Abstract is missing.
- Graph-Based Time Series Edge Anomaly Detection in Smart GridAidong Xu, Tao Wu, Yunan Zhang, Zhiwei Hu, Yixin Jiang. 1-6 [doi]
- A Semantically Rich Knowledge Graph to Automate HIPAA Regulations for Cloud Health IT ServicesDae Young Kim, Karuna P. Joshi. 7-12 [doi]
- Community Detection of Mobile Internet Delivery UsersWei Peng, Yonglu Li, Huifang Liu, Xiuping Ouyang, Min Lin, Lixia Li, Ying Wang, Zhijie Chen, Haining Ye, Ziwen Peng. 13-19 [doi]
- Unsupervised Perturbation based Self-Supervised Adversarial TrainingZhuoyi Wang, Yu Lin, Yifan Li, Feng Mi, Zachary Tian, Latifur Khan, Bhavani M. Thuraisingham. 20-25 [doi]
- Research on Data Security Technology Based on Blockchain TechnologyShuang Xie, Yujie Hong, Xiangdie Wang, Jie Shen. 26-31 [doi]
- Improvement of the DPoS Consensus Mechanism in Blockchain Based on PLTSShuyu Chen, Mingyue Xie, Jun Liu 0044, Yunan Zhang. 32-37 [doi]
- Automated Compliance of Mobile Wallet Payments for Cloud ServicesAnkur Nagar, Lavanya Elluri, Karuna Pande Joshi. 38-45 [doi]
- Research on Big Data Value Creation System Applied to CPSXiaoyan Chen, Jiangling Ge, Wei Huang. 46-51 [doi]
- Webshell Detection Technology Based on Deep LearningZiheng Zhou, Lin Li, Xu Zhao. 52-56 [doi]
- Research on Bootstrapping Algorithm for Health Insurance Data Fraud Detection Based on Decision TreeWenyi Yang, Wenhui Hu, Yingjie Liu, Yu Huang, Xueyang Liu, Shikun Zhang. 57-62 [doi]
- Machine-Learning based MOOC learning data analysisHong Guo, Yining Li, Fang Liu, Wei Hu. 63-68 [doi]
- Enabling Flexible Administration in ABAC Through Policy Review: A Policy Machine Case StudySherifdeen Lawal, Ram Krishnan. 69-74 [doi]
- Filtration method of DDoS attacks based on time-frequency analysisZhijun Wu, Weihang Cui, Pan Gao. 75-80 [doi]
- User and Event Behavior Analytics on Differentially Private Data for Anomaly DetectionFatema Rashid, Ali Miri. 81-86 [doi]
- Algorithm selection for software verification based on adversarial LSTMQiang Wang, Jiawei Jiang, Yongxin Zhao, Weipeng Cao, Chunjiang Wang, Shengdong Li. 87-92 [doi]
- A Method for Finding Quasi-identifier of Single Structured Relational DataYi-Hua, Zhangbing Li, Hankang Sheng, Baichuan Wang. 93-98 [doi]
- An Automatic and Unified Consistency Verification Rule and Method of SG-CIM ModelXiaoqi Liao, Hang Li, Xing Li, Pengyu Zhang, Yu Huang, Chunmei Wang. 99-104 [doi]
- Chinese Text Classification Model Based On Bert And Capsule Network StructureHong Guo, Tianyi Liu, Fang Liu, Yining Li, Wei Hu. 105-110 [doi]
- A Secure and Decentralized Reconfiguration Protocol For Sharding BlockchainsYizhong Liu, Yu Xia, Jianwei Liu, Yiming Hei. 111-116 [doi]
- Research on Sentiment Dictionary Based on Sentiment Analysis in News DomainYihang Gao, Peng Su, Hui Zhao 0002, Meikang Qiu, Meiqin Liu. 117-122 [doi]
- Zero-shot Question Generation: Accelerate the Development of Domain-specific Dialogue SystemLei Zhang, Meng Ma, Ping Wang. 123-128 [doi]
- A community detection algorithm based on discrete mixed fruit fly optimizationJun Liu, Sule Tang, Chuang Ma, Sishi Qin, Wei Li, Aidong Xu. 129-134 [doi]
- A Smart Solution with Ignition Interlock Device to Prevent Drunk-Driving AccidentsSudiksha Das. 135-140 [doi]
- A Data Privacy and Authentication Scheme Based on Internet of VehiclesQiaohong Wu, Weidong Xiao, Xiaoke Hu, Peiyuan Zhu, Xihua Chen. 141-145 [doi]
- Energy-efficient Smart Parking for Self-driving VehiclesXiao Chen. 146-150 [doi]
- Overview of Privacy Protection Data Release Anonymity TechnologyHan Deng, Zhechon Wang, Yazhen Zhang. 151-156 [doi]
- Toward Pinpointing Data Leakage from Advanced Persistent ThreatsJack D'Agostino, Gökhan Kul. 157-162 [doi]
- Research on Secret Sharing Scheme in CPS EnvironmentXiaoyan Chen, Weidong Xiao, Weijiang Zhang, Qifeng Xie, Sujuan Zhang. 163-168 [doi]
- Big Data Analysis System Based on Cloudera Distribution HadoopAlan Hong, Weidong Xiao, Jiangling Ge. 169-173 [doi]
- A Cloud Data Storage Technology for Alliance Blockchain TechnologyHan Deng, Fei Fang, Juan Chen, Yazhen Zhang. 174-179 [doi]
- A Mapping Method for Reconfigurable Array based on Decoupled DataFlowZihan Zhang, Jianfei Jiang, Weiguang Sheng, Qin Wang, Zhigang Mao, Naifeng Jing. 180-185 [doi]
- Virtual Assistant for Forensics Recovery of IoT DevicesAngel Castro 0003, Alexander Perez-Pons. 186-190 [doi]
- GANN: A Graph alignment neural network for video partial copy detectionXiyue Liu, Xin Feng, Pan Pan. 191-196 [doi]
- Cyberbullying and Hate Speech Detection on Kazakh-Language Social NetworksDaniyar Sultan, Shynar Mussiraliyeva, Aigerim Toktarova, Marat Nurtas, Zhalgasbek Iztayev, Lyazzat Zhaidakbaeva, Lazzat Shaimerdenova, Oxana Akhmetova, Batyrkhan Omarov. 197-201 [doi]
- Human Mobility Model in Mission-oriented Opportunistic NetworksYue Wang, Xinlian Zhou, Shiwen Zhang, Weihong Huang. 202-207 [doi]
- Improving Satisfaction in Crowdsourcing PlatformsGriffith Samore, Jonah Bates, Xiao Chen. 208-213 [doi]