default search action
DASC/PiCom/DataCom/CyberSciTech 2017: Orlando, FL, USA
- 15th IEEE Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2017, Orlando, FL, USA, November 6-10, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1956-8
CyberSciTech Regular Papers
- Peter Kimani Mungai, Runhe Huang, Zhong Chen, Xiaokang Zhou:
Semantic Neuron Networks Based Associative Memory Model. 1-8 - Ao Guo, Jianhua Ma:
An Integrative and Precise Approach in Personality Computing Based on Ontic Personae Modeling. 9-15 - Kehua Guo, Ting Li, Runhe Huang, Jian Kang:
Deep Convolution Neural Network Discriminator for Distinguishing Seborrheic Keratosis and Flat Warts. 16-21 - Zili Li, Li Zeng, Zhigang Luo:
Identifying the Landscape and Trends in Cyberspace Research: From 1989 to 2016. 22-29 - Shan Gao, Guibing Guo, Yusong Lin, Xingjin Zhang, Yongpeng Liu, Zongmin Wang:
Pairwise Preference Over Mixed-Type Item-Sets Based Bayesian Personalized Ranking for Collaborative Filtering. 30-37 - Maximilian Frank, Maria Leitner, Timea Pahi:
Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education. 38-46 - Yuxia Sun, Yunlong Xie, Zhi Qiu, Yuchang Pan, Jian Weng, Song Guo:
Detecting Android Malware Based on Extreme Learning Machine. 47-53 - Tomoya Furukawa, Qianfgu Zhao:
On Extraction of Rules from Deep Learner: The Deeper, the Better? 54-60 - Pan Wang, Xuejiao Chen:
Co_Hijacking Monitor: Collaborative Detecting and Locating Mechanism for HTTP Spectral Hijacking. 61-67 - Shuang Li, Yuezhi Zhou, Di Zhang, Yaoxue Zhang, Xiang Lan:
Learning to Diversify Recommendations Based on Matrix Factorization. 68-74 - Zhe Sun, Zhixin Sun, Xuejian Zhao, Long Jin, Wei Zhang:
Application of Adaptive Genetic Algorithm for Multimodal Transportation Logistics Distribution Routing Problem. 75-80 - BingBing Rao, Liqiang Wang:
A Survey of Semantics-Aware Performance Optimization for Data-Intensive Computing. 81-88 - Stamatios Giannoulakis, Nicolas Tsapatsoulis, Klimis S. Ntalianis:
Identifying Image Tags from Instagram Hashtags Using the HITS Algorithm. 89-94 - Qichao Xu, Zhou Su, Yilong Hui, Qing Yang:
Caching Scheme with Edge Nodes for Mobile Cyber Physical Systems. 95-100 - Xiu Li, Chang Men, Fan Zhang, Zhihui Du:
A Smart Visual Analysis Solution for MOOC Data. 101-106 - Maede Rayatidamavandi, Yu Zhuang, Mahshid Rahnamay-Naeini:
A Comparison of Hash-Based Methods for Trajectory Clustering. 107-112 - Ahmad Jamialahmadi, Yaser P. Fallah:
Analysis of the Impact of Driver Behavior Models on Performance of Forward Collision Warning Systems. 113-118 - Tongtong Xu, Ao Guo, Jianhua Ma, Kevin I-Kai Wang:
Feature-Based Temporal Statistical Modeling of Data Streams from Multiple Wearable Devices. 119-126 - Shengjie Xu, Yi Qian, Rose Qingyang Hu:
A Study on Communication Network Reliability for Advanced Metering Infrastructure in Smart Grid. 127-132 - Dongfeng Fang, Yi Qian, Rose Qingyang Hu:
Interference Management for Physical Layer Security in Heterogeneous Networks. 133-138 - Luis Gabriel Jaimes, Robert Steele:
Incentivization for Health Crowdsensing. 139-146 - Moon Ho Lee:
A Real Example of Jong Nang and Tomb Gate of Cyber Biology Jeju Island: Its Fundamental Principle of DNA Code. 147-155 - Hossein Nourkhiz Mahjoub, Amin Tahmasbi-Sarvestani, Hadi Kazemi, Yaser P. Fallah:
A Learning-Based Framework for Two-Dimensional Vehicle Maneuver Prediction over V2V Networks. 156-163 - Fei Lu, Zhikui Chen, Xu Yuan, Qiu Li, Zedong Du, Li Luo, Fengyi Zhang:
MMHG: Multi-modal Hypergraph Learning for Overall Survival After D2 Gastrectomy for Gastric Cancer. 164-169 - Yongpeng Liu, Yusong Lin, Shan Gao, Hongpo Zhang, Zongmin Wang, Yang Gao, Guanling Chen:
Respiratory Sounds Feature Learning with Deep Convolutional Neural Networks. 170-177 - Jianmei Lei, Dongmei Chen, Fengxi Li, Qingwen Han, Siru Chen, Lingqiu Zeng, Min Chen:
A Bus Arrival Time Prediction Method Based on GPS Position and Real-Time Traffic Flow. 178-184 - Liang Xu, Qianbin Xia, Weijun Xiao:
Locality-Driven Dynamic Flash Cache Allocation. 185-193 - Ahmad O. Aseeri, Yu Zhuang, Mohammed Saeed Alkatheiri:
A Memory Capacity-Aware Algorithm for Fast Clustering of Disk-Resident Big Datasets. 194-201
CyberSciTech Short Papers
- Masoumeh Kalantari Khandani, Wasfy Mikhael, Yaser P. Fallah, Katerina Goseva-Popstojanova:
Data-Based Analysis of Sampling and Estimation Methods for Vehicle Tracking Over Wireless Networks. 202-207 - Zi Wang, Zifei Zhao, Zhiwei Zhao, Geyong Min, Xinyuan Huang, Hancong Duan, Jia Hu:
Exploiting Mobile Sensor Data for Media Caching in Mobile Edge Networks. 208-213 - Tengku Adil Tengku Izhar, Bernady O. Apduhan:
An Ontology-Based Framework for Organization Information Extraction. 214-219 - Ting Wu, Fei Hao, Mijin Kim:
Exploring the Production of "The Belt and Road"-Driven Animations with Crowdsourcing Model. 220-225 - David Maimon, Olga Babko-Malaya, Rebecca Cathey, Steve Hinton:
Re-thinking Online Offenders' SKRAM: Individual Traits and Situational Motivations as Additional Risk Factors for Predicting Cyber Attacks. 232-238 - Arthur A. B. Bucioli, Gabriel Fernandes Cyrino, Gerson Flavio Mendes de Lima, Isabela Cristina dos Santos Peres, Alexandre Cardoso, Edgard Afonso Lamounier, Milton Miranda Neto, Roberto V. Botelho:
Holographic Real Time 3D Heart Visualization from Coronary Tomography for Multi-place Medical Diagnostics. 239-244 - Andre Goode, Robert James Steele:
A Practical Cyber-Physical System for the Self-Capture of the Effect of Exercise on Blood Glucose Levels. 245-250 - Feng Ye, Yujun Sun, Andrew Rettig:
Authentication and Access Control for an IoT Green Roof Monitoring System. 251-256 - Alan Oliveira de Sá, Luiz Fernando Rust da Costa Carmo, Raphael Carlos Santos Machado:
Use of Switching Controllers for Mitigation of Active Identification Attacks in Networked Control Systems. 257-262 - Peipei Wang, Yutong Han, Jing Qin, Bin Wang, Xiaochun Yang:
Anomaly Detection for Streaming Data from Wearable Sensor Network. 263-268 - Marta Chinnici, Davide De Chiara, Andrea Quintiliani:
Data Center, a Cyber-Physical System: Improving Energy Efficiency Through the Power Management. 269-272 - Thomas Friedl, Henning Schneider, Miloslava Plachkinova:
Development of a Platform-Independent Software Tool for Management of X.509 Certificates from Diverse Certificate Stores. 273-275 - Ronald Loui:
Plausible Deniability for ISP Log and Browser Suggestion Obfuscation with a Phrase Extractor on Potentially Open Text. 276-279 - Ronald Loui, Will Hope:
Information Warfare Amplified by Cyberwarfare and Hacking the National Knowledge Infrastructure. 280-283 - Yu-Pei Liang, Shuo-Han Chen, Yi-Han Lien, Tseng-Yi Chen, Heng-Yin Chen, Wei-Kuan Shih:
Enabling High-Resolution Video Support for the Next-Generation Internet-Connected Display. 284-286
Special Session on Cyber-Enabled Smart Environment and Healthcare (Cyber-ESEH)
- Gabriel Ploof, Bassam Alqahtani, Farwan Alghamdi, Garret Flynn, Cai Xia Yang:
Center of Mass Estimation Using Motion Capture System. 287-292 - Xiongyi Liu, Wenbing Zhao:
Buddy: A Virtual Life Coaching System for Children and Adolescents with High Functioning Autism. 293-298 - Qing Wu, Wenbing Zhao:
Towards a Technology-Enabled Environment of Care for Nursing Homes. 299-302 - Hao Qiu, Xianping Wang, Fei Xie:
A Survey on Smart Wearables in the Application of Fitness. 303-307 - Marius Rashid Khan, Sabine Sachweh, Albert Zündorf:
Towards User-Centered Assistance in Smart Environments Based on Device Metadata. 308-311 - Albert Budi Christian, Lokesh Sharma, Shih-Lin Wu:
AED: Adaptive Energy-Efficient Data Transmission Scheme for Heart Disease Detection. 312-317 - Veton Këpuska, Gamal Bohouta:
Improving Wake-Up-Word and General Speech Recognition Systems. 318-321
Special Session on Computing and Applications for Cyber Internet of Things (Cyber-IoT)
- Hui Hui, Rui Xing:
QoE Based Optimization for Cyber Vehicular Networks. 322-325 - Xinzheng Feng, Jun Wu, Kuan Wang, Jianhua Li, Meng Wang:
Security Analysis of Simple Network Management Protocol Based IEEE P21451 Internet of Things. 326-330 - Junjie Pei, Zhuoxuan Ju, Hengdong Ye, Bibo Wu, Shu Fu:
Performance Comparison of Base Station On/Off and Base Station Cooperative Transmission in Ultra-Dense Network. 331-335 - Hengdong Ye, Zhuoxuan Ju, Bibo Wu, Junjie Pei, Shu Fu:
Joint Base Station Cooperative Transmission and ON-OFF Mechanism in Internet of Things Networks. 336-339
Special Session on Cyber-Enabled Intelligent Sensing and Smart Computing (Cyber-ISSC)
- Song Deng, Kun Wang:
An Overview on Key Technologies of Secure and Efficient Data Transmission for Energy Internet. 340-345
Special Session on Cyber Social Computing and Cyber-Enabled Applications (CSC&CEA)
- Ninglin Xu, Jiulei Jiang, Xiaofeng Wang:
Flexible Analysis of Cross-Organizational Process Modeling Based on π Calculus. 346-350 - Yaya Liu, Jiulei Jiang, Lingyu Xu, Lishuang Zhao:
Formalization of Business Process with Flexibility Based on Service Interaction. 351-355 - Liangxu Liu, Dayao Gong, Bo Guan, Junyan Xiao:
CF-Cluster: Clustering Bike Station Based on Common Flows. 356-361
Special Session on ICT Apps, Cyber and Economy Workshop (ACE-2017)
- Yuping Zhao, Geng Li, Wanyue Qu:
A Novel Cluster-Based Ultra-Dense Network Technique for 5G and its Security Issues. 362-367 - Iroshan Abeykoon, Xiaohua Feng, Renxi Qiu:
A Forensic Investigation of Robot Operating System. 368-372 - Xiaohua Feng, Audrey Asante, Emma Short, Iroshan Abeykoon:
Cyberstalking Issues. 373-376
DASC Regular Papers
- Kutalmis Akpinar, Fereshteh Jafariakinabad, Kien A. Hua, Omar Nakhila, Jun Ye, Cliff C. Zou:
Fault-Tolerant Network-Server Architecture for Time-Critical Web Applications. 377-384 - Md. Arafatur Rahman, Md. Munirul Hasan, A. Taufiq Asyhari, Md. Zakirul Alam Bhuiyan:
A 3D-Collaborative Wireless Network: Towards Resilient Communication for Rescuing Flood Victims. 385-390 - Yaohang Li, Ravi Mukkamala, Michael Mascagni:
Validating the Correctness of Outsourced Computational Tasks Using Pseudorandom Number Generators. 391-398 - Jake Fairbrother, Matthew Leeke:
On Basis Variables for Efficient Error Detection. 399-406 - Bruno Costa, Paulo F. Pires, Flávia Coimbra Delicato:
Specifying Functional Requirements and QoS Parameters for IoT Systems. 407-414 - Shigeki Yoneda, Naohiro Hayashibara:
Adaptive Zone Replication for Structured Peer-to-Peer Systems. 415-422 - Koji Hasebe, Mitsuaki Tsuji, Kazuhiko Kato:
Deadlock Detection in the Scheduling of Last-Mile Transportation Using Model Checking. 423-430 - D. Frank Hsu, Xiaojie Lan, Gabriel Miller, David Baird:
A Comparative Study of Algorithm for Computing Strongly Connected Components. 431-437 - Mohammad Asadul Hoque, Phil Pfeiffer, Sanford Gabrielle, Edward Hall, Elizabeth Turbyfill:
SAFARI-Taxi: Secure, Autonomic, FAult-Resilient, and Intelligent Taxi Hailing System. 438-445 - Shameek Bhattacharjee, Mehrdad Salimitari, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Preserving Data Integrity in IoT Networks Under Opportunistic Data Manipulation. 446-453 - Joachim Fellmuth, Paula Herber, Tobias F. Pfeffer, Sabine Glesner:
Securing Real-Time Cyber-Physical Systems Using WCET-Aware Artificial Diversity. 454-461 - Igor Khokhlov, Leon Reznik:
Colluded Applications Vulnerabilities in Android Devices. 462-469 - Jiyuan Zhou, Tian Wang, Md. Zakirul Alam Bhuiyan, Anfeng Liu:
A Hierarchic Secure Cloud Storage Scheme Based on Fog Computing. 470-477 - Roberto M. Vergaray, Julian L. Rrushi:
On Sustaining Prolonged Interaction with Attackers. 478-485 - Julian L. Rrushi:
Defending Electrical Substations Against 0-Day Malware Through Decoy I/O in Protective Relays. 486-493 - Gianluigi Me, Liberato Pesticcio, Paolo Spagnoletti:
Discovering Hidden Relations Between Tor Marketplaces Users. 494-501 - Mihiro Sonoyama, Takatsugu Ono, Osamu Muta, Haruichi Kanaya, Koji Inoue:
Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics. 502-510 - Matthew Sinda, Qi Liao:
Spatial-Temporal Anomaly Detection Using Security Visual Analytics via Entropy Graph and Eigen Matrix. 511-518 - Sergio de Medeiros Camara, Luiz Fernando Rust da Costa Carmo, Luci Pirmez:
Towards a Storage-Efficient and Categorized Secure Log Structure Scheme for Embedded Systems. 519-526 - Kelvin Ly, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin:
Approximate Power Grid Protection Against False Data Injection Attacks. 527-533 - Samer Khamaiseh, Dianxiang Xu:
Software Security Testing via Misuse Case Modeling. 534-541 - James Halvorsen, Julian L. Rrushi:
Target Discovery Differentials for 0-Knowledge Detection of ICS Malware. 542-549 - Senwen Kan, Jennifer Dworak:
Systematic Test Generation for Secure Hardware Supported Virtualization. 550-556 - Jhen-Hao Li, Sheng-De Wang:
PhishBox: An Approach for Phishing Validation and Detection. 557-564 - Sarah Harun, Tanveer Hossain Bhuiyan, Song Zhang, Hugh R. Medal, Linkan Bian:
Bot Classification for Real-Life Highly Class-Imbalanced Dataset. 565-572 - Adnan Kiliç, Ertan Onur, Cansu Betin Onur:
Revisiting Shamir's No-Key Protocol: Lightweight Key Transport. 573-580 - Changqing Luo, Sergio Salinas, Ming Li, Pan Li:
Energy-Efficient Autonomic Offloading in Mobile Edge Computing. 581-588 - Masashi Hayano, Naoki Iijima, Toshiharu Sugawara:
Asynchronous Agent Teams for Collaborative Tasks Based on Bottom-Up Alliance Formation and Adaptive Behavioral Strategies. 589-596 - Hossain Shahriar, William Bond:
Towards an Attack Signature Generation Framework for Intrusion Detection Systems. 597-603 - Tam Thi Thanh Nguyen, Kazuhiro Ogata:
Graphical Animations of State Machines. 604-611
DASC Short Papers
- Kai Ding, Andrey Morozov, Klaus Janschek:
Classification of Hierarchical Fault-Tolerant Design Patterns. 612-619 - Takumi Fujimori, Minoru Watanabe:
Holographic Memory Calculation FPGA Accelerator for Optically Reconfigurable Gate Arrays. 620-625 - Sudip Chakraborty:
Temporal Variation of Trust in Dependable Systems. 626-631 - Zachary Thomas, Sherif Abdelwahed:
Active Malware Countermeasure Approach for Mission Critical Systems. 632-638 - Travis E. Schulze, Daryl G. Beetner, Yiyu Shi, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Combating Data Leakage Trojans in Sequential Circuits Through Randomized Encoding. 639-644 - David Eastman, Sathish A. P. Kumar:
A Simulation Study to Detect Attacks on Internet of Things. 645-650 - Nick Neely, Zachary Waldman, Mike Burns, Haklin Kimm:
Web-Based Malware Mitigation with a Virtualized Web-Browser: A Comparison Study. 651-656 - Sayonnha Mandal, Robin A. Gandhi, Harvey P. Siy:
Modular Norm Models: A Lightweight Approach for Modeling and Reasoning about Legal Compliance. 657-662 - Richard Ciancioso, Danvers Budhwa, Thaier Hayajneh:
A Framework for Zero Day Exploit Detection and Containment. 663-668 - Damianos Pinou, Rien Chy, Thaier Hayajneh:
Electromagnetic Warfare and the Cybersecurity Threat. 669-674 - Hailu Belay Kassa, Kevin T. Kornegay, Yacob Astatke, Marcial Tienteu:
Secrecy Capacity and Energy Efficiency Evaluation of RLS-Kaiser Based Smart Antenna System. 675-680 - Abdulghani Ali Ahmed:
Detection and Avoidance Technique of Anomalous Congestion at the Network Gateways. 681-686 - Ananth A. Jillepalli, Daniel Conte de Leon, Stuart Steiner, Frederick T. Sheldon, Michael A. Haney:
Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web Browsers. 687-692 - Sharif Hassan, Ratan Guha:
A Probabilistic Study on the Relationship of Deceptions and Attacker Skills. 693-698 - Rafael I. Bonilla, Cristina L. Abad:
Towards a Real Time Framework for Monitoring IoT Devices for Attack Detection: Vision Paper. 699-703 - Rafael I. Bonilla, Juan J. Crow, Luigi S. Basantes, Luis G. Cruz:
A Metric for Measuring IoT Devices Security Levels. 704-709 - Jumoke Soyemi, John Akinode, Samson Oloruntoba:
Electronic Lecture Time-Table Scheduler Using Genetic Algorithm. 710-715 - Emmanuel Masabo, Kyanda Swaib Kaawaase, Julianne Sansa-Otim, Damien Hanyurwimfura:
Structural Feature Engineering Approach for Detecting Polymorphic Malware. 716-721 - Abdulhameed Alelaiwi, Mohammad Mehedi Hassan, Md. Zakirul Alam Bhuiyan:
A Secure and Dependable Connected Smart Home System for Elderly. 722-727