Abstract is missing.
- Web Service Composition Sequence Learning Based on Neural Language NetworksKungan Zeng, Incheon Paik. 1-8 [doi]
- Profiling of Disease-Associated Proteins Neighborhood NetworksSheheeda Manakkadu, Sourav Dutta, Sam R. Thangiah. 9-13 [doi]
- Big Data Science on COVID-19 DataCarson K. Leung, Yubo Chen 0003, Siyuan Shang, Deyu Deng. 14-21 [doi]
- Exploring the Application of Machine Learning Algorithms to the City Public Bus TransportMichael Alicea, Arlen P. McDonald, Chunyang Tang, Jeong Yang. 22-27 [doi]
- Goal-driven Look-alike Modelingfor Mobile ConsumersNisha Verma, Sangaralingam Kajanan, Anindya Datta. 28-35 [doi]
- Using GWAS SNPs to Determine Association between COVID-19 and Comorbid DiseasesRyan Yixiang Wang, Tim Qinsong Guo, Leo Guanhua Li, Julia Yutian Jiao. 36-40 [doi]
- Real-Time Social Media Analytics with Deep Transformer Language Models: A Big Data ApproachAhmed Ahmet, Tariq Abdullah. 41-48 [doi]
- A Novel Bilateral Oblivious Transfer Protocol Based on Cut-and-Choose TechniqueLulu Ning, Jian Wang. 49-56 [doi]
- Animated Commentator Enhanced Network Monitoring and Visualization Application for Cyber Security CompetitionJie Yan, Claude Turner, Dwight Richards. 57-64 [doi]
- An Improved RFID-based Authentication Protocol for Rail TransitRong Zhu, Xiaoxi He, Jiahong Xie, Zongjie Zhang, Ping Wang. 65-72 [doi]
- DP-AP: Differential Privacy-Preserving Affinity Propagation ClusteringHanbo Cai, Jinyan Wang, Xiaohong Liu, Xianxian Li. 73-79 [doi]
- A machine-learning based framework for detection of fake political speechChinguun Purevdagva, Rui Zhao, Pei-Chi Huang, William Mahoney. 80-87 [doi]
- IoTDefender: A Federated Transfer Learning Intrusion Detection Framework for 5G IoTYulin Fan, Yang Li, Mengqi Zhan, Huajun Cui, Yan Zhang. 88-95 [doi]
- Hardware Trojan Detection Combines with Machine Learning: an Isolation Forest-based Detection MethodTaifeng Hu, Liji Wu, Xiangmin Zhang, Zhaopo Liao. 96-103 [doi]
- Policy Enforcement for Secure and Trustworthy Data Sharing in Multi-domain InfrastructuresXin Zhou, Reginald Cushing, Ralph Koning, Adam Belloum, Paola Grosso, Sander Klous, Tom M. van Engers, Cees de Laat. 104-113 [doi]
- Reputation-based Trust: A robust mechanism for Dynamic Adaptive Streaming over Named Data NetworkingIoanna Angeliki Kapetanidou, Muhammad Hassan 0001, Christos-Alexandros Sarros, Mauro Conti, Vassilis Tsaoussidis. 114-121 [doi]
- A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use CaseSyed Ghazanfar Abbas, Shahzaib Zahid, Faisal-Bashir Hussain, Ghalib A. Shah, Muhammad Husnain. 122-129 [doi]
- Side Channel Leakage Alignment Based on Longest Common SubsequenceAnni Jia, Wei Yang, Gongxuan Zhang. 130-137 [doi]
- A Systematic Study of AI Applications in Cybersecurity CompetitionsFangjiao Zhang, Xiang Cui, Zhi Wang, Shaomian Chen, Qixu Liu, Chaoge Liu. 138-146 [doi]
- Invariance of Algebraic Immunity of Vectorial Boolean Functions under Equivalence RelationsYan Tong, Huanguo Zhang, Zhengwei Ren, Shiwei Xu. 147-154 [doi]
- Blockchain-based Multi-Levels Trust Mechanism Against Sybil Attacks for Vehicular NetworksAchref Haddaji, Samiha Ayed, Lamia Chaari Fourati. 155-163 [doi]