Abstract is missing.
- Using Deep-Learning-Based Memory Analysis for Malware Detection in CloudHuhua Li, Dongyang Zhan, Tianrui Liu, Lin Ye. 1-6 [doi]
- Machine Learning for Security at the IoT Edge - A Feasibility StudyHan Wang, Luis Barriga, Arash Vahidi, Shahid Raza. 7-12 [doi]
- Kin Genomic Data Inference Attacks Through Factor GraphHui Shang, Zaobo He. 13-18 [doi]
- The Adversarial Attacks Threats on Computer Vision: A SurveyYiyun Zhou, Meng Han, Liyuan Liu, Jing He, Xi Gao. 25-30 [doi]
- Pattern-Adaptive Time Series Prediction via Online Learning and Paralleled Processing using CUDAZhifeng He, Meng Han, Bing Han. 31-36 [doi]
- Detecting Abnormal Behaviors in Smart HomeYonghua Yu, ChangYang Li, Mainuddin Ahmad Jonas, Chuanhao Ma, Faysal Hossain Shezan, Siyuan Shen, Peng Gao, Yuan Tian. 37-42 [doi]
- On the Generality of Facial Forgery DetectionJoshua Brockschmidt, Jiacheng Shang, Jie Wu 0001. 43-47 [doi]
- Assuring the Integrity of Videos from Wireless-Based IoT Devices using BlockchainDominik Danko, Suat Mercan, Mumin Cebe, Kemal Akkaya. 48-52 [doi]
- Server-Side Fingerprint-Based Indoor Localization Using Encrypted SortingAndrew Quijano, Kemal Akkaya. 53-57 [doi]
- Creating Simple Adversarial Examples for Speech Recognition Deep Neural NetworksNathaniel Redden, Ben Bernard, Jeremy Straub. 58-62 [doi]
- Adaptive Sampling for Low-Power Wearable and Implantable DevicesRalph Castro, N. Sertac Artan. 63-66 [doi]
- Multiplatform Stereoscopic 3D Terrain Mapping for UAV LocalizationCharles Kinzel, Jacob Marchio, Saad Biaz, Richard Chapman. 67-71 [doi]
- Cognitive Distraction to Improve Cybersickness in Virtual Reality EnvironmentCelina Zhou, Clara Luisa Bryan, Evan Wang, N. Sertac Artan, Ziqian Dong. 72-76 [doi]
- Autonomous Refueling Strategies using Vehicle-to-Infrastructure Communication in Smart CitiesKameron Carr, Jacob Rojas, Xiao Chen. 77-81 [doi]
- Efficient Safe Learning for Robotic Systems in Unstructured EnvironmentsSara Pohland, Sylvia L. Herbert, Claire Tomlin. 82-86 [doi]
- Automated Dynamic Detection of Self-Hiding BehaviorLuke Baird, Zhiyong Shan, Vinod Namboodiri. 87-91 [doi]
- Motion Tracking for Volumetric Motion Capture DataDerek Roberts, Ying Zhu. 92-96 [doi]
- Secure Over-The-Air Firmware Updates for Sensor NetworksKevin Kerliu, Alexandra Ross, Gong Tao, Zelin Yun, Zhijie Shi, Song Han, Shengli Zhou. 97-100 [doi]
- D-SEA: The Underwater Depth Sensing Device for Standalone Time-Averaged MeasurementsCharmaine Beluso, Anfeng Xu, Eamon Patamasing, Brian Sebastian, Eric Lo, Curt Schurgers, Ryan Kastner, Liren Chen, Xuanyi Yu, Dan Sturm, Robert Barlow. 101-105 [doi]
- Using Transfer Learning, SVM, and Ensemble Classification to Classify Baby Cries Based on Their Spectrogram ImagesLillian Le, Abu Nadim M. H. Kabir, Chunyan Ji, Sunitha Basodi, Yi Pan 0001. 106-110 [doi]
- Graphics Card Based FuzzingRyan Mower, Ben Bernard, Jeremy Straub. 111-115 [doi]
- Dual Output Isolated DC-DC Full-Bridge Converter with Six Power SwitchesAhmed Yago, Nathan Eli Solórzano, Omar Nezamuddin, Euzeli Cipriano dos Santos. 116-120 [doi]
- Intrusion Detection For Controller Area Network Using Support Vector MachinesVinayak Tanksale. 121-126 [doi]
- Optimizing Traditional Transforms for Vehicular Network Sign ClassificationCarl Cheng, Yu Shen, Patrick Liu. 127-132 [doi]
- HYLOC - A Hybrid Localization and Communication System for Vehicles in Mixed Terrain EnvironmentsEmad A. Felemban, Adil Amjad Sheikh. 133-139 [doi]
- The Design and Implementation of a RESTful IoT Service Using the MERN StackPreston Porter, Shuhui Yang, Xuefeng Xi. 140-145 [doi]
- Performance Modeling and Verification of Load Balancing in Cloud Systems Using Formal MethodsShenghui Chen, Zhiming Fan, Haiying Shen, Lu Feng. 146-151 [doi]
- MACH-2K Architecture: Building Mobile Device Trust and Utility for Emergency Response NetworksKaren H. Thurston, Daniel Conte de Leon. 152-157 [doi]
- Dynamic Timer Based on Expected Link Duration in Mobile Ad Hoc NetworksBeomsu Kim, Daniel Godfrey Majengo, Ki-Il Kim, Bongsoo Roh, Jae-Hyun Ham. 158-159 [doi]
- Implementation of AODV-UU on Linux 4.15 KernelSangwoo Jung, Beomsu Kim, Ki-Il Kim, Bongsoo Roh, Jae-Hyun Ham. 160-161 [doi]
- Offloading Tasks to Vehicular Virtual Edge ServersTakamasa Higuchi, Seyhan Ucar, Onur Altintas. 162-163 [doi]
- Lane Change Advisory by Vehicular Micro CloudsSeyhan Ucar, Takamasa Higuchi, Onur Altintas. 164-165 [doi]
- A Geo-Obfuscation Approach to Protect Worker Location Privacy in Spatial Crowdsourcing SystemsCe Pang, Chenxi Qiu, Ning Wang. 166-167 [doi]
- Drone Noise Reduction using Deep Convolutional Autoencoder for UAV Acoustic Sensor NetworksChanjun Chun, Kwang Myung Jeon, Taewoon Kim, Wooyeol Choi. 168-169 [doi]
- Implementation of Low-Latency Message Delivery for Serverless Based WorkflowSeunghyn Hwang, Heeseok Choi, Heon-Chang Yu. 170-171 [doi]
- Demo: Towards the Development of a Differentially Private Lightweight and Scalable Blockchain for IoTAbdur R. Shahid, Niki Pissinou, Laurent Njilla, Edwin Aguilar, Eric Perez. 172-173 [doi]
- An Experimental Study of Cellular Data Offloading in Urban and University ScenariosJeffrey Wang, Ning Wang. 174-175 [doi]
- Performance Evaluation of Sensors Lightweight Security MechanismArie Haenel, Yoram Haddad 0001, Zonghua Zhang. 176-177 [doi]
- Software-Based Implementation of Dual Connectivity for LTECarlos Pupiales, Walter Nitzold, Clemens Felber, Ilker Demirkol. 178-179 [doi]
- Demo Abstract: Cost-Effective Crowdsensing: Spectrum Monitoring with SitaraPhillip Smith, Anh Luong, Shamik Sarkar, Harsimran Singh, Neal Patwari, Sneha Kumar Kasera, Kurt Derr, Samuel Ramirez. 180-181 [doi]
- SCoRe: Scheduling Commands and Responses for Multihop Low-Power Wireless NetworkMingyu Park, Jeongyeup Paek. 182-183 [doi]
- Topology Update Algorithm for Wireless NetworksKlement Streit, Raphael Labaca Castro, Nils Rodday, Gabi Dreo Rodosek. 184-185 [doi]