Abstract is missing.
- DCSA: Using Density-Based Clustering and Sequential Association Analysis to Predict Alarms in Telecommunication NetworksPeng Lin, Kejiang Ye, Ming Chen, Cheng-Zhong Xu 0001. 1-8 [doi]
- Adaptive Function Launching Acceleration in Serverless Computing PlatformsZhengjun Xu, Haitao Zhang, Xin Geng, Qiong Wu, Huadong Ma. 9-16 [doi]
- An Active Method to Mitigate the Long Latencies for Host-Aware Shingle Magnetic Recording DrivesPeng Xu, Jiguang Wan, Ping Huang 0001, Bihua Shu, Chenlei Tang, Changsheng Xie. 17-26 [doi]
- Cloud Computing Task Scheduling Method Based on a Coral Reefs Optimization AlgorithmWei Chen, Hongpo Xu. 27-34 [doi]
- An Efficient and Transparent Approach for Adaptive Intra-and Inter-Node Virtual Machine Communication in Virtualized CloudsYi Ren, Renshi Liu, Qi Zhang 0009, Jianbo Guan, Ziqi You, Yusong Tan, Qingbo Wu. 35-44 [doi]
- Bridging Server and Cooling: Toward Effective Energy Management in Data CentersBiyu Zhou, Xiaohui Song, Xiang Shi, Yijun Lu, Songlin Hu. 45-52 [doi]
- ADGS: Anomaly Detection and Localization Based on Graph Similarity in Container-Based CloudsChengzhi Lu, Kejiang Ye, Wenyan Chen, Cheng-Zhong Xu 0001. 53-60 [doi]
- Labeling Scheduler: A Flexible Labeling-Based Jointly Scheduling Approach for Big Data AnalysisXin Li, Zhuzhong Qian, Jianjun Qiu, Xiaolin Qin, Jie Wu. 61-68 [doi]
- UR: A User-Based Collaborative Filtering Recommendation System Based on Trust Mechanism and Time WeightingLei Zhang 0096, Zhijun Zhang, Jufang He, Zhenyu Zhang. 69-76 [doi]
- IGATA: An Attraction-Based Online Task Recommendation Framework in Freemium-Crowdsourcing PlatformYuchen Xia, Shenwei Chen, Xiaofeng Gao, Haipeng Dai, Guihai Chen. 77-84 [doi]
- Maximizing Profits of Allocating Limited Resources under Stochastic User DemandsBing Shi, Bingzhen Li. 85-92 [doi]
- Accelerating Fine-Grained Spatial-Textual Trajectory Similarity Joins with GPGPUsKaixing Dong, Yanmin Zhu, Yaofeng Xue, Qiuxia Chen, Ning Fu, Jiadi Yu. 93-100 [doi]
- Multi-Path Routing Oriented Flow Statistics Collection in Software Defined NetworksJie Zhang, Song Guo 0001, Deze Zeng, Zhihao Qu. 101-108 [doi]
- Distributed Fuzzy Rough Set for Big Data Analysis in Cloud ComputingWenhao Qu, Linghe Kong, Kaishun Wu, Feilong Tang, Guihai Chen. 109-116 [doi]
- Timed Data Plane Update in Data Center NetworkYuxiang Liu, Xiaofeng Gao, Jiaqi Zheng, Guihai Chen. 117-124 [doi]
- Leveraging Spatio-Temporal Patterns for Predicting Citywide Traffic Crowd Flows Using Deep Hybrid Neural NetworksAhmad Ali, Yanmin Zhu, Qiuxia Chen, Jiadi Yu, Haibin Cai. 125-132 [doi]
- Push-Based Network-efficient Hadoop YARN Scheduling Mechanism for In-Memory ComputingRong Gu, Kaixuan Huang, Zhixiang Zhang, Chunfeng Yuan, Yihua Huang. 133-140 [doi]
- LADD: A Length-Adaptive Approach to Detecting Taxi Anomalous DetoursXuansheng Lu, Weiyu Cheng, Yanyan Shen, Yanmin Zhu. 141-144 [doi]
- Characterizing and Balancing the Workloads of Semi-Containerized CloudsShang Zhao, Shuai Xue, Quan Chen 0002, Minyi Guo. 145-148 [doi]
- Deep Tracking Students Identity and Motion in ClassroomWan-Yu Deng, Ying Wang, Jie Men. 149-152 [doi]
- Resource Optimization and Traffic-Aware VNF Placement in NFV-Enabled NetworksYi Yue, Bo Cheng 0001, Xuan Liu, Meng Wang, Biyi Li. 153-158 [doi]
- OctopusKing: A TCT-Aware Task Scheduling on Spark PlatformHaizhou Du, Keke Zhang, Sheng Huang. 159-162 [doi]
- A+ Tuning: Architecture+Application Auto-Tuning for In-Memory Data-Processing FrameworksHan Wang, Setareh Rafatirad, Houman Homayoun. 163-166 [doi]
- A Novel Algorithm for Optimizing Selection of Cloud Instance Types in Multi-Cloud EnvironmentWenqiang Liu, Pengwei Wang, Ying Meng, Guobing Zou, Zhaohui Zhang. 167-170 [doi]
- Joint Correlation-Aware VNF Selection and Placement in Cloud Data Center NetworksBiyi Li, Bo Cheng 0001, Meng Wang, Xuan Liu, Yi Yue, Junliang Chen. 171-176 [doi]
- Effective Straggler Mitigation with Cross-Layer Interference-Aware OptimizationLaiping Zhao, Yiming Li, Françoise Fogelman-Soulié. 177-182 [doi]
- Transaction Finality through Ledger CheckpointsRatul Antik Das, Md. Muhaimin Shah Pahalovi, Muhammad Nur Yanhaona. 183-192 [doi]
- Dynamically Adjusting Scale of a Kubernetes Cluster under QoS GuaranteeQiang Wu, Jiadi Yu, Li Lu 0008, Shiyou Qian, Guangtao Xue. 193-200 [doi]
- Storage-Reliability-Repair Trade-Offs in Distributed Storage SystemYichuan Qi, Dan Feng. 201-208 [doi]
- EC4: ECN and Credit-Reservation Converged Congestion ControlZihao Wei, Dezun Dong, Shan Huang, Liquan Xiao. 209-216 [doi]
- A Target Wake Time Based Power Conservation Scheme for Maximizing Throughput in IEEE 802.11ax WLANsQinghua Chen, Guoxi Liang, Zhengqiu Weng. 217-224 [doi]
- Distributed Physical Layer Key Generation for Secure LPWAN CommunicationBiao Han, Sirui Peng, Xiaoyan Wang, Baosheng Wang. 225-232 [doi]
- Understanding Distributed Poisoning Attack in Federated LearningDi Cao, Shan Chang, Zhijian Lin, Guohua Liu, Donghong Sun. 233-239 [doi]
- CPU-GPU Collaborated Computation Models for Biological Sequence Alignment with Mirror-Based Work Load BalancingSanjay Soundarajan, Michelle Salomon, Jin H. Park. 240-248 [doi]
- Diameter/ASPL-Based Mapping of Applications with Uncertain Communication over Random Interconnection NetworksYao Hu, Michihiro Koibuchi. 249-258 [doi]
- MTO: Multicast-Based Traffic Optimization for Information Centric NetworksQingyi Zhang, Xingwei Wang 0001, Jianhui Lv, Min Huang 0001. 259-266 [doi]
- A Data-Sharing Aware and Scalable Cache Miss Rates Model for Multi-Core Processors with Multi-Level Cache HierarchiesGuangmin Wang, Jiancong Ge, Yunhao Yan, Ming Ling. 267-274 [doi]
- T2HT : Traffic-Driven Machine Learning Based Hierarchical Topology Generation ModelHongrui Zhu, Guojun Yuan, Guangming Tan, Zhan Wang, Tao Jiang, Xuejun An. 275-283 [doi]
- Revisiting Asynchronous Rumor Spreading in the Blockchain EraChristos Patsonakis, Mema Roussopoulos. 284-293 [doi]
- Distributed Triangle Counting Algorithms in Simple Graph StreamMengdi Yu, Chao Song, Jiqing Gu, Ming Liu. 294-301 [doi]
- A Node Rating Based Sharding Scheme for BlockchainJianrong Wang, Yangyifan Zhou, Xuewei Li, Tianyi Xu, Tie Qiu. 302-309 [doi]
- Make Page Coloring more Efficient on Slice-Based Three-Level CacheHaifeng Li, Tianyue Lu, Yuhang Liu, Mingyu Chen 0001. 310-317 [doi]
- Comparing Busy Poll Socket and NAPIJing Xie 0005, Xuesong Li, Qingkai Meng, Xunli Fan, Niu Bo, Fengyuan Ren. 318-325 [doi]
- LHC: A Low-Power Heterogeneous Computing Method on Neural Network AcceleratorFangxin Liu, Kunpeng Xie, Cheng Gong, Shusheng Liu, Ye Lu, Tao Li. 326-334 [doi]
- CRState: In-Kernel Checkpoint/Restart of OpenCL Program Execution on GPUGenlang Chen, Jiajian Zhang, Qiuru Lin, Hai Jiang 0003, Chaoyi Pang. 335-342 [doi]
- Efficient Management and Intelligent Fault Tolerance for HPC Interconnect NetworksJijun Cao, Mingche Lai, Zhang Luo, Jiaqing Xu, Zhengbin Pang. 343-351 [doi]
- Active and Adaptive Application-Level Flow Control for Latency Sensitive RPC ApplicationsJing Xie 0005, Wenxue Cheng, Tong Zhang 0018, Qingkai Meng, Xuesong Li, Rong Li, Fengyuan Ren. 352-359 [doi]
- An Empirical Study of HPC Workloads on Huawei Kunpeng 916 ProcessorYichao Wang, Jin-Kun Chen, Bin-Rui Li, Si-Cheng Zuo, William Tang, Bei Wang, Qiu-Cheng Liao, Rui Xie, James Lin. 360-367 [doi]
- Optimizing the Aggregated Throughput of GPUs in Public Clouds Based on Adaptive Kernel ReorderingJingjin Du, Quan Chen, Minyi Guo. 368-375 [doi]
- Latency-Minimized and Energy-Efficient Online Task Offloading for Mobile Edge Computing with Stochastic Heterogeneous TasksTong Liu, Suqin Sheng, Lu Fang, Yameng Zhang, Tao Zhang, Weiqin Tong. 376-383 [doi]
- FADBM: Frequency-Aware Dummy-Based Method in Long-Term Location Privacy ProtectionJiabang Liu, Xutong Jiang, Song Zhang, Hao Wang, Wanchun Dou. 384-391 [doi]
- Deep-RL: Deep Reinforcement Learning for Marking-Aware via per-Port in Data CentersAkbar Majidi, Xiaofeng Gao, Nazila Jahanbakhsh, Shahram Jamali, Jiaqi Zheng, Guihai Chen. 392-395 [doi]
- A Permissioned Distributed Ledger for Monitoring Web ContentMichalis Konstantopoulos, Nikos Chondros, Mema Roussopoulos. 396-401 [doi]
- Implementation of Fluid Scheduling Using IPC Control MechanismYuta Tsukahara, Nobuyuki Yamasaki. 402-405 [doi]
- HMalloc: A Hybrid, Scalable, and Lock-Free Memory Allocator for Multi-Threaded ApplicationsTianlin Li, Yiping Yao, Wenjie Tang, Zhongwei Lin. 406-409 [doi]
- Enabling Energy-Efficient and Reliable Neural Network via Neuron-Level Voltage ScalingShubo Liu, Xu Wang, Jing Wang, Xin Fu, Xingyao Zhang, Lan Gao, Weigong Zhang, Tao Li. 410-413 [doi]
- When Learning Joins Edge: Real-Time Proportional Computation Offloading via Deep Reinforcement LearningNing Chen, Sheng Zhang 0001, Zhuzhong Qian, Jie Wu 0001, Sanglu Lu. 414-421 [doi]
- Cost-Efficient Resource Provision for Multiple Mobile Users in Fog ComputingShuaibing Lu, Jie Wu, Yubin Duan, Ning Wang, Juan Fang. 422-429 [doi]
- A Framework for Distributed Deep Neural Network Training with Heterogeneous Computing PlatformsBontak Gu, Joonho Kong, Arslan Munir, Young-geun Kim. 430-437 [doi]
- ADDA: Adaptive Distributed DNN Inference Acceleration in Edge Computing EnvironmentHuitian Wang, Guangxing Cai, Zhaowu Huang, Fang Dong. 438-445 [doi]
- Reliable Redundant Services Placement in Federated Micro-CloudsHan Huang, Haitao Zhang, Tongyu Guo, Jianli Guo, Chenze He. 446-453 [doi]
- A Null-Space-Based Verification Scheme for Coded Edge Computing against Pollution AttacksMingjia Fu, Jin Wang 0009, Jingya Zhou, Jianping Wang 0001, Kejie Lu, Xiaobo Zhou. 454-461 [doi]
- An Edge-Assisted Vehicle Routing Method Based on Game-Theoretic Multiagent LearningBichuan Zhu, Jinglin Li, Quan Yuan 0004, JiaWei Lu, Shu Yang. 462-469 [doi]
- MobileEdge: Enhancing On-Board Vehicle Computing Units Using Mobile Edges for CAVsLin Wang, Qingyang Zhang, Youhuizi Li, Hong Zhong 0001, Weisong Shi. 470-479 [doi]
- LST-MAC: A Low-Latency Hybrid MAC Protocol for LEO Satellite Supported IoTChaoyu Wang, Liang Liu 0001, Huadong Ma, Dan Xia. 480-487 [doi]
- Joint Heterogeneous Server Placement and Application Configuration in Edge ComputingJiaying Meng, Chaoliang Zeng, Haisheng Tan, Zining Li, Bojie Li, Xiang-Yang Li 0001. 488-497 [doi]
- An Edge Computing Service Model Based on Information-Centric NetworkingZhenyu Fan, Wang Yang, Kaijin Tian. 498-505 [doi]
- Performance Analysis and Characterization of Training Deep Learning Models on Mobile DeviceJie Liu, Jiawen Liu, Wan Du, Dong Li 0001. 506-515 [doi]
- ROS Task Scheduling Algorithm in Multi-Core SystemNan Ding, Xianghua Meng, Yawen Zhao, Di Wu. 516-519 [doi]
- Contact Ratio Aware Mobile Edge Computing for Content OffloadingPeiyan Yuan, Yunyun Cai. 520-524 [doi]
- Enabling Adaptive Deep Neural Networks for Video Surveillance in Distributed Edge CloudsQiong Wu, Haitao Zhang, Peilun Du, Ye Li, Jianli Guo, Chenze He. 525-528 [doi]
- HyPDS: Enabling a Hybrid File Transfer Protocol and Peer to Peer Content Distribution System for Remote Sensing DataZhuang Chen, Qian He, Bingcheng Jiang, Li Cao, Feng Li. 529-534 [doi]
- Optimal Auction for Resource Allocation in Wireless Virtualization: A Deep Learning ApproachJun Qian, Kun Zhu 0001, Ran Wang 0004, Yanchao Zhao. 535-538 [doi]
- Unknown Worker Recruitment with Budget and Covering Constraints for Mobile CrowdsensingGuoju Gao, Jie Wu 0001, Zhaoyang Yan, Mingjun Xiao, Guoliang Chen 0001. 539-547 [doi]
- Integration of UAV and Fog-Enabled Vehicle: Application in Post-Disaster ReliefChaogang Tang, Chunsheng Zhu, Xianglin Wei, Hao Peng, Yi Wang. 548-555 [doi]
- RFdesk: Record Your Objects on Desktop Using COTS RFID Devices ContactlesslyZiyang Chen, Panlong Yang, Gang Huang, Yuanhao Feng, Haisheng Tan, Xiangyang Li. 556-561 [doi]
- A Location-Aware Duty Cycle Approach toward Energy-Efficient Mobile CrowdsensingWenzao Li, Jianwei Liu, Xi Wu, Fangxin Wang, Jiangchuan Liu. 562-569 [doi]
- Always Connected Things: Building Disaster Resilience IoT CommunicationsHe Li 0001, Kaoru Ota, Mianxiong Dong. 570-577 [doi]
- FILM: Fine-Grained Book Localization with Mobile RFID ScanningXingyu Bian, Xia Wang, Wei Cheng, Xingyu Chen, Jia Liu 0008, Lijun Chen 0006. 578-585 [doi]
- An Effective Spatio-Temporal Query Framework for Massive Trajectory Data in Urban ComputingShiqiang Li, Weize Wang, Jiawei Shan, Heng Qi, Yanming Shen, Baocai Yin. 586-593 [doi]
- Decentralized Algorithm for Repeating Pattern Formation by Multiple RobotsShan Jiang 0005, Junbin Liang, Jiannong Cao, Jia Wang, Jinlin Chen, Zhixuan Liang. 594-601 [doi]
- Exploiting Q-Learning in Extending the Network Lifetime of Wireless Sensor Networks with HolesKhanh Le, Thanh-Hung Nguyen, Kien Nguyen, Phi-Le Nguyen. 602-609 [doi]
- Dynamic Resource Optimization Based on Flexible Numerology and Markov Decision Process for Heterogeneous ServicesChao Tang, Xin Chen 0018, Ying Chen, Zhuo Li 0003. 610-617 [doi]
- RF-ARP: RFID-Based Activity Recognition and Prediction in Smart HomeYegang Du, Yuto Lim, Yasuo Tan. 618-624 [doi]
- Real-Time Resource Slicing for 5G RAN via Deep Reinforcement LearningRanran Xi, Xin Chen, Ying Chen, Zhuo Li. 625-632 [doi]
- Cost-Efficient Node Deployment for Intrusion Detection in Underwater Sensor NetworksJiayi Sun, Gaotao Shi. 633-638 [doi]
- Deep and Efficient Impact Models for Edge Characterization and Control of Energy EventsGrigore Stamatescu, Rahim Entezari, Kay Römer, Olga Saukh. 639-646 [doi]
- SEAD: Towards A Social-Media-Driven Energy-Aware Drone Sensing FrameworkMd. Tahmid Rashid, Daniel Yue Zhang, Lanyu Shang, Dong Wang. 647-654 [doi]
- iShake: Imitation-Resistant Secure Pairing of Smart Devices via ShakingCongcong Shi, Lei Xie, Chuyu Wang, Peicheng Yang, Yubo Song, Sanglu Lu. 655-662 [doi]
- A Hierarchical Futures Data Analysis Framework for Multiple Accounts DetectionYining Liu, Tianhua Hu. 663-670 [doi]
- MoRa: A LoRa-Based System for Timely and Energy-Efficient e-Price Tag Update in MarketsYihui Wang, Gonglong Chen, Jiajun Bu, Wei Dong 0001. 671-678 [doi]
- UAV-Net: Effective and Efficient UAV Network Deployment for Extending Cell Tower CoverageJing Zhang, Dong Zhao 0001, Xianzhong Zhang, Lige Ding, Huadong Ma. 679-686 [doi]
- Ground-Station Based Software-Defined LEO Satellite NetworksDan Xia, Xiaolong Zheng, Pengrui Duan, Chaoyu Wang, Liang Liu, Huadong Ma. 687-694 [doi]
- P3R: Realizing Robust Routing for VANET Using Trajectory Prediction and Crossroad RecognitionChuwen Zhang, Huichen Dai, Yong Feng, Yang Li 0062, Wenquan Xu, Xuefeng Ji, Ying Wan, Gong Zhang, Bin Liu 0001. 695-702 [doi]
- Efficient Multi-Keyword Based Service Discovery Routing in Peer-to-Peer IoT NetworksHessam Moeini, I-Ling Yen, Farokh B. Bastani. 703-710 [doi]
- Path Planning Method Based on the Location Uncertainty of Water Surface Nodes in Underwater Sensor NetworkJian Zhou, Jingwen Yang, Fu Xiao, Xiaoyong Yan, Linfeng Liu. 711-716 [doi]
- The Design and Implementation of Edge Computing-Based Intelligent Ashcan Management System for Smart CommunityYiran Qi, Jin Wang, Jingya Zhou, Lianmin Shi, Lingzhi Li, Xinyue Ge, Yilin Zhang. 717-724 [doi]
- Multi-Channel Physiological Signal Emotion Recognition Based on ReliefF Feature SelectionYong Zhang, Cheng Cheng, Tianzhen Chen. 725-730 [doi]
- A Subregional Monitoring-Oriented Topology Control Strategy in UWSNsXiaoyun Guang, Wenyu Qu, Chunfeng Liu 0001, Tie Qiu, Mohammed Atiquzzaman. 731-738 [doi]
- VCEC: Velocity Control of Energy-Constrained RF-Based Wireless Charger in Sensor Networks with Multi-Depots DeploymentYinan Zhu, Kaikai Chi, Xianzhong Tian. 739-746 [doi]
- Energy-Efficient Admission of Delay-Sensitive Tasks for Multi-Mobile Edge Computing ServersJianrong Wang, Yuanzhi Yue, Ru Wang, Mei Yu, Jian Yu, Hongwei Liu, Xiang Ying, Ruiguo Yu. 747-753 [doi]
- Information-Centric Local Resource Sharing System on Smart PhonesJie Li, Tao Hong, Fuliang Li, Tengfei Li, Xingwei Wang. 754-760 [doi]
- Cost-Effective Signal Map Crowdsourcing with Auto-Encoder Based Active Matrix CompletionChengyong Liu, Yanchao Zhao, Kun Zhu 0001, Sheng Zhang 0001, Jie Wu 0001. 761-768 [doi]
- Predictive Maintenance Using GPU-Accelerated Partially Observable Markov Decision ProcessNaman Sharma, Chen-Khong Tham. 769-773 [doi]
- The Automatic Text Classification Method Based on BERT and Feature UnionWenting Li, Shangbing Gao, Hong Zhou, Zihe Huang, Kewen Zhang, Wei Li. 774-777 [doi]
- Dynamic Query Tree Anti-Collision Protocol for RFID SystemsNan Zhao, Lijuan Zhang, Lei Lei 0003, Shengsuo Cai. 778-781 [doi]
- DeepAoA: Online Vehicular Direction Finding Based on a Deep Learning MethodYifeng Zhu, Yunxiang Cai, Hongzi Zhu, Shan Chang. 782-789 [doi]
- Towards Efficient Parallel Multipathing: A Receiver-Centric Cross-Layer Solution to Aid Multipath TCPYuanlong Cao, Dandan Yu, Li Zeng, Qinghua Liu, Fuying Wu, Xiaolin Gui, Minghe Huang. 790-797 [doi]
- Location Familiarity Oriented Task Planning in Spatial CrowdsourcingChaoqun Peng, Xinglin Zhang, Zhaojing Ou. 798-805 [doi]
- Optimizing the Waiting Time of Sensors in a MANET to Strike a Balance between Energy Consumption and Data TimelinessHanwen Hu, Shiyou Qian, Jian Cao, Jiadi Yu, Guangtao Xue, Yanmin Zhu, Minglu Li 0001, Zhi-jie Wang. 806-813 [doi]
- MagWi: Practical Indoor Localization with Smartphone Magnetic and WiFi SensorsHao Yuan, Jiankun Wang, Zenghua Zhao, Jiayang Cui, Minglu Yan, Shengen Wei. 814-821 [doi]
- Unsupervised Classification for Social Networks with RS MatrixXiang Xu. 822-826 [doi]
- Deeplive: QoE Optimization for Live Video Streaming through Deep Reinforcement LearningZhao Tian, Laiping Zhao, Lihai Nie, Peiqi Chen, Shuyu Chen. 827-831 [doi]
- Joint Spatial-Temporal Trajectory Clustering Method for Mobile Social NetworksJi Tang, Linfeng Liu, Jiagao Wu, Jian Zhou, Yang Xiang. 832-835 [doi]
- PADVA: A Blockchain-Based TLS Notary ServicePawel Szalachowski. 836-843 [doi]
- Non-Deterministic Behavior Analysis for Embedded Software Based on Probabilistic Model CheckingGang Hou, Weiqiang Kong, Kuanjiu Zhou, Jie Wang, Chi Lin. 844-851 [doi]
- Toward Secure, Privacy-Preserving, and Interoperable Medical Data Sharing via BlockchainHao Jin, Chen Xu, Yan Luo, Peilong Li, Yu Cao 0002, Jomol Mathew. 852-861 [doi]
- Predicting the Silent Data Corruption Vulnerability of Instructions in ProgramsNa Yang, Yun Wang. 862-869 [doi]
- KerTSDroid: Detecting Android Malware at Scale through Kernel Task StructuresXinning Wang, Chong Li. 870-879 [doi]
- Cache Side-Channel Attacks: Flush+Flush and the Countermeasures Time GapKeith Nyasha Bhebe, Jian Liu, Wenyu Qu. 880-887 [doi]
- n)Yongnan Li, Limin Xiao. 888-895 [doi]
- A Verifiable Dynamic Multi-user Searchable Encryption Scheme without Trusted Third PartiesFanghan Ye, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Wenhua Zhao. 896-900 [doi]
- A Systematic Approach to Horizontal Clustering Analysis on Embedded RSA ImplementationFanyu Shi, Jizeng Wei, Dazhi Sun, Guo Wei 0005. 901-906 [doi]
- STNN: A Novel TLS/SSL Encrypted Traffic Classification System Based on Stereo Transform Neural NetworkYu Zhang, Shiman Zhao, Jianzhong Zhang 0003, Xiaowei Ma, Feilong Huang. 907-910 [doi]
- A Survey on 5G Network Slicing Enabling the Smart GridXu Xia, Lei Zhang, Chengli Mei, Jinyan Li, Xuetian Zhu, Yun Liang 0001, Jeffrey Song. 911-916 [doi]
- Electrical Sensing and Control Information Flows Optimization Algorithm in Cyber Power Physical SystemHao Ji, Ziyang He, Zhouze He, Han Jiang, Shaotang Cai, Ting Yang. 917-920 [doi]
- FStream: Flexible Stream Scheduling and Prioritizing in Multipath-QUICXiang Shi, Lin Wang, Fa Zhang, Zhiyong Liu. 921-924 [doi]
- An Adaptive Probability Prediction Routing Scheme in Urban DTNsZhan Wen, Xianghong Tang, Xiaoyan Huang, Tingwei Fu, Jianwei Liu, Wenzao Li. 925-928 [doi]
- Joint Uplink-Downlink Resource Allocation under Outage Case in Vehicular CommunicationsShuang Xiao, Wenzao Li, Lingling Yang, Zhan Wen, Jianwei Liu, Feifei Tan. 929-932 [doi]
- Random Noise Redunction of Seismic Data in NSCT DomainYu Sang, Xiaobin Pan, Chao Yan. 933-936 [doi]
- Heading Judgment for the Waist-Mounted MIMU Using LSTMShanzhi Gu, Chao Guo. 937-942 [doi]
- Capability Leakage Detection between Android Applications Based on Dynamic FeedbackMingsong Zhou, Fanping Zeng, Zhao Chen. 943-948 [doi]
- IDTree: Concise Hierarchical Data Representation for Resource-Constrained Smart ObjectsWuming Luo. 949-954 [doi]
- An Energy Efficiency Approach via Self-Adaptive Duty-Cycle in Social Contacts ScenarioJianwei Liu, Wenzao Li, Zhan Wen, Shuang Xiao, Lingling Yang, Feifei Tan. 955-958 [doi]
- Edge-Cloud Collaborative Computation Offloading Model Based on Improved Partical Swarm Optimization in MECJinze Wu, Zhiying Cao, Yingjun Zhang, Xiuguo Zhang. 959-962 [doi]
- Clustering-Based Algorithm for Services Deployment in Mobile Edge Computing EnvironmentYamin Wang, Zhiying Cao, Xiuguo Zhang, Huijie Zhou, Wenjia Li. 963-966 [doi]
- Spatio-Temporal Position Prediction Model for Mobile Users Based on LSTMShasha Tian, Xiuguo Zhang, Yingjun Zhang, Zhiying Cao, Wei Cao. 967-970 [doi]
- An Efficient Mobile Server Task Scheduling Algorithm in D2D EnvironmentWenjia Li, Xiuguo Zhang, Zhiying Cao, Yisong Zheng, Yamin Wang. 971-974 [doi]
- Designing and Developing High-Confidence Petroleum Extraction Cyber-Physical System Using the Model-Driven ArchitectureHuawei Zhai, Licheng Cui, Weishi Zhang, Lijia Zhou, Xiuguo Zhang. 975-978 [doi]
- EASVD: A Modified Method to Enhance the Authentication for SPICE Virtual DesktopChao Liu, Xinling Shen, Nan Li. 979-984 [doi]
- PPGAN: Privacy-Preserving Generative Adversarial NetworkYi Liu, Jialiang Peng, James Jian Qiao Yu, Yi Wu. 985-989 [doi]
- Multi-Platform Application Interaction Extraction for IoT DevicesZhao Chen, Fanping Zeng, Tingting Lu, Wenjuan Shu. 990-995 [doi]
- K-Bucket Based Raft-Like Consensus Algorithm for Permissioned BlockchainRihong Wang, Lifeng Zhang, Quanqing Xu, Hang Zhou. 996-999 [doi]
- On the Design of Software-Defined Service-Centric Networking for Mobile Cloud ComputingZihan Wang, Danhong Zhang, Huiwen Xia. 1000-1005 [doi]
- Efficient Multi-party Computation Algorithm Design for Real-World ApplicationsZengxiang Li, Chutima Kitcharoenpaisan, Phond Phunchongharn, Yechao Yang, Rick Siow Mong Goh, Yusen Li. 1006-1009 [doi]