default search action
9th BigDataSecurity/HPSC/IDS 2023: New York, NY, USA
- 9th Intl Conference on Big Data Security on Cloud, BigDataSecurity, IEEE Intl Conference on High Performance and Smart Computing, HPSC and IEEE Intl Conference on Intelligent Data and Security IDS 2023, New York, NY, USA, May 6-8, 2023. IEEE 2023, ISBN 979-8-3503-1293-5
- Redwan Walid, Karuna P. Joshi, Seung Geol Choi:
Semantically Rich Differential Access to Secure Cloud EHR. 1-9 - Kaiyin Zhu, Neal N. Xiong, Mingming Lu:
A Survey of Weakly-supervised Semantic Segmentation. 10-15 - Hao Ren, Guowen Xu, Han Qiu, Tianwei Zhang:
PriFR: Privacy-preserving Large-scale File Retrieval System via Blockchain for Encrypted Cloud Data. 16-23 - Tre' R. Jeter, My T. Thai:
Privacy Analysis of Federated Learning via Dishonest Servers. 24-29 - Xiaodi Li, Md Delwar Hossain, Hideya Ochiai, Latifur Khan:
2MiCo: A Contrastive Semi-Supervised Method with Double Mixup for Smart Meter Modbus RS-485 Communication Security. 30-39 - Hua Guo, Shuo Wang, Hutao Song, Yiran Han, Xiyong Zhang, Jianwei Liu:
A New Method of Construction of Permutation Trinomials with Coefficients 1. 40-44 - Chao Li, Balaji Palanisamy, Runhua Xu, Li Duan:
Cross-Consensus Measurement of Individual-level Decentralization in Blockchains. 45-50 - Xing Li:
An Expert Knowledge Generation Model in Smart Contract Vulnerability Fuzzing. 51-56 - Chi Sing Chum, Xinzhou Wei, Xiaowen Zhang:
Cyber Attack Detection using Secret Sharing Schemes. 57-59 - Ruiyi Zhang, Song Yuan:
Research and Application of Blind Watermark Based on DCT. 60-65 - Rui Sun, Chao Li, Jingyu Liu, Xingchen Sun:
Exploring Downvoting in Blockchain-based Online Social Media Platforms. 66-71 - Jin Lei, Ruifang Jiang, Zhijun Wu:
Malicious ADS-B data Generation Based on Improved GAN. 72-77 - Chaoliang Li, Hongjing Zhou, Yao Liu, Hua Huang, Shukun Liu:
Inventory Big Data Management for Internet of Things based on Privacy Preserving. 78-83 - Safwana Haque, Fadi El-Moussa, Nikos Komninos, Muttukrishnan Rajarajan:
Identification of Important Features at Different IoT layers for Dynamic Attack Detection. 84-90 - Harsh Agrawal, Mohnish Sankhe, Arnav Chaudhari, Deepak Karia, Narendra Bhagat, Najib Ghatte:
Securitizing Microcredits Using blockchain. 91-95 - Gaoxiang Duan, Xiaoying Zheng, Yongxin Zhu, Tao Ren, Yan Yan:
An Efficient Transformer with Distance-aware Attention. 96-101 - Suliman Alazmi, Daniel Conte de Leon:
Customizing OWASP ZAP: A Proven Method for Detecting SQL Injection Vulnerabilities. 102-106 - Feifei Liu, Yu Sun, Zheng Liu, Yu Yan, Huilin Li, Yiran Han, Jianwei Liu:
Lightweight Batch Authentication Protocol for Bus-NB-IoT Hierarchical Network in Smart Grid Using Physically Unclonable Function. 107-114 - Junichi Sakamoto, Kazuki Tachibana, Tsutomu Matsumoto:
Application of Profiled Analysis to ADC-Based Remote Side-Channel Attacks. 115-121 - Hamideh Taslimasa, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani:
ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol. 122-129 - Shiyu Wang, Jiahao Xie, Mingming Lu, Neal N. Xiong:
FedGraph-KD: An Effective Federated Graph Learning Scheme Based on Knowledge Distillation. 130-134 - Yingzi Huo, Kai Jin, Jiahong Cai, Huixuan Xiong, Jiacheng Pang:
Vision Transformer (ViT)-based Applications in Image Classification. 135-140 - Meikang Qiu, Xiangyu Gao:
Multi-level Encryption for Agricultural Data Protection. 141-146 - Mengqiao Zhang, Yingpeng Zhang, Shizhong Li, Qinjun Wan:
Software Trusted Startup and Update Protection Scheme of IoT Devices. 147-152 - Zhang Kunqi, Chunyan Tong, Cai Xiaokang, Wang Hao:
An Individual-differences-based Method for Discovering Viewpoints on Interactive Behavior. 153-162 - Huixuan Xiong, Kai Jin, Jingnian Liu, Jiahong Cai, Lijun Xiao:
Deep Learning-based Image Text Processing Research*. 163-168 - Peng Zhou, Weiqiang Qi, Jiasai Sun, Zichao Xu:
An Efficient Privacy-preserving Join-Aggregation Scheme in Smart Grids. 169-174 - Seth Brozdzik, Michael Paulson, Xiao Chen:
Probabilistic Task Assignment in Edge Computing. 175-180 - Pengyu Zhang, Shijie Gao, Yi Shen, Shiyu Yang, Lizhuang Sun:
SG-RC: SG-CIM Grid Knowledge Graph Relationship Complementation Model Based on Entropy Uncertainty and Semantic Recognition. 181-186 - Jinghai Yi, Yunhua Wen:
An Improved Data Backup Scheme Based on Multi-Factor Authentication. 187-197 - Somil Jain, Cristina Hava Muntean, Rohit Verma:
Honey2Fish - A Hybrid Encryption Approach for Improved Password and Message Security. 198-203 - Fengyun Li, Shuang Huang, Zihao Zhan, Yunfei Lu, Tian Shen, Jianguo Zhou:
Optimizing Cabin Wireless Network Signal Coverage with Ray Tracing Method. 204-209 - Zhi-Ying Yang, Chaohsiung Lee, Lu-Chin Kung, Jung-Tang Huang:
Home health care system for the Elderly based on IMU wearable device. 210-215 - Shuang Huang, Fengyun Li, Zihao Zhan, Kaiyu Li, Wenhao Zhang, Jianguo Zhou:
DDS-Based Information Interaction System for Ship Cloud Storage Data Center. 216-221 - Yunhe Feng, Pradhyumna Poralla, Swagatika Dash, Kaicheng Li, Vrushabh Desai, Meikang Qiu:
The Impact of ChatGPT on Streaming Media: A Crowdsourced and Data-Driven Analysis using Twitter and Reddit. 222-227
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.