default search action
4th BigDataSecurity/HPSC/IDS 2018: Omaha, NE, USA
- 4th IEEE International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2018, Omaha, NE, USA, May 3-5, 2018. IEEE 2018, ISBN 978-1-5386-4400-3
BigDataSecurity 1
- Sam Forman, Bharath Kumar Samanthula:
Secure Similar Document Detection: Optimized Computation Using the Jaccard Coefficient. 1-4 - Khaled Alrawashdeh, Carla Purdy:
Fast Activation Function Approach for Deep Learning Based Online Anomaly Intrusion Detection. 5-13 - Biao Wang, Yiwei Zhang, Ding Wang:
Research on a New Metadata Model of Political Event Data Set. 14-19 - Huijuan Zhao, Ning Ye, Ruchuan Wang:
Transferring Age and Gender Attributes for Dimensional Emotion Prediction from Big Speech Data Using Hierarchical Deep Learning. 20-24
BigDataSecurity 2
- Yenumula B. Reddy:
Big Data Processing and Access Controls in Cloud Environment. 25-33 - Zhijie Han, Ji-Ao Ma, Hui Zhao:
An Access Pattern Model Analysis for Online VoD Multimedia Flow for Bigdata. 34-38 - Xin He, Mingshu He, Zhijie Han:
A Survey of Network Topology of Data Center. 39-41 - Lena Ara, Xiao Luo:
Identify the Maximal Cluster of Hosts Based on Data Fusion and Machine Learning Algorithms for Intrusion Detection. 42-46
BigDataSecurity 3
- Weibei Fan, Zhijie Han, Yujie Zhang, Ruchuan Wang:
Method of Maintaining Data Consistency in Microservice Architecture. 47-50 - Zhijie Han, Yujie Zhang, Ruchuan Wang:
A Locality Live Migration Strategy Based on Docker Containers. 51-54 - Zhijie Han, Yalu Wang, Hui Zhao:
Web Load Balance Strategy with Energy Consumption Constrained Based on DNS Collaboration. 55-58 - Hui Li, Xiaoyu Du, Zhijie Han:
A Coverage Algorithm in Circular Area Based on Polar Coordinates for WSNs. 59-64
BigDataSecurity 4
- Yujie Zhang, Weibei Fan, Zhijie Han, Ruchuan Wang:
Research on Security Public Opinion Based on Declining Value of Big Data. 65-68 - Marwa Elsayed, Mohammad Zulkernine:
Towards Security Monitoring for Cloud Analytic Applications. 69-78 - Bo Cai, Xuanxuan Wang, Peng Li, Zhijie Han:
A Summary of Data Analysis Based on Differential Privacy. 79-82 - Xiaolong Xu, Qingxiang Liu, Lianyong Qi, Yuan Yuan, Wanchun Dou, Alex X. Liu:
A Heuristic Virtual Machine Scheduling Method for Load Balancing in Fog-Cloud Computing. 83-88
BigDataSecurity 5
- Guo Niu, Meikang Qiu, Yanchun Gu:
Kernel Learning Method on Riemannian Manifold with Geodesic Distance Preservation. 89-94 - Wenwen Gong, Chengming Zhang, Qing Cheng, Hang Zhang:
A Trust Model for Secure and Reliable Cloud Service Systems. 95-99 - Yenumula B. Reddy:
Big Data Security in Cloud Environment. 100-106 - Yunhe Feng, Zheng Lu, Qing Cao:
Secure Sharing of Private Locations through Homomorphic Bloom Filters. 107-113
BigDataSecurity 6
- Prasanthi Sreekumari:
Privacy-Preserving Keyword Search Schemes over Encrypted Cloud Data: An Extensive Analysis. 114-120 - Parinya Suwansrikham, Kun She:
Asymmetric Secure Storage Scheme for Big Data on Multiple Cloud Providers. 121-125 - Keke Gai, Meikang Qiu, Meiqin Liu:
Privacy-Preserving Access Control Using Dynamic Programming in Fog Computing. 126-132 - K. Anitha Kumari, G. Sudha Sadasivam, S. Shymala Gowri, Sebastin Arockia Akash, E. G. Radhika:
An Approach for End-to-End (E2E) Security of 5G Applications. 133-138
BigDataSecurity Short Papers
- Huijuan Zhao, Ning Ye, Ruchuan Wang:
A Survey on Automatic Emotion Recognition Using Audio Big Data and Deep Learning Architectures. 139-142 - Zhijie Han, Xinjian Zhang, Jie Li:
The Analysis and Proof of the Hamiltonian Property in GBC3 Network Topology. 143-146 - Xin He, Qingfang Zhang, Zhijie Han:
The Hamiltonian of Data Center Network BCCC. 147-150 - Xiaoyu Du, Yinhe Huangfu, Zhijie Han:
The Hamiltonian Property Analysis and Proof of BCube Topology. 151-154 - Yang Xin, Chensu Zhao, Hongliang Zhu, Mingcheng Gao:
A Survey of Malicious Accounts Detection in Large-Scale Online Social Networks. 155-158
HPSC 1
- Zheng Li, Hao Wu, Shuibing He:
Timing Prediction for Dynamic Application Migration on Multi-core Embedded Systems. 159-164 - Elena Alexandrova, Ali Ahmadinia:
Real-Time Intelligent Air Quality Evaluation on a Resource-Constrained Embedded Platform. 165-170 - Jinhai Wang, Yanchuan Gu, Zhimin He, Meikang Qiu:
A Resource Scheduling Algorithm Based on Maximum Discrete VM in Heterogeneity Cloud. 171-176 - Guifang Cao:
An Event Matching Algorithm of Attribute Value Domain Division for Content-Based Publish/Subscribe System. 177-182 - Weili Zhou, Zhen Zhu, Changle Zhong, Meikang Qiu:
Speech Denoising Using Bayesian NMF with Online Base Update. 183-187
HPSC 2
- Ravindra Sandaruwan Ranaweera, Eiji Oki, Nattapong Kitsuwan:
Non-local Data Fetch Scheme Based on Delay Distribution for Hadoop Clusters in Public Cloud. 188-193 - Jason M. McGinthy, Alan J. Michaels:
Session Key Derivation for Low Power IoT Devices. 194-203 - Junnan Liu, Xing Zhai, Aiqing Han, Shuang Ding, Min Wang, Peng Yin:
The Future Development of Traditional Chinese Medicine from the Perspective of Artificial Intelligence with Big Data. 204-209 - Wanxing Sheng, Yiming Lu, Peipei Jin, Riliang Liu, Jian Du:
Design and Implementation of the Distribution Power Network Model Construction Technology. 210-215 - Xiaotong Sun:
Critical Security Issues in Cloud Computing: A Survey. 216-221
HPSC Short Papers
- Mengxiao Jin, Canshuai Wang, Peng Li, Zhijie Han:
Survey of Load Balancing Method Based on DPDK. 222-224 - Zhijie Han, Yanhao Jing:
Multicast Routing Algorithm for ExCCC Networks. 225-228 - Zhijie Han, Lin Yu:
A Survey of the BCube Data Center Network Topology. 229-231
IDS 1
- Biao Wang, Ding Wang, Yingchu Xie:
Research on the Construction and Application of Burma-Vietnam's Political Event Data Set. 232-237 - Yuxin Chen, Shun Li, Jiahui Yao:
Missing Information Management for Massive Sparse Data. 238-243 - Baozhou Luo, Wenjun Zhu, Peng Li, Zhijie Han:
Distributed Dynamic Cuckoo Filter System Based on Redis Cluster. 244-247 - Xiaoyu Shan, Hanxiao Zhi, Peng Li, Zhijie Han:
A Survey on Computation Offloading for Mobile Edge Computing Information. 248-251
IDS 2
- Mengfan Wei, Baojun Qiao, Jianhui Zhao, Xianyu Zuo:
Application of Remote Sensing Technology in Crop Estimation. 252-257 - Zhimin He, Haozhen Situ, Yan Zhou, Jinhai Wang, Fei Zhang, Meikang Qiu:
A Fast Security Evaluation of Support Vector Machine Against Evasion Attack. 258-263 - Xing Zhai, Junnan Liu, Aiqing Han, Shuang Ding, Youliang Huang, Peng Yin, Min Wang:
Research on the Biological Basis of Treating Different Diseases with Same Method Based on Big Data Mining and Complex Network. 264-269
IDS Short Papers
- Zhijie Han, Weiwei Zhang:
A Summary of the BCCC Data Center Network Topology. 270-272 - Chang-O Eun, Taehyoung Kim, Im Young Jung:
Which Devices are Connected around us? 273-276
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.