


default search action
CCCI 2021: Beijing, China
- International Conference on Communications, Computing, Cybersecurity, and Informatics, CCCI 2021, Beijing, China, October 15-17, 2021. IEEE 2021, ISBN 978-1-6654-3208-5

- Youssef Mansour

, Hamdan Hammad, Omnia Abu Waraga, Manar Abu Talib:
Energy Management Systems and Smart Phones: A Systematic Literature Survey. 1-7 - Yuanyan Xie, Yu Guo, Yue Chen, Zhenqiang Mi:

Real-Time Instance Segmentation for Low-Cost Mobile Robot Systems Based on Computation Offloading. 1-5 - Georgios L. Stavrinides, Helen D. Karatza

:
Fault-Tolerant Orchestration of Bags-of-Tasks with Application-Directed Checkpointing in a Distributed Environment. 1-6 - Anastasios Valkanis, Georgios Papadimitriou, Petros Nicopolitidis, Georgia A. Beletsioti, Emmanouel A. Varvarigos

:
A Traffic Prediction assisted Routing Algorithm for Elastic Optical Networks. 1-6 - Yabin Xu, Shengjie Sun, Zhuang Wu:

Gibbs Free-energy Prediction Method for Iron-base Alloy Materials Based on Deep Learning*. 1-5 - Harsh Mankodiya, Mohammad S. Obaidat, Rajesh Gupta

, Sudeep Tanwar:
XAI-AV: Explainable Artificial Intelligence for Trust Management in Autonomous Vehicles. 1-5 - Yanmiao Li, Hao Guo, Jiangang Hou, Zhen Zhang, Tongqing Jiang, Zhi Liu:

A Survey of Encrypted Malicious Traffic Detection*. 1-7 - Kajal Chatterjee, Mohammad S. Obaidat, Debabrata Samanta, Balqies Sadoun, SK Hafizul Islam, Rajdeep Chatterjee:

Classification of Soil Images using Convolution Neural Networks. 1-5 - Mengyao Yang, Junpeng Qi:

Reference-based Image Super-Resolution by Dual-Variational AutoEncoder. 1-5 - Jinghu Li, Lili Wang, Qianguo Xing:

Detection of Coastal Green Macroalgae based on SLIC, CNN and SVM. 1-5 - Shanyin Peng, Ning Wang:

Optimization Method of Pneumonia Image Classification Model Based on Deep Transfer Learning. 1-5 - Lianfen Huang, Tao Chen, Zhibin Gao, Manman Luo, Zhang Liu:

System Level simulation for 5G Ultra-Reliable Low-Latency Communication. 1-5 - Le Weng, Hengyu Liu, Lianfen Huang, Yingmin Zhang, Chao Feng:

Android malicious application detection based on Support Filtering and Lasso LR Algorithm. 1-5 - Xiaoling Guo, Yaqun Yang, Xinyu Song, Hongmiao Yao, Fudong Zhang:

Discover Community Structure in Network by Optimization Algorithm Based on Modular Function. 1-4 - Chunli Song, Xin Zhang:

Physical Layer Security of RIS-assisted NOMA Networks Over Fisher-Snedecor ℱ Composite Fading Channel. 1-6 - Xiaoqing Yang, Yuelong Zhu, Jun Feng

, Jiamin Lu
:
Cross-modal Retrieval of Archives based on Principal Affinity Representation. 1-5 - Yue Chen, Yu Guo, Yuanyan Xie, Zhenqiang Mi:

Legal and Regulation Retrieval System Based on Hierarchical Retrieval. 1-5 - Dheerendra Mishra

, Mohammad S. Obaidat, Ankita Mishra:
Privacy Preserving Location-based Content Distribution Framework for Digital Rights Management Systems. 1-5 - Dongliang Xuan, Huaping Hu, Bidong Wang, Bo Liu:

Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection. 1-5 - Zihao Liu, Yanrui Xu, Xiaokun Wang, Xiaojuan Ban, Zhiyu Zheng:

Simulation and visualization of solid-liquid phase transition and interactive using particle-based method. 1-5 - Fangzhe Chen, Zhibin Gao, Zhang Liu, Lianfen Huang, Yuliang Tang:

Code-based Computation Offloading in Vehicular Fog Networks. 1-5 - Ashish Rana, Avleen Malhi:

Building Safer Autonomous Agents by Leveraging Risky Driving Behavior Knowledge. 1-6 - Keiichi Shima

:
Catching Unusual Traffic Behavior using TF-IDF-based Port Access Statistics Analysis. 1-5 - Rajesh Gupta

, Sudeep Tanwar, Mohammad S. Obaidat, Sudhanshu Tyagi, Neeraj Kumar:
Capsule: All you need to know about Tactile Internet in a Nutshell. 1-5 - Xinyi Hu

, Chunxiang Gu, Yihang Chen, Fushan Wei:
tCLD-Net: A Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory Network. 1-5 - Jiayu Wang, Lintao Liu, Jia Chen, Xuehu Yan:

Comparison and analysis of secret image sharing principles. 1-5 - Chandrashekhar Meshram, Mohammad S. Obaidat, Kuei-Fang Hsiao, Agbotiname Lucky Imoize, Akshaykumar Meshram

:
An Effective Fair Off-Line Electronic Cash Protocol using Extended Chaotic Maps with Anonymity Revoking Trustee. 1-5 - Feilong Du

, Xiaojuan Ban, Yalan Zhang
, Zirui Dong, Haojian Duan:
Solid-liquid dual channel data-driven method for Lagrangian fluid simulation. 1-5 - Muhammad Ayaz Khan, Anwar Ghani

, Mohammad S. Obaidat, Pandi Vijayakumar, Khwaja Mansoor, Shehzad Ashraf Chaudhry:
A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System. 1-5 - Matthieu Moreau, Tarek Benkhelif:

DPSGD Strategies for Cross-Silo Federated Learning. 1-5 - Khaled Rabieh, Ahmet Furkan Aydogan, Marianne A. Azer

:
Towards Safer Roads: An Efficient VANET-based Pedestrian Protection Scheme. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














