Abstract is missing.
- Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABESharad Dixit, Karuna Pande Joshi, Seung Goel Choi, Lavanya Elluri. 1-10 [doi]
- Message from the General ChairsHongjun Dai. 1 [doi]
- Message from the Program Chairs IDS 2022Han Qiu, Luna Li, Linghe Kong. 1 [doi]
- Message from the Program Chairs BigDataSecurity 2022Yonghao Wang, Shui Yu, Yongxin Zhu. 1 [doi]
- Message from the Program Chairs HPSC 2022Cheng Zhang, Keke Gai, Jihe Wang. 1 [doi]
- An Insider Threat Detection Method Based on Heterogeneous Graph EmbeddingChaofan Zheng, Wenhui Hu, Tianci Li, Xueyang Liu, Jinchan Zhang, Litian Wang. 11-16 [doi]
- Predicting Relations in SG-CIM Model Based on Graph Structure and Semantic InformationPengyu Zhang, Yufei Li, Xinliang Ge, Wenhui Hu, Lizhuang Sun, Xueyang Liu. 17-22 [doi]
- A Semantic Analysis-Based Method for Smart Contract VulnerabilityXingrun Yan, Shuo Wang, Keke Gai. 23-28 [doi]
- Correlation Power Analysis and Protected Implementation on Lightweight Block Cipher FESHShijun Ding, an Wang, Shaofei Sun, Yaoling Ding, Xintian Hou, Dong Han. 29-34 [doi]
- Overview of Blockchain and Cloud Service IntegrationFeng Yang, Liao Lei, Hangyu Zhu. 35-40 [doi]
- A Russian Hate Speech Corpus for Cybersecurity ApplicationsXin Wen, Yulan Wang, Kai Wang, Ran Sui. 41-47 [doi]
- Modeling Learner Behavior Analysis Based on Educational Big Data and Dynamic Bayesian NetworkFang Liu, Zimeng Fan, Feihu Huang, Yining Li, Yanxiang He, Wei Hu. 48-53 [doi]
- Cloud Storage I/O Load Prediction Based on XB-IOPS Feature EngineeringChenjun Liang, Li Deng, Jincan Zhu, Zhen Cao, Chao Li. 54-60 [doi]
- Remote Audit Scheme of Embedded Device Software Based on TPMDawei Li, YingPeng Zhang, Jian Cui, Di Liu, Yu Sun, Zhenyu Guan, Xu Wang. 61-66 [doi]
- Practical Verifiable Computation on Encrypted DataXunwu Gong, Bin Hu, Yunqiang Xiong, Xiaofang Zhao. 67-74 [doi]
- High-performance Distributed Feature Storage and Consumption Services in Power Grid ScenariosGuoqing Wang, Yiming Lu, Peng Liu, Wang Zhou. 75-80 [doi]
- An Automatic Model Table Entity Alignment Framework for SG-CIM ModelFangjun Li, Runzhen Yan, Rui Su, Yating Wang, Xueyang Liu, Kehui Xu. 81-86 [doi]
- Job Scheduling on Edge and Cloud ServersXiao Chen. 87-91 [doi]
- Public Transit Prediction During COVID-19 PandemicJoshua Smith, Yingying Zhu, Zheng Li. 92-94 [doi]
- Disk Failure Prediction Based on SW-Disk Feature EngineeringChenjun Liang, Li Deng, Jincan Zhu, Zhen Cao, Chao Li. 95-100 [doi]
- Method of Interaction between Blockchain and the World outside the Chain based on Oracle MachineFeng Yang, Liao Lei, Lin Chen. 101-106 [doi]
- EVCS: An Edge-assisted Virtual Computing and Storage Approach for Heterogeneous Desktop DeploymentMing Wu, Lei Zhou, Fujin Huang. 107-112 [doi]
- Efficient Process Scheduling for Multi-core SystemsXiangyu Gao, Meikang Qiu. 113-118 [doi]
- TANN: Text-based Attention Neural Network Recommendation ModelGang Qiu, Yanli Guo, Changjun Song. 119-124 [doi]
- An Intrusion Detection Method for Cyber Monintoring Using Attention based Hierarchical LSTMHaixia Hou, Zijun Di, Mingqiang Zhang, Dongfeng Yuan. 125-130 [doi]
- Prediction of CNC Machine Tool Wear Stat Based on LSTMLei Tengfei, Fu Haiyan, Huang Lili, Hongyan Zang, Zhou You, Yan Tingyang. 131-136 [doi]
- A Hybrid Deep Learning Anomaly Detection Framework for Intrusion DetectionRahul Kale, Zhi Lu, Kar-Wai Fok, Vrizlynn L. L. Thing. 137-142 [doi]
- Research and Application of Image Style Transfer MethodLuoyifan Zhong, Na Li, Yi Sun. 143-147 [doi]
- Identification and Analysis of Tool Wear State Based on Deep LearningYi Sun, Luoyifan Zhong, Hao Yue, Tao Mi. 148-153 [doi]
- An identity-based message authentication scheme for Internet of vehiclesChenyang Yan, Hongshuo Wang, Songsong Yan. 154-156 [doi]
- Research on Face Recognition Algorithm Based on CNN and Image Super-resolution ReconstructionFeng Cao, Min Su. 157-161 [doi]
- Fault Prediction of Process Industry Based on Fuzzy ClusteringTao Mi, Luoyifan Zhong, Xin He, Yi Sun, Chenyang Yan, Hao Yue. 162-167 [doi]
- New Method of Song Sentiment Classification Based on Neural NetworkYing Yu. 168-173 [doi]
- Node Similarity-based Search Method for Medical Insurance Heterogeneous Information NetworkLitian Wang, Wenhui Hu, Tong Zheng, Shanshan Yin, Xiaoya Zhang, Xueyang Liu. 174-179 [doi]
- Toward a BCI-Based Personalized Recommender System Using Deep LearningSukun Li, Xiaoxing Liu. 180-185 [doi]
- Optimization and Prediction of Intelligent Tourism DataLuoyifan Zhong. 186-188 [doi]
- On the Feasibility of T-PKI as an Anonymization Protocol for TPMs in Trusted Computing EnvironmentsArt Sedighi, Thomas Daniels, Doug Jacobson. 189-193 [doi]
- "How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Malware DetectorZhi Lu, Vrizlynn L. L. Thing. 194-199 [doi]
- Civil Servant Position Recommendation Algorithm Based on Model FusionJinchan Zhang, Xueyang Liu, Wenyu Shao, Wenhui Hu, Wenmo Zhang, Chaofan Zheng. 200-205 [doi]
- Medicare Fraud Gang Discovery Based on Community Discovery AlgorithmsWenmo Zhang, Xueyang Liu, Xiaoya Zhang, Wenhui Hu, Jinchan Zhang, Wenyu Shao. 206-211 [doi]
- Overview of Blockchain Privacy ProtectionCe Yang, Juan Chen, Bin Zeng, Lei Liao. 212-217 [doi]
- A Federated Approach for Learning from Electronic Health RecordsSadaf M. D. Halim, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham, Md. Delwar Hossain. 218-223 [doi]
- SentMod: Hidden Backdoor Attack on Unstructured Textual DataSaquib Irtiza, Latifur Khan, Kevin W. Hamlen. 224-231 [doi]