Abstract is missing.
- Secrecy Outage Probability of Secondary System for Wireless-Powered Cognitive Radio NetworksKun Tang, Shaowei Liao, Md. Zakirul Alam Bhuiyan, Wei Shi. 3-17 [doi]
- CodeeGAN: Code Generation via Adversarial TrainingYouqiang Deng, Cai Fu, Yang Li. 18-30 [doi]
- Information Consumption Patterns from Big DataJesús Silva, Ligia Romero, Claudia Fernández, Darwin Solano, Nataly Orellano Llinás, Carlos Vargas Mercado, Jazmín Flórez Guzmán, Ernesto Steffens Sanabria. 31-39 [doi]
- DHS-Voting: A Distributed Homomorphic Signcryption E-VotingXingyue Fan, Ting Wu, Qiuhua Zheng, Yuanfang Chen, Xiaodong Xiao. 40-53 [doi]
- Towards In-Network Generalized Trustworthy Data Collection for Trustworthy Cyber-Physical SystemsHafiz ur Rahman, Guojun Wang 0001, Md. Zakirul Alam Bhuiyan, Jianer Chen. 54-66 [doi]
- QoS Based Clustering for Vehicular Networks in Smart CitiesSoumia Bellaouar, Mohamed Guerroumi, Samira Moussaoui. 67-79 [doi]
- Searchable Attribute-Based Encryption Protocol with Hidden Keywords in CloudFang Qi, Xing Chang, Zhe Tang, Wenbo Wang. 80-92 [doi]
- A Comparative Study of Two Different Spam Detection MethodsHaoyu Wang, Bingze Dai, Dequan Yang. 95-105 [doi]
- Towards Privacy-preserving Recommender System with BlockchainsAbdullah Al Omar, Rabeya Bosri, Mohammad Shahriar Rahman, Nasima Begum, Md. Zakirul Alam Bhuiyan. 106-118 [doi]
- Integrating Deep Learning and Bayesian ReasoningSin Yin Tan, Wooi Ping Cheah, Shing Chiang Tan. 119-130 [doi]
- Assessing the Dependability of Apache Spark System: Streaming Analytics on Large-Scale Ocean DataJanak Dahal, Elias Ioup, Shaikh Arifuzzaman, Mahdi Abdelguerfi. 131-144 [doi]
- On the Assessment of Security and Performance Bugs in Chromium Open-Source ProjectJoseph Imseis, Costain Nachuma, Shaikh Arifuzzaman, Md. Zakirul Alam Bhuiyan. 145-157 [doi]
- Medical Image Segmentation by Combining Adaptive Artificial Bee Colony and Wavelet Packet DecompositionMuhammad Arif 0006, Guojun Wang 0001, Oana Geman, Jianer Chen. 158-169 [doi]
- Recommender System for Decentralized Cloud ManufacturingKarim Alinani, Deshun Liu, Dong Zhou, Guojun Wang 0001. 170-179 [doi]
- Gait Analysis for Gender Classification in ForensicsPaola Barra, Carmen Bisogni, Michele Nappi, David Freire-Obregón, Modesto Castrillón Santana. 180-190 [doi]
- Hybrid Cloud Computing Architecture Based on Open Source TechnologyAmelec Viloria, Hugo Hernández Palma, Wilmer Cadavid Basto, Alexandra Perdomo Villalobos, Carlos Andrés Uribe de la Cruz, Juan de la Hoz Hernández, Omar Bonerge Pineda Lezama. 191-200 [doi]
- Transportation and Charging Schedule for Autonomous Electric Vehicle Riding-Sharing System Considering Battery DegradationMingChu Li, Tingting Tang, Yuanfang Chen, Md. Zakirul Alam Bhuiyan. 203-216 [doi]
- Blockchain-Powered Service Migration for Uncertainty-Aware Workflows in Edge ComputingXiaolong Xu, Qingfan Geng, Hao Cao, Ruichao Mo, Shaohua Wan, Lianyong Qi, Hao Wang. 217-230 [doi]
- Towards the Design of a Covert Channel by Using Web Tracking TechnologiesAniello Castiglione, Michele Nappi, Chiara Pero. 231-246 [doi]
- Dependable Person Recognition by Means of Local Descriptors of Dynamic Facial FeaturesAniello Castiglione, Giampiero Grazioli, Simone Iengo, Michele Nappi, Stefano Ricciardi. 247-261 [doi]
- From Data Disclosure to Privacy Nudges: A Privacy-Aware and User-Centric Personal Data Management FrameworkYang Lu, Shujun Li, Athina Ioannou, Iis Tussyadiah. 262-276 [doi]
- A Socio-Technical and Co-evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime EcosystemsTasmina Islam, Ingolf Becker, Rebecca Posner, Paul Ekblom, Michael McGuire, Hervé Borrion, Shujun Li. 277-293 [doi]
- Mobile APP User Attribute Prediction by Heterogeneous Information Network ModelingHekai Zhang, Jibing Gong, Zhiyong Teng, Dan Wang, Hongfei Wang, Linfeng Du, Md. Zakirul Alam Bhuiyan. 294-303 [doi]
- Application of Internet of Things and GIS in Power Grid Emergency Command SystemDaning Huang, Huihe Chen, Shiyong Huang, Yuchang Lin, Ying Ma. 304-313 [doi]
- Visualized Panoramic Display Platform for Transmission Cable Based on Space-Time Big DataRenxin Yu, Qinghuang Yao, Tianrong Zhong, Wei Li, Ying Ma. 314-323 [doi]
- Optimal Personalized DDoS Attacks Detection Strategy in Network SystemsMingChu Li, Xian Yang, Yuanfang Chen, Md. Zakirul Alam Bhuiyan. 327-340 [doi]
- AI and Its Risks in Android Smartphones: A Case of Google Smart AssistantHaroon Elahi, Guojun Wang 0001, Tao Peng, Jianer Chen. 341-355 [doi]
- A Light-Weight Framework for Pre-submission Vetting of Android Applications in App StoresBoya Li, Guojun Wang 0001, Haroon Elahi, Guihua Duan. 356-368 [doi]
- Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection SchemeKehinde O. Babaagba, Zhiyuan Tan 0001, Emma Hart. 369-382 [doi]
- Demand Forecasting Method Using Artificial Neural NetworksAmelec Viloria, Luisa Fernanda Arrieta Matos, Mercedes Gaitán, Hugo Hernández Palma, Yasmin Flórez Guzmán, Luis Cabas Vásquez, Carlos Vargas Mercado, Omar Bonerge Pineda Lezama. 383-391 [doi]
- Analyzing and Predicting Power Consumption Profiles Using Big DataAmelec Viloria, Ronald Prieto Pulido, Jesús García Guiliany, Jairo Martínez Ventura, Hugo Hernández Palma, José Jinete Torres, Osman Redondo Bilbao, Omar Bonerge Pineda Lezama. 392-401 [doi]
- A New Intrusion Detection Model Based on GRU and Salient Feature ApproachJian Hou, Fangai Liu, Xuqiang Zhuang. 405-415 [doi]
- Research on Electronic Evidence Management System Based on Knowledge GraphHonghao Wu. 416-425 [doi]
- Research on Security Supervision on Wireless Network Space in Key SitesHonghao Wu. 426-434 [doi]
- Review of the Electric Vehicle Charging Station Location ProblemYu Zhang, Xiangtao Liu, Tianle Zhang, Zhaoquan Gu. 435-445 [doi]
- Structural Vulnerability of Power Grid Under Malicious Node-Based AttacksMinzhen Zheng, Shudong Li, Danna Lu, Wei Wang, Xiaobo Wu, Dawei Zhao. 446-453 [doi]
- Electric Power Grid Invulnerability Under Intentional Edge-Based AttacksYixia Li, Shudong Li, Yanshan Chen, Peiyan He, Xiaobo Wu, Weihong Han. 454-461 [doi]
- Design and Evaluation of a Quorum-Based Hierarchical Dissemination Algorithm for Critical Event Data in Massive IoTsIhn-Han Bae. 462-476 [doi]
- Comparative Analysis on Raster, Spiral, Hilbert, and Peano Mapping Pattern of Fragile Watermarking to Address the Authentication Issue in Healthcare SystemSyifak Izhar Hisham, Mohamad Nazmi Nasir, Nasrul Hadi Johari. 477-486 [doi]