default search action
19th TrustCom 2020: Guangzhou, China
- Guojun Wang, Ryan K. L. Ko, Md. Zakirul Alam Bhuiyan, Yi Pan:
19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0392-4
Trust Track
- Xuewei Feng, Dongxia Wang, Zhechao Lin, Xiaohui Kuang, Gang Zhao:
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency. 1-12 - Xin Tang, Linna Zhou, Dan Liu, Boyu Liu, Xinyi Lü:
Reversible data hiding based on improved rhombus predictor and prediction error expansion. 13-21 - Dapeng Qu, Jiankun Zhang, Zhenhuan Hou, Ming Wan, Bo Dong:
A Trust Routing Scheme based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer Networks. 22-29 - Jingbin Liu, Yu Qin, Dengguo Feng:
SeRoT: A Secure Runtime System on Trusted Execution Environments. 30-37 - Young Choon Lee, Jayden King, Young Ki Kim, Seok-Hee Hong:
Robust Scheduling for Large-Scale Distributed Systems. 38-45 - Chengying Mao, Linlin Wen, Tsong Yueh Chen:
Adaptive Random Test Case Generation Based on Multi-Objective Evolutionary Search. 46-53 - Wei Yang, Anmin Fu, Hailong Zhang, Chanying Huang:
Improving Efficiency of Key Enumeration Based on Side-Channel Analysis. 54-61 - Marcin Plata, Piotr Syga:
Robust Spatial-spread Deep Neural Image Watermarking. 62-70 - Ha Xuan Son, Hai Trieu Le, Nadia Metoui, Nghia Duong-Trung:
DeM-CoD: Novel Access-Control-Based Cash on Delivery Mechanism for Decentralized Marketplace. 71-78 - Ran Li, Jiaqi Yin, Huibiao Zhu:
Modeling and Analysis of RabbitMQ Using UPPAAL. 79-86 - Xiaohu Zhou, Vitor Jesus, Yonghao Wang, Mark B. Josephs:
User-Controlled, Auditable, Cross-Jurisdiction Sharing of Healthcare Data Mediated by a Public Blockchain. 87-96 - Ming Liu, Zhi Xue, Xiangjian He:
A Unified Host-based Intrusion Detection Framework using Spark in Cloud. 97-103 - Yanshul Sharma, Zinea Das, Alok Das, Sanjay Moulik:
TA-HRT: A temperature-aware scheduler for heterogeneous real-time multicore systems. 104-111 - Yin Liu, Eli Tilevich:
Reducing the Price of Protection: Identifying and Migrating Non-Sensitive Code in TEE. 112-120 - Wentao Xie, Peng Wu:
Fairness Testing of Machine Learning Models Using Deep Reinforcement Learning. 121-128
Security Track
- Isaac Matthews, John C. Mace, Sadegh Soudjani, Aad van Moorsel:
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach. 129-136 - Qi Feng, Debiao He, Min Luo, Zengxiang Li, Kim-Kwang Raymond Choo:
Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency. 137-147 - Roberto Dillon, Shailey Chawla, Dayana Hristova, Barbara Göbl, Suzana Jovicic:
Password Policies vs. Usability: When Do Users Go "Bananas"? 148-153 - Yu Ding, Shupeng Wang, Jian Xing, Xiaoyu Zhang, ZiSen Oi, Ge Fu, Qian Qiang, Haoliang Sun, Jianyu Zhang:
Malware Classification on Imbalanced Data through Self-Attention. 154-161 - Ning Zhang, Zhiqiang Lv, Yanlin Zhang, Haiyang Li, Yixin Zhang, Weiqing Huang:
Novel design of Hardware Trojan: A generic approach for defeating testability based detection. 162-173 - Munir Geden, Kasper Rasmussen:
TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity. 174-181 - Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan:
LURK: Server-Controlled TLS Delegation. 182-193 - Fang Li, Ziyuan Zhu, Chao Yan, Bowen Chen, Dan Meng:
Malware Detection Based on Term Frequency Analysis of GPRs Features. 194-201 - Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare:
Secure Outsourcing of Multi-Armed Bandits. 202-209 - Yannan Liu, Yabin Lai, Kaizhi Wei, Liang Gu, Zhengzheng Yan:
NLabel: An Accurate Familial Clustering Framework for Large-scale Weakly-labeled Malware. 210-216 - Xuyang Ding, Feng Xiao, Man Zhou, Zhibo Wang:
Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things. 217-224 - Oleg Schell, Marcel Kneib:
VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area Network. 225-232 - Peilun Wu, Nour Moustafa, Shiyi Yang, Hui Guo:
Densely Connected Residual Network for Attack Recognition. 233-242 - Guoqiang Yang, Fanyu Kong, Qiuliang Xu:
Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime Fields. 243-249 - Kemeng Wu, Yongzheng Zhang, Tao Yin:
FTPB: A Three-stage DNS Tunnel Detection Method Based on Character Feature Extraction. 250-258 - Tianning Zhang, Miao Cai, Diming Zhang, Hao Huang:
De-randomizing the Code Segment with Timing Function Attack. 259-267 - Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang:
Unmasking Windows Advanced Persistent Threat Execution. 268-276 - Changchun Yin, Hao Wang, Lu Zhou, Liming Fang:
Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud Data. 277-284 - Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage. 285-292 - Xiaonan Song, Aimin Yu, Haibo Yu, Shirun Liu, Xin Bai, Lijun Cai, Dan Meng:
Program Slice based Vulnerable Code Clone Detection. 293-300 - Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs. 301-309 - Tiago Fernandes, Luis Dias, Miguel Correia:
C2BID: Cluster Change-Based Intrusion Detection. 310-319 - Tianlin Huo, Wenhao Wang, Pei Zhao, Yufeng Li, Tingting Wang, Mingshu Li:
TEADS: A Defense-aware Framework for Synthesizing Transient Execution Attacks. 320-327 - Benjamin Semal, Konstantinos Markantonakis, Keith Mayes, Jan Kalbantner:
One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud. 328-336 - Jiajin Cai, Tongxin Li, Can Huang, Xinhui Han:
ReDex: Unpacking Android Packed Apps by Executing Every Method. 337-344 - Tiago Espinha Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque, Daniel Méndez Fernández:
Awareness of Secure Coding Guidelines in the Industry - A first data analysis. 345-352 - Junaid Haseeb, Masood Mansoori, Harith Al-Sahaf, Ian Welch:
IoT Attacks: Features Identification and Clustering. 353-360 - Hoang Hai Nguyen, David M. Nicol:
Estimating Loss Due to Cyber-attack in the Presence of Uncertainty. 361-369 - Xueying Han, Rongchao Yin, Zhigang Lu, Bo Jiang, Yuling Liu, Song Liu, Chonghua Wang, Ning Li:
STIDM: A Spatial and Temporal Aware Intrusion Detection Model. 370-377 - Xiaohui Wu, Yeping He, Qiming Zhou, Hengtai Ma, Liang He, Wenhao Wang, Liheng Chen:
Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks. 378-385 - Guga Suri, Jianming Fu, Rui Zheng, Xinying Liu:
Family Identification of AGE-Generated Android Malware Using Tree-Based Feature. 386-393 - Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig:
Towards a Theory of Special-Purpose Program Obfuscation. 394-401 - Meng Li, Qi Zhong, Leo Yu Zhang, Yajuan Du, Jun Zhang, Yong Xiang:
Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach. 402-409 - Johannes Lauinger, Lars Baumgärtner, Anna-Katharina Wickert, Mira Mezini:
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild. 410-417 - Yuzong Hu, Futai Zou, Linsen Li, Ping Yi:
Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet. 418-424 - Dong Qin, Shen Fu, George T. Amariucai, Daji Qiao, Yong Guan:
MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTW. 425-433 - Yu Fu, Siming Tong, Xiangyu Guo, Liang Cheng, Yang Zhang, Dengguo Feng:
Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information. 434-441 - Joe Samuel, Khalil Aalab, Jason Jaskolka:
Evaluating the Soundness of Security Metrics from Vulnerability Scoring Frameworks. 442-449 - Yi Li, Xi Xiao, Xiaogang Zhu, Xiao Chen, Sheng Wen, Bin Zhang:
SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge. 450-457 - Lars Baumgärtner, Alexandra Dmitrienko, Bernd Freisleben, Alexander Gruler, Jonas Höchst, Joshua Kühlberg, Mira Mezini, Richard Mitev, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl:
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. 458-467 - Mingkai Tong, Guo Li, Runzi Zhang, Jianxin Xue, Wenmao Liu, Jiahai Yang:
Far from classification algorithm: dive into the preprocessing stage in DGA detection. 468-474 - Minghui Li, Yang Li, Liming Fang:
ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing. 475-482 - Jordan Stobbs, Biju Issac, Seibu Mary Jacob:
Phishing Web Page Detection Using Optimised Machine Learning. 483-490 - Nan Messe, Vanea Chiprianov, Nicolas Belloir, Jamal El Hachem, Régis Fleurquin, Salah Sadou:
Asset-Oriented Threat Modeling. 491-501 - Yipeng Zhang, Zhonghao Sun, Liqun Yang, Zhoujun Li, Qiang Zeng, Yueying He, Xiaoming Zhang:
A11 Your PLCs Belong to Me: ICS Ransomware Is Realistic. 502-509 - Haoqi Wu, Zhengxuan Yu, Dapeng Huang, Haodong Zhang, Weili Han:
Automated Enforcement of the Principle of Least Privilege over Data Source Access. 510-517 - Chengqian Guo, Quanwei Cai, Qiongxiao Wang, Jingqiang Lin:
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes. 518-529 - Zhiyu Xu, Lin Yang, Ziyuan Wang, Sheng Wen, Rob Hanson, Shiping Chen, Yang Xiang:
BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services. 530-538 - Defu Cao, Jing Huang, Xuanyu Zhang, Xianhua Liu:
FTCLNet: Convolutional LSTM with Fourier Transform for Vulnerability Detection. 539-546 - Luqi Zhu, Jin Wang, Lianmin Shi, Jingya Zhou, Kejie Lu, Jianping Wang:
Secure Coded Matrix Multiplication against Cooperative Attack in Edge Computing. 547-556 - Junaid Haseeb, Masood Mansoori, Ian Welch:
A Measurement Study of IoT-Based Attacks Using IoT Kill Chain. 557-567 - Tengfei Li, Xiaohong Chen, Haiying Sun, Jing Liu, Jiajia Yang, Chenchen Yang, Junfeng Sun:
Modeling and Verification of Spatio-Temporal Intelligent Transportation Systems. 568-575 - Tianyi Zhang, Jian Wang:
Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing. 576-583 - Xuren Wang, Mengbo Xiong, Yali Luo, Ning Li, Zhengwei Jiang, Zihan Xiong:
Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCN. 584-591 - Francis Onodueze, Darsana Josyula:
Anomaly Detection on MIL-STD-1553 Dataset using Machine Learning Algorithms. 592-598
Privacy Track
- Meng Li, Jianbo Gao, Yifei Chen, Jingcheng Zhao, Mamoun Alazab:
Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks. 599-606 - Eduardo Gomes, Igor Zavalyshyn, Nuno Santos, João Silva, Axel Legay:
Flowverine: Leveraging Dataflow Programming for Building Privacy-Sensitive Android Applications. 607-614 - Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu:
Prihook: Differentiated context-aware hook placement for different owners' smartphones. 615-622 - Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao, Chunjiang Wu, Shilin Qiu:
Improving Laplace Mechanism of Differential Privacy by Personalized Sampling. 623-630 - De Li, Jinyan Wang, Zhou Tan, Xianxian Li, Yuhang Hu:
Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks. 631-638 - Zhihao Zheng, Zhenfu Cao, Jiachen Shen:
Practical and Secure Circular Range Search on Private Spatial Data. 639-645 - Hugo Sbaï, Jassim Happa, Michael Goldsmith, Samy Meftali:
Dataset Construction and Analysis of Screenshot Malware. 646-655 - Shiwei Xu, Xiaowen Cai, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Huanguo Zhang, Le Du, Yan Tong:
zkrpChain: Privacy-preserving Data Auditing for Consortium Blockchains Based on Zero-knowledge Range Proofs. 656-663 - Thomas Cory, Philip Raschke, Axel Küpper:
Heimdall: Illuminating the Hidden Depths of Third-party Tracking in Android Applications. 676-682 - Tianyuan Liu, Hongpeng Guo, Claudiu Danilov, Klara Nahrstedt:
A Privacy-preserving Data Collection and Processing Framework for Third-party UAV Services. 683-690 - Mina Sheikhalishahi, Nicola Zannone:
On the Comparison of Classifiers' Construction over Private Inputs. 691-698 - Muqian Chen, Xuebin Wang, Jinqiao Shi, Can Zhao, Meiqi Wang, Binxing Fang:
Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way. 699-706 - Linpeng Lu, Ning Ding:
Multi-Party Private Set Intersection in Vertical Federated Learning. 707-714
Forensics and Analytics Track
- Fucheng Liu, Yu Wen, Yanna Wu, Shuangshuang Liang, Xihe Jiang, Dan Meng:
MLTracer: Malicious Logins Detection System via Graph Neural Network. 715-726 - Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed:
Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets. 727-735 - Runzi Zhang, Mingkai Tong, Lei Chen, Jianxin Xue, Wenmao Liu, Feng Xie:
CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic. 736-743 - Xiaojian Li, Bo Li, Hailan Wang, Jiajia Zhang, Haopeng Yang, Jingang Liu:
A Novel Violation Tracing Model for Cloud Service Accountability. 744-750 - Lida Ketsbaia, Biju Issac, Xiaomin Chen:
Detection of Hate Tweets using Machine Learning and Deep Learning. 751-758 - Jack Hance, Jeremy Straub:
Use of Bash History Novelty Detection for Identification of Similar Source Attack Generation. 759-766 - Adnan Anwar, S. M. Abu Adnan Abir:
Measurement Unit Placement Against Injection Attacks for the Secured Operation of an IIoT-based Smart Grid. 767-774 - Yen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Cross Platform IoT- Malware Family Classification based on Printable Strings. 775-784 - Yuqing Pan, Xi Xiao, Guangwu Hu, Bin Zhang, Qing Li, Haitao Zheng:
ALBFL: A Novel Neural Ranking Model for Software Fault Localization via Combining Static and Dynamic Features. 785-792 - Behzad Asadi, Vijay Varadharajan:
Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples. 793-801 - Matthew J. Ryan, Morshed U. Chowdhury, Frank Jiang, Robin Doss:
Avoiding Geographic Regions in Tor. 802-809 - Paul Black, Iqbal Gondal, Peter Vamplew, Arun Lakhotia:
Identifying Cross-Version Function Similarity Using Contextual Features. 810-818 - Yunan Zhang, Aidong Xu, Yixin Jiang:
Scalable and Accurate Binary Search Method based on Simhash and Partial Trace. 818-826 - Taejun Choi, Guangdong Bai, Ryan K. L. Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang:
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems. 827-835 - Shinelle Hutchinson, Neesha Shantaram, Umit Karabiyik:
Forensic Analysis of Dating Applications on Android and iOS Devices. 836-847 - Nour Moustafa, Marwa Keshk, Essam Soliman Debie, Helge Janicke:
Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications. 848-855 - Sara Salim, Nour Moustafa, Benjamin P. Turnbull:
Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media. 856-863
Emerging Technologies Track
- Mengxiang Wan, Hanbing Yao, Xin Yan:
Generation of malicious webpage samples based on GAN. 864-869 - Dali Zhu, Yuchen Ma, Yinlong Liu:
A Flexible Attentive Temporal Graph Networks for Anomaly Detection in Dynamic Networks. 870-875 - Lei Xu, Lin Chen, Zhimin Gao, Han-Yee Kim, Taeweon Suh, Weidong Shi:
FPGA based Blockchain System for Industrial IoT. 876-883 - Handong Cui, Tsz Hon Yuen:
Address-based Signature. 884-891 - Shunsheng Zhang, Yuling Luo, Lvchen Cao, Junxiu Liu:
Cryptanalysis of a Chaos-based Block Cryptosystem Using Multiple Samples Correlation Power Analysis. 892-898 - Giulio Zizzo, Chris Hankin, Sergio Maffeis, Kevin Jones:
Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems. 899-910 - Alban Siffer, Pierre-Alain Fouque, Alexandre Termier, Christine Largouët:
Netspot: a simple Intrusion Detection System with statistical learning. 911-918 - Zhongkai Tong, Ziyuan Zhu, Zhanpeng Wang, Limin Wang, Yusha Zhang, Yuxin Liu:
Cache side-channel attacks detection based on machine learning. 919-926 - Xiaohui Hu, Rui Sun, Kejia Xu, Yongzheng Zhang, Peng Chang:
Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model. 927-934 - Paul Walther, Thorsten Strufe:
Inference Attacks on Physical Layer Channel State Information. 935-942 - Enzo Tartaglione, Marco Grangetto:
A non-discriminatory approach to ethical deep learning. 943-950 - Amjad Qashlan, Priyadarsi Nanda, Xiangjian He:
Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts. 951-958 - Rahma Mukta, James Martens, Hye-Young Paik, Qinghua Lu, Salil S. Kanhere:
Blockchain-based Verifiable Credential Sharing with Selective Disclosure. 959-966 - Wenjun Fan, Younghee Park, Shubham Kumar, Priyatham Ganta, Xiaobo Zhou, Sang-Yoon Chang:
Blockchain-enabled Collaborative Intrusion Detection in Software Defined Networks. 967-974 - Mingfu Xue, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu:
Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique. 975-982 - Zhanpeng Wang, Ziyuan Zhu, Limin Wang, Zhongkai Tong, Chao Yan:
SCPORAM: a hardware support scheme for protecting memory access patterns. 983-990 - Zhujun Zhang, Dali Zhu, Wei Fan:
QPBFT: Practical Byzantine Fault Tolerance Consensus Algorithm Based on Quantified-role. 991-997 - Kilian Becher, J. A. Gregor Lagodzinski, Thorsten Strufe:
Privacy-Preserving Public Verification of Ethical Cobalt Sourcing. 998-1005 - Zhuo Li, Xu Zhou, Yang Liu, Congshan Fan, Wei Wang:
A Computation Offloading Model over Collaborative Cloud-Edge Networks with Optimal Transport Theory. 1006-1011 - Yizhong Liu, Jianwei Liu, Yiming Hei, Wei Tan, Qianhong Wu:
A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness. 1012-1019 - Andreas Abraham, Stefan More, Christof Rabensteiner, Felix Hörandner:
Revocable and Offline-Verifiable Self-Sovereign Identities. 1020-1027 - Lei Xu, Zhimin Gao, Xinxin Fan, Lin Chen, Han-Yee Kim, Taeweon Suh, Weidong Shi:
Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement. 1028-1035 - Subhra Mazumdar, Prabal Banerjee, Sushmita Ruj:
Time is Money: Countering Griefing Attack in Lightning Network. 1036-1043 - Przemyslaw Kubiak, Miroslaw Kutylowski:
Preventing a Fork in a Blockchain - David Fighting Goliath. 1044-1051 - Ting Su, Jiahe Shi, Yongkang Tang, Shaoqing Li:
Golden-Chip-Free Hardware Trojan Detection Through Thermal Radiation Comparison in Vulnerable Areas. 1052-1059 - Rohan Dahiya, Frank Jiang, Robin Doss:
A Feedback-Driven Lightweight Reputation Scheme for IoV. 1060-1068 - Md. Atik Shahriar, Faisal Haque Bappy, A. K. M. Fakhrul Hossain, Dayamoy Datta Saikat, Md. Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Md. Zakirul Alam Bhuiyan:
Modelling Attacks in Blockchain Systems using Petri Nets. 1069-1078 - Md. Saiful Islam Bhuiyan, Abdur Razzak, Md. Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Mohammad Ashraful Hoque, Sasu Tarkoma:
BONIK: A Blockchain Empowered Chatbot for Financial Transactions. 1079-1088 - Harsh Dhillon, Anwar Haque:
Towards Network Traffic Monitoring Using Deep Transfer Learning. 1089-1096
Work-in-Progress Track
- Stanislaw Saganowski:
A three-stage machine learning network security solution for public entities. 1097-1104 - Alexandros Bakas, Antonis Michalas:
Multi-Input Functional Encryption: Efficient Applications from Symmetric Primitives. 1105-1112 - Rawan Baalous, Ronald Poet:
Factors Affecting Users' Disclosure Decisions in Android Runtime Permissions Model. 1113-1118 - Syed W. Shah, Naeem Firdous Syed, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss:
Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication. 1119-1126 - Arun Kumar Jindal, Imtiyazuddin Shaik, Vasudha, Srinivasa Rao Chalamala, Rajan M. A, Sachin Lodha:
Secure and Privacy Preserving Method for Biometric Template Protection using Fully Homomorphic Encryption. 1127-1134 - Muhammad Jehanzaib Yousuf, Mingjun Wang, Zheng Yan, Fawad Khan:
Trusted Network Slicing among Multiple Mobile Network Operators. 1135-1140 - Andreas Aigner, Abdelmajid Khelil:
A Scoring System to efficiently measure Security in Cyber-Physical Systems. 1141-1145 - Manaz Kaleel, Nhien-An Le-Khac:
Towards a new deep learning based approach for the password prediction. 1146-1150 - Qicheng Ma, Nidhi Rastogi:
DANTE: Predicting Insider Threat using LSTM on system logs. 1151-1156 - Qi Lei, Chao Li, Kexin Qiao, Zhe Ma, Bo Yang:
VGG-based side channel attack on RSA implementation. 1157-1161 - Tao Zhang, Zelei Cheng, Yi Qin, Qiang Li, Lin Shi:
Deep Learning for Password Guessing and Password Strength Evaluation, A Survey. 1162-1166 - Michel Barbeau, Frédéric Cuppens, Nora Cuppens, Romain Dagnas, Joaquín García-Alfaro:
Metrics to Enhance the Resilience of Cyber-Physical Systems. 1167-1172 - Ang Li, Wenjun Jiang, Xueqi Li, Xinrong Chen, Guojun Wang:
Independent Worker Selection In Crowdsourcing. 1173-1178 - Wenjuan Li, Weizhi Meng, Hui Zhu:
Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust. 1179-1186 - Min Li, Haroon Elahi, Tao Peng, Fang Qi, Guojun Wang:
A Function-Centric Risk Assessment Approach for Android Applications. 1187-1193 - Fangzhou Zhu, Liang Liu, Weizhi Meng, Ting Lv, Simin Hu, Renjun Ye:
SCAFFISD: A Scalable Framework for Fine-grained Identification and Security Detection of Wireless Routers. 1194-1199 - Kuniyasu Suzaki, Kenta Nakajima, Tsukasa Oi, Akira Tsukamoto:
Library Implementation and Performance Analysis of GlobalPlatform TEE Internal API for Intel SGX and RISC-V Keystone. 1200-1208 - James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, James Xi Zheng:
A Privacy-Preserving Data Inference Framework for Internet of Health Things Networks. 1209-1214 - Yizhen Sun, Yiman Xie, Weiping Wang, Shigeng Zhang, Yuxi Wu, Jingchuan Feng:
RPAD: An Unsupervised HTTP Request Parameter Anomaly Detection Method. 1215-1221 - Tong Liu, Xiaochen Yuan:
Image Self-Recovery Based on Authentication Feature Extraction. 1222-1227 - Manasi Mittal, Muhammad Rizwan Asghar, Arvind K. Tripathi:
Do My Emotions Influence What I Share? Analysing the Effects of Emotions on Privacy Leakage in Twitter. 1228-1235 - Jinfang Sheng, Yan Hu, Kerong Guan, Bin Wang, Xiaoxia Pan, Wenjun Kang:
Robustness analysis and defence strategy of an interdependent networks model based on closeness centrality. 1236-1241 - Fatma Mohammed, A. S. M. Kayes, Eric Pardede, Wenny Rahayu:
A Framework for Measuring IoT Data Quality Based on Freshness Metrics. 1242-1249 - Xiuli Fang, Muhammad Rizwan Asghar:
RevBloc: A Blockchain-based Secure Customer Review System. 1250-1259 - Amr Megahed, Qi Han:
Face2Face Manipulation Detection Based on Histogram of Oriented Gradients. 1260-1267 - Saurabh Chamotra, Ferdous Ahmed Barbhuiya:
Analysis and modelling of multi-stage attacks. 1268-1275 - Hootan Alavizadeh, Hooman Alavizadeh, Julian Jang-Jaccard:
Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud. 1276-1284 - Sanjiv S. Jha, Simon Mayer, Tanja Schneider:
Explicitly Privacy-Aware Space Usage Analysis. 1285-1290 - Abdullah Al Omar, Abu Kaisar Jamil, Md. Shakhawath Hossain Nur, Md Mahamudul Hasan, Rabeya Bosri, Md. Zakirul Alam Bhuiyan, Mohammad Shahriar Rahman:
Towards A Transparent and Privacy-preserving Healthcare Platform with Blockchain for Smart Cities. 1291-1296 - Ba-Lam Do, Quang-Thang Nguyen, Thang Nguyen, Tien-Thao Nguyen, Thanh-Chung Dao, Binh Minh Nguyen:
BML: A Data Mapping Language for Blockchain Platforms. 1297-1303
The 11th International Workshop on Collaborative Computing with Cloud and Client (C4W 2020)
- Tao Lu, Hongyun Xu, Kai Tian, Cenxi Tian, Rui Jiang:
Semantic Location Privacy Protection Algorithm Based on Edge Cluster Graph. 1304-1309 - Dimuth Lasantha, Biplob Ray:
Priority based Modeling and Comparative study of Google Cloud Resources between 2011 and 2019. 1310-1317 - Aakanksha Sharma, Venki Balasubramanian, Alireza Jolfaei:
Security Challenges and Solutions for 5G HetNet. 1318-1323 - Immanuel Kunz, Angelika Schneider, Christian Banse:
Privacy Smells: Detecting Privacy Problems in Cloud Architectures. 1324-1331 - Weizheng Wang, Huakun Huang, Lejun Zhang, Zhaoyang Han, Chen Qiu, Chunhua Su:
BlockSLAP: Blockchain-based Secure and Lightweight Authentication Protocol for Smart Grid. 1332-1338 - Shan Liang, Yuewu Wang, Lingguang Lei, Jiwu Jing, Quan Zhou:
SecureESFS: Sharing Android External Storage Files in A Securer Way. 1339-1347 - Yuxi Li, Fucai Zhou, Zifeng Xu:
PPFQ: Privacy-Preserving Friends Query over Online Social Networks. 1348-1353 - Dong Liang, Qinrang Liu, Yanbin Hu, Tao Hu, Binghao Yan, Haiming Zhao:
Dynamic flow redirecton scheme for enhancing control plane robustness in SDN. 1354-1359 - Fariha Tasmin Jaigirdar, Carsten Rudolph, Chris Bain:
Prov-IoT: A Security-Aware IoT Provenance Model. 1360-1367 - Ahmed Alshehri, Malek Ben Salem, Lei Ding:
Are Smart Home Devices Abandoning IPV Victims? 1368-1375 - Tomoaki Mimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji:
A Practical Privacy-Preserving Algorithm for Document Data. 1376-1383 - Muhammad Umar Farooq, Xingfu Wang, Ammar Hawbani, Asad Khan, Adeel Ahmed, Fisseha Teju Wedaj:
TORP: Load Balanced Reliable Opportunistic Routing for Asynchronous Wireless Sensor Networks. 1384-1389 - Tao Sun, Jing Yang, Wenjie Zhong:
CPN Model Checking Method of Concurrent Software Based on State Space Pruning. 1390-1394 - Yan Yan, Xin Gao, Adnan Mahmood, Yang Zhang, Shuang Wang, Quan Z. Sheng:
An Arithmetic Differential Privacy Budget Allocation Method for the Partitioning and Publishing of Location Information. 1395-1401 - Syed Ghazanfar Abbas, Muhammad Husnain, Ubaid Ullah Fayyaz, Farrukh Shahzad, Ghalib A. Shah, Kashif Zafar:
IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source. 1402-1409 - Md Shamimur Rahman Shuvo, Dima Alhadidi:
Membership Inference Attacks: Analysis and Mitigation. 1410-1419 - Taha Al-Jody, Violeta Holmes, Alexandros Antoniades, Yazan Kazkouzeh:
Bearicade: secure access gateway to High Performance Computing systems. 1420-1427 - Anthony Phipps, Karim Ouazzane, Vassil T. Vassilev:
Enhancing Cyber Security Using Audio Techniques: A Public Key Infrastructure for Sound. 1428-1436 - Klaus Herberth:
Group Communication Needs No Consistent Transcript Distribution. 1437-1443 - Zhicheng Song, Pushpendu Kar:
Name-Signature Lookup System: A Security Enhancement to Named Data Networking. 1444-1448 - Vasileios Kouliaridis, Georgios Kambourakis, Tao Peng:
Feature importance in Android malware detection. 1449-1454 - Chi Zhang, Jinfu Chen, Saihua Cai, Bo Liu, Yiming Wu, Ye Geng:
iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection Methods. 1455-1460
The 10th International Workshop on Assistive Engineering and Information Technology (AEIT 2020)
- Wei Liu, Wenlong Feng, Mengxing Huang, Guilai Han, Jialun Lin:
Plant Taxonomy In Hainan Based On Deep Convolutional Neural Network And Transfer Learning. 1461-1466 - Jing Zhu, Hongyu Ge, Ao Cheng, Ruobing Zhang, Lirong Wang:
Research on Stitching and Alignment of Mouse Carcass EM Images. 1468-1471 - Jiangchang Cheng, Yinglong Dai, Yao Yuan, Hongli Zhu:
A Simple Analysis of Multimodal Data Fusion. 1472-1475 - Deyin Li, Miao Zhang, Wei Shi, Huimin Zhang, Duoduo Wang, Lirong Wang:
Pyramid Pooling Channel Attention Network for esophageal tissue segmentation on OCT images. 1476-1480 - Mixue Deng, Lishen Qiu, Hongqing Wang, Wei Shi, Lirong Wang:
Atrial Fibrillation Classification Using Convolutional Neural Networks and Time Domain Features of ECG Sequence. 1481-1485 - Dong Wang, Lishen Qiu, Wei Shi, Hongqing Wang, Xiangxiang Xu, Lirong Wang:
Design and implementation of a multifunctional ECG analysis software system. 1486-1491 - Hui Kang, Lingfeng Lu, Hang Su:
A Four-Feature Keyword Extraction Algorithm Based on Word Length Priority ratio. 1492-1498 - Hui Kang, Shengquan Chen, Lingfeng Lu, Chenkun Meng:
Research and Improvement of Community Discovery Algorithm Based on Spark for Large Scale Complicated Networks. 1499-1508 - Xiaoying Li, Huai-bin Wang, Yuqiong Liu, Yuefei Wang, Zhen Liu:
An Investigation of Assistive Products for the Elderly. 1509-1514 - Yuefei Wang, Zhen Liu, Liucun Zhu, Xiaoying Li, Huaibin Wang:
An impedance control method of lower limb exoskeleton rehabilitation robot based on predicted forward dynamics. 1515-1518 - Haibo Chen, Junzuo Chen, Jinfu Chen, Shang Yin, Yiming Wu, Jiaping Xu:
An Automatic Vulnerability Scanner for Web Applications. 1519-1524 - Haibo Chen, Dalin Zhang, Jinfu Chen, Wei Lin, Dengzhou Shi, Zian Zhao:
An Automatic Vulnerability Classification System for IoT Softwares. 1525-1529
The 5th International Workshop on Privacy, Data Assurance, Security Solutions in the Internet of Things (PASS4IoT 2020)
- Hongzhaoning Kang, Gang Liu, Quan Wang, Runnan Zhang, Zichao Zhong, Yumin Tian:
Policy Evaluation and Dynamic Management Based on Matching Tree for XACML. 1530-1535 - Zhaoli Liu, Qindong Sun, Zhihai Yang, Kun Jiang, Jinpei Yan:
Fined-grained Aspect Extraction from Online Reviews for Decision Support. 1536-1541 - Xinchun Cui, Xueqing Li, Yiming Qin, Yong Ding:
A Password Strength Evaluation Algorithm based on Sensitive Personal Information. 1542-1545 - Gaofei Wei, Qiang Cai, Meng Li, Rui Dong, Yang Liu:
Prediction of high precision ignition process in the condition of multi flow area coupling of micro solid rocket motor. 1546-1551
The 4th International Workshop on Cyberspace Security (IWCSS 2020)
- Xiaoying Qiu, Guangda Li, Xuan Sun, Zhiguo Du:
Exploiting User Selection Algorithm for Securing Wireless Communication Networks. 1552-1555 - Ruxian Zhang, Zhaoju Zhang, Hong Di:
Easy-to-implement Campus Electronic Anonymous Voting System. 1556-1559 - Chaofan Chen, Zelei Cheng, Zuotian Li, Manyi Wang:
Hypergraph Attention Networks. 1560-1565 - Ronghai Yang, Jia Liu, Liang Gu, Yurong Chen:
Search & Catch: Detecting Promotion Infection in the Underground through Search Engines. 1566-1571 - Xiaomei Liu, Xin Tang:
Image Authentication using QR Code Watermarking Approach based on Image Segmentation. 1572-1577 - Fan Yan, Jia Liu, Liang Gu, Zelong Chen:
A Semi-Supervised Learning Scheme to Detect Unknown DGA Domain Names based on Graph Analysis. 1578-1583 - Han Zhang, Ming Liu, Zihan Yue, Zhi Xue, Yong Shi, Xiangjian He:
A PHP and JSP Web Shell Detection System With Text Processing Based On Machine Learning. 1584-1591 - Wei Ren:
A Symmetric Uniform Formula and Sole Index Method for Sieving (Twin) Primes. 1592-1597 - Xiaohan Hao, Wei Ren, Wenwen Zheng, Tianqing Zhu:
SCScan: A SVM-based Scanning System for Vulnerabilities in Blockchain Smart Contracts. 1598-1605 - Jiajia Yi, Lirong Chen, Haitao Zhang, Yun Li, Huanyu Zhao:
A Security Model and Implementation of Embedded Software Based on Code Obfuscation. 1606-1613 - Yan Lin, Guosheng Xu, Guoai Xu, Yudong Chen, Dawei Sun:
Sensitive Information Detection based on Convolution Neural Network and Bi-directional LSTM. 1614-1621 - Dongkun Hou, Jie Zhang, Ka Lok Man:
Enhancing the Security of Numeric Comparison Secure Simple Pairing in Bluetooth 5.0. 1622-1629 - David Mödinger, Franz J. Hauck:
3P3: Strong Flexible Privacy for Broadcasts. 1630-1637 - Dominik Ziegler, Alexander Marsalek:
Efficient Revocable Attribute-Based Encryption with Hidden Policies. 1638-1645 - Thomas Hupperich, Katharina Dassel:
On the Usefulness of User Nudging and Strength Indication Concerning Unlock Pattern Security. 1646-1654 - Yunxiu Ye, Zhenfu Cao, Jiachen Shen:
Unbounded Key-Policy Attribute-based Encryption with Black-Box Traceability. 1655-1663 - Jingxiang Zeng, Xiaofan Nie, Liwei Chen, Jinfeng Li, Gewangzi Du, Gang Shi:
An Efficient Vulnerability Extrapolation Using Similarity of Graph Kernel of PDGs. 1664-1671 - Samaneh Rashidibajgan, Thomas Hupperich, Robin Doss, Lei Pan:
Opportunistic Tracking in Cyber-Physical Systems. 1672-1679 - Jinghui Xu, Yu Wen, Chun Yang, Dan Meng:
An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection. 1680-1687 - Ren Yang, Xuebin Ma, Xiangyu Bai, Xiangdong Su:
Differential Privacy Images Protection Based on Generative Adversarial Network. 1688-1695 - Shengyi Guan, Xuebin Ma, Wuyungerile Li, Xiangyu Bai:
DP-Eclat: A Vertical Frequent Itemset Mining Algorithm Based on Differential Privacy. 1696-1703 - Xianze Liu, Jihong Liu, Bifei Jiang, Haozhen Jiang, Zhi Yang:
More efficient SM9 algorithm based on bilinear pair optimization processing. 1704-1710 - Yongkang Wu, Yiwei Shan, Zhichao Wang, Pengcheng Zhang, Min He, Jihong Liu:
SeWG: Security-enhanced WireGuard for Android Based on TEE. 1711-1717 - Xuejian Qi, Xuebin Ma, Xiangyu Bai, Wuyungerile Li:
Differential privacy preserving data publishing based on Bayesian network. 1718-1726 - Yixuan Wang, Yujun Li, Xiang Chen, Yeni Luo:
Implementing Network Attack Detection with a Novel NSSA Model Based on Knowledge Graphs. 1727-1732 - Luping Ma, Dali Zhu, Shunliang Zhang, Xiaohui Zhang, Shumin Peng, Ya Li:
UIDroid: User-driven Based Hierarchical Access Control for Sensitive Information. 1733-1740 - Yongkang Wu, Langyue He, Yiwei Shan, Pengcheng Zhang, Min He, Zhi Yang:
TrustyShare: A Sharing Scheme using ARM TrustZone. 1741-1747 - Lorena González-Manzano, Sergio Bernardez, José María de Fuentes:
SmartLED: Smartphone-based covert channels leveraging the notification LED. 1748-1755 - Zhichao Wang, Yiwei Shan, Zhi Yang, Ruoyi Wang, Shuang Song:
Semantic redirection obfuscation: A control flow obfuscation based on Android Runtime. 1756-1763 - Junzhi Yan, Xiaoyong Hang, Bo Yang, Li Su, Shen He:
Blockchain based PKI and Certificates Management in Mobile Networks. 1764-1770 - Shin-Ying Huang, Tao Ban:
Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis. 1771-1776 - Jack Pye, Biju Issac, Nauman Aslam, Husnain Rafiq:
Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation Algorithms. 1777-1782 - Muhammad Shadi Hajar, M. Omar Al-Kadri, Harsha K. Kalutarage:
LTMS: A Lightweight Trust Management System for Wireless Medical Sensor Networks. 1783-1790 - Tanveer Khan, Antonis Michalas:
Trust and Believe - Should We? Evaluating the Trustworthiness of Twitter Users. 1791-1800 - Theo Dimitrakos, Tezcan Dilshener, Alexander Kravtsov, Antonio La Marra, Fabio Martinelli, Athanasios Rizos, Alessandro Rosetti, Andrea Saracino:
Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things. 1801-1812 - Xiaoyang Liu, Ziyuan Zhu:
pcSVF: An Evaluation of Side-Channel Vulnerability of Port Contention. 1813-1819 - Syed Ghazanfar Abbas, Fabiha Hashmat, Ghalib A. Shah:
A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application. 1820-1825 - Andreas Aigner, Abdelmajid Khelil:
A Semantic Model-based Security Engineering Framework for Cyber-Physical Systems. 1826-1833 - Ahmad Salehi S., Carsten Rudolph, Marthie Grobler:
Attribute-Based Data Access Control for Multi-Authority System. 1834-1841 - Xuren Wang, Xinpei Liu, Shengqin Ao, Ning Li, Zhengwei Jiang, Zongyi Xu, Zihan Xiong, Mengbo Xiong, Xiaoqing Zhang:
DNRTI: A Large-scale Dataset for Named Entity Recognition in Threat Intelligence. 1842-1848 - Gerald Palfinger, Bernd Prünster, Dominik Julian Ziegler:
AndroTIME: Identifying Timing Side Channels in the Android API. 1849-1856 - Eric Klieme, Jonathan Wilke, Niklas van Dornick, Christoph Meinel:
FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication. 1857-1867 - Mohamed Ali Kandi, Djamel Eddine Kouicem, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal:
A Blockchain-based Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things. 1868-1873 - Eyal Nussbaum, Michael Segal:
Finding Geometric Medians with Location Privacy. 1874-1881 - Wanrong Zhao, Hossain Shahriar, Victor Clincy, Md. Zakirul Alam Bhuiyan:
Security and Privacy Analysis of mhealth Application: A Case Study. 1882-1887 - Eda Zhou, Joseph Turcotte, Lorenzo De Carli:
Enabling Security Analysis of IoT Device-to-Cloud Traffic. 1888-1894 - Rick Cents, Nhien-An Le-Khac:
Towards A New Approach to Identify WhatsApp Messages. 1895-1902
The 3rd International Workshop on Blockchain Systems and Applications (BlockchainSys 2020)
- Hossein Rezaeighaleh, Cliff C. Zou:
Efficient Off-Chain Transaction to Avoid Inaccessible Coins in Cryptocurrencies. 1903-1909 - Monika Di Angelo, Gernot Salzer:
Assessing the Similarity of Smart Contracts by Clustering their Interfaces. 1910-1919 - Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin J. Fidge:
Securing Manufacturing Using Blockchain. 1920-1925 - Markus Knecht, Burkhard Stiller:
SCUR: Smart Contracts with a Static Upper-bound on Resource Usage. 1926-1934 - Rafael Belchior, Benedikt Putz, Günther Pernul, Miguel Correia, André Vasconcelos, Sérgio Guerreiro:
SSIBAC: Self-Sovereign Identity Based Access Control. 1935-1943 - Tao Peng, Jierong Liu, Jianer Chen, Guojun Wang:
A Privacy-Preserving Crowdsensing System with Muti-Blockchain. 1944-1949 - Dawei Wang, Xiao Chen, Haiqin Wu, Ruozhou Yu, Yishi Zhao:
A Blockchain-based Vehicle-trust Management Framework Under a Crowdsourcing Environment. 1950-1955 - Jinshan Shi, Ru Li:
Permission Token Segmentation Scheme based on Blockchain Access Control. 1956-1964 - Nicolas Six, Claudia Negri-Ribalta, Nicolas Herbaut, Camille Salinesi:
A blockchain-based pattern for confidential and pseudo-anonymous contract enforcement. 1965-1970
The 2020 International Workshop on Machine Learning for Trust, Security and Privacy in Computing and Communications (MLTrustCom 2020)
- Yu-Chih Wei, You-Xin Lai, Hai-Po Su, Yu-Wen Yen:
Detecting Online Game Malicious Chargeback by using k-NN. 1971-1976 - Li Jian, Fei Rong, Tang Yu:
A novel Q-Learning Algorithm Based on the Stochastic Environment Path Planning Problem. 1977-1982 - Tran Phuong Thao, Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi, Toshiyuki Nakata:
Boosting Homograph Attack Classification Using Ensemble Learning and N-gram Model. 1983-1988 - Yizhuo Zhang, Yiwei Liu, Chi-Hua Chen:
Survey on Blockchain and Deep Learning. 1989-1994 - Rina Okada, Zen Ishikura, Toshiki Shibahara, Satoshi Hasegawa:
Special-purpose Model Extraction Attacks: Stealing Coarse Model with Fewer Queries. 1995-2000
The 2020 International Workshop on Smart Technologies for Intelligent Transportation and Communications (SmartITC 2020)
- Maozhu Liao, Shengdong Chen, Chuangjie Zheng, Feng Yuan:
A low-cost method for accurate localization of traffic participants. 2001-2006 - Muhammad Arif, Walter Balzano, Alessandro Fontanella, Silvia Stranieri, Guojun Wang, Xiaofei Xing:
Integration of 5G, VANETs and Blockchain Technology. 2007-2013 - Mihaela Hnatiuc, Oana Geman, Dragos Vicoveanu, George Motru:
Aquatic Drone Control Using Inertial Sensors - Comparative Filtering Methods. 2014-2019 - Yingying Ma, Shuo Li, Shaotian Qin, Yue Qi:
Factors affecting trust in the autonomous vehicle: A survey of primary school students and parent perceptions. 2020-2027 - Hubert Kyeremateng-Boateng, Marvin A. Conn, Darsana Josyula, Manohar Mareboyana:
Prediction of Radio Frequency Spectrum Occupancy. 2028-2034
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.