Abstract is missing.
- Budgeted Persuasion on User Opinions via Varying SusceptibilityWenyi Tang, Xinrui Xu, Guangchun Luo, Zaobo He, Kaiming Zhan. 1-8 [doi]
- Edge Computing Based Privacy-Preserving Data Aggregation Scheme in Smart GridYuhao Kang, Songtao Guo, Pan Li, Yuanyuan Yang 0001. 1-6 [doi]
- FluxInfer: Automatic Diagnosis of Performance Anomaly for Online Database SystemPing Liu, Shenglin Zhang, Yongqian Sun, Yuan Meng, Jiahai Yang, Dan Pei. 1-8 [doi]
- Evaluation of the interest of an extra-slot for a grouped polling-selecting methodGuéréguin Der Sylvestre Sidibé, Raphaël Bidaud, Marie-Françoise Servajean, Nadir Hakem, Michel Misson. 1-8 [doi]
- Supporting Efficient Dynamic Update in Public Integrity Verification of Cloud DataJiawei Wan, Shijie Jia, Limin Liu, Yang Zhang. 1-12 [doi]
- Privacy Preserving Inference with Convolutional Neural Network EnsembleAlexander Xiong, Michael Nguyen, Andrew So, Tingting Chen. 1-6 [doi]
- FProbe: Detecting Stealthy DGA-based Botnets by Group Activities AnalysisJiawei Sun, Yuan Zhou, Shupeng Wang, Lei Zhang 0116, Junjiao Liu, Junleng Hou, Zhicheng Liu. 1-8 [doi]
- Lifecycle Management Protocols for Batteryless, Intermittent Sensor NodesMathew L. Wymore, Vishal Deep, Vishak Narayanan, Henry Duwe, Daji Qiao. 1-8 [doi]
- UAV Swarm Communication Aware Formation Control via Deep Q NetworkChengtao Xu, Kai Zhang, Houbing Song. 1-2 [doi]
- Network Resource Scheduling For Cloud/Edge Data CentersYuhan Zhao, Wei Zhang, Meihong Yang, Huiling Shi. 1-4 [doi]
- Software Define Radio in Realizing the Intruding UAS Group Behavior PredictionJoshua Eason, Chengtao Xu, Houbing Song. 1-5 [doi]
- SEGIVE: A Practical Framework of Secure GPU Execution in Virtualization EnvironmentZiyang Wang, Fangyu Zheng, Jingqiang Lin, Guang Fan, Jiankuo Dong. 1-10 [doi]
- Authentication Based on BlockchainNorah Alilwit. 1-6 [doi]
- NRV: Leveraging Secure Multi-Party Computation for Lightweight BGP Security EnhancementGuoqiang Zhang, Mingwei Xu, Jiang Li. 1-6 [doi]
- P4SFC: Service Function Chain Offloading with Programmable SwitchesJunte Ma, Sihao Xie, Jin Zhao 0001. 1-6 [doi]
- Efficient arithmetic expression optimization with weighted adjoint matrixXiahua Liu, Chun Yang, Zixin Guan. 1-8 [doi]
- An Encrypted Traffic Classification Method Combining Graph Convolutional Network and AutoencoderBoyu Sun, Wenyuan Yang, Mengqi Yan, Dehao Wu, Yuesheng Zhu, Zhiqiang Bai. 1-8 [doi]
- On Machine Learning-based Stage-aware Performance Prediction of Spark ApplicationsGuangjun Ye, Wuji Liu, Chase Q. Wu, Wei Shen, Xukang Lyu. 1-8 [doi]
- A Modular and Distributed Setup for Power and Performance Analysis of Multi-Processor System-on-Chip at Electronic System LevelMuhammad Mudussir Ayub, Franz Kreupl. 1-8 [doi]
- LIDAUS: Localization of IoT Device via Anchor UAV SLAMYue Sun, Deqiang Xu, Zhuoming Huang, Honggang Zhang, Xiaohui Liang. 1-11 [doi]
- A sensor attack detection method based on fusion interval and historical measurement in CPSXiaobo Cai, Ke Han, Yan Li, Xuefei Li, Jiajin Zhang, Yue Zhang. 1-4 [doi]
- BonnMotion 4 - Taking Mobility Generation to the Next LevelAlexander Bothe, Nils Aschenbruck. 1-8 [doi]
- Open Framework of Gateway Monitoring System for Internet of Things in Edge ComputingKe Han, Youyan Duan, Rui Jin, ZhiCheng Ma, Hui Rong, Xiaobo Cai. 1-5 [doi]
- Hieff: Enabling Efficient VNF Clusters by Coordinating VNF Scaling and Flow SchedulingZenan Wang, Jiao Zhang 0002, Haoran Wei, Tao Huang 0005. 1-8 [doi]
- Efficient Architecture Paradigm for Deep Learning Inference as a ServiceJin Yu, Xiaopeng Ke, Fengyuan Xu, Hao Huang. 1-8 [doi]
- SEC: Secure, Efficient, and Compatible Source Address Validation with Packet TagsXinyu Yang, Jiahao Cao, Mingwei Xu. 1-8 [doi]
- A Multimodal Feature Fusion-Based Method for Individual Depression Detection on Sina WeiboYiding Wang, Zhenyi Wang, Chenghao Li 0007, Yilin Zhang, Haizhou Wang. 1-8 [doi]
- What You See Is Not What You Get: Towards Deception-Based Data Moving Target DefenseYaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu. 1-8 [doi]
- When is Enough Enough? "Just Enough" Decision Making with Recurrent Neural Networks for Radio Frequency Machine LearningMegan Moore, William H. Clark, R. Michael Buehrer, William C. Headley. 1-7 [doi]
- AdaEmb-Encoder: Adaptive Embedding Spatial Encoder-Based Deduplication for Backing Up Classifier Training DataYaobin Qin, David J. Lilja. 1-8 [doi]
- Research on Security Estimation and Control of Cyber-Physical SystemXiaobo Cai, Ke Han, Yan Li, Huihui Wang, Jiajin Zhang, Yue Zhang. 1-5 [doi]
- Paradox of AlphaZero: Strategic vs. Optimal PlaysZe-Li Dou, Liran Ma, Khiem Nguyen, Kien X. Nguyen. 1-9 [doi]
- Improved Window Segmentation for Deep Learning Based Inertial OdometrySiyu Chen, Yu Zhu, Xiaoguang Niu, Zhiyong Hu. 1-7 [doi]
- REPROOF: Quantifying the Jam Resistance of REBUFJoshua Groen, Peter Howell, Michael Collins. 1-2 [doi]
- Research on Power Quality Data Placement Strategy Based on Improved Particle Swarm Optimization AlgorithmChengdong Wang, Jun Fang, Zhuofeng Zhao, Bo Zhao. 1-5 [doi]
- Policy Units and Categories: Networking Models for Simplifying Security Policy ManagementMadeline Van Ness, Xin Sun. 1-11 [doi]
- Adaptive Video Streaming via Deep Reinforcement Learning from User Trajectory PreferencesQingyu Xiao, Jin Ye, Chengjie Pang, Liangdi Ma, Wenchao Jiang. 1-8 [doi]
- A Dynamic Task Assignment Framework based on Prediction and Adaptive BatchingLijun Sun, Xiaojie Yu, Shicong Chen, Yang Yan. 1-8 [doi]
- FPGA Implementation of a Pseudo-Random Signal Generator for RF Hardware Test and EvaluationRandeep S. Baweja, Devin Ridge, Harpreet S. Dhillon, William C. Headley. 1-7 [doi]
- Socially-Aware D2D Pair Strategy: A Stable Matching ApproachXian Zhou, Daru Pan, Hui Song, Xu Huang. 1-4 [doi]
- Deploying Network Key-Value SSDs to Disaggregate Resources in Big Data Processing FrameworksMahsa Bayati, Harsh Roogi, Ron Lee, Ningfang Mi. 1-8 [doi]
- Website Recommendation with Side Information Aided Variational AutoencoderPinhao Wang, Wenzhong Li, Zepeng Yu, Baoguo Lu, Sanglu Lu. 1-6 [doi]
- Modeling Energy Consumption of Virtual Machines in DVFS-Enabled Cloud Data CentersJianzhou Mao, Tathagata Bhattacharya, Xiaopu Peng, Ting Cao, Xiao Qin 0001. 1-6 [doi]
- Experiments with Non-Cooperative Space DTN RoutingRicardo Lent. 1-6 [doi]
- Secure Decentralized Application Development of Blockchain-based GamesNatalia Trojanowska, Michal Kedziora, Moataz Hanif, Houbing Song. 1-8 [doi]
- Automatic Recognition of Identification Schemes for IoT Identifiers via Sequence-to-Sequence ModelXiaotao Li, Shujuan You, Wai Chen. 1-6 [doi]
- Deep Learning for IoTTao Lin. 1-4 [doi]
- Interrupting Real-Time IoT Tasks: How Bad Can It Be to Connect Your Critical Embedded System to the Internet?Ilja Behnke, Lukas Pirl, Lauritz Thamsen, Robert Danicki, Andreas Polze, Odej Kao. 1-6 [doi]
- Spatio-Temporal Data Mining for Aviation Delay PredictionKai Zhang, Yushan Jiang, Dahai Liu, Houbing Song. 1-7 [doi]
- Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means ClusteringLixin Wang, Jianhua Yang, Mary Mccormick, Peng-Jun Wan, XiaoHua Xu. 1-8 [doi]
- A Connection-Free Reliable Transport ProtocolJ. J. Garcia-Luna-Aceves, Abdulazaz Ali Albalawi. 1-6 [doi]
- Performance and Consistency Analysis for Distributed Deep Learning ApplicationsDanlin Jia, Manoj Pravakar Saha, Janki Bhimani, Ningfang Mi. 1-8 [doi]
- A Unite and Conquer Based Ensemble learning Method for User Behavior ModelingAbdoulaye Diop, Nahid Emad, Thierry Winter. 1-8 [doi]
- Discussion on Application of the Internet of Things in Modern Agricultural Experimental BaseLihua Jiang, Jiawei Yan, Nengfu Xie. 1-4 [doi]
- The Practical Application of IoT for Large-scale Instruments and Equipment Sharing Management PlatformGuangjun Shi, Liang Liu, Fu Chen. 1-5 [doi]
- Design Alternatives for Performance Monitoring Counter based Malware DetectionJordan Pattee, Byeong Kil Lee. 1-2 [doi]
- Research of Knowledge Graph Technology and its Applications in Agricultural Information Consultation FieldFan Zhang, Jizhou Wu, Yingli Nie, Lihua Jiang, Ailian Zhou, Nengfu Xie. 1-4 [doi]
- Distributed Scheduling Algorithm for Optimizing Age of Information in Wireless NetworksDongxiao Yu, Xinpeng Duan, Feng Li 0002, Yi Liang, Huan Yang, Jiguo Yu. 1-8 [doi]