


default search action
ICBDS 2019: Nanjing, China
- Yuan Tian

, Tinghuai Ma
, Muhammad Khurram Khan
:
Big Data and Security - First International Conference, ICBDS 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers. Communications in Computer and Information Science 1210, Springer 2020, ISBN 978-981-15-7529-7
Cybersecurity and Privacy
- Yanfeng Shi, Shuo Qiu, Jiqiang Liu:

An Efficient Lattice-Based IBE Scheme Using Combined Public Key. 3-16 - Wenxi Wang, Weilong Zhang, Jin Zhang, Keyan Sun, Runlin Zou, Chenrong Huang, Yuan Tian:

A Novel Location Privacy Protection Scheme with Generative Adversarial Network. 17-27 - Najla Al-Nabhan:

Security, Safety and Privacy Issues of Unmanned Aerial Vehicle Systems. 28-39 - Yonghua Gong, Lei Chen:

A Trust Model for Evaluating Trust and Centrality Based on Entropy Weight Method in Social Commerce. 40-50 - Yueqiang Xu, Tero Päivärinta, Pasi Kuvaja:

Digital Twins as Software and Service Development Ecosystems in Industry 4.0: Towards a Research Agenda. 51-64 - Xinyu Liu, Xin Zhang, Qianyun Miao:

A Click Fraud Detection Scheme Based on Cost-Sensitive CNN and Feature Matrix. 65-79 - Shengxu Xie, Chang-you Xing, Guomin Zhang, Jinlong Zhao:

Research on Table Overflow Ldos Attack Detection and Defense Method in Software Defined Networks. 80-97 - A. Ayoub, Vidyasagar M. Potdar, A. Rudra, Hoa Luong

:
Human Factors Affecting XBRL Adoption Success in Lebanese Small to Medium-Sized Enterprises. 98-115 - A. Ayoub, Vidyasagar M. Potdar, A. Rudra, Hoa Luong

:
Impact of Nepotism on the Human Resources Component of ERP Systems Implementation in Lebanon. 116-134 - Miada Murad, Yuan Tian, Mznah Al-Rodhaan:

Computationally Efficient Fine-Grain Cube CP-ABE Scheme with Partially Hidden Access Structure. 135-156 - A. Ayoub, Vidyasagar M. Potdar, A. Rudra, Hoa Luong

:
The Impact of Organizational Culture on the Internal Controls Components of Accounting Information Systems in the City of Beirut, Lebanon. 157-177 - Congdong Lv, Yucai Li:

A Security Vehicle Network Organization Method for Railway Freight Train Based on Lightweight Authentication and Property Verification. 178-189 - Yongbing Lian, Xiaogang Wei:

Lightweight Identity Authentication Scheme Based on IBC Identity Cryptograph. 190-198 - Guangyao Yuan, Lihong Guo, Gang Wang:

Security Analysis and Improvement on Kerberos Authentication Protocol. 199-210 - Zongsheng Lv, Kaiwen Huang, Yuanzhi Wang, Ruikang Tao, Guanghan Wu, Jiande Zhang, Yuan Tian:

Distributed Differential Privacy Protection System for Personalized Recommendation. 211-222 - Haiyan Sun, Lingling Li, Jianwei Zhang, Wanwei Huang:

An Improved Dynamic Certificateless Authenticated Asymmetric Group Key Agreement Protocol with Trusted KGC. 223-237 - Yubin Liu, Ming Pang:

Research on Medical Image Encryption Method Based on Chaotic Scrambling and Compressed Sensing. 238-246 - Li Wang, Xin Shu, Wei Zhang, Yunfang Chen:

Design and Optimization of Evaluation Metrics in Object Detection and Tracking for Low-Altitude Aerial Video. 247-262 - Tianxu Sun, Yunlong Zhao, Zuowei Lian:

People Flow Analysis Based on Anonymous OD Trip Data. 263-273 - Muhammad Ovais Ahmad:

Agile Methods and Cyber-Physical Systems Development - A Review with Preliminary Analysis. 274-285 - Lina Pan, Bo Zhang:

Optimizing the Reservoir Connection Structure Using Binary Symbiotic Organisms Search Algorithm: A Case Study on Electric Load Forecasting. 286-297 - Runtong Zou, Xuecheng Zhang, Wei Jiang, Linfeng Liu:

On the Character Relations Between Nodes for Data Forwarding in Mobile Opportunistic Networks. 298-308 - Shanyu Bi, Junyao Zhang, Weiwei Kong, Long Liu, Pengpeng Lv:

Research on Interference of LTE Wireless Network in Electric Power System. 309-318 - Zewei Tang, Chengzhi Jiang:

Research on High Reliability Planning Method in Electric Wireless Network. 319-329 - Yu Chen, Kun Liu, Ziqian Zhang:

Research on Service Support Ability of Power Wireless Private Network. 330-339 - Zhan Shi, Chenrong Huang, Xiaoqin Zeng, Jiande Zhang, Lei Han, Ying Qian:

A Method of UML Sequence Diagram Verification Based on a Graph Grammar. 340-351 - Yuexiao Cai, Yunlong Zhao, Jinqian Yang, Changxin Wang:

A Bus Passenger Flow Estimation Method Based on POI Data and AFC Data Fusion. 352-367
Big Data
- Yi Chen, Zhuoran Yang, Zhicong Ye, Hui Liu:

Research Character Analyzation of Urban Security Based on Urban Resilience Using Big Data Method. 371-381 - Alaa A. Alwabel:

Privacy Issues in Big Data from Collection to Use. 382-391 - Lihong Guo, Haitao Wu, Jie Yang:

Trusted Query Method Based on Authorization Index and Triangular Matrix in Big Data. 392-401 - Liyuan Tang, Haoren Hu, Zhonghua Wang, Jiansheng Wang, Yahui Li:

Microservice Architecture Design for Big Data in Tactical Cloud. 402-416 - Hai Yu, Zi-Xuan Li, Yu-Yan Jiang

:
Using GitHub Open Sources and Database Methods Designed to Auto-Generate Chinese Tang Dynasty Poetry. 417-428 - Zelei Hou, Chao Huang, Jiagao Wu, Linfeng Liu:

Distributed Image Retrieval Base on LSH Indexing on Spark. 429-441
Blockchain and Internet of Things
- Dawei Li, Xue Gao:

A Blockchain Based Terminal Security of IoT. 445-454 - Abubakar Mohammed, Vidyasagar M. Potdar, Li Yang:

Key Factors Affecting Blockchain Adoption in Organizations. 455-467 - Najla Al-Nabhan:

An IoT-Based Congestion-Aware Emergency Evacuation Approach. 468-478 - Najla Al-Nabhan, Aseel Bin Othman, Anura Jayasumana, Mahindre Gunjan:

Directional Virtual Coordinate Approach for 3-D IoT Systems in Smart Cities. 479-498
Security in Cloud and Fog Computing
- Shadan AlHamed, Mznah AlRodhaan, Yuan Tian:

Privacy Preservation of Future Trajectory Using Dummy Rotation Algorithm in Fog Computing. 501-513 - Yuanfei Tu, Qingjian Su, Yang Geng:

Enabling Secure and Efficient Data Sharing and Integrity Auditing for Cloud-Assisted Industrial Control System. 514-528 - Pei Sun, Baojing Chen, Shaocong Han, Huizhong Shi, Zhenwei Yang, Xing Li:

An Evolutionary Task Offloading Schema for Edge Computing. 529-540 - Chengzhi Jiang, Song Deng:

Data Leakage Prevention System for Smart Grid. 541-549
Artificial Intelligence/Machine Learning Security
- Anwar Ullah, Muhammad Zubair Asghar

, Anam Habib, Saiqa Aleem, Fazal Masud Kundi, Asad Masood Khattak:
Optimizing the Efficiency of Machine Learning Techniques. 553-567 - Yunfang Chen, Li Wang, Dehao Qi, Wei Zhang:

Community Detection Based on DeepWalk in Large Scale Networks. 568-583 - Rahman Ali, Asmat Ali, Farkhund Iqbal, Asad Masood Khattak, Saiqa Aleem:

A Systematic Review of Artificial Intelligence and Machine Learning Techniques for Cyber Security. 584-593 - Shuaicheng Pan, Lei Han, Yi Tao, Qingyu Liu:

Study on Indicator Recognition Method of Water Meter Based on Convolution Neural Network. 594-602 - Najwa Altwaijry

, Ameerah ALQahtani
, Isra Alturaiki
:
A Deep Learning Approach for Anomaly-Based Network Intrusion Detection. 603-615 - Haiyong Wang, Weizheng Guan, Kaixin Zhang:

Over-Sampling Multi-classification Method Based on Centroid Space. 616-632 - Ming Jin, Chenchen Dou, Peichun Pan, Ming Wan, Biying Sun, Wenxuan Zhang:

A Blockchain-Based IoT Workflow Management Approach. 633-644 - Xiaogang Wei, Yongbing Lian:

Research on Identity-Based Cryptograph and Its Application in Power IoT. 645-654

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














