Linked e-resources

Details

[I]. The 11th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2020): EDC : an edge-oriented dynamic resource configuration strategy
The future prospecgts of adversarial nets
Secure cross-domain data sharing technology based on blockchain.

[II]. The 10th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2020): Microservice-oriented edge server deployment in cloud-edge system
QoS-aware dynamical resource scheduling in cloud data centers
BinSEAL : Linux binary obfuscation against synbolic execution
Location based communication privacy in Internet of Vehicles using fog computing.

[III]. The 9th International Symposium on Security and Privacy on Internet of Things (SPIoT 2020): The theory and practice of magic hash based attacks on lightweight cryptographic hash functions in complex IoT environments
Efficient public key cryptography scheme with equality test for heterogeneous systems in IIoT
The dark (and bright) side of IoT : attacks and countermeasures for identifying smart home devices and services
Study of transparent file encryption technology on Android platform
SCPAC : an access control framework for diverse IoT platforms based on OAuth2.0.

[IV]. The 6th International Symposium on Sensor-Cloud Systems (SCS 2020): Adaptive routing strategy based on improved Q-learning for satellite Internet of Things
Reliability evaluation of sensor network based on information entropy in power grid planning
Intelligent fault diagnosis and response method based on GIS and IoT in power grid planning
Group authentication for sensors in wireless body area network
Automatic heart sound classification using one dimension deep neural network
Indoor positioning technology based on the fusion of UWB and BLE
A user privacy-preserving algorithm in the live streaming cloud platforms
Multi-echelon vehicle routing problem in sensor-cloud architecture with mobile sinks
Joint optimization of transmission source selection and RSU cache for vehicular video streaming
Who distributes it? Privacy-preserving image sharing scheme with illegal distribution detection
Stepwise-refined interval for deep learning to process sensor-cloud data with noises
Data prediction service model based on sequential pattern mining in sensor-cloud
Statisticval method of space distribution for riding base don R-tree uner differential privacy
Multi-target tracking with EmbedMask and LSTM model fusion
Face detction using improved multi-task cascaded convolutional networks
Access control method absed on a mutual trust mechanism in the edgecomputing environment
Increasing crop yield using agriculture sensing data in smart plant factory
A fuzzy keywords enabled ranked searchable CP-ABE scheme for a public cloud environment
Identifying traffic bottleneck in urban road networks via causal inference
NAS-WFPN : neural architecture search weighted feature pyramid networks for object detection
Performacne benchmarking and optimization for IIoT-oriented blockchain.

[V]. The 2nd International Workshop on Communication, Computing, Informatics and Security (CCIS 2020): A multi-patch deep learning system for text-independent writer identification
Classification of abnormal traces in a collaborative fog computing architecture
A multi-detection method of covert timing channel based on perceptual hashing
Deep learning-based dew computing with novel offloading strategy
Detecting credential stuffing between servers.

[VI]. The 1st International Workshop on Intelligence and Security in Next Generation Networks (ISNGN 2020): A critical node detection algorithm based node interplay model
A posteriori preference multi-objective optimization using machine learning
HVH : a lightweight hash function based on dual pseudorandom transformation
SVHF : a lightweight stream cipher based on Feistel and OFB
A novel quantum color image encryption scheme based on controlled alternate quantum walks.

[VII]. The 1st International Symposium on Emerging Information Security and Applications (EISA 2020): Security analysis of a multi-secret sharing scheme with unconditional security
Simultaneous deauthentication of equals attack
Impact of active scanning tools for device discovery in industrial networks
Designing double-click-based unlocking mechanism on smartphones
An efficient blind signature scheme with untraceability for data privacy in smart grid.

Browse Subjects

Show more subjects...

Statistics

from
to
Export