


default search action
13th SpaCCS Workshops 2020: Nanjing, China
- Guojun Wang

, Bing Chen
, Wei Li
, Roberto Di Pietro
, Xuefeng Yan, Hao Han
:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings. Lecture Notes in Computer Science 12383, Springer 2021, ISBN 978-3-030-68883-7
The 11th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2020)
- Lei Wei, Weiwei Miao, Zeng Zeng, Hesheng Sun, Zhuzhong Qian:

EDC: An Edge-Oriented Dynamic Resource Configuration Strategy. 3-14 - Muhammad Sohaib Yousaf

, Shazia Riaz
, Saqib Ali
, Shuhong Chen
, Guojun Wang
:
The Future Prospects of Adversarial Nets. 15-26 - Manchao Zhang, Hong Zhu, Kai Jiang:

Secure Cross-Domain Data Sharing Technology Based on Blockchain. 27-38
The 10th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2020)
- Yang Dai, Songyun Wang, Xilong Wang, Xin Li:

Microservice-Oriented Edge Server Deployment in Cloud-Edge System. 41-52 - Kaidi Wu, Lei Wang, Huijie Li, Xin Li:

QoS-Aware Dynamical Resource Scheduling in Cloud Data Centers. 53-64 - Ruizhe Qin, Hao Han:

BinSEAL: Linux Binary Obfuscation Against Symbolic Execution. 65-76 - Muhammad Arif, Jianer Chen, Pin Liu, Guojun Wang:

Location Based Communication Privacy in Internet of Vehicles Using Fog Computing. 77-90
The 9th International Symposium on Security and Privacy on Internet of Things (SPIoT 2020)
- Norbert Tihanyi

, Bertalan Borsos:
The Theory and Practice of Magic Hash Based Attacks on Lightweight Cryptographic Hash Functions in Complex IoT Environments. 93-107 - Abdelrhman Hassan

, Rashad Elhabob, Umar Ibrahim, Yong Wang:
Efficient Public Key Cryptography Scheme with Equality Test for Heterogeneous Systems in IIoT. 108-121 - Ahmed Mohamed Hussain

, Gabriele Oligeri, Thiemo Voigt:
The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services. 122-136 - Yongzhong Li, Shipeng Zhang, Yi Li:

Study of Transparent File Encryption Technology on Android Platform. 137-145 - Tong Ye

, Yi Zhuang
:
SCPAC: An Access Control Framework for Diverse IoT Platforms Based on OAuth2.0. 146-157
The 6th International Symposium on Sensor-Cloud Systems (SCS 2020)
- Xiaotian Gong, Lijuan Sun, Jian Zhou, Juan Wang, Fu Xiao:

Adaptive Routing Strategy Based on Improved Q-learning for Satellite Internet of Things. 161-172 - Zhe Wang, Mingxia Zhu, Hongda Zhao:

Reliability Evaluation of Sensor Network Based on Information Entropy in Power Grid Planning. 173-180 - Hongda Zhao, Zhe Wang, Mingxia Zhu, Zhongmin Shi, Zhen Wang, Xianli Wu:

Intelligent Fault Diagnosis and Response Method Based on GIS and IoT in Power Grid Planning. 181-190 - Yong Ding, Hui Xu, Yujue Wang:

Group Authentication for Sensors in Wireless Body Area Network. 191-199 - Qingli Hu, Jianqiang Hu, Xiaoyan Yu, Yang Liu:

Automatic Heart Sound Classification Using One Dimension Deep Neural Network. 200-208 - Jingbo Xia, Yaoxiang Wu, Xiaofu Du:

Indoor Positioning Technology Based on the Fusion of UWB and BLE. 209-221 - Mande Xie, Xiaowei Sheng, Jun Shao, Guoping Zhang, Yingying Ruan:

A User Privacy-Preserving Algorithm in Live Streaming Cloud Platforms. 222-232 - Liang Song, Haibin Chen, Hejiao Huang, Hongwei Du:

Multi-echelon Vehicle Routing Problem in Sensor-Cloud Architecture with Mobile Sinks. 233-244 - Jingyao Liu, Guangsheng Feng, Liying Zheng, Zihan Gao:

Joint Optimization of Transmission Source Selection and RSU Cache for Vehicular Video Streaming. 245-256 - Tianpeng Deng, Xuan Li, Biao Jin, Jinbo Xiong:

Who Distributes It? Privacy-Preserving Image Sharing Scheme with Illegal Distribution Detection. 257-268 - Feichou Kou, Fan Zhang:

Stepwise-Refined Interval for Deep Learning to Process Sensor-Cloud Data with Noises. 269-280 - Gaocai Wang, Hengyi Huang, Ruijie Pan:

Data Prediction Service Model Based on Sequential Pattern Mining in Sensor-Cloud. 281-293 - Yubing Qiu, Jianping Cai

, Lan Sun, Zhenzhen Zhang, Yingjie Wu:
Statistical Method of Space Distribution for Riding Based on R-Tree Under Differential Privacy. 294-309 - Chongben Tao, Kangliang Lu, Feng Cao

:
Multi-target Tracking with EmbedMask and LSTM Model Fusion. 310-320 - Xiaolin Jiang, Yu Xiang:

Face Detection Using Improved Multi-task Cascaded Convolutional Networks. 321-333 - Weijin Jiang, Sijian Lv

:
Access Control Method Based on a Mutual Trust Mechanism in the Edge Computing Environment. 334-344 - Zengwei Zheng, Pengquan Yan, Yuanyi Chen, Jianping Cai, Fengle Zhu:

Increasing Crop Yield Using Agriculture Sensing Data in Smart Plant Factory. 345-356 - Gangqi Shu, Haibo Hong, Mande Xie, Jun Shao:

A Fuzzy Keywords Enabled Ranked Searchable CP-ABE Scheme for a Public Cloud Environment. 357-371 - Yuanyi Chen, Pengquan Yan, Zengwei Zheng, Dan Chen:

Identifying Traffic Bottleneck in Urban Road Networks via Causal Inference. 372-383 - Xiaohan Li, Ziyan Xie, Taotao Lai, Fusheng Zhao, Haiyin Xu, Riqing Chen:

NAS-WFPN: Neural Architecture Search Weighted Feature Pyramid Networks for Object Detection. 384-394 - Kai Qian, Yinqiu Liu, Yamin Han, Kun Wang:

Performance Benchmarking and Optimization for IIoT-oriented Blockchain. 395-406
The 2nd International Workshop on Communication, Computing, Informatics and Security (CCIS 2020)
- Dawei Liang

, Meng Wu:
A Multi-patch Deep Learning System for Text-Independent Writer Identification. 409-419 - Qingmin Meng, Hao Zheng, Haiyan Guo:

Classification of Abnormal Traces in a Collaborative Fog Computing Architecture. 420-429 - Quan Sun, Yonghong Chen, Tian Wang

:
A Muti-detection Method of Covert Timing Channel Based on Perceptual Hashing. 430-443 - Md Noman Bin Khalid:

Deep Learning-Based Dew Computing with Novel Offloading Strategy. 444-453 - Qi Zhang:

Detecting Credential Stuffing Between Servers. 454-464
The 1st International Workshop on Intelligence and Security in Next Generation Networks (ISNGN 2020)
- Lingxiao Zhang, Xuefeng Yan:

A Critical Node Detection Algorithm Based Node Interplay Model. 467-479 - Zheren Sun, Yuhua Huang, Wanlin Sun, Zhiyuan Chen:

A Posteriori Preference Multi-objective Optimization Using Machine Learning. 480-491 - Yuhua Huang, Shen Li, Wanlin Sun, Xuejun Dai, Wei Zhu:

HVH: A Lightweight Hash Function Based on Dual Pseudo-Random Transformation. 492-505 - Yuhua Huang, Wei Zhu, Wanlin Sun, Xuejun Dai, Shen Li:

SVHF: A Lightweight Stream Cipher Based on Feistel and OFB. 506-518 - Ting Yan, Dan Li:

A Novel Quantum Color Image Encryption Scheme Based on Controlled Alternate Quantum Walks. 519-530
The 1st International Symposium on Emerging Information Security and Applications (EISA 2020)
- Min Xiao

, Zhe Xia:
Security Analysis of a Multi-secret Sharing Scheme with Unconditional Security. 533-544 - Stephan Marais, Marijke Coetzee

, Frans F. Blauw
:
Simultaneous Deauthentication of Equals Attack. 545-556 - Thomas Hanka

, Matthias Niedermaier, Florian Fischer, Susanne Kießling, Peter Knauer
, Dominik Merli:
Impact of Active Scanning Tools for Device Discovery in Industrial Networks. 557-572 - Wenjuan Li

, Jiao Tan, Nan Zhu, Yu Wang:
Designing Double-Click-Based Unlocking Mechanism on Smartphones. 573-585 - Weijian Zhang, Chao Lin

, Zhuo Lyu, Chen Cen, Min Luo:
An Efficient Blind Signature Scheme with Untraceability for Data Privacy in Smart Grid. 586-597

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














