Abstract is missing.
- A Safety Vehicle Detection Mechanism Based on YOLOv5Yeting Huang, Hancui Zhang. 1-6 [doi]
- A Survey of Machine Learning-based IoT Intrusion Detection TechniquesJing Long, Fei Fang, Haibo Luo. 7-12 [doi]
- SM9-based Traceable and Accountable Access Control for Secure Multi-user Cloud StorageKe Ren, Peng Jiang, Keke Gai, Liehuang Zhu, Jingjing Huang. 13-18 [doi]
- A Blockchain-Assisted Privacy-Preserving Cloud Computing Method with Multiple KeysLiangqun Huang, Lei Xu 0016, Liehuang Zhu, Keke Gai. 19-25 [doi]
- Research Study on Edge ComputingJiapeng Li, Hua Huang. 26-32 [doi]
- Optimizing the Performance of Web Applications in Mobile Cloud ComputingJatin Patel, Talal Halabi. 33-37 [doi]
- A Token-based Authentication and Key Agreement Protocol for Cloud ComputingZisang Xu, Jianbo Xu, Li-Dan Kuang. 38-43 [doi]
- Unsupervised Learning Based Detection Method for The Life Cycle of Virtual CryptocurrencyTong Zhu, Ziyang Zhou, Chenyang Liao, Xinyu Li, Qingfu Zhang. 44-50 [doi]
- PF_RING-TA: A Traffic-adaptive Method of Packet Capturing by Enhancing PF_RingJiawei Ye, Jiaqian Li, AiErPan Jiang, Chengrong Wu. 51-56 [doi]
- Time-To-Live Based Caching Mechanism with Nonlinear Pricing for Information-centric NetworksCheng Zhang. 57-60 [doi]
- Research on the Application of Time and Space Prediction Method in Traffic Flow PredictionChunyan Diao, Dafang Zhang, Juan Chen, Yuting Tang, Lijun Xiao. 61-66 [doi]
- Hekate a tool for gauging Data Deduplication PerformanceLars Nielsen, Daniel E. Lucani. 67-72 [doi]
- FBLE: A Feature-based Label Enhancement Method for Corporate Bond Credit Rating PredictionYingjie Liu, Xueyang Liu, Wenhui Hu, Minghui Zhang, Dongdong Du, Yu Huang 0004. 73-77 [doi]
- A Resource Allocation Strategy for Edge Services Based on Intelligent PredictionYujie Wang, Xiaoli Wan, Xin Du, Xuzhao Chen, Zhihui Lu 0002. 78-83 [doi]
- Similarity Analysis of Knowledge Graph-based Company Embedding for Stocks PortfolioBoyao Zhang, Zhongrui Li, Chao Yang 0001, Zongguo Wang, Yonghua Zhao, Jingqi Sun, Lihua Wang. 84-89 [doi]
- A case study on profiling of an EEG-based brain decoding interface on Cloud and Edge serversAlexandra Samsonova, Barry J. Devereux, Georgios Karakonstantis, Lev Mukhanov. 90-95 [doi]
- T-PKI for Anonymous Attestation in TPMArt Sedighi, Doug Jacobson, Thomas Daniels. 96-100 [doi]
- SG-CIM Mapping Entity Relationship Inference and Verification Techniques Based on Graph Representation Learning TechnologyYu Huang, Wenhui Hu, Xueyang Liu. 101-106 [doi]
- Optimizing the Uncertainty of PPM on Small Batch of Quality DataJun Wang, Tong Zhang, Chu Wang, Xusheng Shi. 107-110 [doi]
- Deep Learning in Automatic Fingerprint IdentificationChunsheng Wu, Honghao Wu, Song Lei, Xiaojun Li, Hui Tong. 111-116 [doi]
- Review on Service CompositionFengtao Hu, Hua Huang, Zhihan Guo. 117-124 [doi]
- Monitoring solution for cloud-native DevSecOpsArun Sojan, Ranjit Rajan, Pasi Kuvaja. 125-131 [doi]
- Game to Dethrone: A Least Privilege CTFWenjing Wu, Wu-chang Feng. 132-137 [doi]
- Cross-view Matching Neural Network for Remote Sensing ImagesTian Hui, Xiaoqing Chen, Ronggang Zhu, Yuelei Xu, Zhaoxiang Zhang. 138-143 [doi]
- A Genetic Algorithm-Based Artificial Network Method for Material Feature RecombinationJialong Guo, Zhiwei Liu, Zongguo Wang, Yuhang Hu, Jue Wang, Yangang Wang. 144-148 [doi]