


default search action
ICA3PP 2020: New York City, NY, USA
- Meikang Qiu

:
Algorithms and Architectures for Parallel Processing - 20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2-4, 2020, Proceedings, Part III. Lecture Notes in Computer Science 12454, Springer 2020, ISBN 978-3-030-60247-5
Parallel Computing with Cybersecurity and Blockchain (PCB)
- Yue Zhang, Keke Gai

, Meikang Qiu, Kai Ding:
Understanding Privacy-Preserving Techniques in Digital Cryptocurrencies. 3-18 - Zhengkang Fang

, Keke Gai
, Liehuang Zhu, Lei Xu:
LNBFSM: A Food Safety Management System Using Blockchain and Lightning Network. 19-34 - Haochen Li

, Keke Gai
, Liehuang Zhu, Peng Jiang
, Meikang Qiu:
Reputation-Based Trustworthy Supply Chain Management Using Smart Contract. 35-49 - Zhong Li, Xiaolong Jin, Chuanzhi Zhuang, Zhi Sun:

Content-Aware Anomaly Detection with Network Representation Learning. 50-64 - Kai He, Jiaoli Shi, Chunxiao Huang, Xinrong Hu:

Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree. 65-80 - Anyuan Deng, Jiaoli Shi, Kai He, Fang Xu:

IM-ACS: An Access Control Scheme Supporting Informal Non-malleable Security in Mobile Media Sharing System. 81-92 - Hao Jin, Chen Xu, Yan Luo, Peilong Li:

Blockchain-Based Secure and Privacy-Preserving Clinical Data Sharing and Integration. 93-109 - Keke Gai

, Ziyue Hu, Liehuang Zhu, Ruili Wang, Zijian Zhang
:
Blockchain Meets DAG: A BlockDAG Consensus Mechanism. 110-125 - Zhe Wang, Yi Ren, Jianbo Guan, Ziqi You, Saqing Yang, Yusong Tan:

Dynamic Co-located VM Detection and Membership Update for Residency Aware Inter-VM Communication in Virtualized Clouds. 126-143 - Dongxu Cheng, Jianwei Liu

, Zhenyu Guan, Jiale Hu:
An Attack-Immune Trusted Architecture for Supervisory Intelligent Terminal. 144-154 - Shubin Cai, Huaifeng Zhou, Ningsheng Yang, Zhong Ming:

A Simulation Study on Block Generation Algorithm Based on TPS Model. 155-169 - Pengpeng Shao, Feng Ye, Zihao Liu, Xiwen Wang, Ming Lu, Yupeng Mao:

Improving iForest for Hydrological Time Series Anomaly Detection. 170-183 - Ningwei Li, Hang Gao, Liang Liu, Jianfei Peng:

Machine Learning-Based Attack Detection Method in Hadoop. 184-196 - Qianwen Ye, Chase Q. Wu, Wuji Liu, Aiqin Hou, Wei Shen:

Profiling-Based Big Data Workflow Optimization in a Cross-layer Coupled Design Framework. 197-217 - Jiawei Li, Hua Dai, Yiyang Liu, Jianqiu Xu, Jie Sun, Geng Yang:

Detection of Loose Tracking Behavior over Trajectory Data. 218-230 - Xudong Tang, Qiang Wang, Weikai Miao:

Behavioral Fault Modelling and Analysis with BIP: A Wheel Brake System Case Study. 231-250 - Tianbo Wang, Chunhe Xia:

H2P: A Novel Model to Study the Propagation of Modern Hybrid Worm in Hierarchical Networks. 251-269 - Chenyang Liao, Jiahao Huang, Fangkai Zhou, Yang Lin:

Design of Six-Rotor Drone Based on Target Detection for Intelligent Agriculture. 270-281 - Hao Yin

, Yihang Wei, Yuwen Li, Liehuang Zhu, Jiakang Shi, Keke Gai:
Consensus in Lens of Consortium Blockchain: An Empirical Study. 282-296 - Yu Nie, Yu Liu, Chao Li, Hua Huang, Fubao He, Meikang Qiu:

Collaborative Design Service System Based on Ceramic Cloud Service Platform. 297-308 - Soultana Ellinidou

, Gaurav Sharma, Olivier Markowitch, Jean-Michel Dricot, Guy Gogniat
:
Towards NoC Protection of HT-Greyhole Attack. 309-323 - Yizhong Liu, Jianwei Liu

, Jiayuan Yin, Geng Li, Hui Yu, Qianhong Wu:
Cross-shard Transaction Processing in Sharding Blockchains. 324-339 - Jingying Yang, Xianghua Fu

, Shuxin Wang, Wenhao Xie:
Lexicon-Enhanced Transformer with Pointing for Domains Specific Generative Question Answering. 340-354 - Qiangfei Ma, Hua Huang, Wentao Zhang, Meikang Qiu:

Design of Smart Home System Based on Collaborative Edge Computing and Cloud Computing. 355-366 - Lijuan Duan, Hongli Liu, Huifeng Duan, Yuanhua Qiao, Changming Wang:

Classification of Depression Based on Local Binary Pattern and Singular Spectrum Analysis. 367-380 - Tarek Menouer, Amina Khedimi, Christophe Cérin, Congfeng Jiang:

Cloud Allocation and Consolidation Based on a Scalability Metric. 381-395 - Jia Ding, Zhiwu Xu:

Adversarial Attacks on Deep Learning Models of Computer Vision: A Survey. 396-408 - Yizhong Liu, Jianwei Liu

, Dawei Li, Hui Yu, Qianhong Wu:
FleetChain: A Secure Scalable and Responsive Blockchain Achieving Optimal Sharding. 409-425 - Yuan Liu

, Zhengpeng Ai
, Mengmeng Tian, Guibing Guo
, Linying Jiang:
DSBFT: A Delegation Based Scalable Byzantine False Tolerance Consensus Mechanism. 426-440 - Mengjie Zhang, Xingsheng Zhang, Zhijun Chen, Dunhui Yu:

A Privacy-Preserving Approach for Continuous Data Publication. 441-458 - Yunyi Zhang, Jintian Lu, Shuyuan Jin:

Web Attack Detection Based on User Behaviour Semantics. 459-474 - Wenhao Dai, Xiaozhuo Gu, Yajun Teng:

A Supervised Anonymous Issuance Scheme of Central Bank Digital Currency Based on Blockchain. 475-493 - Yafei Sang, Mao Tian, Yongzheng Zhang, Peng Chang, Shuyuan Zhao:

IncreAIBMF: Incremental Learning for Encrypted Mobile Application Identification. 494-508 - Xingfeng Lv, Jinbao Li:

A Multi-level Features Fusion Network for Detecting Obstructive Sleep Apnea Hypopnea Syndrome. 509-519 - Zhen Lin, Yuchuan Luo, Shaojing Fu, Tao Xie:

BIMP: Blockchain-Based Incentive Mechanism with Privacy Preserving in Location Proof. 520-536 - Yufei Liu, Xuqi Fang, Fengyuan Lu, Xuxin Chen, Xinli Huang:

Indoor Positioning and Prediction in Smart Elderly Care: Model, System and Applications. 537-548 - Xinxin Liu, Hua Huang, Meikang Qiu, Meiqin Liu:

Research on Stylization Algorithm of Ceramic Decorative Pattern Based on Ceramic Cloud Design Service Platform. 549-563 - Yujuan Wen, Fengyuan Lu, Yufei Liu, Peijin Cong, Xinli Huang:

Blockchain Consensus Mechanisms and Their Applications in IoT: A Literature Survey. 564-579 - Bismark Tei Asare

, Kester Quist-Aphetsi, Laurent Nana:
Towards a Secure Communication of Data in IoT Networks: A Technical Research Report. 580-591 - Vishwas Rajashekar

, Ishaan Lagwankar
, Durga Prasad S. N, Rahul Nagpal:
Efficient Thermography Guided Learning for Breast Cancer Detection. 592-600 - Ashish Christopher Victor, Akhilarka Jayanthi, Atul Anand Gopalakrishnan, Rahul Nagpal:

PTangle: A Parallel Detector for Unverified Blockchain Transactions. 601-608 - Hongtao Guan, Xingkong Ma, Siqi Shen:

DOS-GAN: A Distributed Over-Sampling Method Based on Generative Adversarial Networks for Distributed Class-Imbalance Learning. 609-622 - Peiquan Jin, Jianchuan Li, Lin Mu, Jingren Zhou, Jie Zhao:

Effective Sentiment Analysis for Multimodal Review Data on the Web. 623-638 - Danghui Wang, Chen Yue, Ze Tian, Ru Han, Lu Zhang:

An Energy-Efficient AES Encryption Algorithm Based on Memristor Switch. 639-653 - Chuangchuang Dai, Xueying Yang, Meikang Qiu, Xiaobing Guo, Zhonghua Lu

, Beifang Niu:
Digital Currency Investment Strategy Framework Based on Ranking. 654-662 - Sukun Li, Meikang Qiu:

Authentication Study for Brain-Based Computer Interfaces Using Music Stimulations. 663-675 - Lin Chen, Huahui Lv, Kai Fan, Hang Yang, Xiaoyun Kuang, Aidong Xu, Siliang Suo:

An Ensemble Learning Approach to Detect Malwares Based on Static Information. 676-686 - Shaokang Yang

, Jianwei Niu
, Jiyan Wu
, Xuefeng Liu:
Automatic Medical Image Report Generation with Multi-view and Multi-modal Attention Mechanism. 687-699

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














