default search action
7th SmartCom 2022: New York City, NY, USA
- Meikang Qiu, Zhihui Lu, Cheng Zhang:
Smart Computing and Communication - 7th International Conference, SmartCom 2022, New York City, NY, USA, November 18-20, 2022, Proceedings. Lecture Notes in Computer Science 13828, Springer 2023, ISBN 978-3-031-28123-5 - Qiming Zhao, Jing Wu, Xiang Wu, Jie Fan, Linhao Wang, Fengling Wu:
Design and Implementation of Deep Learning Real-Time Streaming Video Data Processing System. 1-10 - Haolei Wang, Yong Chen, Chao Zhang, Jian Li, Chun Gan, Yinxian Zhang, Xiao Chen:
GenGLAD: A Generated Graph Based Log Anomaly Detection Framework. 11-22 - Wei-Tek Tsai, Weijing Xiang, Shuai Wang, Enyan Deng:
A New Digital-Currency Model Based on Certificates. 23-34 - Chengjun Yang, Ling zhou, Ce Yang:
Meter Location System Base on Jetson NX. 35-44 - Baoquan Ma, YeJian Cheng, Ni Zhang, Peng Wang, XuHua Lei, XiaoYong Huai, JiaXin Li, ShuJuan Jia, ChunXia Wang:
Research on Cross-Domain Heterogeneous Information Interaction System in Complex Environment Based on Blockchain Technology. 45-54 - Wei-Tek Tsai, Zimu Hu, Rong Wang, Enyan Deng, Dong Yang:
A New Blockchain Design Decoupling Consensus Mechanisms from Transaction Management. 55-65 - Rong Wang, Wei-Tek Tsai, Feng Zhang, Le Yu, Hongyang Zhang, Yaowei Zhang:
Adaptive Byzantine Fault-Tolerant ConsensusProtocol. 66-75 - Wei-Tek Tsai, Dong Yang, Zizheng Fan, Feng Zhang, Le Yu, Hongyang Zhang, Yaowei Zhang:
A Multi-level Corporate Wallet with Governance. 76-84 - Wei-Tek Tsai, Dong Yang, Feng Zhang, Le Yu, Hongyang Zhang, Yaowei Zhang:
Blockchains with Five Merkle Trees to Support Financial Transactions. 85-94 - Canwei Liu, Tingqin He, Hangyu Zhu, Yanlu Li, Songyou Xie, Osama Hosam:
A Survey of Recommender Systems Based on Hypergraph Neural Networks. 95-106 - Jian Li, Xiao Chen, Chao Zhang, Hao Wu, Xin Yu, Shiqi Liu, Haolei Wang:
Equipment Health Assessment Based on Node Embedding. 107-119 - Jie Wan, Yiren Qi:
Improvement of ERP Cost Accounting System with Big Data. 120-130 - Meng Wan, Rongqiang Cao, Yangang Wang, Jue Wang, Kai Li, Xiaoguang Wang, Qinmeng Yang:
OpenVenus: An Open Service Interface for HPC Environment Based on SLURM. 131-141 - Xin Liu, Xiaomeng Liu, Xiaofen Tu, Neil N. Xiong:
Design and Analysis of Two Efficient Socialist Millionaires' Protocols for Privacy Protection. 142-151 - Zhirui Luo, Ruobin Qi, Qingqing Li, Jun Zheng, Sihua Shao:
ABODE-Net: An Attention-based Deep Learning Model for Non-intrusive Building Occupancy Detection Using Smart Meter Data. 152-164 - Xiaofen Tu, Xin Liu, Xiangyu Hu, Baoshan Li, Neal N. Xiong:
Confidentially Computing DNA Matching Against Malicious Adversaries. 165-174 - Hui Zhao, Jiacheng Tan, Jiajia Duan:
Research on Action Recognition Based on Zero-shot Learning. 175-187 - Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi:
DPSD: Dynamic Private Spatial Decomposition Based on Spatial and Temporal Correlations. 188-202 - Xun Liu, Hui Zhao:
Scheduling Algorithm for Low Energy Consumable Parallel Task Application Based on DVFS. 203-212 - Dansheng Rao, Lingfeng Bian, Hui Zhao:
Research of Duplicate Requirement Detection Method. 213-225 - Yu Zhang, Lintao Yang, Fuhao Liu, Lei Zhang, Jingjing Zheng, Chongxi Zhao:
Bayesian Causal Mediation Analysis with Longitudinal Data. 226-235 - Caiwu Lu, Fan Ji, Naixue Xiong, Song Jiang, Di Liu, Sai Zhang:
Track Obstacle Real-Time Detection of Underground Electric Locomotive Based on Improved YOLOX. 236-246 - Jun Liu, Xu Shen, Mingyue Xie, Qi Zhang:
Research on Sharding Strategy of Blockchain Based on TOPSIS. 247-257 - Zikang Chen, Xiangcong Kong, Xiaoying Zheng, Yongxin Zhu, Tom Trigano:
Parallel Pileup Correction for Nuclear Spectrometric Data on Many-Core Accelerators. 258-267 - Xiangyu Gao, Meikang Qiu, Hui Zhao:
Component Extraction for Deep Learning Through Progressive Method. 268-279 - Neal N. Xiong, Wenyong He, Mingming Lu:
LowFreqAttack: An Frequency Attack Method in Time Series Prediction. 280-289 - Hui Zhao, Peng Su, Meikang Qiu:
A Novel Machine Learning-Based Model for Reentrant Vulnerabilities Detection. 290-299 - Jingnian Liu, Weihong Huang, Lijun Xiao, Yingzi Huo, Huixuan Xiong, Xiong Li, Weidong Xiao:
Deep Learning Object Detection. 300-309 - Jun Liu, Qi Zhang, Mingyue Xie, Ming-Peng Chen:
A Decision-Making Method for Blockchain Platforms Using Axiomatic Design. 310-318 - Yue Zhang, Keke Gai, Liehuang Zhu, Meikang Qiu:
An Auxiliary Classifier GAN-Based DDoS Defense Solution in Blockchain-Based Software Defined Industrial Network. 319-328 - Shan Jin, Yong Li, Xi Chen, Ruxian Li, Zhibin Shen:
Blockchain-Based Fairness-Enhanced Federated Learning Scheme Against Data Poisoning Attack. 329-339 - Ying Long, Yinyan Gong, Weihong Huang, Jiahong Cai, Nengxiang Xu, Kuan-Ching Li:
Cryptography of Blockchain. 340-349 - Yuan Li, Ran Guo, Guopeng Wang, Lejun Zhang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen:
An Efficient Detection Model for Smart Contract Reentrancy Vulnerabilities. 350-359 - An Wang, Shulin He, Congming Wei, Shaofei Sun, Yaoling Ding, Jiayao Wang:
Using Convolutional Neural Network to Redress Outliers in Clustering Based Side-Channel Analysis on Cryptosystem. 360-370 - Xuan You, Changsong Zhou, Zeng Chen, Yu Gu, Rui Han, Guozi Sun:
Secure File Outsourcing Method Based on Consortium Blockchain. 371-380 - Feixiang Ren, Sujuan Qin:
Fabric Smart Contract Read-After-Write Risk Detection Method Based on Key Methods and Call Chains. 381-392 - Hui Zhao, Jiacheng Tan:
A Critical-Path-Based Vulnerability Detection Method for tx.origin Dependency of Smart Contract. 393-402 - Hui Zhao, Xing Li, Keke Gai:
A Dynamic Taint Analysis-Based Smart Contract Testing Approach. 403-413 - Xiaoli Huang, Andi Liu, Yizhong Liu, Li Li, Zhenglin Lv, Fan Wang:
Construction Practice of Cloud Billing Message Based on Stream Native. 414-427 - Jiasheng Cui, Li Duan, Mengchen Li, Wei Wang:
A Fine-Grained Access Control Framework for Data Sharing in IoT Based on IPFS and Cross-Blockchain Technology. 428-438 - Wenyu Shao, Xueyang Liu, Wenhui Hu, Xiankui Zhang, Xiaodong Zeng:
Research on Diabetes Disease Development Prediction Algorithm Based on Model Fusion. 439-449 - Zimu Hu, Wei-Tek Tsai, Li Zhang:
Smart-Contract Vulnerability Detection Method Based on Deep Learning. 450-460 - Peiyun Ran, Mingsheng Liu, Jianwu Zheng, Md. Zakirul Alam Bhuiyan, Jianhua Li, Gang Li, Shiyuan Yu, Lifeng Wang, Song Tang, Peng Zhao:
Automatic Smart Contract Generation with Knowledge Extraction and Unified Modeling Language. 461-474 - Nengxiang Xu, Jiahong Cai, Yinyan Gong, Huan Zhang, Weihong Huang, Kuan-Ching Li:
Blockchain Scalability Technologies. 475-484 - Shuo Wang, Zhiqi Lei, Zijun Wang, Dongjue Wang, Mohan Wang, Gangqiang Yang, Keke Gai:
Blockchain Applications in Smart City: A Survey. 485-494 - Chunyan Tong, Zhanwei Xuan, Song Yang, Zheng Zhang, Hongfeng Zhang, Hao Wang, Xinzhuo Shuang, Hao Sun:
Topic-Aware Model for Early Cascade Population Prediction. 495-504 - Xiangyang Cui, Zhou Yan, Song Yang, Zheng Zhang, Hongfeng Zhang, Hao Wang, Xinzhuo Shuang, Qi Nie:
GeoNet: Artificial Neural Network Based on Geometric Network. 505-514 - Hongze Wang, Qinying Zhang:
Research on Blockchain-Based Smart Contract Technology. 515-524 - Tianxiu Xie, Hong Zhang, Yiwei Feng, Jing Qi, Chennan Guo, Gangqiang Yang, Keke Gai:
Cross-Chain-Based Distributed Digital Identity: A Survey. 525-534 - Chen Zhang, Dong Mao, Lin Cui, Jiasai Sun, Fan Yang, Cong Cao:
Research on Power Border Firewall Policy Import and Optimization Tool. 535-545 - Tao Li, Haolong Wang, Yaozheng Fang, Zhaolong Jian, Zichun Wang, Xueshuo Xie:
Block-gram: Mining Knowledgeable Features for Smart Contract Vulnerability Detection. 546-557 - Renjie Niu, Zixiao Jia, Yizhong Liu, Jianhong Lin, Xiaoli Huang, Min Sun:
Enhanced 4A Identity Authentication Center Based on Super SIM Technology. 558-569 - Jiayi Li, Xinsheng Lei, Jieyu Su, Hui Zhao, Zhenyu Guan, Dawei Li:
Verifiable, Fair and Privacy-Preserving Outsourced Computation Based on Blockchain and PUF. 570-580 - Xiangyu Gao, Meikang Qiu, Hui Zhao:
Architecture Search for Deep Neural Network. 581-596 - Siqi Xie, Jiahong Cai, Hangyu Zhu, Ce Yang, Lin Chen, Weidong Xiao:
Blockchain Development. 597-606 - Qinying Zhang, Hongze Wang:
Research on Blockchain-Based Food Safety Traceability Technology. 607-616 - Xiaodong Zeng, Wenhui Hu, Xueyang Liu, Yuhang Chen, Wenyu Shao, Lizhuang Sun:
Few-Shot Learning for Medical Numerical Understanding Based on Machine Reading Comprehension. 617-628 - Yawei Li, Yanli Liu, Heng Zhang, Neal Naixue Xiong:
A Feature Extraction Algorithm Based on Blockchain Storage that Combines ORB Feature Points and Quadtree Division. 629-638 - Weijie Chen, Ran Guo, Guopeng Wang, Lejun Zhang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen:
Smart Contract Vulnerability Detection Model Based on Siamese Network. 639-648 - Chunyan Tong, Kai Zhang, Yang Song, Zhang Zheng, Hongfeng Zhang, Hao Wang, Xinzhuo Shuang, Liu Yerui:
Context-User Dependent Model for Cascade Retweeter Prediction. 649-658 - Ni Zhang, Baoquan Ma, Peng Wang, XuHua Lei, YeJian Cheng, JiaXin Li, XiaoYong Huai, ZhiWei Shen, Ningning Song, Long Wang:
Heterogeneous System Data Storage and Retrieval Scheme Based on Blockchain. 659-668 - Dylan Yu, Ethan Yang, Alissa Shen, Dan E. Tamir, Naphtali Rishe:
Fbereum: A Novel Distributed Ledger Technology System. 669-684 - Pengyong Ding, Zian Jin, Yizhong Liu, Min Sun, Hong Liu, Li Li, Xin Zhang:
Indistinguishable Obfuscated Encryption and Decryption Based on Transformer Model. 685-694 - Jiahong Xiao, Wei Liang, Jiahong Cai, Hangyu Zhu, Xiong Li, Songyou Xie:
An Investigation of Blockchain-Based Sharding. 695-704
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.