


Остановите войну!
for scientists:


default search action
26th ISCC 2021: Athens, Greece
- IEEE Symposium on Computers and Communications, ISCC 2021, Athens, Greece, September 5-8, 2021. IEEE 2021, ISBN 978-1-6654-2744-9
- Penghui Lv, Yu Wang, Yazhe Wang, Qihui Zhou:
Potential Risk Detection System of Hyperledger Fabric Smart Contract based on Static Analysis. 1-7 - Rustem Dautov, Hui Song, Nicolas Ferry:
Towards a Sustainable IoT with Last-Mile Software Deployment. 1-6 - Gabriel R. Castanhel, Tiago Heinrich
, Fabrício Ceschin, Carlos Maziero:
Taking a Peek: An Evaluation of Anomaly Detection Using System calls for Containers. 1-6 - Gabriele Penzotti
, Stefano Caselli, Michele Amoretti:
An N-Tier Fog Architecture for Smart Farming. 1-7 - Dinesh R. Gawade, Roy B. V. B. Simorangkir, Dimitrios Zorbas, Sanjeev Kumar
, Steffen Ziemann, Daniela Iacopino, John Barton, Katharina Schuhmann, Manfred Anders, Brendan O'Flynn, John L. Buckley:
A Museum Artefact Monitoring Testbed using LoRaWAN. 1-3 - Jixin Zhao, Shukui Zhang, Yang Zhang, Li Zhang, Hao Long:
Deep Reinforcement Learning-Based Routing Optimization Algorithm for Edge Data Center. 1-7 - Ashwin Kannoth, Cungang Yang, Manuel Angel Guanipa Larice:
Hand Gesture Recognition Using CNN & Publication of World's Largest ASL Database. 1-6 - Haitian Yang, Xuan Zhao, Degang Sun, Yan Wang, He Zhu, Chao Ma, Weiqing Huang:
Multi-Modal fake news Detection on Social Media with Dual Attention Fusion Networks. 1-6 - Ruizhong Du, Shuang Li:
Identification of IoT Devices Based on Feature Vector Split. 1-6 - Abdallah Belkaaloul, Boucif Amar Bensaber:
Anonymous Authentication Protocol for Efficient Communications in Vehicle to Grid Networks. 1-5 - Micael Pedrosa
, Rui Lebre, Carlos Costa:
Holder-of-key threshold access token for anonymous data resources. 1-7 - Moheddine Smari, Saber Dakhli, Jean-Marie Floc'h, Fethi Choubani:
Design of Frequency-Reconfigurable UWB Filtenna with Independently Controllable Two Rejected Bands. 1-6 - Matteo Carbonari, Greta Vallasciani, Lucia Migliorelli, Emanuele Frontoni, Sara Moccia:
End-to-end semantic joint detection and limb-pose estimation from depth images of preterm infants in NICUs. 1-6 - Gustavo Pantuza, Marcos A. M. Vieira, Luiz Filipe M. Vieira:
eQUIC Gateway: Maximizing QUIC Throughput using a Gateway Service based on eBPF + XDP. 1-6 - Michele Albano
, Stefano Chessa
, Kim Guldstrand Larsen
:
A Model-Checking Static Analysis of Task-Based Energy Neutrality for Energy Harvesting IoT. 1-7 - Anastasios N. Bikos, Sathish Kumar:
Reinforcement Learning-Based Anomaly Detection for Internet of Things Distributed Ledger Technology. 1-7 - Andrea Sabbioni
, Lorenzo Rosa
, Armir Bujari, Luca Foschini, Antonio Corradi:
A Shared Memory Approach for Function Chaining in Serverless Platforms. 1-6 - Xiaohui Zhang, Shunliang Zhang, Zhuang Qiao:
A Chaos-Based Encryption Scheme for OFDM-IM Systems. 1-6 - Oumaima El Joubari, Jalel Ben-Othman, Véronique Vèque:
TA- TDMA: A traffic aware TDMA MAC protocol for safety applications in VANET. 1-8 - Franco Callegati, Aldo Campi, Chiara Contoli
, Silvio Di Santi, Nicola Ghiselli, Carlo Giannelli, Alessandro Pernafini, Riccardo Zamagna:
SDN-based Differentiated Traffic Flow Management for Industrial Internet of Things Environments. 1-6 - Yuanyuan Shen, Md. Akbar Hossain
, Sayan Kumar Ray:
Supporting Elderly People During Medical Emergencies: An Informal Caregiver-based Approach. 1-6 - Francisco Jose Dos Santos Reist, Mateus Assis Veloso, Filipe Mateus Moraes Rodrigues, Vitória de Carvalho Brito, Patrick Ryan Sales dos Santos, José Denes Lima Araújo, Ricardo de Andrade Lira Rabelo, Antonio Oseas de Carvalho Filho:
BacillusNet: An automated approach using RetinaNet for segmentation of pulmonary Tuberculosis bacillus. 1-4 - Ahmed Abbas Mohsin Al-Saedi
, Veselka Boeva, Emiliano Casalicchio:
Reducing Communication Overhead of Federated Learning through Clustering Analysis. 1-7 - Alexandre Martins G. De Deus, Eduardo P. Julio, Marcelo F. Moreno:
Join-Me: A Framework for integrating Service Providers and Mobile Network Operators. 1-7 - Patrick Elfert, Enes Tiryaki, Marco Eichelberg, Norbert Rösch, Andreas Hein:
A Deep Learning Assisted Digital Nutrition Diary to Support Nutrition Counseling for People Affected by the Geriatric Frailty Syndrome. 1-7 - Courtney Potts
, Raymond R. Bond, Maurice D. Mulvenna
, Edel Ennis, Andrea Bickerdike, Edward K. Coughlan, Thomas Broderick, Con Burns, Michael F. McTear, Lauri Kuosmanen, Heidi Nieminen, Kyle A. Boyd, Brian Cahill, Alex Vakaloudis
, Indika S. A. Dhanapala
, Anna-Kaisa Vartiainen, Catrine Kostenius, Martin Malcolm:
Insights and lessons learned from trialling a mental health chatbot in the wild. 1-6 - Mengdi Xu, Jiandong Cheng, Yirong Liu, Wei Huang:
DeepGAN: Generating Molecule for Drug Discovery Based on Generative Adversarial Network. 1-6 - Matheus Torquato, Marco Vieira
:
VM Migration Scheduling as Moving Target Defense against Memory DoS Attacks: An Empirical Study. 1-6 - André R. C. Saraiva, Diego G. Passos
, Célio Vinicius N. Albuquerque:
Evaluation of the reduction of NDT in WSN with asymmetric schedule-based asynchronous duty cycle mechanisms. 1-6 - Xiaojie Tao, Liming Wang, Zhen Xu, Ru Xie:
Secure and Efficient Allocation of Virtual Machines in Cloud Data Center. 1-7 - Weiqing Huang, Chenggang Jia, Min Yu, Gang Li
, Chao Liu, Jianguo Jiang:
UTANSA: Static Approach for Multi-Language Malicious Web Scripts Detection. 1-7 - Renato Caminha Juaçaba-Neto, Pascal Mérindol, Fabrice Theoleyre:
Data Aggregation for Privacy Protection of Data Streams Between Autonomous IoT Networks. 1-6 - Ester Vidaña-Vila
, Rosa Maria Alsina-Pagès, Joan Navarro:
Improving classification accuracy of acoustic real-world urban data using sensors physical redundancy. 1-4 - Luvi Sun, Bian Yang:
Your Privacy Preference Matters: A Qualitative Study Envisioned for Homecare. 1-7 - Guillaume Gingras, Mehdi Adda, Abdenour Bouzouane, Hussein Ibrahim, Clémence Dallaire:
Forecasting Trends in an Ambient Assisted Living Environment Using Deep Learning. 1-4 - Chenhao Xu
, Youyang Qu, Peter W. Eklund, Yong Xiang, Longxiang Gao:
BAFL: An Efficient Blockchain-Based Asynchronous Federated Learning Framework. 1-6 - Gang Liu, Yichao Dong, Guangxi Li:
Cross-Language Plagiarism Detection Model Based On Multiple Features. 1-7 - Ramy Maarouf, Danish Sattar, Ashraf Matrawy:
Evaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion Attacks. 1-6 - David Cavalcanti, Ranieri Carvalho, Nelson S. Rosa:
Adaptive Middleware of Things. 1-6 - Stephanie Anderson, Suma Veeravenkatappa, Priyanka Pola, Seyedamin Pouriyeh, Meng Han:
Automatic Face Mask Detection Using Deep Learning. 1-4 - Dumitru Roman, Nikolay Nikolov, Ahmet Soylu
, Brian Elvesæter
, Hui Song, Radu Prodan, Dragi Kimovski, Andrea Marrella, Francesco Leotta, Mihhail Matskin, Giannis Ledakis
, Konstantinos Theodosiou, Anthony Simonet-Boulogne, Fernando Perales
, Evgeny Kharlamov, Alexandre Ulisses, Arnor Solberg, Raffaele Ceccarelli:
Big Data Pipelines on the Computing Continuum: Ecosystem and Use Cases Overview. 1-4 - Matheus Henrique Junqueira Saldanha, Adriano Kamimura Suzuki:
Determining the Probability Distribution of Execution Times. 1-6 - Ahmed Khoumsi:
An Efficient Blockchain-based Electric Vehicle Charging Management System. 1-7 - Kameswar Rao Vaddina, Laurent Lefèvre, Anne-Cécile Orgerie:
Experimental Workflow for Energy and Temperature Profiling on HPC Systems. 1-7 - Haitian Yang, Degang Sun, Yan Wang, He Zhu, Ning Li, Weiqing Huang:
FKTAN: Fusion Keystroke Time-Textual Attention Networks for Continuous Authentication. 1-6 - Liuqun Zhai, Zhuang Qiao, Zhongfang Wang, Dong Wei:
Identify What You are Doing: Smartphone Apps Fingerprinting on Cellular Network Traffic. 1-7 - Marcelo E. Pellenz, Rosana Lachowski, Edgard Jamhour, Glauber Brante, Guilherme Luiz Moritz, Richard Demo Souza:
In-Network Data Aggregation for Information-Centric WSNs using Unsupervised Machine Learning Techniques. 1-7 - Yanheng Liu, Tingting Zheng, Geng Sun, Jing Zhang, Jiahui Li:
A Joint Optimization Approach for UAV-enabled Collaborative Beamforming. 1-6 - Bradley Durden, Mathew Shulman, Andy Reynolds, Thomas Phillips, Demontae Moore, Indya Andrews, Seyedamin Pouriyeh:
Using Machine Learning Techniques to Predict RT- PCR Results for COVID-19 Patients. 1-4 - Siqi Liu, Yanni Han, Yanjie Hu, Qian Tan:
FA-net: Attention-based Fusion Network For Malware HTTPs Traffic Classification. 1-7 - Shaon Bhatta Shuvo
, Bonaventure Chidube Molokwu, Samaneh Miri Rostami, Ziad Kobti, Anne W. Snowdon:
Simulating and Predicting the Active Cases and Hospitalization Considering the Second Wave of COVID-19. 1-6 - Ran Tian, Zulong Diao, Haiyang Jiang, Gaogang Xie:
NeVe: A Log-based Fast Incremental Network Feature Embedding Approach. 1-7 - Mohamed Redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad:
ODM-RPL: Optimized Dual MOP RPL. 1-6 - Shili Hu, Jiangfeng Li, Qinpei Zhao, Chenxi Zhang, Zijian Zhang
, Yang Shi:
BlockDL: Privacy-Preserving and Crowd-Sourced Deep Learning Through Blockchain. 1-7 - Yao Hu:
MiniCAR: Minimal Congestion-Aware Routing Method in Fine-Grained Circuit-Switched Networks for Parallel Computing Systems. 1-8 - Zhi Wang
, Chaoge Liu, Xiang Cui:
EvilModel: Hiding Malware Inside of Neural Network Models. 1-7 - Michele La Manna, Pericle Perazzo, Luigi Treccozzi, Gianluca Dini:
Assessing the Cost of Quantum Security for Automotive Over -The-Air Updates. 1-6 - Gonçalo Vítor, Pedro Rito
, Susana Sargento:
Smart City Data Platform for Real-Time Processing and Data Sharing. 1-7 - Cassandra Frances Laffan, Robert Kozin, James Elliott Coleshill, Alexander Ferworn, Michael Stanfield, Brodie Stanfield:
ARAIG And Minecraft: A COVID-19 Workaround. 1-7 - Lan Huang, Xiaofang Zhang, Yan Wang, Xuping Xie:
Research and Application of Reinforcement Learning Recommendation Method for Taobao. 1-6 - Agata Romano, Rosaria Lanza, Fabrizio Celesti, Antonio Celesti, Maria Fazio, Francesco Martella
, Antonino Galletta, Massimo Villari:
Towards Smart Tele-Biomedical Laboratory: Where We Are, Issues, and Future Challenges. 1-4 - Andreas Guillot, Fabrice Theoleyre, Cristel Pelsser:
Fair Delegation of Digital Services Without Third Parties. 1-7 - Christian Sicari
, Valeria Lukaj, Antonio Celesti, Maria Fazio, Massimo Villari:
GAVIN: A new platform for enriching 3D virtual indoor navigation with social-based geotags. 1-6 - Hind Mukhtar, Melike Erol-Kantarci:
Machine Learning-Enabled Localization in 5G using LIDAR and RSS Data. 1-6 - Muhammed Choudhury, Guanting Li, Junwei Li, Ke Zhao, Mengyan Dong, Khaled Harfoush:
Power Efficiency in Communication Networks with Power-Proportional Devices. 1-6 - Min Li, Linghan Li, Ruwen Bai, Junxing Ren, Bo Meng, Yang Yang:
A Motion-based Seq-bbox Matching Method for Video Object Detection. 1-7 - Menghan Pan, Daojing He, Xuru Li, Sammy Chan, Emmanouil Panaousis, Yun Gao:
A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments. 1-7 - Daniel Flores-Martín, José García-Alonso, Javier Berrocal, Luca Foschini, Juan Manuel Murillo Rodriguez:
Context-Dependent Services Selection in Smart Environments. 1-6 - Marcel Oliveira Alves
, Daniel Oliveira Dantas:
Mobile Augmented Reality for Craniotomy Planning. 1-6 - Asad Ullah Khan, Nadeem Javaid, Jalel Ben-Othman:
A Secure Authentication and Data Sharing Scheme for Wireless Sensor Networks based on Blockchain. 1-5 - Houssem Sagaama
, Nourchene Ben Slimane
, Maher Marwani
, Sabri Skhiri
:
Automatic Parameter Tuning for Big Data Pipelines with Deep Reinforcement Learning. 1-7 - Lucas Rodrigues Frank, Roberto Massi de Oliveira, Alex Borges Vieira, Edelberto Franco Silva:
Improving a Smart Environment with Wireless Network User Load Prediction. 1-6 - Runhao Wang, Yuhong Zhang, Haiying Sun, Jing Liu:
Dependable Reinforcement Learning via Timed Differential Dynamic Logic. 1-6 - Yanghai Wang, Dezun Dong, Yemao Xu, Shuo Ouyang, Xiangke Liao:
FastHorovod: Expediting Parallel Message-Passing Schedule for Distributed DNN Training. 1-7 - Edson Damasceno Carvalho, Romuere Rôdrigues Veloso e Silva, Mano Joseph Mathew
, Flávio Henrique Duarte de Araújo, Antonio Oseas de Carvalho Filho:
Tumor Segmentation in Breast DCE- MRI Slice Using Deep Learning Methods. 1-6 - Dali Zhu, Hongju Sun, Nan Li, Baoxin Mi, Tong Xi:
BS-Net: A Behavior Sequence Network for Insider Threat Detection. 1-6 - Paolo Zampognaro
, Giovanni Paragliola
, Vincenzo Falanga:
A FHIR based architecture of a multiprotocol IoT Home Gateway supporting dynamic plug of new devices within instrumented environments. 1-7 - Tomás Fukac, Jan Korenek, Jirí Matousek:
Scalability of Hash-Based Pattern Matching for High-Speed Network Security and Monitoring. 1-6 - Yanheng Liu, Hongyang Pan, Geng Sun, Aimin Wang:
Scheduling Optimization of Charging UAV in Wireless Rechargeable Sensor Networks. 1-7 - Guto Leoni Santos, Patricia Takako Endo, Theo Lynn
, Djamel Sadok, Judith Kelner:
Automating the Service Function Chain Availability Assessment. 1-7 - Gustavo Pantuza, Lucas A. C. Bleme, Marcos A. M. Vieira, Luiz Filipe M. Vieira:
Danian: tail latency reduction of networking application through an O(1) scheduler. 1-6 - Hakan Yildiz
, Christopher Ritter, Lan Thao Nguyen, Berit Frech, Maria Mora-Martinez, Axel Küpper:
Connecting Self-Sovereign Identity with Federated and User-centric Identities via SAML Integration. 1-7 - Shadi Eltanani
, Tjeerd Olde Scheper, Helen Dawes:
K - Nearest Neighbor Algorithm: Proposed Solution for Human Gait Data Classification. 1-5 - Colm Sweeney, Edel Ennis, Raymond R. Bond, Maurice D. Mulvenna, Siobhan O'Neill:
Understanding a happiness dataset: How the machine learning classification accuracy changes with different demographic groups. 1-4 - Panteleimon Rodis
, Panagiotis Papadimitriou:
Intelligent Network Service Embedding using Genetic Algorithms. 1-7 - Fabien Viton, Clémence Mauger, Gilles Dequen, Jean-Luc Guérin, Gaël Le Mahec:
Proportional representation to increase data utility in k-anonymous tables. 1-7 - Zhuang Qiao, Liuqun Zhai, Shunliang Zhang, Xiaohui Zhang:
Encrypted 5G Over- The- Top Voice Traffic Identification Based on Deep Learning. 1-7 - Kang Yin, Chengpei Tang, Xie Zhang
, Hele Yao:
Robust Human Activity Recognition System with Wi-Fi Using Handcraft Feature. 1-8 - Hanna Kavalionak, Emanuele Carlini, Patrizio Dazzi
, Luca Ferrucci, Matteo Mordacchini, Massimo Coppola:
Impact of Network Topology on the Convergence of Decentralized Federated Learning Systems. 1-6 - Mariana Rodrigues, Kalinka R. L. J. C. Branco:
Enabling UAV Services in the IoT with HAMSTER. 1-6 - Hsung-Pin Chang
, Wei-Ming Su, Da-Wei Chang:
A Cross-Layered Readahead Architecture for Multi-Tiered Storage Systems. 1-3 - Imen Abidi, Maha Cherif, Moez Hizem, Iness Ahriz, Ridha Bouallegue:
A novel MLP based on compensation method for the effects of High Power Amplifier N onlinearities in Non-Linear SCMA systems. 1-6 - André Ramos Carneiro, Matheus S. Serpa, Philippe O. A. Navaux:
Lightweight Deep Learning Applications on AVX-512. 1-6 - Jianguo Jiang, Xu Wang, Yan Wang, Qiujian Lv, Meichen Liu, Tingting Wang, Leiqi Wang:
GSketch: A Comprehensive Graph Analytic Approach for Masquerader Detection Based on File Access Graph. 1-6 - Chao Liu, Shuai Yu, Min Yu, Baole Wei, Boquan Li, Gang Li, Weiqing Huang:
Adaptive Smooth L1 Loss: A Better Way to Regress Scene Texts with Extreme Aspect Ratios. 1-7 - Pinelopi Kyranoud, Eleni-Maria Kalogeraki, Alexandra Michota, Nineta Polemi:
Cybersecurity Certification Requirements for Supply Chain Services. 1-7 - Tania Panayiotou, Hafsa Maryam, Georgios Ellinas:
Deep Quantile Regression for QoT Inference and Confident Decision Making. 1-6 - Sanaz Gheibi, Tania Banerjee, Sanjay Ranka, Sartaj Sahni:
An Effective Data Structure for Contact Sequence Temporal Graphs. 1-8 - Mariano Basile, Giovanni Nardini, Pericle Perazzo, Gianluca Dini:
On Improving SimBlock Blockchain Simulator. 1-6 - Hacène Fouchal, Ramzi Boutehalla:
Comparison of Pseudonym Change Strategies for C-ITS. 1-6 - Zhixin Shi, Yuru Ma, Xiaoyan Yu:
An Effective and Efficient Method for Word-Level Textual Adversarial Attack. 1-6 - Paolo Bottoni, Remo Pareschi, Domenico Tortola, Nicola Gessa, Gilda Massa:
Distributed ledgers to support revenue-sharing business consortia: a Hyperledger-based implementation. 1-6 - George Manias, Harm op den Akker, Ainhoa Azqueta-Alzúaz, Diego Burgos-Sancho, Nikola Dino Capocchiano, Borja Llobell Crespo, Athanasios Dalianis, Andrea Damiani, Krasimir Filipov, Giorgos Giotis, Maritini Kalogerini, Rostislav Kostadinov, Pavlos Kranas, Dimosthenis Kyriazis, Artitaya Lophatananon, Shwetambara Malwade, George Marinos, Fabio Melillo, Vicent Moncho Mas, Kenneth Muir, Marzena Nieroda
, Antonio De Nigro
, Claudia Pandolfo, Marta Patiño-Martínez, Florin Picioroaga, Aristodemos Pnevmatikakis, Shabbir Syed-Abdul, Tanja Tomson, Dilyana Vicheva, Usman Wajid:
iHELP: Personalised Health Monitoring and Decision Support Based on Artificial Intelligence and Holistic Health Records. 1-8 - Yanan Liu, Huiping Sun, Xu Song, Zhong Chen:
OverlapShard: Overlap-based Sharding Mechanism. 1-7 - Michele Fraccaroli, Giulia Mazzuchelli, Alice Bizzarri
:
Machine Learning Techniques for Extracting Relevant Features from Clinical Data for COVID-19 Mortality Prediction. 1-7 - Shuai Su, Fangyuan Yuan, Yulin Yuan, Li Zeng, Chi Chen:
VoFSQ: An Efficient File-Sharing Interactive Verification Protocol. 1-7 - Alessio Catalfamo
, Armando Ruggeri, Antonio Celesti, Maria Fazio, Massimo Villari:
A Microservices and Blockchain Based One Time Password (MBB-OTP) Protocol for Security-Enhanced Authentication. 1-6 - Athanasios Tsipis, Konstantinos Oikonomou:
Player Assignment in MEC Gaming for Social Interactivity and Server Provisioning Optimization. 1-7 - Yingchao Yu, Shuitao Gan, Xiaojun Qin:
firm VulSeeker: BERT and Siamese based Vulnerability for Embedded Device Firmware Images. 1-7 - João Pedro Barros
, Pedro Brandão
:
End-Stage Renal Disease Self-management: mobile app development. 1-4 - Ivanoe De Falco, Antonio Della Cioppa, Tomas Koutny, Umberto Scafuri, Ernesto Tarantino, Martin Ubl
:
Grammatical Evolution-Based Approach for Extracting Interpretable Glucose-Dynamics Models. 1-6 - Anas Knari, Mohammed-Amine Koulali, Ahmed Khoumsi:
Deep Reinforcement Learning for Content Caching Optimization in the Internet of Vehicles. 1-6 - Carlo Metta
, Riccardo Guidotti, Yuan Yin, Patrick Gallinari, Salvatore Rinzivillo:
Exemplars and Counterexemplars Explanations for Image Classifiers, Targeting Skin Lesion Labeling. 1-7 - Zhezhou Kang, Yi Liu, Guanqun Bi, Fang Fang, Pengfei Yin:
No news is an island: Joint heterogeneous graph network for news classification. 1-7 - Qingkai Meng, Kun Qian, Wenxue Cheng, Fengyuan Ren:
RBA: Adaptive TCP Receive Buffer Sizing. 1-7