default search action
CCCI 2021: Beijing, China
- International Conference on Communications, Computing, Cybersecurity, and Informatics, CCCI 2021, Beijing, China, October 15-17, 2021. IEEE 2021, ISBN 978-1-6654-3208-5
- Youssef Mansour, Hamdan Hammad, Omnia Abu Waraga, Manar Abu Talib:
Energy Management Systems and Smart Phones: A Systematic Literature Survey. 1-7 - Yuanyan Xie, Yu Guo, Yue Chen, Zhenqiang Mi:
Real-Time Instance Segmentation for Low-Cost Mobile Robot Systems Based on Computation Offloading. 1-5 - Georgios L. Stavrinides, Helen D. Karatza:
Fault-Tolerant Orchestration of Bags-of-Tasks with Application-Directed Checkpointing in a Distributed Environment. 1-6 - Anastasios Valkanis, Georgios Papadimitriou, Petros Nicopolitidis, Georgia A. Beletsioti, Emmanouel A. Varvarigos:
A Traffic Prediction assisted Routing Algorithm for Elastic Optical Networks. 1-6 - Yabin Xu, Shengjie Sun, Zhuang Wu:
Gibbs Free-energy Prediction Method for Iron-base Alloy Materials Based on Deep Learning*. 1-5 - Harsh Mankodiya, Mohammad S. Obaidat, Rajesh Gupta, Sudeep Tanwar:
XAI-AV: Explainable Artificial Intelligence for Trust Management in Autonomous Vehicles. 1-5 - Yanmiao Li, Hao Guo, Jiangang Hou, Zhen Zhang, Tongqing Jiang, Zhi Liu:
A Survey of Encrypted Malicious Traffic Detection*. 1-7 - Kajal Chatterjee, Mohammad S. Obaidat, Debabrata Samanta, Balqies Sadoun, SK Hafizul Islam, Rajdeep Chatterjee:
Classification of Soil Images using Convolution Neural Networks. 1-5 - Mengyao Yang, Junpeng Qi:
Reference-based Image Super-Resolution by Dual-Variational AutoEncoder. 1-5 - Jinghu Li, Lili Wang, Qianguo Xing:
Detection of Coastal Green Macroalgae based on SLIC, CNN and SVM. 1-5 - Shanyin Peng, Ning Wang:
Optimization Method of Pneumonia Image Classification Model Based on Deep Transfer Learning. 1-5 - Lianfen Huang, Tao Chen, Zhibin Gao, Manman Luo, Zhang Liu:
System Level simulation for 5G Ultra-Reliable Low-Latency Communication. 1-5 - Le Weng, Hengyu Liu, Lianfen Huang, Yingmin Zhang, Chao Feng:
Android malicious application detection based on Support Filtering and Lasso LR Algorithm. 1-5 - Xiaoling Guo, Yaqun Yang, Xinyu Song, Hongmiao Yao, Fudong Zhang:
Discover Community Structure in Network by Optimization Algorithm Based on Modular Function. 1-4 - Chunli Song, Xin Zhang:
Physical Layer Security of RIS-assisted NOMA Networks Over Fisher-Snedecor ℱ Composite Fading Channel. 1-6 - Xiaoqing Yang, Yuelong Zhu, Jun Feng, Jiamin Lu:
Cross-modal Retrieval of Archives based on Principal Affinity Representation. 1-5 - Yue Chen, Yu Guo, Yuanyan Xie, Zhenqiang Mi:
Legal and Regulation Retrieval System Based on Hierarchical Retrieval. 1-5 - Dheerendra Mishra, Mohammad S. Obaidat, Ankita Mishra:
Privacy Preserving Location-based Content Distribution Framework for Digital Rights Management Systems. 1-5 - Dongliang Xuan, Huaping Hu, Bidong Wang, Bo Liu:
Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection. 1-5 - Zihao Liu, Yanrui Xu, Xiaokun Wang, Xiaojuan Ban, Zhiyu Zheng:
Simulation and visualization of solid-liquid phase transition and interactive using particle-based method. 1-5 - Fangzhe Chen, Zhibin Gao, Zhang Liu, Lianfen Huang, Yuliang Tang:
Code-based Computation Offloading in Vehicular Fog Networks. 1-5 - Ashish Rana, Avleen Malhi:
Building Safer Autonomous Agents by Leveraging Risky Driving Behavior Knowledge. 1-6 - Keiichi Shima:
Catching Unusual Traffic Behavior using TF-IDF-based Port Access Statistics Analysis. 1-5 - Rajesh Gupta, Sudeep Tanwar, Mohammad S. Obaidat, Sudhanshu Tyagi, Neeraj Kumar:
Capsule: All you need to know about Tactile Internet in a Nutshell. 1-5 - Xinyi Hu, Chunxiang Gu, Yihang Chen, Fushan Wei:
tCLD-Net: A Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory Network. 1-5 - Jiayu Wang, Lintao Liu, Jia Chen, Xuehu Yan:
Comparison and analysis of secret image sharing principles. 1-5 - Chandrashekhar Meshram, Mohammad S. Obaidat, Kuei-Fang Hsiao, Agbotiname Lucky Imoize, Akshaykumar Meshram:
An Effective Fair Off-Line Electronic Cash Protocol using Extended Chaotic Maps with Anonymity Revoking Trustee. 1-5 - Feilong Du, Xiaojuan Ban, Yalan Zhang, Zirui Dong, Haojian Duan:
Solid-liquid dual channel data-driven method for Lagrangian fluid simulation. 1-5 - Muhammad Ayaz Khan, Anwar Ghani, Mohammad S. Obaidat, Pandi Vijayakumar, Khwaja Mansoor, Shehzad Ashraf Chaudhry:
A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System. 1-5 - Matthieu Moreau, Tarek Benkhelif:
DPSGD Strategies for Cross-Silo Federated Learning. 1-5 - Khaled Rabieh, Ahmet Furkan Aydogan, Marianne A. Azer:
Towards Safer Roads: An Efficient VANET-based Pedestrian Protection Scheme. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.