Abstract is missing.
- Security Vulnerabilities in Consumer IoT ApplicationsArjun Shakdhe, Suyash Agrawal, Baijian Yang. 1-6 [doi]
- On Relating Code Smells to Security VulnerabilitiesAbdulrahman Abu Elkhail, Tomás Cerný. 7-12 [doi]
- A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple AuthorizationsZeyad A. Al-Odat, Eman Al-qtiemat, Samee Khan. 13-18 [doi]
- Anomaly Detection Models for Smart Home SecuritySowmya Ramapatruni, Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi, Karuna P. Joshi. 19-24 [doi]
- Using Healthcare Authority and Patient Blockchains to Develop a Tamper-Proof Record Tracking SystemUttkarsh Goel, Ron Ruhl, Pavol Zavarsky. 25-30 [doi]
- An Anonymous Mutual Authentication and Key Agreement Scheme in WBANXiangwei Meng, Jianbo Xu, Wei Liang 0005, Kuan-Ching Li. 31-36 [doi]
- Blockchain - Can It Solve the Security Issues and Fraud Expenses for Credit Card Commerce?Kevin Mayhew, Weifeng Chen. 37-41 [doi]
- Streaming Machine Learning For Real-Time Gas Concentration PredictionHaibo Wu, Shiliang Shi, Qifeng Nian. 42-46 [doi]
- A Policy Based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network TrafficArya Renjan, Sandeep Nair Narayanan, Karuna Pande Joshi. 47-52 [doi]
- An Analysis of Differential Privacy Research in Location DataFatima Zahra Errounda, Yan Liu. 53-60 [doi]
- Predicting Network Attacks with CNN by Constructing Images from NetFlow DataXiang Liu, Ziyang Tang, Baijian Yang. 61-66 [doi]
- Privacy-Preserving Predictive Model Using Factor Analysis for Neuroscience ApplicationsSuprateek Kundu, Shan Suthaharan. 67-73 [doi]
- Asynchronous Parallel Surrogate Optimization Algorithm Based on Ensemble Surrogating Model and Stochastic Response Surface MethodYongze Sun, Zhonghua Lu. 74-84 [doi]
- Implementation of Markowitz Mean-Variance Model Based on Matrix-Valued Factor AlgorithmShouyan Du, Yongze Sun, Yonghong Hu, Zhonghua Lu. 85-89 [doi]
- Privacy Protection Oriented Video Data Hiding MethodSi Liu, Yunxia Liu, Zipei Wang, Cong Feng, Hongguo Zhao. 90-95 [doi]
- Transfer Learning for Speech Emotion RecognitionZhijie Han 0001, Huijuan Zhao, Ruchuan Wang 0001. 96-99 [doi]
- The Research on Process Model of Automatic Generation of Political News Event ReportsBiao Wang, Juneui Yu, Shun Li, Guowei Bai. 100-107 [doi]
- A Classification Method of Ancient Ceramics Based on Support Vector Machine in Ceramic Cloud Service PlatformLi-hua Yang, Hua Huang. 108-112 [doi]
- An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data SharingLiehuang Zhu, Hui Dong, Meng Shen, Keke Gai. 113-118 [doi]
- Data-Driven Uncertain Modeling and Optimization Approach for Heterogeneous Network SystemsHai Wang, Hao Jiang, Jing Wu 0016. 119-125 [doi]
- Classification of Base Station Time Series Based on Weighted Adjustable-Parameter LPVGLuqi Li, Hao Jiang 0010, He Nai. 126-131 [doi]
- Concentration Determination of Ternary Mixtures in Water using Ultraviolet Spectrophotometry and Artificial Neural NetworksAngxin Tong, Xiaojun Tang, Feng Zhang, Bin Wang, Wei Qiu, Leilei Xi. 132-137 [doi]
- Using Least Squares Support Vector Machine and Polynomial Partial Least Squares Method Quantitative Analysis of Gases in MinesFeng Zhang, Xiaojun Tang, Angxin Tong, Bin Wang, Leilei Xi, Wei Qiu. 138-143 [doi]
- Research On 3d Interactive Model Selection And Customization Of Ceramic Products Based On Big Data Cloud Service PlatformKaihua Hu, Huang Hua, Yujing Zhang. 144-148 [doi]
- High Performance Data Encryption with AES Implementation on FPGAShuang Chen, Wei Hu 0001, Zhenhao Li. 149-153 [doi]
- Attack Models for Big Data Platform HadoopNingwei Li, Hang Gao, Liang Liu, Fan Zhang, Wenxuan Wang. 154-159 [doi]
- Research on Cloud Workflow Engine Supporting Three-Level Isolation and Privacy ProtectionHua Huang 0006, Yilai Zhang, Min Zhang. 160-165 [doi]
- A Geographical Behavior-Based Point-of-Interest RecommendationXiaoyun Yu, Xin Li 0033, Jidong Li, Keke Gai. 166-171 [doi]
- Imbalanced Data Gravitation Classification Model Using For Internet Video Traffic IdentificationAnqi Teng, Lizhi Peng, Yuxi Xie, Haibo Zhang 0001, Zhenxiang Chen. 172-177 [doi]
- A New Multilevel Circuit Partitioning Algorithm Based on the Improved KL AlgorithmXia Lei, Wei Liang 0005, Kuan-Ching Li, Haibo Luo, Jianqiang Hu, Jiahong Cai, Yanting Li. 178-182 [doi]
- A Short Review of Age and Gender Recognition Based on SpeechHuijuan Zhao, Ping Wang. 183-185 [doi]
- Speech Emotion Recognition Based on Multi-Task LearningHuijuan Zhao, Zhijie Han 0001, Ruchuan Wang 0001. 186-188 [doi]
- A Summary of Hamiltonian Based on Data Center NetworkXiaoyu Du, Zhijie Han 0001, Yinhe Huangfu. 189-191 [doi]
- On the Large-Scale Traffic DDoS Threat of Space Backbone NetworkDi Ao, Ruisheng Shi, Lina Lan, Yueming Lu. 192-194 [doi]
- Designing Security System for IoTNandita Sengupta. 195-199 [doi]
- Raw Cardinality Information Discovery for Big DatasetsSudeep Kumar, Deepak Kumar Vasthimal. 200-205 [doi]
- Improving Energy Efficiency of Hadoop Clusters using Approximate ComputingShubbhi Taneja, Yi Zhou 0009, Ajit Chavan, Xiao Qin 0001. 206-211 [doi]
- A New Framework for Network Flow Queuing Delay Prediction Based on Stream ComputingYu Feng, Yue Pan, Bo Zhu, Yuchuan Deng, Jing Wu 0016, Hao Jiang 0010. 212-217 [doi]
- Distributed Parameter Optimization Scheduling Strategy and System Design Based on MesosShuo Li, Zhonghua Lu, Yongze Sun, Sungen Deng, Beifang Niu. 218-224 [doi]
- Perspectives on Anomaly and Event Detection in Exascale SystemsGabriel Iuhasz, Dana Petcu. 225-229 [doi]
- Scalable Data Reporting Platform for A/B TestsDeepak Kumar Vasthimal, Pavan Kumar Srirama, Arun Kumar Akkinapalli. 230-238 [doi]
- Hybrid Route Recommender System for Smarter LogisticsGrieshma Unnikrishnan, Deepa Mathew, Bijoy A. Jose, Raju Arvind. 239-244 [doi]
- Handoff Mechanism Considering Growth Benefit for LEO Satellite and Terrestrial Hybrid NetworkZhaojun Wang, Jiaxin Huang, Sisi Gong, Jing Wu 0016, Hao Jiang 0010. 245-250 [doi]
- Architecture of Cyber-Physical Systems Based on CloudShaojie Luo, Lichen Zhang, Nannan Guo. 251-257 [doi]
- Automated Verbal-Pattern Extraction from Political News Articles using CAMEO Event Coding OntologyErick Skorupa Parolin, Sayeed Salam, Latifur Khan, Patrick T. Brandt, Jennifer S. Holmes. 258-266 [doi]
- An Anomaly Detection Technique for Deception Attacks in Industrial Control SystemsQais Saif Qassim, Abdul Rahim Ahmad, Roslan Ismail, Asmidar Abu Bakar, Fiza Abdul Rahim, Mohd Zin Mokhtar, Ramona Ramli, Busyra Mohd Yusof, Mohammed Najah Mahdi. 267-272 [doi]
- ICS-CRAT: A Cyber Resilience Assessment Tool for Industrial Control SystemsMd Ariful Haque, Sachin Shetty, Bheshaj Krishnappa. 273-281 [doi]
- Efficient Implementation of 2D Barcode Verification Algorithm for IoT ApplicationsAbbas M. Al-Ghaili, Fiza Abdul Rahim, Feninferina Azman, Hairoladenan Kasim. 282-287 [doi]
- DeepVCM: A Deep Learning Based Intrusion Detection Method in VANETYi Zeng, Meikang Qiu, Dan Zhu, Zhihao Xue, Jian-xiong, Meiqin Liu. 288-293 [doi]
- Capturing Real World Derived Information Relevancies In XMLYifan Shu, Qian Xu, Peng Ke. 294-299 [doi]
- A Novel Intrusion Detector Based on Deep Learning Hybrid MethodsShizhao Wang, Chunhe Xia, Tianbo Wang. 300-305 [doi]
- A Comparative Study of Data Anonymization TechniquesSuntherasvaran Murthy, Asmidar Abu Bakar, Fiza Abdul Rahim, Ramona Ramli. 306-309 [doi]
- Is Public Cloud Computing Adoption Strategically the Way to Go for All the Enterprises?Wajid Hassan, Te-Shun Chou, Leslie Pagliari, John Pickard, Tamer Omar. 310-320 [doi]
- Time Series Identification Method for Extracting Structural FeaturesHe Nai, Hao Jiang 0010. 321-327 [doi]
- A Survey on Deception Techniques for Securing Web ApplicationMohd Alif Erfan Mohd Efendi, Zul-Azri Ibrahim, Md Nabil Ahmad Zawawi, Fiza Abdul Rahim, Nor' Azuwa Muhamad Pahri, Anuar Ismail. 328-331 [doi]