Abstract is missing.
- Efficiency Optimization in Supply Chain Using RFID TechnologyAbdullah, Eleni Stroulia, Faiza Nawaz. 1-6 [doi]
- Sub-6G Metamaterial-Based Flexible Wearable UWB Antenna for IoT and WBANTale Saeidi, Sarmad Nozad Mahmood, Sameer Alani, Shahid M. Ali, Idris Ismail, Adam Reda Hasan Alhawari. 7-13 [doi]
- Metamatrial-based Antipodal Vivaldi Wearable UWB Antenna for IoT and 5G ApplicationsTale Saeidi, Idris Ismail, Sarmad Nozad Mahmood, Sameer Alani, Shahid M. Ali, Adam Reda Hasan Alhawari. 14-20 [doi]
- On Data Integrity Attacks against Industrial Internet of ThingsHansong Xu, Wei Yu 0002, Xing Liu, David W. Griffith, Nada Golmie. 21-28 [doi]
- A Data Privacy-preserving Method for Students' Physical Health Monitoring by Using Smart Wearable DevicesMinghui Yang, Junqi Guo, Ludi Bai. 29-34 [doi]
- Demystifying the Cyber Attribution: An Exploratory StudyFehmi Jaafar, Florent Avellaneda, El Hackemi Alikacem. 35-40 [doi]
- Towards Continuous User Authentication Using Personalised Touch-Based BehaviourPeter Aaby, Mario Valerio Giuffrida, William J. Buchanan, Zhiyuan Tan 0001. 41-48 [doi]
- Blockchain-based Trust Management in Social Internet of ThingsMohammad Amiri-Zarandi, Rozita A. Dara 0001. 49-54 [doi]
- Intrusion Traffic Detection and Characterization using Deep Image LearningGurdip Kaur, Arash Habibi Lashkari, Abir Rahali. 55-62 [doi]
- Detection of DoH Tunnels using Time-series Classification of Encrypted TrafficMohammadreza MontazeriShatoori, Logan Davidson, Gurdip Kaur, Arash Habibi Lashkari. 63-70 [doi]
- Comparative Analysis of Cyber Resilience Strategy in Asia-Pacific CountriesDebora Irene Christine, Mamello Thinyane. 71-78 [doi]
- Behavioral Study of Malware Affecting Financial Institutions and ClientsRuchi Mishra, Sergey Butakov, Fehmi Jaafar, Neelam Memon. 79-86 [doi]
- A Blockchain Approach to Identifying Compromised Nodes in Collaborative Intrusion Detection SystemsChandralekha Yenugunti, Stephen S. Yau. 87-93 [doi]
- Contextual Privacy Policy Modeling in IoTEmmanuel Onu, Michael Mireku Kwakye, Ken Barker 0001. 94-102 [doi]
- A Multi-objective Simulated Annealing Algorithm-based Coal Blending Optimization Approach in Coking ProcessJinkai Zi, Feng Jin, Jun Zhao, Wei Wang, Quanli Liu. 103-109 [doi]
- Knowledge Distillation for Real-time On-Road Risk DetectionKai Su, Chowdhury Md Intisar, Qiangfu Zhao, Yoichi Tomioka. 110-117 [doi]
- An Authentication Scheme Designed for the Lightweight Precision Time Protocol in IoTHuei-Wen Ferng, Michael Poernomo, Mingfu Li. 118-123 [doi]
- Segmentation of 3D Point Clouds for Weak Texture Ground PlaneMing-can Geng, Sheng Bi, Zhi-xuan Wei, Quan-fa Yan. 124-129 [doi]
- Research on FJSP with transportation time constraint based on Improved Particle Swarm OptimizationBi Li, Chen Kui. 130-137 [doi]
- A Study of Social Network Applications in University EducationMohammed Yahya Alghamdi. 138-145 [doi]
- Research on Task Assignment to Minimize Travel Cost for Spatio-temporal CrowdsourcingQingxian Pan, Tingwei Pan, Hongbin Dong, Zhaolong Gao, Yingjie Wang 0002. 146-153 [doi]
- Cyber-based Intelligent Route Planning with Multi-constraintsChunjie Zhou, Ali Li, Zhenxing Zhang, Zhiwang Zhang. 154-159 [doi]
- A Novel Fog Node Aggregation Approach for Users in Fog Computing EnvironmentJie Pan, Yiwen Zhang, Qingren Wang, Dengcheng Yan, Wenming Zhang. 160-167 [doi]
- Research on Scenario Classification of Burglary Cases via BERTXiangwu Ding, Ziqi Yang. 168-173 [doi]
- A Research of Distributed Security and QoS Testing FrameworkZhibin Liu, Ziang Liu, Yuanyuan Huang, Xin Liu, Xiaokang Zhou, Rui Zhou 0005. 174-181 [doi]
- Multiple Linear Regression with Kalman Filter for Predicting End Prices of Online AuctionsXiaohui Li, Hongbin Dong, Shuang Han. 182-191 [doi]
- Cyber Trainground: Building-Scale Virtual Reality for Immersive Presentation TrainingKatashi Nagao, Yuto Yokoyama. 192-200 [doi]
- Research on Data Quality Control of Crowdsourcing Annotation: A SurveyJian Lu, Wei Li, Qingren Wang, Yiwen Zhang. 201-208 [doi]
- A novel computer vision based gait analysis technique for normal and Parkinson's gaits classificationLiyun Gong, Jing Li, Miao Yu, Ming Zhu, Ross Clifford. 209-215 [doi]
- An Energy Balance-aware Event Query Algorithm based on Chinese Remainder TheoremJiayao Wang, Qianmin Zhang, Qilin Wu, Bo Liu, Yiwen Zhang. 216-221 [doi]
- Malicious Mail Filtering and Tracing System Based on KNN and Improved LSTM AlgorithmDa Xiao, Meiyi Jiang. 222-229 [doi]
- Reputation-based Q-Routing for Robust Inter-committee Routing in the Sharding-based BlockchainZelei Cheng, Zuotian Li, Bowen Sun, Shuhan Zhang, Yuanrong Shao. 230-236 [doi]
- Automatic recognition of arrhythmia using a CNN-based broad learning systemShengshi Li Zhuhai, Yujuan Si, Dunwei Wen, Weiyi Yang, Gong Zhang, Peiyu Zhu. 237-244 [doi]
- User Portrait Technology Based on Stacking ModeYirui Wu, Pengyu Yu. 245-250 [doi]
- AMC-MDL: A Novel Approach of Android Malware Classification using Multimodel Deep LearningWenbo Fang, Linlin Zhang, Chenyue Wang, Yingjie Hu, Yuaner Yu, Kai Zhao. 251-256 [doi]
- Chain-of-Evidence in Secured Surveillance Videos using Steganography and HashingNadia Kanwal, Mamoona Naveed Asghar, Mohammad Samar Ansari, Brian A. Lee, Martin Fleury, Marco Herbst, Yuansong Qiao. 257-264 [doi]
- Study on classification of maize disease image based on fast k-nearest neighbor supportYan Xu, Qingbo Hao, Lijuan Qiao, Shaoyong Wang. 265-270 [doi]
- A learning based 3D reconstruction method for point cloudQi Guo, Jinhui Li. 271-276 [doi]
- Human Moving Behavior Recognition Based on the D-S Evidence Theory and SVM utilizing SmartphoneZou Zhou, Nan Duan, Tingting Li, Miao Ye, Fei Zheng, Guoli Zhang, Ruonan Wang, Kaixuan Wang. 277-283 [doi]
- Analyzing Pre-braking Behaviors of Drivers with Varying ExperienceBo Wu 0007, Shoji Nishimura, Qun Jin, Yishui Zhu. 284-289 [doi]
- Genre-based Emoji Usage Analysis and Prediction in Video CommentsHongyu Jiang, Ao Guo, Jianhua Ma. 290-299 [doi]
- Multi-Scenario Fusion for More Accurate Classifications of Personal CharacteristicsAo Guo, Hongyu Jiang, Jianhua Ma. 300-305 [doi]
- Mobile Book Reader Based on Reading Behavior CharacteristicsRuichao Xu, Zhigang Gao, Bo Wu, Wenjie Diao, Yucai Huang, Wei Zhao. 306-311 [doi]
- Game-Like Captchas for Intrusion DetectionPhilip Kirkbride, M. Ali Akber Dewan, Fuhua Lin. 312-315 [doi]
- Web Browser Extension User-Script XSS VulnerabilitiesMuath Obaidat, Joseph Brown, Abdullah Al Hayajneh. 316-321 [doi]
- Legal Regulation of Cyberbullying - From a Chinese perspectiveJunke Xu. 322-327 [doi]
- Artificial Intelligence Cyber Security StrategyXiaohua Feng, Yunzhong Feng, Edward Swarlat Dawam. 328-333 [doi]
- Smart City Lane Detection for Autonomous VehicleEdward Swarlat Dawam, Xiaohua Feng. 334-338 [doi]
- KNCR: Knowledge-Aware Neural Collaborative Ranking for Recommender SystemsChen Huang, Zhongyuan Gan, Feng Ye, Pan Wang, Moxuan Zhang. 339-344 [doi]
- Student-Facing Educational Dashboard Design for Online LearnersArta Farahmand, M. Ali Akber Dewan, Fuhua Lin. 345-349 [doi]
- A comparative analysis of the STEM education in Chinese primary and secondary schoolsYang Yan, Dunwei Wan, Wen-Bo Huang, Ke Wang. 350-354 [doi]
- Extracting Advertisements from Content Marketing Articles based on TopicCNNXiaoming Fan, Chenxu Wang, Xiao Liang. 355-360 [doi]
- Legal Judgment Prediction with Label DependenciesLong Chen, Nuo Xu, Yue Wang. 361-365 [doi]
- Segment-Level Sentiment Classification for Online Comments of Legal CasesPeng Yang, Yong Wu, Tenglang Cheng, Xinyuan Lyu, Zhuang Wang. 366-370 [doi]
- A Trust-Based Security Scheme for 5G UAV Communication SystemsYu Su, Jian Zhou, Zhinuan Guo. 371-374 [doi]
- Using Agent Solutions and Visualization Techniques to Manage Cloud-based Education SystemWei Huang, Jin Li. 375-379 [doi]
- CTL Symbolic Model Checking Based on Fuzzy LogicPengzhan Nie, Jiulei Jiang, Zhanyou Ma. 380-385 [doi]
- An Improved ID3 classification algorithm for solving the backbone of proposition formulaeTian Liang, Xiaofeng Wang, Shuai Wang, Xingkai Wang. 386-391 [doi]
- A Recommendation Algorithm Based on Belief Propagation and Probability Matrix FactorizationJuan Li, Xiaofeng Wang, Wanjing Feng. 392-398 [doi]
- Feature Extraction Approach to Unearth Domain Generating Algorithms (DGAs)Shubhangi Upadhyay, Ali Ghorbani. 399-405 [doi]
- Analyzing Mowing Behaviors on Sloping Land via Motion Capture DeviceBo Wu 0007, Yuan Wu, Yoko Aoki, Shoji Nishimura, Masayuki Kashiwagi. 406-409 [doi]
- A Survey of Key Issues in UAV Data Collection in the Internet of ThingsXiangyue Yang, Shu Fu, Bibo Wu, Meng Zhang. 410-413 [doi]
- Trust Management for Multi-Agent Systems Using Smart ContractsKalpesh Lad, M. Ali Akber Dewan, Fuhua Lin. 414-419 [doi]
- Recognizing Human Gestures Using Ambient LightShakir Mahmood, Raghav H. Venkatnarayan, Muhammad Shahzad. 420-428 [doi]
- Urban Mobility Prediction Using TwitterSaeed Khan, Ash Rahimi, Neil Bergmann. 429-436 [doi]
- Effects of Pre-trained Word Embeddings on Text-based Deception DetectionDavid Nam, Jerin Yasmin, Farhana H. Zulkernine. 437-443 [doi]
- Determining Worker Type from Legal Text Data using Machine LearningYifei Yin, Farhana H. Zulkernine, Samuel Dahan. 444-450 [doi]
- Image Annotation based on Semantic Structure and Graph LearningZhikui Chen, Meng Wang, Jing Gao, Peng Li. 451-456 [doi]
- Historical Document Image Denoising by Ising ModelGuoming Chen, Qiang Chen, Yiqun Chen, Xiongyong Zhu. 457-461 [doi]
- Edge-supported Microservice-based Resource Discovery for Mist ComputingArash Sattari, Rouhollah Ehsani, Teemu Leppänen, Susanna Pirttikangas, Jukka Riekki. 462-468 [doi]
- Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning AlgorithmsZhuolin Li, Hao Zhang, Hossain Shahriar, Dan Lo, Kai Qian, Michael Whitman, Fan Wu. 469-474 [doi]
- Search Engine for Heterogeneous Internet of Things Systems and OptimizationCheng Qian, Weichao Gao, William G. Hatcher, Weixian Liao, Chao Lu 0002, Wei Yu 0002. 475-482 [doi]
- Trusted Digital Identities for Mobile DevicesDr. P. Renee Carnley, Pam Rowland, Dave Bishop, Sikha Bagui, Matt Miller. 483-490 [doi]
- DTMSim-IoT: A Distributed Trust Management Simulator for IoT NetworksSyed Wasif Abbas Hamdani, Abdul Waheed Khan, Naima Iltaf, Waseem Iqbal. 491-498 [doi]
- High-Performance Computing with TeraStatEdoardo Bompiani, Umberto Ferraro Petrillo, Giovanna Jona-Lasinio, Francesco Palini. 499-506 [doi]
- Enhancing A New Classification for IDN Homograph Attack DetectionZicong Zhu, Tran Phuong Thao, Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi, Toshiyuki Nakata 0001. 507-514 [doi]
- Dynamic Android Malware Category Classification using Semi-Supervised Deep LearningSamaneh Mahdavifar, Andi Fitriah Abdul Kadir, Rasool Fatemi, Dima Alhadidi, Ali A. Ghorbani. 515-522 [doi]
- A Neural Embedding for Source Code: Security Analysis and CWE ListsMartina Saletta, Claudio Ferretti. 523-530 [doi]
- Enhancing IoT-based critical diagnosis in emergency rooms through intelligent video surveillanceLoredana Caruccio, Ornella Piazza, Giuseppe Polese, Genoveffa Tortora. 531-538 [doi]
- Social Robot Interactions for Social Engineering: Opportunities and Open IssuesAndrea F. Abate, Carmen Bisogni, Lucia Cascone, Aniello Castiglione, Gerardo Costabile, Ilenia Mercuri. 539-547 [doi]
- Secure Count Query on Encrypted Heterogeneous DataMd Safiur Rahman Mahdi, Md. Nazmus Sadat, Noman Mohammed, Xiaoqian Jiang. 548-555 [doi]
- Would an Object Representation Invariant Provide Sufficient State Based Knowledge to Adapt Network Intrusion Detection System Rules With Minimal Impact to System Resources?Anthony Melaragno. 556-561 [doi]
- Attention-based Bidirectional Long Short-Term Memory Networks for Relation Classification Using Knowledge Distillation from BERTZihan Wang, Bo Yang. 562-568 [doi]
- A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and SharingZhanwen Chen, Jiageng Chen, Weizhi Meng. 569-576 [doi]
- CASTLEGUARD: Anonymised Data Streams with Guaranteed Differential PrivacyAlistair Robinson, Frederick Brown, Nathan Hall, Alex Jackson, Graham Kemp, Matthew Leeke. 577-584 [doi]
- Inter Cloud Interoperability Use Cases and Gaps in Corresponding StandardsSyed Imran Akhtar, Abdul Rauf, Haider Abbas, Muhammad Faisal Amjad. 585-592 [doi]
- A Blockchain and Defensive Deception Co-design for Webcam Spyware DetectionHaissam Badih, Yasamin Alagrash, Julian L. Rrushi. 593-600 [doi]
- Biometric Face Recognition Based on Landmark DynamicsAndrea F. Abate, Lucia Cimmino, Fabio Narducci, Chiara Pero. 601-605 [doi]
- Malware Detection via Machine Learning and Recognition of Non Stationary TasksYasamin Alagrash, Haissam Badih, Julian L. Rrushi. 606-611 [doi]
- Efficient Privacy-Preserving Approaches for Trajectory DatasetsMd Yeakub Hassan, Ullash Saha, Noman Mohammed, Stephane Durocher, Avery Miller. 612-619 [doi]
- Transfer Learning based Data-Efficient Machine Learning Enabled ClassificationShuteng Niu, Jian Wang, Yongxin Liu, Houbing Song. 620-626 [doi]
- Blockchain-based Model for Sharing Activities of Daily Living in Healthcare ApplicationsSeyed Nima Khezr, Rachid Benlamri, Abdulsalam Yassine. 627-633 [doi]
- Scalable Taxonomy Generation and Evolution on Apache SparkKanwal Aalijah, Rabia Irfan. 634-639 [doi]
- Predicting Performance and Cost of Serverless Computing Functions with SAAFRobert Cordingly, Wen Shu, Wes J. Lloyd. 640-649 [doi]
- Optimizing Hospital Resources using Big Data Analytics with Standardized e-Clinical PathwaysAyman Alahmar, Rachid Benlamri. 650-657 [doi]
- Internet of Energy: Ensemble Learning through Multilevel Stacking for Load ForecastingShailendra Singh 0007, Abdulsalam Yassine, Rachid Benlamri. 658-664 [doi]
- Applying Machine Learning to Aviation Big Data for Flight Delay PredictionYushan Jiang, Yongxin Liu, Dahai Liu, Houbing Song. 665-672 [doi]
- Filtering and Storing User Preferred Data: an Apache Spark Based ApproachBannya Chanda, Shikharesh Majumdar. 673-679 [doi]
- Characterizing Performance Variation of Genomic Data Analysis Workflows on the Public CloudDavid Perez, Ling-Hong Hung, Sonia Xu, Ka Yee Yeung, Wes Lloyd. 680-683 [doi]
- A RMF and AHP-Based Approach to Risk Assessment of Power Internet of ThingsKunchang Li, Runhua Shi, Jingchen Yan, Chenxi Cai, Mingyu Sun, Jianbin Li. 684-689 [doi]
- Executing Complex Calculations in the Cloud to Enable Real-Time Data ProcessingManuel Leibetseder, Marc Kurz, Erik Sonnleitner, Thomas Rittenschober. 690-695 [doi]
- Auto-scaling Compute and Network Resources in a Data-centerAnshuman Biswas, Biswajit Nandy, Shikharesh Majumdar, Ali El-Haraki. 696-703 [doi]
- Implications of Programming Language Selection for Serverless Data Processing PipelinesRobert Cordingly, Hanfei Yu, Varik Hoang, David Perez, David Foster, Zohreh Sadeghi, Rashad Hatchett, Wes J. Lloyd. 704-711 [doi]