


default search action
CyberSciTech 2024: Boracay Island, Philippines
- 2024 IEEE Cyber Science and Technology Congress (CyberSciTech), Boracay Island, Philippines, November 5-8, 2024. IEEE 2024, ISBN 979-8-3315-3209-3

- Lugang Nie, Benxiong Huang, Lai Tu:

Traffic Prediction by Integrating Multi-Cycle Features and Spatio-Temporal Correlations. 1-8 - Ziang Lu, Lu Chen, Yong Li, Guangxin Guo, Tengyan Wang:

Attack Path Extraction based on VGAE and DBSCAN. 9-14 - Ning Liu, Fei Dai, Xinzhuo Chai, Guoxi Liu, Xiaoiing Wu, Bi Huang:

Review of Collaborative Inference in Edge Intelligence: Emphasis on DNN Partition. 15-22 - Jiujie Zhang

, Yangfei Lin, Zhaoyang Du, Wugedele Bao:
Fuzzy Logic-Based Deep Reinforcement Learning Pre-Training: A Case Study in MEC Task Offloading. 23-30 - Jianxin Yang, Hui Lin, Xiaoding Wang

:
SarlBFT: Scalable Tree Communication Pattern BFT Protocol. 31-38 - Xintao Pei, Yuling Chen, Yun Luo, Zaidong Li, Jianqi Wei:

Lightweight IoT-Oriented Verifiable Computing Scheme in Cloud Computing Circumstance. 39-44 - Tianci Chen, Hui Lin, Lizhao Wu, Xiaoding Wang

:
Optimized Block-K Clustering IoT Clustering and Blockchain Sharding Strategy Using Deep Reinforcement Learning. 45-51 - Wenlei Zhong, Yu Jiang, Qinglin Yang, Chenlu Zhuansun, Yanbin Sun, Shen Su, Zhihong Tian, Yuan Liu:

Node Betweenness Centrality based Defense Strategy Against Topology Inference Threat: A Static Game Theoretical Perspective. 52-58 - Xinzhuo Chai, Bi Huang, Ning Liu, Guoxi Liu, Xiaojing Wu, Fei Dai:

An Approach to Detecting Reentrancy Vulnerabilities in Interacting Smart Contracts Using Model Checking. 59-66 - Yican Geng, Haoyang Hu, Zhaoxuan Ge, Zhichao Lian:

Network Intrusion Detection Algorithm Based on LightGBM Model and Improved Particle Swarm Optimization. 67-74 - Danyu Xu, Pengchuan Wang, Qianmu Li:

Improving Example Quality in Black Box Hard Label Text Adversarial Attacks. 75-81 - Minyao Liu, Pan Wang, Yingchun Ye, Xuejiao Chen:

Model Uncertainty Based Unsupervised Real-Time Drift Detection in Network Traffic Classification. 82-87 - Zaidong Li, Yuling Chen, Yun Luo, Xintao Pei, Yingqi Qin:

Private Comparison Based on Digital Decomposition for IoT Cloud Environments. 88-93 - Jianqi Wei, Yuling Chen, Yun Luo, Zaidong Li:

Range Proof-Based Noise Filtering Mechanism for loT Differential Privacy. 94-99 - Siman Chen, Wei Liang:

A Study on Adaptive Gradient Clipping Algorithms for Differential Privacy: Enhancing Cyber Security and Trust. 100-106 - Li Yang, Bi Huang, Xinzhuo Chai, Guoxi Liu, Xiaojing Wu, Fei Dai:

Deadlock Analysis of Microservice Systems with Bounded Buffers. 107-114 - Samuel Ndichu

, Tao Ban, Takeshi Takahashi, Akira Yamada, Seiichi Ozawa, Daisuke Inoue:
Adversarial Evaluation of AI-Based Security Alert Screening Systems. 115-124 - Weiyu Wang, Zhuotao Lian, Tianhui Li, Kouichi Sakurai, Chunhua Su:

Privacy-Preserving Parameter Aggregation Scheme Based on Two Leaders for Federated Learning. 125-131 - Jim Alves-Foss, Baby Grace Llego:

Internet Security and Privacy Awareness Among College Students in the Philippines. 132-137 - Weiwei Chen, Jinquan Zuo, Shuai Su, Chi Chen:

A Privacy-Preserving Across-Institution Archives Utilization Framework and Implementation. 138-145 - Marzia Canzaniello

, Sara Amitrano
, Edoardo Prezioso, Fabio Giampaolo, Salvatore Cuomo, Francesco Piccialli:
Leveraging Digital Twins and Generative AI for Effective Urban Mobility Management. 146-153 - Kozaburo Ibuki, Noriaki Kamiyama:

Evacuation Guidance System Using UAVs of Multiple Types at Disaster. 154-159 - Zhaoxiang Huang

, Zhiwen Yu, Zhijie Huang, Erhe Yang, Jiangyan Xu, Bin Guo:
Energy-Efficient Reliable Data Storage Service in Heterogeneous Crowdsensing. 160-167 - Shihua Zhang, Fan He, Xun Shao:

Motion Deblurring by Fusing Multi-Stage Image Features. 168-173 - Chuan Wang, Hua Wang, Jian Bi, Ke Yan:

Short-Term Solar Irradiance Forecasting Based on CNNiTransformer Model. 174-179 - Xiaoming He, Yunzhe Jiang, Huajun Cui, Yinqiu Liu:

Addressee Selection for Multi-Party Conversations in Cyber-Physical-Social Systems. 180-186 - Hao Yu, Wei Sun, Jian Liu, Peng Gao:

Unsupervised Anomaly Behavior Detection in Power Information Network Based on Discriminative Semantic Transformation Sequences. 187-194 - Yuhua Xu, Yan Li, Zhixin Sun:

IoT Intrusion Detection Using SDN Cloud-Edge Collaboration and Ensemble Deep Learning. 195-200 - Ruihao Chen, Hui Lin, Qingxin Lin, Hui Ju:

An Automated Memory Image Forensic Scheme for Linux Systems Based on Containerization Technology. 201-206 - Yuhao Chen, Zengwei Zheng, Jianhua Ma, Binbin Zhou:

A Graph Neural Network with Imbalance-Aware Mechanism for Enhanced Fraud Detection. 207-213 - Jiangyan Xu, Zhiwen Yu, Zhaoxiang Huang

, Lele Zhao, Ziyue Yu, Bin Guo:
CDPP: A Crowdsensing Task Allocation Method Based on Diverse Participant Preferences. 214-221 - Masaki Ito, Noriaki Kamiyama:

Money Adjustment Among ISPs Based on Cooperative Games for ICN Promotion. 222-229 - Jiaqi Wang, Jian Chen, Qun Jin:

Assessing ChatG PT -Generated Comments for Video Content Viewing in Online Learning. 230-237 - Chao Wu, Celimuge Wu, Jiale Wu, Yangfei Lin, Zhaoyang Du, Ha Si, Wugedele Bao:

Bandwidth-Adaptive Semantic Communication System with Non-ROI Image Compression. 238-243 - Jingxin Zhao, Zhenxing Ni, Cuilan Liu, Jiadong Ren, Caiyun Liu, Yuqing Zhang:

Chinese Named Entity Recognition in Industry Domain Based on Lexical Enhancement. 244-249 - LeCheng Li, Xinzhuo Chai, Fei Dai, Shuai Wang, Yueyu Dong, Bi Huang:

STFormer: Spatio- Temporal Transformer Network for Traffic Flow Prediction. 250-257 - Jianhua Ma, Qun Jin, Hui-Huang Hsu, John Paul C. Vergara, Antonio Guerrieri

, Claudio Miceli de Farias, Ao Guo:
Challenges and Emerging Issues for Generative AI and Hyper Intelligence. 258-265 - Cheng Zhou, Xiaojuan Guan, Chen Wang, Wen Ji, Chenhan Lin:

Research on Virtual Resource Scheduling Algorithm Based on Multi-Objective Optimization. 266-271 - Ying Chen, Weihao Guo, Pingyuan Ge, Xiaoji Ma, Yuqing Zhang:

Model Extraction Attacks on Text-to-Image Generative Adversarial Networks. 272-279 - Guoxi Liu, Bi Huang, Ning Liu, Xiaojing Wu, Li Yang, Fei Dai:

Pavement Crack Detection Based on Channel Attention Mechanism. 280-287 - Haotian Wang, Walid Brahim, Jianhua Ma, Muxin Ma, Alex Qi:

Detecting Characteristic Points in Breathing Cycles Using FMCW Radar with Spirometer as Reference. 288-293 - Haikuo Zhang, Weizhen Han, Haiyong Shi, Haiyang Feng, Jin Hu:

Autonomous Decision-Making in Roundabouts Using Deep Reinforcement Learning and Heuristics Rules. 294-299 - Haiyang Feng, Weizhen Han, Haikuo Zhang, Lisha Yang, Meng Xu:

Voltage Prediction of Electric Vehicle Based on Attention Mechanism CNN-GRU Model. 300-305 - Fu Li, Hui Zhang, Zhichao Lian, Shujuan Wang:

Fake News Detection Based on Contrast Learning and Cascading Attention. 306-313 - Yinzhao Zhang, Qianmu Li, Fan Liu:

Improving the Visual Quality of Adversarial Examples for Face Recognition Models. 314-321 - Ce Wang, Qianmu Li:

Stealthy Adversarial Patch for Evading Object Detectors Based on Sensitivity Maps. 322-328 - Jianing Zhao, Qun Jin:

A Two-Stage Depression Recognition Model Based on Improved YOLOv5 and Spatial-Temporal CNN-Transformer Network. 329-334 - Weixiong Zhang, Anton Louise P. De Ocampo, Rowell M. Hernandez:

Detection of Smoking Behaviors Using Human Key Points and YOLOv8. 335-340 - Shixin Huang, Jiawei Luo, Xiaoyu Wan, Xixi Nie:

EvoResUNet: A Lesion Segmentation Network for Primary Liver Cancer from 3D CECT Volume. 341-348 - Riya Mahajan, Yegang Du

, Alexander Schmitz, Gabriele Trovato, Yasuyuki Taki, Shigeki Sugano:
uSkin Pillow: Tactile-Sensor-Based Non-Invasive Approach to Sleep Analysis. 349-354 - Xiaojing Wu, Xinzhuo Chai, Fei Dai, Shuai Wang, Yueyu Dong, Bi Huang:

Improved YOLOv5 for Pavement Patch Detection Using Deformable Convolution and Bidirectional Feature Pyramid Network. 355-362 - Bo He, Yang Gao, Jing Cao, Weining Cai, Xin Ma, Xiaoyu Zhao, Zhichao Lian:

Millimetre-Wave Human Image Dangerous Object Detection Based on Faster R-CNN. 363-368 - Yoshiko Yasumura, Masakazu Fujio, Wataru Nakamura, Kenta Takahashi:

Bio-SSI: Self-Sovereign Identity Bound to Biometrics. 369-377 - Xizhi Yang, Zhichao Lian:

Integrated Evaluation System for Intelligent Model. 378-383 - Chenyu Wu, Ting Zhang, Zhixian Li, Zhichao Lian:

Enhancing Adversarial Patch Effectiveness for Face Recognition Systems Using Sharpness-Aware Minimization. 384-389 - Kuo-Yi Chang, Kun-Lin Li, Ming-Hwa Sheu, Szu-Hong Wang:

DMCGF Dehazing Neural Network Design for Edge-AI Implementation. 390-393 - Yukun Wang, Xingjian Xu, Fanjun Meng:

Deep Knowledge Tracking Model Integrating Multiple Feature Personalization Factors. 394-399 - Shivam Goyal

, Sudhakar Kumar
, Sunil K. Singh
, Brij B. Gupta
, Varsha Arya
, Kwok Tai Chui
:
Intelligent Task Offloading in IoT-Driven Digital Twin Systems via Hybrid Federated and Reinforcement Learning. 400-405 - Anmol Jaiswal, Sunil K. Singh

, Sudhakar Kumar
, Brij B. Gupta, Kwok Tai Chui
:
Advanced Evaluation of Propagation Models and Routing Protocols in Vehicular Ad-Hoc Networks. 406-411 - Wen Ji, Chenhan Lin, Jiang Liu, Hongyang Xu, Liangjie Xu, Jun Hu:

SA-PSO Approach for Optimizing QoS Management in SDN Service Chains. 412-417 - Kaito Kondo, Noriaki Kamiyama:

Analysis of Business Model of Co-Creation Digital-Twin City Using Evolutionary Game. 418-423 - Kwanho Kim, Dokyung Kim, Kanghyun Jo:

DORAC: Dynamic-Objects Removal and Clustering for Object Detection. 424-428 - Chalee Vorakulpipat, Apiwat Chantawibul, Satheanpong Jeungudomporn, Chanchai Techawatcharapaikul, Wachirapong Jirakitpuwapat:

FaceGuard: Enhancing Data Privacy Through Selective Facial Anonymization in Public Events. 429-434 - Minseung Kim, Jongchae Lee, Kanghyun Jo:

Low-Frequency Injection for Performance Boosting of Image Classification. 435-438 - Jongchae Lee, Minseung Kim, Kanghyun Jo:

Descriptor Feature Map for Classification. 439-442 - Jehwan Choi, Youlkyeong Lee, Kanghyun Jo:

Efficient Feature Extraction Model for Surveillance Systems Using Drone Imagery. 443-447 - Seongmin Kim, Kanghyun Jo:

Checking the Neural Networks' Subitizing Ability and Proposing Three Challenges for Human-Like Subitizing. 448-451 - Jae-hyeon Sung, Kanghyun Jo:

3-DoF Pose Estimation of Vehicles on the Road. 452-455 - Houtao Sun, Chuanxin Wen, Chunhu Shi, Qiangsheng Pu, Pengpeng Lv, Fei Luo:

Improved Multi-Objective Simulated Annealing Particle Swarm Algorithm for Siting and Capacity Sizing of Distributed Power Supplies. 456-460 - Ganggui Wang, Celimuge Wu, Yangfei Lin, Zhaoyang Du, Wugedele Bao, Ha Si:

Cross-Layer Performance Analysis of Delay-Doppler Domain Multi-Carrier Modulation for Vehicular Networks. 461-465 - Yuanchen Wang, Kai Zhang, Yiliang Liu, Weilin Song, Jian Tang:

Age of Information Dependent Grant-Free Communication. 466-469 - Yonglin Pu, Xiaolong Xu, Lianyong Qi, Wanchun Dou, Jiong Yu, Ziyang Li:

Duplicate Data Elimination Optimization Strategy Based on Edge Service Management. 470-475 - Haojia Yang, Qichao Xu:

Fine-Grained Access Control for Lightweight Data Sharing of UAVs. 476-479 - Yizhi Pan, Kai Li, Jinghao Wu, Han Shu

, Feihe Shao, Junyi Xin, Guanqun Sun:
Sequence-Integrated Radiology Report Generation Leveraging Positional Encoding for Text and Images. 480-484 - Dong Wang, Guoyuan Zhou, Jinglue Xu, João Eduardo Batista, Jia Guo, Hitoshi Iba:

A PSO-CNN-BiLSTM Model for Predicting Leaf Area Index. 485-490 - Zhiying Huang, Yuang Meng, Ao Guo, Walid Brahim, Jianhua Ma:

Leveraging ECG Signal for People Identification under Different Emotion States. 491-495 - Xiaolin Wu, Shuliang Zhu, Jinjia Zhou, Raymond Yao:

Paradigm Shift in Foreign Language Teaching Practices in the Age of AI - Case Studies of Chinese and Japanese Learners. 496-501 - Xin Tong, Akinori Nagata, Kimiya Fujisawa:

Analyzing the Impact of Effect Sounds on Real-World Human Emotions and Behaviors by Adding Effect Sounds to Human Actions. 502-505 - Haojie Wang, Luyang Wang, Yishui Zhu, Jun Wang, Bo Wu

:
Analyzing Eye-Movements of Drivers with Varying Levels of Experience During U-Turn Segment. 506-511 - Nikhil Kumar Agarwal, Gurkiran Singh Batra, Dhrumik Mukeshbhai Patel, Eslam G. AbdAllah:

Impacts of Internet of Things (IoT) Leveraging Radio Frequency Identification (RFID) and Internet Protocol (IP) on Business Continuity (BC) and Disaster Recovery (DR). 512-517 - Yu Qi, Siyu Xiong, Chongyang Zhang, Bo Wu

:
Analyzing the Imitation Behaviors of Gorilla Chest-Beating Based on Human Pose Estimation. 518-522 - Xiangyu Su, Siyu Xiong, Bo Wu

:
A New Smart Glasses-Based Dual Authentication System via Signature Image Recognition Handwriting Behaviors Identification. 523-528 - Tao Zhou

, Tianle Hu, Hong Chen:
Investigating Decentralized Management of Wearable Device Data for Health. 529-533 - Xin Liu, Rui Wang, Rui Xing, Donglan Liu, Fangzhe Zhang, Lili Sun:

Delay-Tolerant Computation Offloading in Vehicular Networks Based on Local Blockchain. 534-539 - Yu Su, Qianqian Cheng, Ziyang Liu:

Integrated Sensing and Communication for UAV Detection: A Reinforcement Learning-based Approach. 540-543 - Han Liu, Baoyu An, Yaoyao Yin, Xueyang Huo, Zhou Su, Yuntao Wang:

A Trust Evaluation and Concept Drift-Based Approach for Dynamic APT Evasion Detection. 544-547 - Robert Seeliger, Martin Lasak, Görkem Güçlü, Stefan Arbanowski, Stephan Steglich:

Towards Green Video: Energy-Saving Potentials in Streaming. 548-553 - Yuanhong Wu, Isaiah Smith, Tushar Marwah, Michael Schroeter, Mohamed Rahouti, D. Frank Hsu:

NCAA Bracket Prediction Uing Machine Learning and Combinatorial Fusion Analysis. 554-561

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














