default search action
9th BDCAT 2022: Vancouver, WA, USA
- IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, BDCAT 2022, Vancouver, WA, USA, December 6-9, 2022. IEEE 2022, ISBN 978-1-6654-6090-3
- Sahara Ali, Jianwu Wang:
MT-IceNet - A Spatial and Multi-Temporal Deep Learning Model for Arctic Sea Ice Forecasting. 1-10 - Terence Jie Chua, Wenhan Yu, Chang Liu, Jun Zhao:
Detection of Uncertainty in Exceedance of Threshold (DUET): An Adversarial Patch Localizer. 11-20 - Yuqing Geng, Wenlong Tian, Ruixuan Li, Weijun Xiao, Chunping Ouyang, Yongbin Liu, Qifei Liu, Jing Li, Xuming Ye, Zhiyong Xu:
Context-aware Resemblance Detection based Deduplication Ratio Prediction for Cloud Storage. 21-29 - Catherine Higgins, Suprio Ray:
Fast Exploratory Analysis with Spatio-temporal Aggregation over Polygonal Regions. 30-39 - Nour Alhussien, Ahmed Aleroud, Reza Rahaeimehr, Alexander A. Schwarzmann:
Triggerability of Backdoor Attacks in Multi-Source Transfer Learning-based Intrusion Detection. 40-47 - Xingyan Li, Jian Li, Zachary Williams, Xin Huang, Mark Carroll, Jianwu Wang:
Enhanced Deep Learning Super-Resolution for Bathymetry Data. 49-57 - Yasir Ali Farrukh, Irfan Khan, Syed Wali, David A. Bierbrauer, John A. Pavlik, Nathaniel D. Bastian:
Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets. 58-67 - Matthieu Martel:
Compressed Matrix Computations. 68-76 - Atakan Kara, F. Serhan Danis, Günce Keziban Orman, Sultan Nezihe Turhan:
Extracting Relations Between Sectors. 77-82 - Mansour Alqarni, Akramul Azim:
Mining Large Data to Create a Balanced Vulnerability Detection Dataset for Embedded Linux System. 83-91 - Dan Incorvaja, Yasin Celik, Ioan Petri, Omer F. Rana:
Circular Economy and Construction Supply Chains. 92-99 - Tao Lu, Fang Qi, John Ner, Tianqing Feng, Brian Cunningham, Lu Peng:
GeauxTrace: A Scalable Privacy-Protecting Contact Tracing App Design Using Blockchain. 100-109 - Tommy Dang, Ngan V. T. Nguyen, Jie Li, Alan Sill, Jon R. Hass, Yong Chen:
JobViewer: Graph-based Visualization for Monitoring High-Performance Computing System. 110-119 - Syed Wali, Irfan Khan, Yasir Ali Farrukh, Muhammad Areeb Fasih, Muhammad Hassan Ul Haq, Majida Kazmi:
Development of Open-Source, Edge Energy Management System for Tactical Power Networks. 120-127 - Jorge López González, Theodore Chapman, Kathryn Chen, Hannah Nguyen, Logan Chambers, Seraj Al Mahmud Mostafa, Jianwu Wang, Sanjay Purushotham, Chenxi Wang, Jia Yue:
Atmospheric Gravity Wave Detection Using Transfer Learning Techniques. 128-137 - Mohammadhadi Shateri, Fabrice Labeau:
Privacy-Preserving Adversarial Network (PPAN) for Continuous non-Gaussian Attributes. 138-143 - Abdi Yamil Vicenciodelmoral, Md. Mehedi Hasan Tanim, Feng Zhao, Xinghui Zhao:
Supporting Green Neuromorphic Computing: Machine Learning Guided Microfabrication for Resistive Random Access Memory. 154-157 - Mehryar Majd, Pejman Najafi, Seyed Ali Alhosseini, Feng Cheng, Christoph Meinel:
A Comprehensive Review of Anomaly Detection in Web Logs. 158-165 - Hayatullahi Bolaji Adeyemo, Rami Bahsoon, Peter Tiño:
Surrogate-based Digital Twin for Predictive Fault Modelling and Testing of Cyber Physical Systems. 166-169 - Jialin Liu, Lin Li, Na Li:
Learning and Preserving Relationship Privacy in Photo Sharing. 170-173 - Abdulkabir Abdulraheem, Im Young Jung:
An Effective Supplementation of Insufficient Data by Generative Adversarial Networks. 174-175 - Sabtain Ahmad:
Communication and Energy Efficient Edge Intelligence. 176-177 - Charlotte Lew:
Physics Informed Neural Networks: Reducing Data Size Requirements via Hybrid Learning. 178-179 - Wanghu Chen, Jilong Yao, Meilin Zhou, Jing Li, Mengyang Shen:
Anomaly detection of high-dimensional data based on Ensemble GANs with Dropout. 180-181 - Md. Mehedi Hasan Tanim, Abdi Yamil Vicenciodelmoral, Zoe Templin, Xinghui Zhao, Feng Zhao:
Honey-CNT based Resistive Switching Device for Neuromorphic Computing Applications. 182-183 - Xiaofu Ding, Xinyu Dong, Olivia McGough, Chenxin Shen, Annie Ulichney, Ruiyao Xu, William Swartworth, Jocelyn T. Chi, Deanna Needell:
Population-Based Hierarchical Non-Negative Matrix Factorization for Survey Data. 184-193 - Tarang Saluja, John S. Heidemann, Yuri Pradkin:
Differences in Monitoring the DNS Root Over IPv4 and IPv6. 194-203 - Benjamin Hall, Joseph Kessler, Osayamen Edo-Ohanba, Jaired Collins, Haoxiang Zhang, Nick Allegreti, Ye Duan, Songjie Wang, Kannappan Palaniappan, Prasad Calyam:
Networked and Multimodal 3D Modeling of Cities for Collaborative Virtual Environments. 204-212 - Joseph Clark, Anaise Gaillard, Justin Koe, Nithya Navarathna, Daniel J. Kelly, Matthias K. Gobbert, Carlos A. Barajas, Jerimy C. Polf:
Multi-Layer Recurrent Neural Networks for the Classification of Compton Camera Based Imaging Data for Proton Beam Cancer Treatment. 213-222 - Erik Maza, Kazi Zakia Sultana:
Identifying Evolution of Software Metrics by Analyzing Vulnerability History in Open Source Projects. 223-232 - Eric Ingram, Furkan Gursoy, Ioannis A. Kakadiaris:
Accuracy, Fairness, and Interpretability of Machine Learning Criminal Recidivism Models. 233-241 - Sean Wang, Arielle Carr, Sihong Xie:
A Predictor-Corrector Method for Multi-objective Optimization in Fair Machine Learning. 242-247 - Casey Hanks, Rakesh M. Verma:
Data Quality and Linguistic Cues for Domain-independent Deception Detection. 248-258 - Rafael Baez Ramirez, Sanuj Kumar, Tuan M. V. Le, Huiping Cao:
Focused Stochastic Neighbor Embedding for Better Preserving Points of Interest. 259-264 - Jacob Ginesin, Jelena Mirkovic:
Understanding DNS Query Composition at B-Root. 265-270 - Logan Reichling, Ikran Warsame, Shane Reilly, Austen Brownfield, Nan Niu, Boyang Wang:
FaultHunter: Automatically Detecting Vulnerabilities in C against Fault Injection Attacks. 271-276 - Avi Spector, Wanying Zhu, Jumman Hossain, Nirmalya Roy:
Simulated Forest Environment and Robot Control Framework for Integration with Cover Detection Algorithms. 277-283 - John W. Gardner, Furkan Gursoy, Ioannis A. Kakadiaris:
Accuracy-Fairness Tradeoff in Parole Decision Predictions: A Preliminary Analysis. 284-287 - Emily Hitchcock, Sarah Hodges, Kevin Zuang, Rosy J. Lu, Yuanwei Jin, Qiuhong He, Enyue Lu:
Image Processing and Machine Learning for Tumor Tissue Detection Using MRI Images in Bacteria Based Cancer Therapy. 288-296 - Joo-Eun Bae, Jin-Hyong Lee, Young-In Park, So-Hyang Park, Kyoung-Sook Kim, Kwanghoon Pio Kim:
An Experimental Analysis on Mining Proportional Process Models from Process Logs. 297-305
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.