default search action
DASC/PiCom/DataCom/CyberSciTech 2018: Athens, Greece
- 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2018, Athens, Greece, August 12-15, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7518-2
3rd IEEE Cyber Science and Technology Congress (CyberSciTech)
CyberSciTech 2018 Regular Papers
- Xin Wang, Shuting Zuo, Meiling Zhang, Lei Zhang, Chen Yang, Zhiyu Han, Juan Shui:
A Fuzzy IBE Scheme with Attribute Timeliness. 1-6 - Jingjing Xu, Chun Ying, Shuhua Tan, Zhe Sun, Pan Wang, Zhixin Sun:
An Attribute-Based Searchable Encryption Scheme Supporting Trapdoor Updating. 7-14 - Linjing Wei, Wenke Dong, Hui Zhou, Yue Li, Xia Zhao:
Application of Fuzzy Analogy Preferred Ratio Based on Euclid Distance in Quantitative Decision of Turfgrass Introduction. 15-18 - Jihao Wang, Yangping Wang, Jianwu Dang, Linjing Wei:
Target Detection Based on Cascade Network and Densely Connected Network in Remote Sensing Image. 19-25 - Yen Tsan, Ao Guo, Jianhua Ma, Runhe Huang, Zhong Chen:
Incremental User Modeling of Online Activity for Cyber-I Growth with Successive Browsing Logs. 26-32 - Ao Guo, Jianhua Ma, Kevin I-Kai Wang:
From User Models to the Cyber-I Model: Approaches, Progresses and Issues. 33-40 - Xuejiao Chen, Jiahui Yu, Feng Ye, Pan Wang:
A Hierarchical Approach to Encrypted Data Packet Classification in Smart Home Gateways. 41-45 - Ruiying Cai, Ao Guo, Jianhua Ma, Runhe Huang, Ruiyun Yu, Chen Yang:
Correlation Analyses Between Personality Traits and Personal Behaviors Under Specific Emotion States Using Physiological Data from Wearable Devices. 46-53 - Guofeng Lin, Chun Ying, Shuhua Tan, Yunhao Xia, Zhixin Sun:
ARP-CP-ABE: Toward Efficient, Secure and Flexible Access Control for Personal Health Record Systems. 54-61 - Yasuyuki Kawanishi, Hideaki Nishihara, Daisuke Souma, Hirotaka Yoshida, Yoichi Hata:
A Study on Quantitative Risk Assessment Methods in Security Design for Industrial Control Systems. 62-69 - Pratiksha Dwivedi, Varsha Sharma, Ravindra Patel:
USB SPY: A Stratagem for Tracing USB Storage Devices. 70-77 - Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein:
A Security Framework for ICN Traffic Management. 78-85 - Yamini Konduru, Nishchol Mishra, Sanjeev Sharma:
Acquisition and Analysis of Forensic Data Artefacts of Some Popular Apps in Android Smartphone. 86-93 - Shan Ding, Tong Zhao, Ryo Kurachi, Gang Zeng:
ID Hopping CAN Controller Design with Obfuscated Priority Assignment. 94-99 - Chaonian Guo, Hao Wang, Hong-Ning Dai, Shuhan Cheng, Tongsen Wang:
Fraud Risk Monitoring System for E-Banking Transactions. 100-105 - Shenglan Ma, Wang Hao, Hong-Ning Dai, Shuhan Cheng, Ruihua Yi, Tongsen Wang:
A Blockchain-Based Risk and Information System Control Framework. 106-113 - Fulong Chen, Hao Shen, Cheng Wang, Le Xie, Shoujun Zhou, Hesheng Wang:
The Model Experimental Evaluation of the Cardiovascular Interventional Surgery Robot System. 114-120 - Puneet Bakshi, Neelakantan Subramanian, Sukumar Nandi:
Using Digital Tokens to Improve Amortized Performance of eSign. 121-128 - Xiaojun Yin, Kecheng Yang, Qi Zhang, Xiaohui Zhang:
Stencil Imaging and Defects Detection Using Artificial Neural Networks. 129-134 - Chunhua Chen, Junwei Yan:
HyTube: A Novel Middleware Layer for Smart Building Systems. 135-142 - Lai Tu, Jing Wen, Benxiong Huang, Dan Tan:
Multi-scale Trajectory Data Management and Query. 143-150 - Siyang Lu, Xiang Wei, Yandong Li, Liqiang Wang:
Detecting Anomaly in Big Data System Logs Using Convolutional Neural Network. 151-158 - Balaji Kalluri Mallikarjuna, Sekhar Kondepudi, Tham Kwok Wai, Kua Harn Wei, Andreas Kamilaris:
SMELs: A Data-Driven Middleware for Smart Miscellaneous Electrical Load Management in Buildings. 159-165 - Xiangyu Su, Wenrun Wang, Linjing Wei, Zhenghai Zhang:
Augmented Reality Registration Method Based on Improved LMeds. 166-172 - Yaokai Feng, Hitoshi Akiyama, Liang Lu, Kouichi Sakurai:
Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks. 173-180 - Kehua Guo, Tao Xu, Yayuan Tang, Ruifang Zhang, Jianhua Ma:
An Incremental Collaborative Filtering Based Recommendation Framework for Personalized Websites. 181-186 - Chandra Mouli Madhav Kotteti, Xishuang Dong, Na Li, Lijun Qian:
Fake News Detection Enhancement with Data Imputation. 187-192 - Wenyuan Xue, Qingyong Li, Zhen Zhang, Yulei Zhao, Hao Wang:
Table Analysis and Information Extraction for Medical Laboratory Reports. 193-199 - Xin Liu, Qingchen Yu, Xiaokang Zhou, Qingguo Zhou:
OwlEye: An Advanced Detection System of Web Attacks Based on HMM. 200-207 - Lingchi Chen, Xiaoheng Deng, Hailan Shen, Congxu Zhu, Le Chang:
DYCUSBoost: Adaboost-Based Imbalanced Learning Using Dynamic Clustering and Undersampling. 208-215 - Weimin Li, Jun Mo, Yue Liu, Nobuyasu Ito, Yohsuke Murase, Jianwei Liu:
The Influence Maximization Problem in the Network Under Node Personalized Characteristics. 216-221 - Ying Liu, Dequan Zheng, Tongmao Lin, Xianqi Liu, Deshuai Wang, Frank Hopfgartner:
Smart Crib Control System Based on Sentiment Analysis. 222-229 - Yue Li, Yiqing Pan, Wensheng Liu, Xingming Zhang:
An Automated Evaluation System for App Inventor Apps. 230-235 - Savvas Zenonos, Andreas Tsirtsis, Nicolas Tsapatsoulis:
Twitter Influencers or Cheated Buyers? 236-242 - Joyjit Chatterjee, Vajja Mukesh, Hui-Huang Hsu, Garima Vyas, Zhen Liu:
Speech Emotion Recognition Using Cross-Correlation and Acoustic Features. 243-249 - Po Chun Lien, Qiangfu Zhao:
Product Surface Defect Detection Based on Deep Learning. 250-255 - Tsukasa Ueno, Qiangfu Zhao:
Interpretation of Deep Neural Networks Based on Decision Trees. 256-261 - Marc Prince, Fuhua Lin:
Hunting Algorithm Visualization and Performance Evaluation Through BDI Agent Simulation. 262-269 - Zhipu Xie, Weifeng Lv, Syed Muhammad Asim Ali, Bowen Du, Runhe Huang:
Anomaly Prediction in Passenger Flow with Knowledge Transfer Method. 270-277 - Wei Qiu, Andy Wai Hoong Khong, Wee Peng Tay:
Hidden Markov Model for Masquerade Detection Based on Sequence Alignment. 278-285 - Kiichi Tago, Kosuke Takagi, Kenichi Ito, Qun Jin:
Specifying Latent Factors with a Domain Model for Personal Data Analysis. 286-291 - Massimo Marchiori, Marco de Vecchi:
The Team Brain: Soccer Analysis and Battles of Minds. 292-299 - Yangping Wang, Chengwei Tang, Jingyu Yang, Linjing Wei:
Road Extraction from High-Resolution Remotely Sensed Image Based on Improved Ant Colony Optimization Method. 300-309
CyberSciTech 2018 Work-in-Progress Papers
- Peiying Tao, Chun Ying, Zhe Sun, Shuhua Tan, Pan Wang, Zhixin Sun:
The Controller Placement of Software-Defined Networks Based on Minimum Delay and Load Balancing. 310-313 - Yafei Wang, Guanghui Yan, Qingqing Ma, Yu Wu, Meng Zhang:
Identifying Influential Nodes Based on Vital Communities. 314-317 - Dan Jin, Yu Wu, Guanghui Yan, Yafei Wang, Qingqing Ma, Juncheng Li:
A Community Detecting Algorithm Based on Modular Tensor in Temporal Network. 318-322 - Yuntao Wang, Zhou Su, Qichao Xu, Ning Zhang:
Contract Based Energy Blockchain for Secure Electric Vehicles Charging in Smart Community. 323-327 - Dallas Wright, Josh Stroschein:
A Malware Analysis and Artifact Capture Tool. 328-333 - Mengjin Jiang, Yizhi Ren, Ye Yao, Lifeng Yuan, Ting Wu, Zhen Wang:
CPS: A Community Priority Based Vaccine Distribution Strategy in Different Networks. 334-337 - Chih-Chieh Hung, Chun-Yu Kuo, Hui-Huang Hsu, Yian Chen:
Identifying Niche Singers in Online Music Streaming Services. 338-342 - Kuan-Hua Lai, Neil Y. Yen, Mu-Yen Chen:
Design of an AI-Empowered Recommender System for Travelling Support: Individual Traveler as an Instance. 343-346 - Bi Li, Bin-feng Jin:
Research on Dynamic Multi-objective FJSP Based on Genetic Algorithm. 347-352 - Luqi Yang, Zhiwei Zhao, Geyong Min:
User Verification Based On Customized Sentence Reading. 353-356 - Jingyu Yang, Zhengdong Ma, Jianwu Dang, Linjing Wei, Yangping Wang:
Improved Fast-ICA for Change Detection of Multi Temporal Remote Sensing Images. 357-361 - Stephan Mannhart, Bruno Rodrigues, Eder J. Scheid, Salil S. Kanhere, Burkhard Stiller:
Toward Mitigation-as-a-Service in Cooperative Network Defenses. 362-367 - Jung-Eun Park, Young-Hoon Park:
Efficient File-Share Reconstruction Scheme for Device Addition/Removal in Personal Area Network. 368-372
CyberSciTech 2018 Poster Papers
- Pedro Merino Laso, David Brosset, Marie-Annick Giraud:
Secured Architecture for Unmanned Surface Vehicle Fleets Management and Control. 373-375 - Tony Jan:
Ensemble of Semi-Supervised Models for IoT Resource Scheduling and Sharing. 376-378 - Yingjie Zhang, Sheng Bi, Min Dong, Yunda Liu:
The Implementation of CNN-Based Object Detector on ARM Embedded Platforms. 379-382 - Cheche Xie, Sheng Bi, Min Dong, Zehao Jin:
Key Frame Extraction of Skeleton Joint Based on Kinect Sensor. 383-385 - Michael J. O'Grady, Olga Murdoch, Dominic Carr, Rem W. Collier, Gregory M. P. O'Hare:
The Cyber Sensor Network. 386-389 - Subash Luitel, Sangman Moh:
Channel-Aware MAC Protocol for Cognitive Radio Sensor Networks. 390-392 - Van Quan Nguyen, Linh Van Ma, Jin-Young Kim, Kwang-Ki Kim, Jinsul Kim:
Applications of Anomaly Detection Using Deep Learning on Time Series Data. 393-396 - Ming-Yang Su, Hong-Siou Wei, Xin-Yu Chen, Po-Wei Lin, Ding-You Qiu:
Identifying Ad Libraries by Their Network Behavior Patterns. 397-398
Special Session on Computing and Applications for Cyber Internet of Things (Cyber-IoT)
- Shu Fu, Lina Ma, Xiangyue Yang, Xin Jian:
Design and Implementation of the Background Management Platform of Nutrition Point Catering for the Elderly. 399-402 - Yu Su, Yan Zhang:
A Novel Solution to Improve Network Coverage and Capacity with EasyMacro. 403-407 - Tony Jan, A. S. M. Sajeev:
Boosted Probabilistic Neural Network for IoT Data Classification. 408-411
Special Session on Cyber Social Computing and Cyber-Enabled Applications (CSC&CEA)
- Luyan Ni, Jiulei Jiang, Xiaofeng Wang:
Improved Collaborative Filtering Algorithm Based on Multifactor Fusion and User Features Clustering. 412-417 - Weimin Li, Heng Zhu, Xiaokang Zhou, Shohei Shimizu, Mingjun Xin, Qun Jin:
A Novel Personalized Recommendation Algorithm Based on Trust Relevancy Degree. 418-422 - Shoujian Yu, Guohui Cai, Weimin Li, Jianyun Xie:
Top-K Frequent Spatial-Temporal Words Query Based on R-Tree. 423-428
Workshop on Emerging Dependable Computing System Technologies and Applications (EDCSTA)
- Tengku Adil Tengku Izhar, Bernady O. Apduhan, Torab Torabi:
Relationships and Rule-Based Organizational Goals Ontology: A Case of Library Goals. 429-434 - Tomoyuki Sueda, Naohiro Hayashibara:
Opportunistic Message Broadcasting with Pheromone-Based Caching. 435-440
Workshop on Healthcare with Intelligent Sensing, System and Data (HISSD)
- Charalampos Loukas, Francesco Fioranelli, Julien Le Kernec, Shufan Yang:
Activity Classification Using Raw Range and I & Q Radar Data with Long Short Term Memory Layers. 441-445 - Kahina Amara, Naeem Ramzan, Nouara Achour, Mahmoud Belhocine, Cherif Larbes, Nadia Zenati:
A New Method for Facial and Corporal Expression Recognition. 446-450 - Varuna De Silva, Jamie Roche, Xiyu Shi, Ahmet M. Kondoz:
IoT Driven Ambient Intelligence Architecture for Indoor Intelligent Mobility. 451-456 - Oussama Kerdjidj, Naeem Ramzan, Abbes Amira, Khalida Ghanem, Fatima Chouireb:
Design and Evaluation of Vivado HLS-Based Compressive Sensing for ECG Signal Analysis. 457-461 - Rao Naveed Bin Rais, Muhammad Sajjad Akbar, Mohammad Aazam:
Fog-Supported Internet of Things (IoTs) Architecture for Remote Patient Monitoring Systems Using Wireless Body Area Sensor Networks. 462-466 - Wenda Li, Bo Tan, Robert J. Piechocki:
Opportunistic Doppler-Only Indoor Localization Via Passive Radar. 467-473 - Alexandros Konios, Yanguo Jing, Mark Eastwood, Bo Tan:
Unifying and Analysing Activities of Daily Living in Extra Care Homes. 474-479
16th IEEE Int'l Conf. on Dependable, Autonomic & Secure Computing (DASC2018)
DASC 2018 Regular Papers
- Zhan Wang, Alain Lambert:
A Reliable and Low Cost Vehicle Localization Approach Using Interval Analysis. 480-487 - Masanori Misono, Kaito Yoshida, Juho Hwang, Takahiro Shinagawa:
Distributed Denial of Service Attack Prevention at Source Machines. 488-495 - Ali Dorri, Mahdi Abadi, Mahila Dadfarnia:
SocialBotHunter: Botnet Detection in Twitter-Like Social Networking Services Using Semi-Supervised Collective Classification. 496-503 - Jacek Kobusinski, Jerzy Brzezinski, Anna Kobusinska:
On Increasing Dependability of Web Services - an Approach to Design a Failure Detection Service. 504-511 - Khaled Alanezi, Shivakant Mishra:
A Privacy Negotiation Mechanism for the Internet of Things. 512-519 - Ana Nieto, Antonio Acien, Javier López:
Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory. 520-527 - Karl Ott, Rabi N. Mahapatra:
Hardware Performance Counters for Embedded Software Anomaly Detection. 528-535 - Antonio Acien, Ana Nieto, Javier López:
Analyzing Cross-Platform Attacks: Towards a Three-Actor Approach. 536-543 - Abdul Rafay Khatri, Ali Hayek, Josef Börcsök:
Validation of the Proposed Fault Injection, Test and Hardness Analysis for Combinational Data-Flow Verilog HDL Designs Under the RASP-FIT Tool. 544-551 - Nikolaos Totosis, Constantinos Patsakis:
Android Hooking Revisited. 552-559 - Jia Wan, Mohammad Zulkernine, Clifford Liem:
A Dynamic App Anti-Debugging Approach on Android ART Runtime. 560-567 - Nesrine Berjab, Hieu Hanh Le, Chia-Mu Yu, Sy-Yen Kuo, Haruo Yokota:
Abnormal-Node Detection Based on Spatio-Temporal and Multivariate-Attribute Correlation in Wireless Sensor Networks. 568-575 - Kamal Taha, Paul D. Yoo:
A Forensic System for Identifying the Suspects of a Crime with No Solid Material Evidences. 576-583 - Quentin Bergougnoux, Julien Cartigny, Gilles Grimaud:
Porting the Pip Proto-Kernel's Model to Multi-core Environments. 584-591 - Zuhal Ozturk, Haluk Rahmi Topcuoglu, Sanem Arslan, Mahmut Taylan Kandemir:
Soft Error Characterization on Scientific Applications. 592-599 - Fatemeh Khodaparast, Mina Sheikhalishahi, Hassan Haghighi, Fabio Martinelli:
Privacy Preserving Random Decision Tree Classification Over Horizontally and Vertically Partitioned Data. 600-607 - Saman A. Zonouz, Mingbo Zhang, Pengfei Sun, Luis Garcia, Xiruo Liu:
Dynamic Memory Protection via Intel SGX-Supported Heap Allocation. 608-617 - Arafa Anis, Mohammad Zulkernine, Shahrear Iqbal, Clifford Liem, Catherine Chambers:
Securing Web Applications with Secure Coding Practices and Integrity Verification. 618-625 - Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Tao Peng:
Wi-Fi Halow Signal Coverage Estimation in Collapsed Structures. 626-633 - David Jaeger, Feng Cheng, Christoph Meinel:
Accelerating Event Processing for Security Analytics on a Distributed In-Memory Platform. 634-643 - Max Smith-Creasey, Fatema A. Albalooshi, Muttukrishnan Rajarajan:
Context Awareness for Improved Continuous Face Authentication on Mobile Devices. 644-652 - Tsozen Yeh, Yipin Wang:
Enhancing Hadoop System Dependability Through Autonomous Snapshot. 653-660 - Maria Katsaiti, Nicolas Sklavos:
Implementation Efficiency and Alternations, on CAESAR Finalists: AEGIS Approach. 661-665 - Igor Leão dos Santos, Marcelo Pitanga Alves, Flávia Coimbra Delicato, Paulo F. Pires, Luci Pirmez, Wei Li, Albert Y. Zomaya, Samee U. Khan:
A System Architecture for Cloud of Sensors. 666-672 - Edren Dacaymat, Jun Zhang, Qi Wang, M. D. Alam Bhuiyan, Thaier Hayajneh:
Exploring Problems with Virtualization in Cloud Computing. 673-680 - Muhammad Arif, Guojun Wang, Shuhong Chen:
Deep Learning with Non-parametric Regression Model for Traffic Flow Prediction. 681-688 - Ibnu Febry Kurniawan, Md. Arafatur Rahman, A. Taufiq Asyhari, Md. Zakirul Alam Bhuiyan:
Performance Evaluation of History-Based and Priority-Based MAC for Traffic-Differentiated Intra-Vehicular Network. 689-694 - Naw Safrin Sattar, Shaikh Arifuzzaman:
Parallelizing Louvain Algorithm: Distributed Memory Challenges. 695-701 - Raja Khurram Shahzad:
Android Malware Detection Using Feature Fusion and Artificial Data. 702-709