Abstract is missing.
- Message from the Program Chairs EdgeCom 2020 CSCloud-EdgeCom 2020Albert Y. Zomaya, Ziliang Zong, Keke Gai. [doi]
- Message from the Program Chairs CSCloud 2020 CSCloud-EdgeCom 2020Zakirul Alam, Zonghua Zhang, Haibo Zhang 0001. 1 [doi]
- Deep Learning, Cloud Computing for Credit/Debit Industry Analysis of Consumer BehaviorYohn Jairo Parra Bautista, Richard Aló, Ningning Wang. 1-7 [doi]
- Message from the General Chair CSCloud-EdgeCom 2020Meikang Qiu. 1 [doi]
- Cyber Security and Artificial Intelligence for Cloud-based Internet of Transportation SystemsBhavani M. Thuraisingham. 8-10 [doi]
- Research on Text Classification Method of Distribution Network Equipment Fault based on Deep LearningWei Liu, Jian Su, Zhenyu Mao, Peipei Jin, Yu Huang, Chengfeng Dou, Limei Zhou, Yuwei Shang. 11-16 [doi]
- Autonomous Driving and Control: Case Studies with Self-Driving PlatformsPei-heng Hong, Meikang Qiu, Yuehua Wang. 17-22 [doi]
- Attribute-Based Weighted Keyword Search Scheme Supporting Multi-Search Mechanism in Fog ComputingShulan Wang, Yuan Li, Haiyan Wang, Xi Zhang, Jianyong Chen. 23-28 [doi]
- Derepo: A Distributed Privacy-Preserving Data Repository with Decentralized Access Control for Smart HealthYepeng Ding, Hiroyuki Sato. 29-35 [doi]
- Minimizing Data Breach by a Malicious Fog Node within a Fog FederationMohammed Alshehri, Brajendra Panda. 36-43 [doi]
- Digital Forensic Analysis of Fitbit Wearable Technology: An Investigator's GuideAtheer Almogbil, Abdullah Alghofaili, Chelsea Deane, Timothy R. Leschke. 44-49 [doi]
- Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on ContainersWonjun Lee, Mohammad Nadim. 50-55 [doi]
- Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS AttackSaikat Das, Deepak Venugopal, Sajjan G. Shiva, Frederick T. Sheldon. 56-61 [doi]
- LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values TuningMd Delwar Hossain, Hideya Ochiai, Doudou Fall, Youki Kadobayashi. 62-69 [doi]
- DeepfakeStack: A Deep Ensemble-based Learning Technique for Deepfake DetectionMd. Shohel Rana, Andrew H. Sung. 70-75 [doi]
- Trustworthy When Human and Bots Are MingledZhixiong Chen, Zhihui Lu 0002, Abhishek Sane, Anthony Bhimsain. 76-81 [doi]
- Detection and Blocking of DGA-based Bot Infected Computers by Monitoring NXDOMAIN ResponsesYuki Iuchi, Yong Jin, Hikaru Ichise, Katsuyoshi Iida, Yoshiaki Takai. 82-87 [doi]
- G-Model: A Novel Approach to Privacy-Preserving 1: M Microdata PublicationKhalid Albulayhi, Predrag T. Tosic, Frederick T. Sheldon. 88-99 [doi]
- Blockchain-Based Architecture for Secured Cyber-Attack Features ExchangeOluwaseyi Ajayi, Tarek N. Saadawi. 100-107 [doi]
- Research on Aviation Man-made Error Detection and Its Impact on Flight SafetyDesheng Xu, Junyi Zhai. 108-112 [doi]
- An Analytical Framework to Control the Synchronization on NetworksWenting Wang, Xingxing Zhou, Minmin Zhang. 113-119 [doi]
- A Biologically Inspired Feature Enhancement Framework for Zero-Shot LearningZhongwu Xie, Weipeng Cao, Xizhao Wang, Zhong Ming 0001, Jingjing Zhang 0005, Jiyong Zhang. 120-125 [doi]
- Clustering Ensembles Based on Probability Density Function EstimationYingyan Wu, Yulin He, Joshua Zhexue Huang. 126-131 [doi]
- Formal analysis of QUIC handshake protocol using ProVerifJingjing Zhang 0005, Lin Yang, Xianming Gao, Qiang Wang. 132-138 [doi]
- Observation Points-Based Particle Swarm Optimization AlgorithmShengsheng Xu, Yulin He, Joshua Zhexue Huang. 139-144 [doi]
- Design and Implementation of Virtual Pottery Space Based on Ceramic Cloud Service PlatformWentao Zhang, Hua Huang, Meikang Qiu. 145-150 [doi]
- Intelligent Algorithm for Ceramic Decorative Pattern Style Transfer Based on CycleGANXinxin Liu, Hua Huang, Meikang Qiu. 151-156 [doi]
- Traffic identification algorithm based on improved LRUSong Wen, Donghong Qin, Ting Lv, Lina Ge, Xiaodong Yang. 157-159 [doi]
- Deep Binarized Convolutional Neural Network Inferences over Encrypted DataJunwei Zhou, Junjiong Li, Emmanouil Panaousis, Kaitai Liang. 160-167 [doi]
- Cost Minimization for Music Uploading to a CloudletGrace Peng, Meikang Qiu. 168-173 [doi]
- Energy Consumption for IoT Streaming ApplicationsManoj Muniswamaiah, Tilak Agerwala, Charles C. Tappert. 174-177 [doi]
- Risks of Increase in the IoT DevicesSahba Bahizad. 178-181 [doi]
- Green computing for Internet of ThingsManoj Muniswamaiah, Tilak Agerwala, Charles C. Tappert. 182-185 [doi]
- The Accuracy of GPS-Enabled Fitbit Activities as Evidence: A Digital Forensics StudyAtheer Almogbil, Abdullah Alghofaili, Chelsea Deane, Timothy R. Leschke, Atheer Almogbil, Abdullah Alghofaili. 186-189 [doi]
- Performance of databases in IoT applicationsManoj Muniswamaiah, Tilak Agerwala, Charles C. Tappert. 190-192 [doi]
- Parallel Multi-threaded Gridrec Algorithm for Computer Tomography on GPU for Edge ComputingXintong Chen, Yongxin Zhu 0001, Xiaoying Zheng, Si Miao, Tianhao Nan, Wanyi Li. 193-198 [doi]
- Truthful Computation Offloading Mechanisms for Edge ComputingWeibin Ma, Lena Mashayekhy. 199-206 [doi]
- Service Placement for Real-Time Applications: Rate-Adaptation and Load-Balancing at the Network EdgeSaadallah Kassir, Gustavo de Veciana, Nannan Wang, Xi Wang, Paparao Palacharla. 207-215 [doi]
- CUPA: A Configurable User Privacy Approach For Android Mobile ApplicationZainab Alkindi, Mohamed Sarrab, Nasser Alzidi. 216-221 [doi]
- A Resource Management Model for Real-time Edge System of Multiple RobotsZheyuan Hu, Jianwei Niu, Tao Ren, Huiyong Li, Ye Rui, Yuan Qiu, Liang Bai. 222-227 [doi]
- Research on Load Forecasting Method of Distribution Transformer based on Deep LearningLei Chen, Huihua Yu, Li Tong, Xu-Huai, Peipei Jin, Yu Huang, Chengfeng Dou. 228-233 [doi]
- FPGA-based Hardware Acceleration for Image Copyright Protection Syetem Based on BlockchainWanyi Li, Yongxin Zhu 0001, Li Tian, Tianhao Nan, Xintong Chen. 234-239 [doi]
- Cloud-based Livestock Monitoring System Using RFID and Blockchain TechnologyLiuqing Yang, Xiao-Yang Liu, Jeong-Soo Kim. 240-245 [doi]
- Edge Computing-based 3D Pose Estimation and Calibration for Robot ArmsQun Ma, Jianwei Niu 0002, Zhenchao Ouyang, Mo Li, Tao Ren, Qingfeng Li. 246-251 [doi]
- Craft Distillation: Layer-wise Convolutional Neural Network DistillationCody Blakeney, Xiaomin Li, Yan Yan 0002, Ziliang Zong. 252-257 [doi]
- Research on Edge Intelligence-based Security Analysis Method for Power Operation SystemZheng Zhu, Yingjie Tian, Fan Li, Hongshan Yang, Zheng Ma, Guoping Rong. 258-263 [doi]
- Assessing the Reliability of Hybrid Clouds with Monte Carlo SimulationXiaowei Wang, Gefan Ren, Huajian Zhou, Guotao Xie, Yougang Bian, Biao Xu. 264-269 [doi]
- Automated Student Engagement Monitoring and Evaluation during Learning in the WildYuehua Wang, Anuhya Kotha, Pei-heng Hong, Meikang Qiu. 270-275 [doi]
- Performance Analysis of Two Cloud-Based IoT Implementations: Empirical StudyMohammed A. Aleisa, Abdullah Abuhussein, Faisal Alsubaei, Frederick T. Sheldon. 276-280 [doi]
- Change-Encryption: Encryption Using Spatiotemporal Information as a Function ModelChuangchuang Dai, Haijing Luan, Qingbing Yu, Xiaoyu He, Yunhao Wang, Bincheng Shuai, Xiaobing Guo, Zhonghua Lu, Beifang Niu. 281-287 [doi]