Abstract is missing.
- Message from the General Chairs; IEEE CSCloud/EdgeCom 2024ZhiHui Lv, Jihe Wang, Sun-Yuan Kung. [doi]
- Message from the Program Chairs; CSCloud2024Gérard Memmi, Han Qiu, Zakirul Alam. [doi]
- Entity Alignment Through Joint Utilization of Multiple Pretrained Models for Attribution RelationshipYujia Liu, Tao Xu, Zhehan Su, Xinsong Li, Kaipeng Xue, Yuxin Liu. 1-6 [doi]
- An Adversarial Attack Method Against Financial Fraud Detection Model Beta Wavelet Graph Neural Network via Node InjectionShuhan Yang, Hengqi Guo, Xiaozheng Du, Jirui Yang, Zhihui Lu 0002. 7-12 [doi]
- Innovative Approach to Supernumerary Teeth Identification: CNN-Based Intelligent Medical Auxiliary System for Occlusal RadiographsTsung-Yi Chen, Hung-I Wu, Zhi-Han Li, Jui-An Fu, Chiung-An Chen, Kuo-Chen Li, Sze-Teng Liong, Tsun-Kuang Chi, Shih-Lun Chen. 13-18 [doi]
- Blockchain-Based Data Management and Control System in Rail Transit Security ScenarioHaodong Li, Junxiong Lin, Shaohua Zhang, Mengying Xie, Yicheng Zhou, Yuan Weng, Yu Liu, Hongbing Zhang. 19-23 [doi]
- Niect: A Model for Intrusion Security Detection Applied to Campus Video Surveillance Edge NetworksFeng Zhou, Ming Yuan, Yu Liu, Hongbing Zhang, Mingyu Gu, Tongming Zhou. 24-29 [doi]
- A Few-Shot Network Flow Attack Classification via Graph Contrastive LearningBinbin Gel, Bo Li 0005, Xudong Mou, Jun Zhao 0017, Xudong Liu 0001. 30-35 [doi]
- A Trustworthy Biological Assets Governance System Using Decentralized IdentityZhengkang Fang, Jing Yu 0007, Shufen Fang, Shuo Wang, Weilin Chan, Zexin Gao, Keke Gai. 36-41 [doi]
- SIAS-AT: Adversarial Training with Sample-Wise Individualized Adversarial StrategyHaina Li, Zuming Zhang. 42-47 [doi]
- A Model and Method for Computing Resource Scoring in Supercomputing CentersGang Wu, Tianjing Lv, Fang Li, Quanlong Fu. 48-52 [doi]
- Enhancing DevSecOps: Three Custom Tools for Continuous SecurityNuno André Bernardino, Bernardo Sequeira, Eduardo Piza, Fábio Henriques, Filipe Neves, Catarina I. Reis. 53-58 [doi]
- Lightweight Privacy-Preserving Mechanisms for Cross-Chain TransactionsJun Zhu, Keke Gai, Peng Jiang, Liehuang Zhu. 59-64 [doi]
- An Evaluation System for Large Language Models based on Open-Ended QuestionsZhiyuan Cao, Zeyu Ma, Mingang Chen. 65-72 [doi]
- FinDS2: A Novel Data Synthesis System for Fintech Product RisksXiaozheng Du, Xu Guo, Feng Zhou, Mingyu Gu, Zhihui Lu 0002, Cheng Wang. 73-78 [doi]
- Power Data Quality Assessment based on Entropy Weight Method and Grey System TheoryNaiwang Guo, Quanjiang Shen, Chang Liu. 79-83 [doi]
- Hypeleger Fabric Smart Contract Vulnerability Detection Technology: An OverviewDonghan Chen, Junxiong Lin, Shaohua Zhang, Yu Liu, Hongbing Zhang. 84-89 [doi]
- Liver Fibrosis Classification based on Multimodal Imaging Feature FusionXinyan Jiang, Xinping Ren, Yongxin Zhu, Xiaoying Zheng, Yueying Zhou, Li Tian. 90-95 [doi]
- Formal Analysis on Interaction Flow and Information Cocoon Based on Probabilistic GraphJian Liu, Shaohua Zhang, Siying Yan, Xianchao Zhang, Wei Ren. 96-100 [doi]
- FINSEC: An Efficient Microservices-Based Detection Framework for Financial AI Model SecurityChenxi Yang, Xinyu Wang, Peng Chen, Zhihui Lu 0005, Xiaozheng Du. 101-106 [doi]
- Paradigm of Trustworthy Data Element Circulation TransactionsHsunfang Cho, Li Zhang, Xiaozhen Jiang. 107-112 [doi]
- Securing AWS Lambda: Advanced Strategies and Best PracticesAmine Barrak, Gildas Fofe, Léo Mackowiak, Emmanuel Kouam, Fehmi Jaafar. 113-119 [doi]
- Efficiency Meets Security: A Delegated Transport Authentication Protocol for the CloudHongbing Zhang, Wei Pan, Zhiyuan Gao, Zhihui Lu 0005, Yu Liu, Lingyu Hou, Jie Feng, Jiawei Li. 120-125 [doi]
- COMURICE: Closing Source Code Leakage in Cloud-Based Compiling via EnclaveDahan Pan, Jianqiang Wang, Yingpeng Chen, Donghui Yu, Wenbo Yang, Yuanyuan Zhang 0002. 126-131 [doi]
- AutoTest: Evolutionary Code Solution Selection with Test CasesZhihua Duan, Jialin Wang. 132-134 [doi]
- Iterative Proof of Retrievability for Periodic Incremental Data Via Optimistic Tags GenerationTianxu Han, Qianhong Wu, Sipeng Xie, Kun Wang, Yingmiao Zhang. 135-140 [doi]
- A Congestion Control Algorithm for Live Video Streaming in Dynamic NetworkWenqi Pan, Bin Tan, Die Hu 0002, Jun Wu 0006. 141-145 [doi]
- DER: A Novel Metric Based on Dynamic Efficiency Ratio for Evaluating Computing Resource EfficiencyXiaojun Shen, Jinxia Jiang, Chao Ji, Huanjie Wu. 146-152 [doi]
- Leveraging Electric Power Data for Enhanced Credit Assessment and Risk Control: A Framework for Data Monetization and InnovationYingying Zhao, Naiwang Guo, Yi Wu 0011, Yingjie Tian 0002, Yun Su. 153-158 [doi]
- Game Theory-Based Rational Secret Sharing Scheme with Quantum ResistantJiale Song, Cheng Chi, Faguo Wu, Zihang Yin. 159-164 [doi]
- Enhancing Cloud-Native Security Through eBPF TechnologyMing Feng, Jia Zhou, Yi Tang. 165-168 [doi]
- Research on Index Optimization Method Based on Line Quantification in Topic Network CrawlerBinbin Wang, Lei Zhang, Cheng Zheng. 169-173 [doi]
- LRPAFL: Layer-Wise Relevance Propagation-Based Adaptive Federated LearningShuo Wang, Zhengkang Fang, Keke Gai. 174-179 [doi]
- Application of Transformer Model in Chemical Industry Safety ProductionChuangchuang Dai, Can Li, Ziang Li, Huaiwei Sun, Lei Guan, Lei Li. 180-186 [doi]
- Secure Cryptographic Technology Framework for Data Element Circulation TransactionsHsunfang Cho, Li Zhang, Xiaozhen Jiang. 187-193 [doi]
- cDEM: Extract Core Data Elements for Migration Accelerating from Legacy Platform to Modern Cloud EnvironmentXiangdong Tian, Kejun Wei, Shuqi Yang, Xianglan Gao, Yuwei Tang, Zhichao Li. 194-199 [doi]
- Implementing a Security Framework for Container OrchestrationZlatan Moric, Vedran Dakic, Matej Kulic. 200-206 [doi]