default search action
ICBDS 2019: Nanjing, China
- Yuan Tian, Tinghuai Ma, Muhammad Khurram Khan:
Big Data and Security - First International Conference, ICBDS 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers. Communications in Computer and Information Science 1210, Springer 2020, ISBN 978-981-15-7529-7
Cybersecurity and Privacy
- Yanfeng Shi, Shuo Qiu, Jiqiang Liu:
An Efficient Lattice-Based IBE Scheme Using Combined Public Key. 3-16 - Wenxi Wang, Weilong Zhang, Zhang Jin, Keyan Sun, Runlin Zou, Chenrong Huang, Yuan Tian:
A Novel Location Privacy Protection Scheme with Generative Adversarial Network. 17-27 - Najla Al-Nabhan:
Security, Safety and Privacy Issues of Unmanned Aerial Vehicle Systems. 28-39 - Yonghua Gong, Lei Chen:
A Trust Model for Evaluating Trust and Centrality Based on Entropy Weight Method in Social Commerce. 40-50 - Yueqiang Xu, Tero Päivärinta, Pasi Kuvaja:
Digital Twins as Software and Service Development Ecosystems in Industry 4.0: Towards a Research Agenda. 51-64 - Xinyu Liu, Xin Zhang, Qianyun Miao:
A Click Fraud Detection Scheme Based on Cost-Sensitive CNN and Feature Matrix. 65-79 - Shengxu Xie, Chang-you Xing, Guomin Zhang, Jinlong Zhao:
Research on Table Overflow Ldos Attack Detection and Defense Method in Software Defined Networks. 80-97 - A. Ayoub, Vidyasagar M. Potdar, A. Rudra, Hoa Luong:
Human Factors Affecting XBRL Adoption Success in Lebanese Small to Medium-Sized Enterprises. 98-115 - A. Ayoub, Vidyasagar M. Potdar, A. Rudra, Hoa Luong:
Impact of Nepotism on the Human Resources Component of ERP Systems Implementation in Lebanon. 116-134 - Miada Murad, Yuan Tian, Mznah Al-Rodhaan:
Computationally Efficient Fine-Grain Cube CP-ABE Scheme with Partially Hidden Access Structure. 135-156 - A. Ayoub, Vidyasagar M. Potdar, A. Rudra, Hoa Luong:
The Impact of Organizational Culture on the Internal Controls Components of Accounting Information Systems in the City of Beirut, Lebanon. 157-177 - Congdong Lv, Yucai Li:
A Security Vehicle Network Organization Method for Railway Freight Train Based on Lightweight Authentication and Property Verification. 178-189 - Yongbing Lian, Xiaogang Wei:
Lightweight Identity Authentication Scheme Based on IBC Identity Cryptograph. 190-198 - Guangyao Yuan, Lihong Guo, Gang Wang:
Security Analysis and Improvement on Kerberos Authentication Protocol. 199-210 - Zongsheng Lv, Kaiwen Huang, Yuanzhi Wang, Ruikang Tao, Guanghan Wu, Jiande Zhang, Yuan Tian:
Distributed Differential Privacy Protection System for Personalized Recommendation. 211-222 - Haiyan Sun, Lingling Li, Jianwei Zhang, Wanwei Huang:
An Improved Dynamic Certificateless Authenticated Asymmetric Group Key Agreement Protocol with Trusted KGC. 223-237 - Yubin Liu, Ming Pang:
Research on Medical Image Encryption Method Based on Chaotic Scrambling and Compressed Sensing. 238-246 - Li Wang, Xin Shu, Wei Zhang, Yunfang Chen:
Design and Optimization of Evaluation Metrics in Object Detection and Tracking for Low-Altitude Aerial Video. 247-262 - Tianxu Sun, Yunlong Zhao, Zuowei Lian:
People Flow Analysis Based on Anonymous OD Trip Data. 263-273 - Muhammad Ovais Ahmad:
Agile Methods and Cyber-Physical Systems Development - A Review with Preliminary Analysis. 274-285 - Lina Pan, Bo Zhang:
Optimizing the Reservoir Connection Structure Using Binary Symbiotic Organisms Search Algorithm: A Case Study on Electric Load Forecasting. 286-297 - Runtong Zou, Xuecheng Zhang, Wei Jiang, Linfeng Liu:
On the Character Relations Between Nodes for Data Forwarding in Mobile Opportunistic Networks. 298-308 - Shanyu Bi, Junyao Zhang, Weiwei Kong, Long Liu, Pengpeng Lv:
Research on Interference of LTE Wireless Network in Electric Power System. 309-318 - Zewei Tang, Chengzhi Jiang:
Research on High Reliability Planning Method in Electric Wireless Network. 319-329 - Yu Chen, Kun Liu, Ziqian Zhang:
Research on Service Support Ability of Power Wireless Private Network. 330-339 - Zhan Shi, Chenrong Huang, Xiaoqin Zeng, Jiande Zhang, Lei Han, Ying Qian:
A Method of UML Sequence Diagram Verification Based on a Graph Grammar. 340-351 - Yuexiao Cai, Yunlong Zhao, Jinqian Yang, Changxin Wang:
A Bus Passenger Flow Estimation Method Based on POI Data and AFC Data Fusion. 352-367
Big Data
- Yi Chen, Zhuoran Yang, Zhicong Ye, Hui Liu:
Research Character Analyzation of Urban Security Based on Urban Resilience Using Big Data Method. 371-381 - Alaa A. Alwabel:
Privacy Issues in Big Data from Collection to Use. 382-391 - Lihong Guo, Haitao Wu, Jie Yang:
Trusted Query Method Based on Authorization Index and Triangular Matrix in Big Data. 392-401 - Liyuan Tang, Haoren Hu, Zhonghua Wang, Jiansheng Wang, Yahui Li:
Microservice Architecture Design for Big Data in Tactical Cloud. 402-416 - Hai Yu, Zi-Xuan Li, Yu-Yan Jiang:
Using GitHub Open Sources and Database Methods Designed to Auto-Generate Chinese Tang Dynasty Poetry. 417-428 - Zelei Hou, Chao Huang, Jiagao Wu, Linfeng Liu:
Distributed Image Retrieval Base on LSH Indexing on Spark. 429-441
Blockchain and Internet of Things
- Dawei Li, Xue Gao:
A Blockchain Based Terminal Security of IoT. 445-454 - Abubakar Mohammed, Vidyasagar M. Potdar, Li Yang:
Key Factors Affecting Blockchain Adoption in Organizations. 455-467 - Najla Al-Nabhan:
An IoT-Based Congestion-Aware Emergency Evacuation Approach. 468-478 - Najla Al-Nabhan, Aseel Bin Othman, Anura Jayasumana, Mahindre Gunjan:
Directional Virtual Coordinate Approach for 3-D IoT Systems in Smart Cities. 479-498
Security in Cloud and Fog Computing
- Shadan AlHamed, Mznah AlRodhaan, Yuan Tian:
Privacy Preservation of Future Trajectory Using Dummy Rotation Algorithm in Fog Computing. 501-513 - Yuanfei Tu, Qingjian Su, Yang Geng:
Enabling Secure and Efficient Data Sharing and Integrity Auditing for Cloud-Assisted Industrial Control System. 514-528 - Pei Sun, Baojing Chen, Shaocong Han, Huizhong Shi, Zhenwei Yang, Xing Li:
An Evolutionary Task Offloading Schema for Edge Computing. 529-540 - Chengzhi Jiang, Song Deng:
Data Leakage Prevention System for Smart Grid. 541-549
Artificial Intelligence/Machine Learning Security
- Anwar Ullah, Muhammad Zubair Asghar, Anam Habib, Saiqa Aleem, Fazal Masud Kundi, Asad Masood Khattak:
Optimizing the Efficiency of Machine Learning Techniques. 553-567 - Yunfang Chen, Li Wang, Dehao Qi, Wei Zhang:
Community Detection Based on DeepWalk in Large Scale Networks. 568-583 - Rahman Ali, Asmat Ali, Farkhund Iqbal, Asad Masood Khattak, Saiqa Aleem:
A Systematic Review of Artificial Intelligence and Machine Learning Techniques for Cyber Security. 584-593 - Shuaicheng Pan, Lei Han, Yi Tao, Qingyu Liu:
Study on Indicator Recognition Method of Water Meter Based on Convolution Neural Network. 594-602 - Najwa Altwaijry, Ameerah ALQahtani, Isra Alturaiki:
A Deep Learning Approach for Anomaly-Based Network Intrusion Detection. 603-615 - Haiyong Wang, Weizheng Guan, Kaixin Zhang:
Over-Sampling Multi-classification Method Based on Centroid Space. 616-632 - Ming Jin, Chenchen Dou, Peichun Pan, Ming Wan, Biying Sun, Wenxuan Zhang:
A Blockchain-Based IoT Workflow Management Approach. 633-644 - Xiaogang Wei, Yongbing Lian:
Research on Identity-Based Cryptograph and Its Application in Power IoT. 645-654
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.