


default search action
CyberSciTech 2024: Boracay Island, Philippines
- 2024 IEEE Cyber Science and Technology Congress (CyberSciTech), Boracay Island, Philippines, November 5-8, 2024. IEEE 2024, ISBN 979-8-3315-3209-3
- Lugang Nie, Benxiong Huang, Lai Tu:
Traffic Prediction by Integrating Multi-Cycle Features and Spatio-Temporal Correlations. 1-8 - Ziang Lu, Lu Chen, Yong Li, Guangxin Guo, Tengyan Wang:
Attack Path Extraction based on VGAE and DBSCAN. 9-14 - Ning Liu, Fei Dai, Xinzhuo Chai, Guoxi Liu, Xiaoiing Wu, Bi Huang:
Review of Collaborative Inference in Edge Intelligence: Emphasis on DNN Partition. 15-22 - Jiujie Zhang, Yangfei Lin, Zhaoyang Du, Wugedele Bao:
Fuzzy Logic-Based Deep Reinforcement Learning Pre-Training: A Case Study in MEC Task Offloading. 23-30 - Jianxin Yang, Hui Lin, Xiaoding Wang:
SarlBFT: Scalable Tree Communication Pattern BFT Protocol. 31-38 - Xintao Pei, Yuling Chen, Yun Luo, Zaidong Li, Jianqi Wei:
Lightweight IoT-Oriented Verifiable Computing Scheme in Cloud Computing Circumstance. 39-44 - Tianci Chen, Hui Lin, Lizhao Wu, Xiaoding Wang:
Optimized Block-K Clustering IoT Clustering and Blockchain Sharding Strategy Using Deep Reinforcement Learning. 45-51 - Wenlei Zhong, Yu Jiang, Qinglin Yang, Chenlu Zhuansun, Yanbin Sun, Shen Su, Zhihong Tian, Yuan Liu:
Node Betweenness Centrality based Defense Strategy Against Topology Inference Threat: A Static Game Theoretical Perspective. 52-58 - Xinzhuo Chai, Bi Huang, Ning Liu, Guoxi Liu, Xiaojing Wu, Fei Dai:
An Approach to Detecting Reentrancy Vulnerabilities in Interacting Smart Contracts Using Model Checking. 59-66 - Yican Geng, Haoyang Hu, Zhaoxuan Ge, Zhichao Lian:
Network Intrusion Detection Algorithm Based on LightGBM Model and Improved Particle Swarm Optimization. 67-74 - Danyu Xu, Pengchuan Wang, Qianmu Li:
Improving Example Quality in Black Box Hard Label Text Adversarial Attacks. 75-81 - Minyao Liu, Pan Wang, Yingchun Ye, Xuejiao Chen:
Model Uncertainty Based Unsupervised Real-Time Drift Detection in Network Traffic Classification. 82-87 - Zaidong Li, Yuling Chen, Yun Luo, Xintao Pei, Yingqi Qin:
Private Comparison Based on Digital Decomposition for IoT Cloud Environments. 88-93 - Jianqi Wei, Yuling Chen, Yun Luo, Zaidong Li:
Range Proof-Based Noise Filtering Mechanism for loT Differential Privacy. 94-99 - Siman Chen, Wei Liang:
A Study on Adaptive Gradient Clipping Algorithms for Differential Privacy: Enhancing Cyber Security and Trust. 100-106 - Li Yang, Bi Huang, Xinzhuo Chai, Guoxi Liu, Xiaojing Wu, Fei Dai:
Deadlock Analysis of Microservice Systems with Bounded Buffers. 107-114 - Samuel Ndichu, Tao Ban, Takeshi Takahashi, Akira Yamada, Seiichi Ozawa, Daisuke Inoue:
Adversarial Evaluation of AI-Based Security Alert Screening Systems. 115-124 - Weiyu Wang, Zhuotao Lian, Tianhui Li, Kouichi Sakurai, Chunhua Su:
Privacy-Preserving Parameter Aggregation Scheme Based on Two Leaders for Federated Learning. 125-131 - Jim Alves-Foss, Baby Grace Llego:
Internet Security and Privacy Awareness Among College Students in the Philippines. 132-137 - Weiwei Chen, Jinquan Zuo, Shuai Su, Chi Chen:
A Privacy-Preserving Across-Institution Archives Utilization Framework and Implementation. 138-145 - Marzia Canzaniello, Sara Amitrano, Edoardo Prezioso, Fabio Giampaolo, Salvatore Cuomo, Francesco Piccialli:
Leveraging Digital Twins and Generative AI for Effective Urban Mobility Management. 146-153 - Kozaburo Ibuki, Noriaki Kamiyama:
Evacuation Guidance System Using UAVs of Multiple Types at Disaster. 154-159 - Zhaoxiang Huang, Zhiwen Yu, Zhijie Huang, Erhe Yang, Jiangyan Xu, Bin Guo:
Energy-Efficient Reliable Data Storage Service in Heterogeneous Crowdsensing. 160-167 - Shihua Zhang, Fan He, Xun Shao:
Motion Deblurring by Fusing Multi-Stage Image Features. 168-173 - Chuan Wang, Hua Wang, Jian Bi, Ke Yan:
Short-Term Solar Irradiance Forecasting Based on CNNiTransformer Model. 174-179 - Xiaoming He, Yunzhe Jiang, Huajun Cui, Yinqiu Liu:
Addressee Selection for Multi-Party Conversations in Cyber-Physical-Social Systems. 180-186 - Hao Yu, Wei Sun, Jian Liu, Peng Gao:
Unsupervised Anomaly Behavior Detection in Power Information Network Based on Discriminative Semantic Transformation Sequences. 187-194 - Yuhua Xu, Yan Li, Zhixin Sun:
IoT Intrusion Detection Using SDN Cloud-Edge Collaboration and Ensemble Deep Learning. 195-200 - Ruihao Chen, Hui Lin, Qingxin Lin, Hui Ju:
An Automated Memory Image Forensic Scheme for Linux Systems Based on Containerization Technology. 201-206 - Yuhao Chen, Zengwei Zheng, Jianhua Ma, Binbin Zhou:
A Graph Neural Network with Imbalance-Aware Mechanism for Enhanced Fraud Detection. 207-213 - Jiangyan Xu, Zhiwen Yu, Zhaoxiang Huang, Lele Zhao, Ziyue Yu, Bin Guo:
CDPP: A Crowdsensing Task Allocation Method Based on Diverse Participant Preferences. 214-221 - Masaki Ito, Noriaki Kamiyama:
Money Adjustment Among ISPs Based on Cooperative Games for ICN Promotion. 222-229 - Jiaqi Wang, Jian Chen, Qun Jin:
Assessing ChatG PT -Generated Comments for Video Content Viewing in Online Learning. 230-237 - Chao Wu, Celimuge Wu, Jiale Wu, Yangfei Lin, Zhaoyang Du, Ha Si, Wugedele Bao:
Bandwidth-Adaptive Semantic Communication System with Non-ROI Image Compression. 238-243 - Jingxin Zhao, Zhenxing Ni, Cuilan Liu, Jiadong Ren, Caiyun Liu, Yuqing Zhang:
Chinese Named Entity Recognition in Industry Domain Based on Lexical Enhancement. 244-249 - LeCheng Li, Xinzhuo Chai, Fei Dai, Shuai Wang, Yueyu Dong, Bi Huang:
STFormer: Spatio- Temporal Transformer Network for Traffic Flow Prediction. 250-257 - Jianhua Ma, Qun Jin, Hui-Huang Hsu, John Paul C. Vergara, Antonio Guerrieri, Claudio Miceli de Farias, Ao Guo:
Challenges and Emerging Issues for Generative AI and Hyper Intelligence. 258-265 - Cheng Zhou, Xiaojuan Guan, Chen Wang, Wen Ji, Chenhan Lin:
Research on Virtual Resource Scheduling Algorithm Based on Multi-Objective Optimization. 266-271 - Ying Chen, Weihao Guo, Pingyuan Ge, Xiaoji Ma, Yuqing Zhang:
Model Extraction Attacks on Text-to-Image Generative Adversarial Networks. 272-279 - Guoxi Liu, Bi Huang, Ning Liu, Xiaojing Wu, Li Yang, Fei Dai:
Pavement Crack Detection Based on Channel Attention Mechanism. 280-287 - Haotian Wang, Walid Brahim, Jianhua Ma, Muxin Ma, Alex Qi:
Detecting Characteristic Points in Breathing Cycles Using FMCW Radar with Spirometer as Reference. 288-293 - Haikuo Zhang, Weizhen Han, Haiyong Shi, Haiyang Feng, Jin Hu:
Autonomous Decision-Making in Roundabouts Using Deep Reinforcement Learning and Heuristics Rules. 294-299 - Haiyang Feng, Weizhen Han, Haikuo Zhang, Lisha Yang, Meng Xu:
Voltage Prediction of Electric Vehicle Based on Attention Mechanism CNN-GRU Model. 300-305 - Fu Li, Hui Zhang, Zhichao Lian, Shujuan Wang:
Fake News Detection Based on Contrast Learning and Cascading Attention. 306-313 - Yinzhao Zhang, Qianmu Li, Fan Liu:
Improving the Visual Quality of Adversarial Examples for Face Recognition Models. 314-321 - Ce Wang, Qianmu Li:
Stealthy Adversarial Patch for Evading Object Detectors Based on Sensitivity Maps. 322-328 - Jianing Zhao, Qun Jin:
A Two-Stage Depression Recognition Model Based on Improved YOLOv5 and Spatial-Temporal CNN-Transformer Network. 329-334 - Weixiong Zhang, Anton Louise P. De Ocampo, Rowell M. Hernandez:
Detection of Smoking Behaviors Using Human Key Points and YOLOv8. 335-340 - Shixin Huang, Jiawei Luo, Xiaoyu Wan, Xixi Nie:
EvoResUNet: A Lesion Segmentation Network for Primary Liver Cancer from 3D CECT Volume. 341-348 - Riya Mahajan, Yegang Du, Alexander Schmitz, Gabriele Trovato, Yasuyuki Taki, Shigeki Sugano:
uSkin Pillow: Tactile-Sensor-Based Non-Invasive Approach to Sleep Analysis. 349-354 - Xiaojing Wu, Xinzhuo Chai, Fei Dai, Shuai Wang, Yueyu Dong, Bi Huang:
Improved YOLOv5 for Pavement Patch Detection Using Deformable Convolution and Bidirectional Feature Pyramid Network. 355-362 - Bo He, Yang Gao, Jing Cao, Weining Cai, Xin Ma, Xiaoyu Zhao, Zhichao Lian:
Millimetre-Wave Human Image Dangerous Object Detection Based on Faster R-CNN. 363-368 - Yoshiko Yasumura, Masakazu Fujio, Wataru Nakamura, Kenta Takahashi:
Bio-SSI: Self-Sovereign Identity Bound to Biometrics. 369-377 - Xizhi Yang, Zhichao Lian:
Integrated Evaluation System for Intelligent Model. 378-383 - Chenyu Wu, Ting Zhang, Zhixian Li, Zhichao Lian:
Enhancing Adversarial Patch Effectiveness for Face Recognition Systems Using Sharpness-Aware Minimization. 384-389 - Kuo-Yi Chang, Kun-Lin Li, Ming-Hwa Sheu, Szu-Hong Wang:
DMCGF Dehazing Neural Network Design for Edge-AI Implementation. 390-393 - Yukun Wang, Xingjian Xu, Fanjun Meng:
Deep Knowledge Tracking Model Integrating Multiple Feature Personalization Factors. 394-399 - Shivam Goyal, Sudhakar Kumar, Sunil K. Singh, Brij B. Gupta, Varsha Arya, Kwok Tai Chui:
Intelligent Task Offloading in IoT-Driven Digital Twin Systems via Hybrid Federated and Reinforcement Learning. 400-405 - Anmol Jaiswal, Sunil K. Singh, Sudhakar Kumar, Brij B. Gupta, Kwok Tai Chui:
Advanced Evaluation of Propagation Models and Routing Protocols in Vehicular Ad-Hoc Networks. 406-411 - Wen Ji, Chenhan Lin, Jiang Liu, Hongyang Xu, Liangjie Xu, Jun Hu:
SA-PSO Approach for Optimizing QoS Management in SDN Service Chains. 412-417 - Kaito Kondo, Noriaki Kamiyama:
Analysis of Business Model of Co-Creation Digital-Twin City Using Evolutionary Game. 418-423 - Kwanho Kim, Dokyung Kim, Kanghyun Jo:
DORAC: Dynamic-Objects Removal and Clustering for Object Detection. 424-428 - Chalee Vorakulpipat, Apiwat Chantawibul, Satheanpong Jeungudomporn, Chanchai Techawatcharapaikul, Wachirapong Jirakitpuwapat:
FaceGuard: Enhancing Data Privacy Through Selective Facial Anonymization in Public Events. 429-434 - Minseung Kim, Jongchae Lee, Kanghyun Jo:
Low-Frequency Injection for Performance Boosting of Image Classification. 435-438 - Jongchae Lee, Minseung Kim, Kanghyun Jo:
Descriptor Feature Map for Classification. 439-442 - Jehwan Choi, Youlkyeong Lee, Kanghyun Jo:
Efficient Feature Extraction Model for Surveillance Systems Using Drone Imagery. 443-447 - Seongmin Kim, Kanghyun Jo:
Checking the Neural Networks' Subitizing Ability and Proposing Three Challenges for Human-Like Subitizing. 448-451 - Jaehyeon Sung, Kanghyun Jo:
3-DoF Pose Estimation of Vehicles on the Road. 452-455 - Houtao Sun, Chuanxin Wen, Chunhu Shi, Qiangsheng Pu, Pengpeng Lv, Fei Luo:
Improved Multi-Objective Simulated Annealing Particle Swarm Algorithm for Siting and Capacity Sizing of Distributed Power Supplies. 456-460 - Ganggui Wang, Celimuge Wu, Yangfei Lin, Zhaoyang Du, Wugedele Bao, Ha Si:
Cross-Layer Performance Analysis of Delay-Doppler Domain Multi-Carrier Modulation for Vehicular Networks. 461-465 - Yuanchen Wang, Kai Zhang, Yiliang Liu, Weilin Song, Jian Tang:
Age of Information Dependent Grant-Free Communication. 466-469 - Yonglin Pu, Xiaolong Xu, Lianyong Qi, Wanchun Dou, Jiong Yu, Ziyang Li:
Duplicate Data Elimination Optimization Strategy Based on Edge Service Management. 470-475 - Haojia Yang, Qichao Xu:
Fine-Grained Access Control for Lightweight Data Sharing of UAVs. 476-479 - Yizhi Pan, Kai Li, Jinghao Wu, Han Shu, Feihe Shao, Junyi Xin, Guanqun Sun:
Sequence-Integrated Radiology Report Generation Leveraging Positional Encoding for Text and Images. 480-484 - Dong Wang, Guoyuan Zhou, Jinglue Xu, João Eduardo Batista, Jia Guo, Hitoshi Iba:
A PSO-CNN-BiLSTM Model for Predicting Leaf Area Index. 485-490 - Zhiying Huang, Yuang Meng, Ao Guo, Walid Brahim, Jianhua Ma:
Leveraging ECG Signal for People Identification under Different Emotion States. 491-495 - Xiaolin Wu, Shuliang Zhu, Jinjia Zhou, Raymond Yao:
Paradigm Shift in Foreign Language Teaching Practices in the Age of AI - Case Studies of Chinese and Japanese Learners. 496-501 - Xin Tong, Akinori Nagata, Kimiya Fujisawa:
Analyzing the Impact of Effect Sounds on Real-World Human Emotions and Behaviors by Adding Effect Sounds to Human Actions. 502-505 - Haojie Wang, Luyang Wang, Yishui Zhu, Jun Wang, Bo Wu:
Analyzing Eye-Movements of Drivers with Varying Levels of Experience During U-Turn Segment. 506-511 - Nikhil Kumar Agarwal, Gurkiran Singh Batra, Dhrumik Mukeshbhai Patel, Eslam G. AbdAllah:
Impacts of Internet of Things (IoT) Leveraging Radio Frequency Identification (RFID) and Internet Protocol (IP) on Business Continuity (BC) and Disaster Recovery (DR). 512-517 - Yu Qi, Siyu Xiong, Chongyang Zhang, Bo Wu:
Analyzing the Imitation Behaviors of Gorilla Chest-Beating Based on Human Pose Estimation. 518-522 - Xiangyu Su, Siyu Xiong, Bo Wu:
A New Smart Glasses-Based Dual Authentication System via Signature Image Recognition Handwriting Behaviors Identification. 523-528 - Tao Zhou, Tianle Hu, Hong Chen:
Investigating Decentralized Management of Wearable Device Data for Health. 529-533 - Xin Liu, Rui Wang, Rui Xing, Donglan Liu, Fangzhe Zhang, Lili Sun:
Delay-Tolerant Computation Offloading in Vehicular Networks Based on Local Blockchain. 534-539 - Yu Su, Qianqian Cheng, Ziyang Liu:
Integrated Sensing and Communication for UAV Detection: A Reinforcement Learning-based Approach. 540-543 - Han Liu, Baoyu An, Yaoyao Yin, Xueyang Huo, Zhou Su, Yuntao Wang:
A Trust Evaluation and Concept Drift-Based Approach for Dynamic APT Evasion Detection. 544-547 - Robert Seeliger, Martin Lasak, Görkem Güçlü, Stefan Arbanowski, Stephan Steglich:
Towards Green Video: Energy-Saving Potentials in Streaming. 548-553 - Yuanhong Wu, Isaiah Smith, Tushar Marwah, Michael Schroeter, Mohamed Rahouti, D. Frank Hsu:
NCAA Bracket Prediction Uing Machine Learning and Combinatorial Fusion Analysis. 554-561

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.