default search action
5th DependSys 2019: Guangzhou, China
- Guojun Wang, Md. Zakirul Alam Bhuiyan, Sabrina De Capitani di Vimercati, Yizhi Ren:
Dependability in Sensor, Cloud, and Big Data Systems and Applications - 5th International Conference, DependSys 2019, Guangzhou, China, November 12-15, 2019, Proceedings. Communications in Computer and Information Science 1123, Springer 2019, ISBN 978-981-15-1303-9
Dependability and Security Fundamentals and Technologies
- Kun Tang, Shaowei Liao, Md. Zakirul Alam Bhuiyan, Wei Shi:
Secrecy Outage Probability of Secondary System for Wireless-Powered Cognitive Radio Networks. 3-17 - Youqiang Deng, Cai Fu, Yang Li:
CodeeGAN: Code Generation via Adversarial Training. 18-30 - Jesús Silva, Ligia Romero, Claudia Fernández, Darwin Solano, Nataly Orellano Llinás, Carlos Vargas Mercado, Jazmín Flórez Guzmán, Ernesto Joaquín Steffens Sanabria:
Information Consumption Patterns from Big Data. 31-39 - Xingyue Fan, Ting Wu, Qiuhua Zheng, Yuanfang Chen, Xiaodong Xiao:
DHS-Voting: A Distributed Homomorphic Signcryption E-Voting. 40-53 - Hafiz ur Rahman, Guojun Wang, Md. Zakirul Alam Bhuiyan, Jianer Chen:
Towards In-Network Generalized Trustworthy Data Collection for Trustworthy Cyber-Physical Systems. 54-66 - Soumia Bellaouar, Mohamed Guerroumi, Samira Moussaoui:
QoS Based Clustering for Vehicular Networks in Smart Cities. 67-79 - Fang Qi, Xing Chang, Zhe Tang, Wenbo Wang:
Searchable Attribute-Based Encryption Protocol with Hidden Keywords in Cloud. 80-92
Dependable and Secure Systems
- Haoyu Wang, Bingze Dai, Dequan Yang:
A Comparative Study of Two Different Spam Detection Methods. 95-105 - Abdullah Al Omar, Rabeya Bosri, Mohammad Shahriar Rahman, Nasima Begum, Md. Zakirul Alam Bhuiyan:
Towards Privacy-preserving Recommender System with Blockchains. 106-118 - Sin Yin Tan, Wooi Ping Cheah, Shing Chiang Tan:
Integrating Deep Learning and Bayesian Reasoning. 119-130 - Janak Dahal, Elias Ioup, Shaikh Arifuzzaman, Mahdi Abdelguerfi:
Assessing the Dependability of Apache Spark System: Streaming Analytics on Large-Scale Ocean Data. 131-144 - Joseph Imseis, Costain Nachuma, Shaikh Arifuzzaman, Minhaz F. Zibran, Md. Zakirul Alam Bhuiyan:
On the Assessment of Security and Performance Bugs in Chromium Open-Source Project. 145-157 - Muhammad Arif, Guojun Wang, Oana Geman, Jianer Chen:
Medical Image Segmentation by Combining Adaptive Artificial Bee Colony and Wavelet Packet Decomposition. 158-169 - Karim Alinani, Deshun Liu, Dong Zhou, Guojun Wang:
Recommender System for Decentralized Cloud Manufacturing. 170-179 - Paola Barra, Carmen Bisogni, Michele Nappi, David Freire-Obregón, Modesto Castrillón Santana:
Gait Analysis for Gender Classification in Forensics. 180-190 - Amelec Viloria, Hugo Hernández Palma, Wilmer Cadavid Basto, Alexandra Perdomo Villalobos, Carlos Andrés Uribe de la Cruz, Juan de la Hoz Hernández, Omar Bonerge Pineda Lezama:
Hybrid Cloud Computing Architecture Based on Open Source Technology. 191-200
Dependable and Secure Applications
- Mingchu Li, Tingting Tang, Yuanfang Chen, Md. Zakirul Alam Bhuiyan:
Transportation and Charging Schedule for Autonomous Electric Vehicle Riding-Sharing System Considering Battery Degradation. 203-216 - Xiaolong Xu, Qingfan Geng, Hao Cao, Ruichao Mo, Shaohua Wan, Lianyong Qi, Hao Wang:
Blockchain-Powered Service Migration for Uncertainty-Aware Workflows in Edge Computing. 217-230 - Aniello Castiglione, Michele Nappi, Chiara Pero:
Towards the Design of a Covert Channel by Using Web Tracking Technologies. 231-246 - Aniello Castiglione, Giampiero Grazioli, Simone Iengo, Michele Nappi, Stefano Ricciardi:
Dependable Person Recognition by Means of Local Descriptors of Dynamic Facial Features. 247-261 - Yang Lu, Shujun Li, Athina Ioannou, Iis Tussyadiah:
From Data Disclosure to Privacy Nudges: A Privacy-Aware and User-Centric Personal Data Management Framework. 262-276 - Tasmina Islam, Ingolf Becker, Rebecca Posner, Paul Ekblom, Michael McGuire, Hervé Borrion, Shujun Li:
A Socio-Technical and Co-evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems. 277-293 - Hekai Zhang, Jibing Gong, Zhiyong Teng, Dan Wang, Hongfei Wang, Linfeng Du, Md. Zakirul Alam Bhuiyan:
Mobile APP User Attribute Prediction by Heterogeneous Information Network Modeling. 294-303 - Daning Huang, Huihe Chen, Shiyong Huang, Yuchang Lin, Ying Ma:
Application of Internet of Things and GIS in Power Grid Emergency Command System. 304-313 - Renxin Yu, Qinghuang Yao, Tianrong Zhong, Wei Li, Ying Ma:
Visualized Panoramic Display Platform for Transmission Cable Based on Space-Time Big Data. 314-323
Dependability and Security Measures and Assessments
- Mingchu Li, Xian Yang, Yuanfang Chen, Md. Zakirul Alam Bhuiyan:
Optimal Personalized DDoS Attacks Detection Strategy in Network Systems. 327-340 - Haroon Elahi, Guojun Wang, Tao Peng, Jianer Chen:
AI and Its Risks in Android Smartphones: A Case of Google Smart Assistant. 341-355 - Boya Li, Guojun Wang, Haroon Elahi, Guihua Duan:
A Light-Weight Framework for Pre-submission Vetting of Android Applications in App Stores. 356-368 - Kehinde O. Babaagba, Zhiyuan Tan, Emma Hart:
Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme. 369-382 - Amelec Viloria, Luisa Fernanda Arrieta Matos, Mercedes Gaitán, Hugo Hernández Palma, Yasmin Flórez Guzmán, Luis Cabas Vásquez, Carlos Vargas Mercado, Omar Bonerge Pineda Lezama:
Demand Forecasting Method Using Artificial Neural Networks. 383-391 - Amelec Viloria, Ronald Prieto Pulido, Jesús García Guiliany, Jairo Martínez Ventura, Hugo Hernández Palma, José Jinete Torres, Osman Redondo Bilbao, Omar Bonerge Pineda Lezama:
Analyzing and Predicting Power Consumption Profiles Using Big Data. 392-401
Explainable Artificial Intelligence for Cyberspace
- Jian Hou, Fangai Liu, Xuqiang Zhuang:
A New Intrusion Detection Model Based on GRU and Salient Feature Approach. 405-415 - Honghao Wu:
Research on Electronic Evidence Management System Based on Knowledge Graph. 416-425 - Honghao Wu:
Research on Security Supervision on Wireless Network Space in Key Sites. 426-434 - Yu Zhang, Xiangtao Liu, Tianle Zhang, Zhaoquan Gu:
Review of the Electric Vehicle Charging Station Location Problem. 435-445 - Minzhen Zheng, Shudong Li, Danna Lu, Wei Wang, Xiaobo Wu, Dawei Zhao:
Structural Vulnerability of Power Grid Under Malicious Node-Based Attacks. 446-453 - Yixia Li, Shudong Li, Yanshan Chen, Peiyan He, Xiaobo Wu, Weihong Han:
Electric Power Grid Invulnerability Under Intentional Edge-Based Attacks. 454-461 - Ihn-Han Bae:
Design and Evaluation of a Quorum-Based Hierarchical Dissemination Algorithm for Critical Event Data in Massive IoTs. 462-476 - Syifak Izhar Hisham, Mohamad Nazmi Nasir, Nasrul Hadi Johari:
Comparative Analysis on Raster, Spiral, Hilbert, and Peano Mapping Pattern of Fragile Watermarking to Address the Authentication Issue in Healthcare System. 477-486
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.