


Остановите войну!
for scientists:
DASC/PiCom/CBDCom/CyberSciTech 2019: Fukuoka, Japan
- 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2019, Fukuoka, Japan, August 5-8, 2019. IEEE 2019, ISBN 978-1-7281-3024-8
The 4th IEEE Cyber Science and Technology Congress (CyberSciTech 2019)
CyberSciTech 2019 Regular Papers
- Boyu Sun, Min Dong, Kaihong Yang, Sheng Bi:
A Design of High-Performance Streetlights Management System. 1-6 - Sarah Fallmann, Liming Chen
, Feng Chen:
A Home-Based IoT-Enabled Framework for Sleep Behaviour Assessment. 7-15 - Xiaoheng Deng, Huan Chen, Ruting Cai, Feng Zeng, Guangquan Xu, Honggang Zhang:
A Knowledge-Based Multiplayer Collaborative Routing in Opportunistic Networks. 16-21 - Sen Liu, Liwen Liu, Xuyan Liu, Yuping Wang, Baoming Bai:
A New Evolutionary Algorithm Based on Self-Adaptive Grouping and Efficient Resource Allocation. 22-27 - Shihan Bao, Ao Lei, Haitham S. Cruickshank, Zhili Sun, Philip Michael Asuquo, Waleed Hathal:
A Pseudonym Certificate Management Scheme Based on Blockchain for Internet of Vehicles. 28-35 - Fan Zhou, Zhongyang Han, Jun Zhao, Wei Wang:
A Spark-Based Approach for High-Efficiency Embedded Feature Selection. 36-43 - Lai Tu, Zhen Ma, Benxiong Huang:
Analysis and Prediction of Differential Parking Behaviors. 44-49 - Jossie Murcia Triviño, Sebastián Moreno Rodríguez, Daniel O. Díaz López, Félix Gómez Mármol:
C3-Sex: a Chatbot to Chase Cyber Perverts. 50-57 - Kenichi Kourai, Yuji Shiota:
Consistent Offline Update of Suspended Virtual Machines in Clouds. 58-65 - Bo Wu, Shoji Nishimura, Qun Jin, Yishui Zhu:
Culture-Based Color Influence Paths Analysis by Using Eye-Tracking Devices. 66-71 - Ke Yan
, Jun Hua:
Deep Learning Technology for Chiller Faults Diagnosis. 72-79 - Mahbub Murshed, M. Ali Akber Dewan, Fuhua Lin, Dunwei Wen:
Engagement Detection in e-Learning Environments using Convolutional Neural Networks. 80-86 - Hairui Zou, Chaoxian Chen, Changjian Zhao, Bo Yang
, Zhongfeng Kang
:
Hybrid Collaborative Filtering with Semi-Stacked Denoising Autoencoders for Recommendation. 87-93 - Wei He, Jing Wang, Beng Wu, Hui Luan, Huaqing Liang, Chong Chen:
IoT Nodes Equipment Selection Based on MADM: A Case Study of Groundwater Quality Detection Equipment. 94-100 - Jiandong Li, Runhe Huang, Kevin I-Kai Wang, Jiannong Cao:
KID Model Realization Using Memory Networks for Text-Based Q/A Analyses and Learning. 101-108 - Xiangjie Kong
, Linyan Wen, Jing Ren, Mingliang Hou, Minghao Zhang, Kang Liu, Feng Xia:
Many-to-Many Collaborator Recommendation Based on Matching Markets Theory. 109-114 - Linjing Wei, Wenke Dong, Yangping Wang, Shirun Gan:
Multi-trait Selection Model of Dairy Cow Based on the Mixed Leapfrog Algorithm. 115-120 - Masato Shimokubo, Runhe Huang, Kevin I-Kai Wang:
Pop-up Recommended Illustrations for E-Book Readers Using Text Analysis Techniques. 121-127 - Xu Yuan, Jianing Zhang, Zhikui Chen, Jing Gao, Peng Li:
Privacy-Preserving Deep Learning Models for Law Big Data Feature Learning. 128-134 - Yangping Wang, Xinlei Ren, Zhengping Zhu, Decheng Gao:
Research on Temporary Building Monitoring of Railway Construction Based on Remote Sensing Image. 135-141 - Chenlei Liu, Wenhan Tao, Chencong Zhao, Xinwan Li, Yaning Su, Zhixin Sun:
Research on Vehicle Routing Problem with time Windows Based on the Dragonfly Algorithm. 142-148 - Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
Searchable Encryption Using Secret-Sharing Scheme for Multiple Keyword Search Using Conjunctive and Disjunctive Searching. 149-156 - Linjing Wei, Wenke Dong, Yangping Wang, Shirun Gan:
Study on Quantization Decision Algorithm for Feature Matching of Turf Grass Introducing. 157-162 - Linjing Wei, Wenke Dong, Shirun Gan, Yangping Wang:
Study on the Matching Algorithm of Turf Grass Introduction Features Based on Big Data Analysis. 163-169 - Riku Anegawa, Masayoshi Aritsugi:
Text Detection on Books Using CNN Trained with Another Domain Data. 170-176 - Nicolas Tsapatsoulis
, Vasiliki Anastasopoulou, Klimis S. Ntalianis:
The Central Community of Twitter ego-Networks as a Means for Fake Influencer Detection. 177-184 - Ao Guo, Jianhua Ma, Kevin I-Kai Wang:
Towards Integrative Personal Character Modeling Using Multi-strategy Fusion Across Scenarios and Periods. 185-192 - Hanwen Feng
, Jianwei Liu, Qianhong Wu, Tongge Xu:
Two-Layer Group Signature and Application to E-Cash. 193-200 - Qun Jin, Zhi Li:
Visualization Design Based on Personal Health Data and Persona Analysis. 201-206 - Jintak Park, King Ma, Henry Leung:
Prediction of Stock Prices with Sentiment Fusion and SVM Granger Causality. 207-214
CyberSciTech 2019 Work-in-Progress Papers
- Abdelkarim Ben Sada, Mohammed Amine Bouras
, Jianhua Ma, Runhe Huang, Huansheng Ning
:
A Distributed Video Analytics Architecture Based on Edge-Computing and Federated Learning. 215-220 - Marat Zhanikeev:
A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge. 221-227 - Yalan Jiang, Lingzhi Yi, Lu Zhu, Zhenkun Jin, Xianjun Deng, Minghua Wang, Yong Liu, Xiangyang Li:
A Novel Strategy for Barrier Confident Information Coverage in Sensor Networks. 228-231 - Chenlei Liu
, Feng Xiang, Pan Wang, Zhixin Sun:
A Review of Issues and Challenges in Fog Computing Environment. 232-237 - Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai:
A Sequential Scheme for Detecting Cyber Attacks in IoT Environment. 238-244 - Eduardo Manuel Silva Machado, Ivan Carrillo, David Saldana, Liming Chen
:
An Assistive Augmented Reality-based Smartglasses Solution for Individuals with Autism Spectrum Disorder. 245-249 - Xize Liu, Tie Qiu, Chen Chen, Huansheng Ning
, Ning Chen:
An Incremental Broad Learning Approach for Semi-Supervised Classification. 250-254 - Sornxayya Phetlasy, Satoshi Ohzahata, Celimuge Wu, Toshihito Kato:
Applying SMOTE for a Sequential Classifiers Combination Method to Improve the Performance of Intrusion Detection System. 255-258 - Karoline Moholth McClenaghan, Ole Christian Moholth:
Computational Model for Wearable Hardware Commodities. 259-265 - Shiquan Dong, Fadi Farha
, Shan Cui, Jianhua Ma, Huansheng Ning
:
CPG-FS: A CPU Performance Graph Based Device Fingerprint Scheme for Devices Identification and Authentication. 266-270 - Khawla Alhasan, Suleiman Onimisi Aliyu, Liming Chen
, Feng Chen:
ICA-Based EEG Feature Analysis and Classification of Learning Styles. 271-276 - Chengxin Zhang, Huiquan Zhang, Di He, Fei Hao:
Evaluation Approach Based upon Knowledge Delivery Process in Smart Teaching Environment. 277-281 - Cheng Wang, Xin Liu, Xiaokang Zhou, Rui Zhou, Dong Lv, Qingquan Lv, Mingsong Wang, Qingguo Zhou:
FalconEye: A High-Performance Distributed Security Scanning System. 282-288 - Hongbiao Gao, Jianbin Li, Jingde Cheng:
Industrial Control Network Security Analysis and Decision-Making by Reasoning Method Based on Strong Relevant Logic. 289-294 - Bidi Ying, Amiya Nayak:
Location Privacy Protection Method Based on a Proxy in Un-Trusted Mobile Social Networks. 295-300 - Yayuan Tang:
Minimizing Energy for Caching Resource Allocation in Information-Centric Networking with Mobile Edge Computing. 301-304 - Shuo Yu, Yuanhu Liu, Jing Ren, Hayat Dino Bedru, Teshome Megersa Bekele, Liangtian Wan, Feng Xia:
Mining Key Scholars via Collapsed Core and Truss. 305-308 - Yilin Hu, Hang Yin, Binbin Yong, Yunshan Cao, Xing Zhou, Rui Zhou, Qingquan Lv, Mingsong Wang:
Online Ventricular Segmentation System Based on Machine Learning. 309-314 - Masato Kikuchi, Takao Okubo:
Power of Communication Behind Extreme Cybersecurity Incidents. 315-319 - Reza Soltani, Uyen Trang Nguyen, Aijun An:
Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets. 320-325 - Kai Su, Qiangfu Zhao, Po Chun Lien:
Product Surface Defect Detection Based on CNN Ensemble with Rejection. 326-331 - Mehrdad Sharbaf:
Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality Management. 332-337 - Haibo Zhang, Toru Nakamura, Kouichi Sakurai:
Security and Trust Issues on Digital Supply Chain. 338-343 - Hanwen Feng
, Jianwei Liu, Qianhong Wu, Tongge Xu:
Traceable Decentralized Anonymous E-Cash System Against Active Attackers. 344-349 - Keisuke Abe:
Data Mining and Machine Learning Applications for Educational Big Data in the University. 350-355
CyberSciTech 2019 Poster Papers
- Shusei Narumi, Mitsuharu Matsumoto:
A Proposal of Music-Based Personal Authentication System. 356-359 - Toshihiro Uchibayashi, Bernady O. Apduhan, Norio Shiratori, Takuo Suganuma, Masahiro Hiji:
Policy Management Technique Using Blockchain for Cloud VM Migration. 360-362 - Radmila Juric:
Semantic Model for Creating an Instance of the IoT. 363-366 - Ho-Ting Wu, Kai-Wei Ke, Song-Ferng Wang, Po-Hung Chen, Guan-Dee Lee, Chen-Yu Tseng, Chen-Yu Ho:
The Implementation of Wireless Industrial Internet of Things (IIoT) Based Upon IEEE 802.15.4-2015 TSCH Access Mode. 367-369
The 2nd International Workshop on Healthcare with Intelligent Sensing, System, and Data (HISSD)
- Changrui Zhu, Wasim Ahmad:
Emotion Recognition from Speech to Improve Human-Robot Interaction. 370-375 - Jaeyong Jung, Jeonghun Cho, Daejin Park:
Energy-Efficient Signal Processors with Silent Mirror Tracer for Long-Term Activity Monitoring. 376-379 - Xinyun Jiang, Wasim Ahmad:
Hand Gesture Detection Based Real-Time American Sign Language Letters Recognition using Support Vector Machine. 380-385 - Hua Li
, Cheng Yang, Zhilin He, Muhammad Ali Imran
, Wasim Ahmad:
Health Activities Monitoring and Warning System for Geriatric Daily Living in Extra Care Homes. 386-391 - Whenhao Cheng, Yuxiang Guo, Pengting Chen, Yue Pang, Xinyun Jiang, Wasim Ahmad:
Inertial Sensors to Detect Multiple Gait Disorders. 392-396 - Jiaye Yang, Yanjun Liu, Yanjun Chen, Huiyang Nie, Zhanqiu Wang, Xu Liu, Muhammad Ali Imran
, Wasim Ahmad:
Assistive and Monitoring Multifunctional Smart Crutch for Elderly. 397-401 - Abdoalbaset Abohmra, Sophia Ramani, Abubakar Sharif, Muhammad Ali Imran
, Qammer H. Abbasi
, Wasim Ahmad:
Novel Flexible and Wearable 2.4 GHz Antenna for Body-Centric Applications. 402-405
The 1st International Workshop on Big Data Analytics for Cyber Security and Defence (BCSec)
- Yuanming Zhang, Shuo Zhang, Yuchao Zhang, Jing Tao, Pinghui Wang:
A Large-Scale Empirical Study of Internet Users' Privacy Leakage in China. 406-411 - Chengling Chen, Zhou Su, Weiwei Li, Yuntao Wang:
Big Data Driven Computing Offloading Scheme with Driverless Vehicles Assistance. 412-416 - Ting Han, Yuanming Zhang, Hezhen Li, Xiaoyu Zhang, Jing Tao:
Large-Scale Network Traffic Analysis and Retrieval System Using CFS Algorithm. 417-421 - Jingyuan Liu, Wei Li, Tao Qin, Liang Zhao, Yuli Gao, Wenqiang Ma:
User Identification Cross Multiple Social Media Platform with Revised Input Output Network Embedding Framework. 422-426
Special Session on Cyber Social Computing and Cyber-EnabledApplications (CSC&CEA)
- Yongze Lin, Xinyuan Zhang, Liting Xia, Yue Ren, Weimin Li:
A Hybrid Algorithm for Influence Maximization of Social Networks. 427-431 - Dehua Chen, Chuang Ma, Yunying Wu:
Clinical Knowledge Graph Embeddings with Hierarchical Structure for Thyroid Treatment Recommendation. 432-436 - Guijiang Wang, Jiulei Jiang, Weimin Li, Can Wang
:
Influence Maximization Based on Node Attraction Model. 437-441 - Furong Chang, Bofeng Zhang, Songxian Wu, Yue Zhao, Bingchun Li, Jiarila Maimaitiriyimu:
OCDAD: An Overlapping Community Detecting Algorithm using Attention Degree in Directed Ex-EgoNet. 442-448 - Panqing Zhang, Jiulei Jiang, Zhanyou Ma, Heng Zhu:
Quantitative µ-Calculus Model Checking Algorithm Based on Generalized Possibility Measures. 449-453
Special Session on Computing and Applications for Cyber Internet of Things (CyberIoT)
- Bahman A. Sassani Sarrafpour, Andrew David, Xiaosong Li, Farhad Mehdipour:
AgentPi: An IoT Enabled Motion CCTV Surveillance System. 454-458 - Yuxiang Lv, Hao Qin, Zhiwei Liu, Yawen Dong, Wenjiang Feng, Weiyang Xu:
An Efficient Synchronization Algorithm in OFDM-Based NB-IoT Systems. 459-464 - Jian Zhou, Yu Su, Penglin Li:
An Emergency Mobile Communication System Based on Fixed-Wing Drone and Satellite Transmission Access. 465-470 - Wenjiang Feng, Yuxiang Lv, Qing Wu, Yajuan Guo, Zhiwei Liu, Xiaolong Bao:
Joint Power Control and Pilot Assignment Algorithm in Multi-cell Multi-user Massive MIMO Systems. 471-477
Special Session on Cyber System Security and Intelligence (CSSI)
- Kaiqiang Liu, Bin Wang, Yuan Liu, Ranfeng Wu, Xun Zhang, Xin Liu, Qiang Zhang, Zhixiang Yin:
An IGS Algorithm Applied to DNA Sequence Design. 478-482 - Chuan Luo, Tianrui Li, Zhang Yi:
An Incremental Feature Selection Approach Based on Information Entropy for Incomplete Data. 483-488 - Kexiong Dong, Weiwei Luo, Xiaohua Pan, Jianwei Yin:
An Internet Medical Care-Oriented Service Security Open Platform. 489-492 - Bahman A. Sassani Sarrafpour, Rosario Del Pilar Soria Choque, Blake Mitchell Paul, Farhad Mehdipour:
Commercial Security Scanning: Point-on-Sale (POS) Vulnerability and Mitigation Techniques. 493-498 - Yanlin Yang, Zhonglin Ye, Haixing Zhao, Lei Meng:
Link Prediction Based on Gravitational Field of Complex Network. 499-504 - Yuechao Zhang, Jianxin Zhang, Chao Che, Kai Lin, Dongsheng Zhou, Qiang Zhang, Xiaopeng Wei:
Pulmonary Nodule Detection Based on Multi-branch 3D Squeeze-and-Excitation Network. 505-509 - Yudai Xue, Jinsong Wang, Yuemin Ding
, Honghao Zhang:
Research on Security Testing and Simulation Platform of Smart Grid Substation System. 510-515 - Xiaorong Pu, Kun Long, Kecheng Chen, Mei Xie, Jiancheng Lv, Dezhong Peng:
A Semantic-Based Short-Text Fast Clustering Method on Hotline Records in Chengdu. 516-521 - Jixiang Guo, Lei Zhang, Yuanyuan Chen, Wei Tang:
An Interactive System for Detection and Analysis of Mandibular Cystic Lesions. 522-526 - Lei Shi, Kunpeng Wang, Zhen Liu:
Design, Development and Testing of a Wearable sEMG Acquisition System. 527-532
Special Session on the Impact of Internet of Things on the Future Elderly Care (IoTonFEC)
- Bo Wu, Yuan Wu, Yoko Aoki, Shoji Nishimura, Masayuki Kashiwagi:
A Study on the Reduction of Mowing Work Burden for Maintaining Landscapes in Rural Areas: Experiment Design for Mowing Behaviors Analyze. 533-536 - Wenjie Diao, Zhigang Gao, Ruichao Xu, Yunfeng Xie, Ke Yan
, Hongyi Guo:
Life Assistants for the Elderly Based on Mobile Devices. 537-542 - Hong Chen
:
Ubi-Care: a Decentralized Ubiquitous Sensing Healthcare System for the Elderly Living Support. 543-547
The 17th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2019)
DASC 2019 Regular Papers
- Chih-Wen Ou, Fu-Hau Hsu, Chia-Min Lai:
Keep Rogue IoT Away: IoT Detector Based on Diversified TLS Negotiation. 548-555 - Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel:
Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold. 556-563 - Linus Karlsson, Nicolae Paladi:
Privacy-Enabled Recommendations for Software Vulnerabilities. 564-571 - Tomonori Morikawa, Kenichi Kourai:
Low-Cost and Fast Failure Recovery Using In-VM Containers in Clouds. 572-579 - Fabio Martinelli, Mina Sheikh Alishahi:
Distributed Data Anonymization. 580-586 - Md. Arafatur Rahman
, Marufa Yeasmin Mukta
, Abu Yousuf, A. Taufiq Asyhari
, Md. Zakirul Alam Bhuiyan, Che Yahaya Yaakub:
IoT Based Hybrid Green Energy Driven Highway Lighting System. 587-594 - Richard McWilliam, Philipp Schiefer, Alan Purvis, Samir Khan:
Stuck-at Fault Resilience using Redundant Transistor Logic Gates. 595-601 - Rabeya Bosri, Abdur Razzak Uzzal, Abdullah Al Omar
, A. S. M. Touhidul Hasan
, Md. Zakirul Alam Bhuiyan:
Towards a Privacy-Preserving Voting System Through Blockchain Technologies. 602-608 - Gerardo Iovane, Michele Nappi, Marta Chinnici
, Alfredo Petrosino, Aniello Castiglione, Silvio Barra:
A Novel Blockchain Scheme Combining Prime Numbers and Iris for Encrypting Coding. 609-618 - Aniello Castiglione, Giovanni Cozzolino, Vincenzo Moscato, Giancarlo Sperlì:
Analysis of Community In Social Networks Based on Game Theory. 619-626
DASC 2019 Work-in-Progress
- Hyeongyun Moon, Jeonghun Cho, Daejin Park:
Reconfigurable Fault-Safe Processor Platform Based on RISC-V for Large-Scaled IoT-Driven Applications. 627-632 - Kousuke Uemura, Satoshi Yamane:
SMT-Based Bounded Model Checking of Embedded Assembly Program with Interruptions. 633-639 - Seong-Kyun Mok, Eun-Sun Cho:
TraceFilter: An Exploitability Analyzer of Vulnerabilities in Binary Code. 640-645 - Mohammad Tahir
, Qazi Mamoon Ashraf, Mohammad Dabbagh
:
Towards Enabling Autonomic Computing in IoT Ecosystem. 646-651 - Paola Barra
, Carmen Bisogni, Antonio Rapuano, Andrea Francesco Abate, Gerardo Iovane:
HiMessage: An Interactive Voice Mail System with the Humanoid Robot Pepper. 652-656
The 18th International Workshop on Assurance in Distributed Systems and Networks (ADSN 2019)
- Masaki Aida, Yuya Kakizawa:
Structural Change Models of Online Social Networks Caused by External Factors Like Mass Media. 657-662 - Yukikazu Nakamoto:
Some Technology Issues in a Connected World. 663-666 - Shinnosuke Murakami, Tomoyuki Ohta, Jürgen Dunkel, Yoshiaki Kakuda:
Evaluation Framework Using Simulator and Mobile Device for Developing Evacuation Route Guidance in MANET-Based Building Evacuation System. 667-671 - Koichi Shin, Haruka Kodama, Masahiro Nishi:
Development of Local Landslide Danger-Related Information Notification System on TV Set for Early Evacuation. 672-676 - Kazuki Uyama, Shinji Inoue, Yoshiaki Kakuda:
A Dynamic System for Forming Convoys Consisting of Connected Vehicles. 677-680 - Eiji Utsunomiya:
Information Propagation that Induces Evacuation Behavior at the Time of Disaster. 681-686