Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/icbds:"
@proceedings{DBLP:conf/icbds/2022, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-3300-6}, doi = {10.1007/978-981-99-3300-6}, isbn = {978-981-99-3299-3}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/0005JJRJ22, author = {Weijie Chen and Qingshan Jiang and Xibei Jia and Abdur Rasool and Weihui Jiang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {A High-Frequency Stock Price Prediction Method Based on Mode Decomposition and Deep Learning}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {47--62}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_5}, doi = {10.1007/978-981-99-3300-6\_5}, timestamp = {Wed, 13 Sep 2023 16:02:27 +0200}, biburl = {https://dblp.org/rec/conf/icbds/0005JJRJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/CaoHYZY22, author = {Wei Cao and Yang Hu and Shuang Yang and Xue{-}Yang Zhu and Jia Yu}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Security Risk Management of the Internet of Things Based on 5G Technology}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {451--461}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_32}, doi = {10.1007/978-981-99-3300-6\_32}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/CaoHYZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ChenCN22, author = {Tao Chen and Can Cao and Pengcheng Ni}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {An Intelligent IoT Terminal Detection System Based on Data Sniffing}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {677--688}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_49}, doi = {10.1007/978-981-99-3300-6\_49}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ChenCN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ChenZT22, author = {Yu Chen and Ziqian Zhang and Ning Tang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on Digital Twin Technology of Main Equipment for Power Transmission and Transformation Based on Big Data}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {512--523}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_36}, doi = {10.1007/978-981-99-3300-6\_36}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ChenZT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/DaiZLLLF22, author = {Zaojian Dai and Jidong Zhang and Yong Li and Xinyi Li and Ziang Lu and Wengao Fang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on 5G-Based Zero Trust Network Security Platform}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {552--563}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_39}, doi = {10.1007/978-981-99-3300-6\_39}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/DaiZLLLF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/GongJY22, author = {Yuhong Gong and Biao Jin and Zhiqiang Yao}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Privacy Measurement Based on Social Network Properties and Structure}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {537--551}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_38}, doi = {10.1007/978-981-99-3300-6\_38}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/GongJY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/HeCLW22, author = {Jindong He and Rongyan Cai and Shanshan Lei and Dan Wu}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on Privacy Protection Methods for Data Mining}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {609--620}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_44}, doi = {10.1007/978-981-99-3300-6\_44}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/HeCLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/HongHRCHTLWJ22, author = {Jingwei Hong and Ping Han and Abdur Rasool and Hui Chen and Zhiling Hong and Zhong Tan and Fan Lin and Steven X. Wei and Qingshan Jiang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {A Correlational Strategy for the Prediction of High-Dimensional Stock Data by Neural Networks and Technical Indicators}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {405--419}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_29}, doi = {10.1007/978-981-99-3300-6\_29}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/HongHRCHTLWJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/HuGLCLNZ22, author = {Youjun Hu and Lan Gan and E. Longhui and Fangcheng Chu and Yang Lu and Xifan Nie and Fei Zhao}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Virtualized Network Functions Placement Scheme in Cloud Network Collaborative Operation Platform}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {480--492}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_34}, doi = {10.1007/978-981-99-3300-6\_34}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/HuGLCLNZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/HuZHJWY22, author = {Yang Hu and Ming Zhang and Yingli He and Guangxiang Jin and Qi Wei and Jia Yu}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Application of the Fusion Access Technology of Carrier and 5G in Power Communication}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {306--317}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_22}, doi = {10.1007/978-981-99-3300-6\_22}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/HuZHJWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/HuangCYP22, author = {Yongqin Huang and Xushan Chen and Anlian Yang and Shuo Ping}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on Application of Knowledge Graph in War Archive Based on Big Data}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {234--247}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_17}, doi = {10.1007/978-981-99-3300-6\_17}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/HuangCYP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/JiaJF22, author = {Lixin Jia and Lixiu Jia and Lihang Feng}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {A Survey of the State-of-the-Art and Some Extensions of Recommender System Based on Big Data}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {155--171}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_12}, doi = {10.1007/978-981-99-3300-6\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/JiaJF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/JiangLZ22, author = {Haiyang Jiang and Hongtong Liu and Yangfei Zhang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on Data-Driven {AGC} Instruction Execution Effect Recognition Method}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {14--24}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_2}, doi = {10.1007/978-981-99-3300-6\_2}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/JiangLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Li22, author = {Yan Li}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on {BIM} Modeling Technology from the Perspective of Power Big Data Security}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {433--450}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_31}, doi = {10.1007/978-981-99-3300-6\_31}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Li22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LiJ22, author = {Shengqing Li and Jiulei Jiang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Graphlet-Based Measure to Assess Institutional Research Teams}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {200--218}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_15}, doi = {10.1007/978-981-99-3300-6\_15}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LiJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LiuGWCY22, author = {Xiangguo Liu and Jian Geng and Zhonglong Wang and Lingyao Cai and Fanjiao Yin}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Data-Driven Energy Efficiency Evaluation and Energy Anomaly Detection of Multi-type Enterprises Based on Energy Consumption Big Data Mining}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {3--13}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_1}, doi = {10.1007/978-981-99-3300-6\_1}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LiuGWCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LiuZW22, author = {Bo Liu and Lan Zhang and Jinke Wang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on Data Security Storage System Based on Distributed Database}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {586--596}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_42}, doi = {10.1007/978-981-99-3300-6\_42}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LiuZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LuWX22, author = {Ronghua Lu and Yisheng Wu and Feng Xu}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Ordering, Pricing, and Coordination of a Closed-Loop Supply Chain with Risk Preference}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {368--390}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_27}, doi = {10.1007/978-981-99-3300-6\_27}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LuWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LuanJWSZW22, author = {Qiqi Luan and Feng Jiang and Xinping Wang and Qingwu Song and Tianze Zhu and Jiangbin Wang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Design of Ultrasonic-Based Remote Distribution Network Online Security Monitoring Device}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {664--676}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_48}, doi = {10.1007/978-981-99-3300-6\_48}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LuanJWSZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LuoLW22, author = {Chen Luo and Yang Li and Qianxuan Wang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on Data Security Access Control Mechanism in Cloud Computing Environment}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {575--585}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_41}, doi = {10.1007/978-981-99-3300-6\_41}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LuoLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/PengXJY22, author = {Yufang Peng and Hao Xu and Weijian Jin and Haiping Yang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Logical Relationship Extraction of Multimodal South China Sea Big Data Using {BERT} and Knowledge Graph}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {219--233}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_16}, doi = {10.1007/978-981-99-3300-6\_16}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/PengXJY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/PengYPYGG22, author = {Hongsong Peng and Weiwei Yuan and Yimin Pu and Xiying Yang and Donghai Guan and Ran Guo}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {An Explainable Optimization Method for Assembly Process Parameter}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {391--404}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_28}, doi = {10.1007/978-981-99-3300-6\_28}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/PengYPYGG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/QiWWZWHWS22, author = {Feng Qi and Qiang Wang and Xiaoqiang Wei and Yiping Zhang and Wenbin Wu and Donyang He and Taicheng Wang and Suyang Shen}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on Day-Ahead Scheduling Strategy of the Power System Includes Wind Power Plants and Photovoltaic Power Stations Based on Big Data Clustering and Filling}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {25--36}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_3}, doi = {10.1007/978-981-99-3300-6\_3}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/QiWWZWHWS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/QiaoW22, author = {Wenyu Qiao and Jiexi Wang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on Data Watermark Tracing System in Hadoop Environment}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {80--91}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_7}, doi = {10.1007/978-981-99-3300-6\_7}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/QiaoW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/QiuNSX22, author = {Shuo Qiu and Wenhui Ni and Yanfeng Shi and Wanni Xu}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on Attribute-Based Privacy-Preserving Computing Technologies}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {420--432}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_30}, doi = {10.1007/978-981-99-3300-6\_30}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/QiuNSX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ShangJSLD22, author = {Wenbo Shang and Xin Jin and Biying Sun and Xiaoqin Liu and Chunhui Du}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on the Identification Model of Power Terminal}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {701--712}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_51}, doi = {10.1007/978-981-99-3300-6\_51}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ShangJSLD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ShenX22, author = {Wen Shen and Hongzhang Xiong}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {A Mobile Data Leakage Prevention System Based on Encryption Algorithms}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {564--574}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_40}, doi = {10.1007/978-981-99-3300-6\_40}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ShenX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/TangYWYDHWC022, author = {Zhichao Tang and Yan Yan and Dong Wu and Tianhao Yang and Ruixuan Dong and Shuyang Hao and Wei Wang and Yizhi Chen and Yuan Tian}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {A Survey of Integrating Federated Learning with Smart Grids: Application Prospect, Privacy Preserving and Challenges Analysis}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {296--305}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_21}, doi = {10.1007/978-981-99-3300-6\_21}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/TangYWYDHWC022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WangGLZJS22, author = {Xinping Wang and Guofei Guan and Chunpeng Li and Hao Zhang and Chao Jiang and Qingwu Song}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on the Security Diagnosis Platform for Partial Discharge of 10 kV Cables in Urban Distribution Networks}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {637--650}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_46}, doi = {10.1007/978-981-99-3300-6\_46}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WangGLZJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WangGPSZ022, author = {Ziyu Wang and Runda Guan and Xiaokang Pan and Biao Song and Xinchang Zhang and Yuan Tian}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Efficient Spatiotemporal Big Data Indexing Algorithm with Loss Control}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {524--533}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_37}, doi = {10.1007/978-981-99-3300-6\_37}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WangGPSZ022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WangLYBSLY22, author = {Hong Wang and Yang Liu and Chao Yin and Xuesong Bai and Bo Sun and Menglei Li and Xiyong Yang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Day-Ahead Scenario Generation Method for Renewable Energy Based on Historical Data Analysis}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {37--46}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_4}, doi = {10.1007/978-981-99-3300-6\_4}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WangLYBSLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WangLYJLW22, author = {Xinping Wang and Chunpeng Li and Xiaoping Yang and Feng Jiang and Qiqi Luan and Yifan Wang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on the Electromagnetic Sensor-Based Partial Discharge Security Monitoring System of Distribution Network}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {651--663}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_47}, doi = {10.1007/978-981-99-3300-6\_47}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WangLYJLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WangSZ0G22, author = {Jinke Wang and Biao Song and Xinchang Zhang and Yuan Tian and Ran Guo}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {An Innovative AdaBoost Process Using Flexible Soft Labels on Imbalanced Big Data}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {172--184}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_13}, doi = {10.1007/978-981-99-3300-6\_13}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WangSZ0G22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WangW22, author = {Hairong Wang and Qiuchi Wu}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on the Evolution of New Energy Industry Financing Ecosystem Under the Background of Big Data}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {139--154}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_11}, doi = {10.1007/978-981-99-3300-6\_11}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WangW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WangZCHJZ22, author = {Jinhu Wang and Tongzhou Zhang and Ming Chen and Wei Han and Mingze Ji and Yuzhuo Zhang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on Typical Scenario Generation Based on Distribution Network Data Mining and Improved Policy Clustering}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {333--342}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_24}, doi = {10.1007/978-981-99-3300-6\_24}, timestamp = {Thu, 11 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icbds/WangZCHJZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WuZDSZ22, author = {Yunzhao Wu and Jialei Zhang and Qing Duan and Guanglin Sha and Yao Zhang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {A Data-Driven and Deep Learning-Based Economic Evaluation Method for New Power System Distribution Grid}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {343--354}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_25}, doi = {10.1007/978-981-99-3300-6\_25}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WuZDSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/XieC22, author = {Haining Xie and Lijuan Chao}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Fault Detection Method for Power Distribution Network Based on Ensemble Learning}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {262--275}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_19}, doi = {10.1007/978-981-99-3300-6\_19}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/XieC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/XieZW22, author = {Haining Xie and Liming Zhuang and Xiang Wang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Semi-supervised Learning Enabled Fault Analysis Method for Power Distribution Network Based on {LSTM} Autoencoder and Attention Mechanism}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {248--261}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_18}, doi = {10.1007/978-981-99-3300-6\_18}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/XieZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/XuDWH22, author = {Xiaowei Xu and Han Ding and Jiayu Wang and Liang Hua}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Power Network Scheduling Strategy Based on Federated Learning Algorithm in Edge Computing Environment}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {737--747}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_54}, doi = {10.1007/978-981-99-3300-6\_54}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/XuDWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/XuLWPC0L22, author = {Hao Xu and Yiyang Li and Mulan Wang and Yufang Peng and Qinwei Chen and Pengcheng Liu and Yijing Li}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Grounded Theory-Driven Knowledge Production Features Mining: One Empirical Study Based on Big Data Technology}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {493--511}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_35}, doi = {10.1007/978-981-99-3300-6\_35}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/XuLWPC0L22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/XuYXXL22, author = {Honghua Xu and Laibi Yin and Ziqiang Xu and Qian Xin and Mengjie Lv}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Feature Fusion Based {IPSO-LSSVM} Fault Diagnosis of On-Load Tap Changers}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {187--199}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_14}, doi = {10.1007/978-981-99-3300-6\_14}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/XuYXXL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/YangNQSZ0G22, author = {Yuanzhe Yang and Zhiyi Niu and Yuying Qiu and Biao Song and Xinchang Zhang and Yuan Tian and Ran Guo}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {A Cluster-Based Facial Image Anonymization Method Using Variational Autoencoder}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {621--633}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_45}, doi = {10.1007/978-981-99-3300-6\_45}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/YangNQSZ0G22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/YeCLYZC22, author = {Zhiyuan Ye and Cen Chen and Nuannuan Li and Wen Yang and Zheng Zhang and Can Cao}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Intelligent IoT Terminal Software Identification System Based on Behavior Features}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {689--700}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_50}, doi = {10.1007/978-981-99-3300-6\_50}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/YeCLYZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZangXQY22, author = {Mengjie Zang and Lidong Xing and Zhiyu Qian and Liuye Yao}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Muscle Fatigue Classification Based on {GA} Optimization of {BP} Neural Network}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {318--330}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_23}, doi = {10.1007/978-981-99-3300-6\_23}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZangXQY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhangFXYS22, author = {Zhenyu Zhang and Shuming Feng and Min Xiao and Yongcheng Yang and Gangbo Song}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Application of {RFID} Tag in the Localization of Power Cable Based on Big Data}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {92--104}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_8}, doi = {10.1007/978-981-99-3300-6\_8}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhangFXYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhangLXW22, author = {Yan Zhang and Pengcheng Liu and Hao Xu and Mulan Wang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research Hotspots and Evolution Trend of Virtual Power Plant in China: An Empirical Analysis Based on Big Data}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {105--121}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_9}, doi = {10.1007/978-981-99-3300-6\_9}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhangLXW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhangZY22, author = {Lan Zhang and Xiangyang Zhang and Tiejun Yang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Design of an Active Data Watermark Detection System}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {597--608}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_43}, doi = {10.1007/978-981-99-3300-6\_43}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhangZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Zhao22, author = {Di Zhao}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {How Can Social Workers Participate in Big Data Governance? The Third-Party Perspective on Big Data Governance}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {725--736}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_53}, doi = {10.1007/978-981-99-3300-6\_53}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Zhao22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhaoPZL22, author = {Jian Zhao and Mo Peng and Bolin Zhu and Ling{-}Ling Li}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Study on Random Generation of Virtual Avatars Based on Big Data}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {355--367}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_26}, doi = {10.1007/978-981-99-3300-6\_26}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhaoPZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhouLDSG22, author = {Pei Zhou and Xiangyang Luo and Shaoyong Du and Wenqi Shi and Jiashan Guo}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {A Cross-Platform Instant Messaging User Association Method Based on Supervised Learning}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {63--79}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_6}, doi = {10.1007/978-981-99-3300-6\_6}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhouLDSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhouWGGJGH22, author = {Chao Zhou and Ziying Wang and Jing Guo and Yajuan Guo and Haitao Jiang and Zhimin Gu and Wei Huang}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Research on Firmware Vulnerability Mining Model of Power Internet of Things}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {713--724}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_52}, doi = {10.1007/978-981-99-3300-6\_52}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhouWGGJGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhuGWSL22, author = {Daohua Zhu and Yajuan Guo and Lei Wei and Yunxiao Sun and Wei Liu}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Multi Slice {SLA} Collaboration and Optimization of Power 5G Big Data Security Business}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {462--479}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_33}, doi = {10.1007/978-981-99-3300-6\_33}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhuGWSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhuMCLH22, author = {Yuqin Zhu and Wengang Ma and Ling Cong and Chengtao Li and Shixiang Hu}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Influencing Factors Analysis and Prediction Model of Pavement Transverse Crack Based on Big Data}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {122--138}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_10}, doi = {10.1007/978-981-99-3300-6\_10}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhuMCLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhuYZW22, author = {Zhentao Zhu and Wen Yue and Yan Zhang and Qiuchi Wu}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {Factors Influencing Chinese Users' Willingness to Pay for {O2O} Knowledge Products Based on Information Adoption Model}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {276--295}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_20}, doi = {10.1007/978-981-99-3300-6\_20}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhuYZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icbds/2021, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-0852-1}, doi = {10.1007/978-981-19-0852-1}, isbn = {978-981-19-0851-4}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/AljablyA021, author = {Randa Aljably and Mznah Al{-}Rodhaan and Yuan Tian}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Detecting Hybrid Anomalies Using an Unsupervised Approach in Online Social Networks}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {630--642}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_50}, doi = {10.1007/978-981-19-0852-1\_50}, timestamp = {Fri, 08 Sep 2023 09:43:24 +0200}, biburl = {https://dblp.org/rec/conf/icbds/AljablyA021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/AljablyH21, author = {Randa Aljably and Salah Hammami}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Using Multi-criteria Evaluation of E-learning System: {A} Methodology Based on Learning Outcomes}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {563--574}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_44}, doi = {10.1007/978-981-19-0852-1\_44}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/AljablyH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/AljofeyJQ21, author = {Ali Aljofey and Qingshan Jiang and Qiang Qu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {A Supervised Learning Model for Detecting Ponzi Contracts in Ethereum Blockchain}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {657--672}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_52}, doi = {10.1007/978-981-19-0852-1\_52}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/AljofeyJQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Bian21, author = {Tingting Bian}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Financial Risk Analysis and Early Warning Research Based on Crowd Search Algorithm}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {194--202}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_15}, doi = {10.1007/978-981-19-0852-1\_15}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Bian21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ChenLZF21, author = {Yang Chen and Peng Li and Yujie Zhang and Weiqing Fang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {State Machine Inference Method of Unknown Binary Protocol Based on Recurrent Neural Network}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {607--616}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_48}, doi = {10.1007/978-981-19-0852-1\_48}, timestamp = {Mon, 18 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ChenLZF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ChenMWZ21, author = {Yunfang Chen and Haotian Mao and Li Wang and Wei Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Community Detection Based on Deep Network Embedding with Dual Self-supervised Training}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {643--656}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_51}, doi = {10.1007/978-981-19-0852-1\_51}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ChenMWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ChenZT21, author = {Yu Chen and Ziqian Zhang and Ning Tang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Application of Digital Twin in the Security Protection of the Internet of Things in Power System}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {218--229}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_17}, doi = {10.1007/978-981-19-0852-1\_17}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ChenZT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ChenZYLYJ21, author = {Guangyu Chen and Zhengyang Zhu and Li Yang and Gang Lin and Yujiao Yun and Peng Jiang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Power Grid Missing Data Filling Method Based on Historical Data Mining Assisted Multi-dimensional Scenario Analysis}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {360--371}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_27}, doi = {10.1007/978-981-19-0852-1\_27}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ChenZYLYJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/DingWJLZ21, author = {Zhihua Ding and Yijie Wu and Peng Jia and Jiaxing Li and Sijia Zhou}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Load Forecasting Method Considering Data Feature Analysis Based on Bi-LSTM Network}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {256--268}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_20}, doi = {10.1007/978-981-19-0852-1\_20}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/DingWJLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/DongHYTYC21, author = {Ruixuan Dong and Shuyang Hao and Tianhao Yang and Zhichao Tang and Yan Yan and Jianhua Chen}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Recent Advances in Smart Meter: Data Analysis, Privacy Preservation and Applications}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {105--114}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_8}, doi = {10.1007/978-981-19-0852-1\_8}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/DongHYTYC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/FanXCL21, author = {Bin Fan and Zuoling Xie and Haitao Cheng and Peng Li}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Risk Prediction of Diabetic Readmission Based on Cost Sensitive Convolutional Neural Network}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {299--311}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_23}, doi = {10.1007/978-981-19-0852-1\_23}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/FanXCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/FangLZC21, author = {Weiqing Fang and Peng Li and YuJie Zhang and Yang Chen}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Optimization of Fuzzing Test of Unknown Protocol Based on Message Type - Black Box Testing}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {284--298}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_22}, doi = {10.1007/978-981-19-0852-1\_22}, timestamp = {Mon, 18 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/FangLZC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/HaqueHDQJ21, author = {Rakib Ul Haque and A. S. M. Touhidul Hasan and Apubra Daria and Qiang Qu and Qingshan Jiang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Towards Convergence of Blockchain and Self-sovereign Identity for Privacy-Preserving Secure Federated Learning}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {243--255}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_19}, doi = {10.1007/978-981-19-0852-1\_19}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/HaqueHDQJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/He21, author = {Jinrui He}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Civil Aviation Etiquette Robot System Based on Decision Tree Model}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {707--715}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_56}, doi = {10.1007/978-981-19-0852-1\_56}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/He21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/HeZZZHH21, author = {Jing He and Songtao Zhang and Yangfei Zhang and Yong Zheng and Yuqin Hong and Changyi Huang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {A Parameter Identification Method of Wind Turbine System Based on Fuzzy Cuckoo Search Algorithm}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {738--748}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_59}, doi = {10.1007/978-981-19-0852-1\_59}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/HeZZZHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/HuaWWF21, author = {Ke Hua and Zhichao Wang and Baoyin Wu and Maosheng Fu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Data-Driven Distribution Network Energy-Saving Planning Based on Cluster Division and High-Penetration Renewable Energy Access}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {617--629}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_49}, doi = {10.1007/978-981-19-0852-1\_49}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/HuaWWF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/HuangJ21, author = {Kun Huang and Jianlong Jiang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Application of Machine Learning Algorithm in Art Field - Taking Oil Painting as an Example}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {575--583}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_45}, doi = {10.1007/978-981-19-0852-1\_45}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/HuangJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/JiaFC21, author = {Mengxin Jia and Yanfang Fan and Ying Cai}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {A Survey on Task Scheduling Schemes in Mobile Edge Computing}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {426--439}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_33}, doi = {10.1007/978-981-19-0852-1\_33}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/JiaFC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/JiangH21, author = {Jianlong Jiang and Kun Huang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Using Big Data Technology to Analyze the Application of Calligraphy Art in Modern Digital Media}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {388--396}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_30}, doi = {10.1007/978-981-19-0852-1\_30}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/JiangH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Li21, author = {Yulin Li}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Civil Aviation Economic Pricing Based on Equilibrium Game}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {496--506}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_39}, doi = {10.1007/978-981-19-0852-1\_39}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Li21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Li21a, author = {Yulin Li}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Civil Aviation Economic Security Situation Assessment Model Based on Ant Colony Algorithm}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {673--682}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_53}, doi = {10.1007/978-981-19-0852-1\_53}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Li21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Liu21, author = {Pengpeng Liu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Dynamic Simulation Modeling of Chemical Industry Based on Edge Algorithm}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {440--451}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_34}, doi = {10.1007/978-981-19-0852-1\_34}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Liu21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LiuXGLTMZLL21, author = {Wenye Liu and Haiming Xu and Kegui Guo and Nianguo Liu and Xuming Tang and Jianghui Meng and Cifu Zhan and Luyao Li and Pin Lu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Defect Intelligent Identification System Based on Cloud-Fog-Edge Cooperation for {UAV} Electric Power Inspection}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {527--544}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_42}, doi = {10.1007/978-981-19-0852-1\_42}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LiuXGLTMZLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Luo21, author = {Shi{-}Fa Luo}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Active Sampling with Self-supervised Model}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {683--695}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_54}, doi = {10.1007/978-981-19-0852-1\_54}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Luo21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LvSZTL21, author = {Yang Lv and Shiming Sun and Qi Zhao and Jiang Tian and Chun Li}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Intelligent Identification Method of Power Grid Missing Data Based on Improved Generation Countermeasure Network with Multi-dimensional Feature Analysis}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {696--706}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_55}, doi = {10.1007/978-981-19-0852-1\_55}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LvSZTL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Ming21, author = {Zhang Ming}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Resource Allocation of Multi-beam Satellite Based on Big Data Under Rain Fading}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {397--408}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_31}, doi = {10.1007/978-981-19-0852-1\_31}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Ming21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/MuradAKB021, author = {Miada Murad and Sarah Altwaijri and Johara Khabti and Ibtehal Baazeem and Yuan Tian}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Trustworthy Collaborative Trajectory Privacy Scheme for Continuous {LBS}}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {149--170}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_12}, doi = {10.1007/978-981-19-0852-1\_12}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/MuradAKB021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/QiuGLXWC21, author = {Yuxiang Qiu and Lan Gan and E. Longhui and Shunwang Xu and Peng Wei and Yan Cai}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Incomplete Feature Recovery of Cloud Network System Based on Artificial Intelligence}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {461--472}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_36}, doi = {10.1007/978-981-19-0852-1\_36}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/QiuGLXWC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/QiuNTS21, author = {Yuying Qiu and Zhiyi Niu and Qikun Tian and Biao Song}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Privacy Preserving Facial Image Processing Method Using Variational Autoencoder}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {3--17}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_1}, doi = {10.1007/978-981-19-0852-1\_1}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/QiuNTS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Rui21, author = {Ji Rui}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {A Model of Resource Scheduling of Ideological and Political Education in Colleges and Universities Based on Cloud Computing}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {452--460}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_35}, doi = {10.1007/978-981-19-0852-1\_35}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Rui21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ShiLLWZL21, author = {Junjie Shi and Fenggang Lai and Weiliang Li and Huaiyu Wang and Xiaoliang Zhang and Yan Li}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Anomaly Detection of Cloud Network Resource State Based on Deep Learning}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {518--526}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_41}, doi = {10.1007/978-981-19-0852-1\_41}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ShiLLWZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ShiNXYLX21, author = {Yanfeng Shi and Wenhui Ni and Wanni Xu and Wenxiu Yang and Qiong Li and Zekai Xue}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {A Review on Traceable Attribute-Based Encryption}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {137--148}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_11}, doi = {10.1007/978-981-19-0852-1\_11}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ShiNXYLX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ShiYXL21, author = {Yanfeng Shi and Wenxiu Yang and Wanni Xu and Qiong Li}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Outsourced {PSI} Protocols for Privacy Preserving Data Sharing}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {125--136}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_10}, doi = {10.1007/978-981-19-0852-1\_10}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ShiYXL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/SongFC21, author = {Zhiwen Song and Yanfang Fan and Ying Cai}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {A Survey on Service Migration Strategies for Vehicular Edge Computing}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {473--487}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_37}, doi = {10.1007/978-981-19-0852-1\_37}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/SongFC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/TangSYY21, author = {Haowei Tang and Jing Shen and Congying Yao and Juncai Yao}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Anomaly Detection of Smart Meter Based on Big Data Mining}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {380--387}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_29}, doi = {10.1007/978-981-19-0852-1\_29}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/TangSYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Wang21, author = {Huali Wang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on the Evaluation Method of Construction Measurement Uncertainty Based on Edge Algorithm}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {488--495}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_38}, doi = {10.1007/978-981-19-0852-1\_38}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Wang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WangGWZML21, author = {Zhonglong Wang and Jian Geng and Qing Wang and Han Zhang and Weidong Meng and Luyan Li}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research and Judgment of Enterprise Energy Consumption Anomaly Based on Massive Data Clustering Algorithm}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {597--606}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_47}, doi = {10.1007/978-981-19-0852-1\_47}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WangGWZML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WangSY21, author = {Xinlong Wang and Chunxiao Song and Mingdai Yu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Power Security Early Warning System Based on Improved K-means Algorithm}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {73--89}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_6}, doi = {10.1007/978-981-19-0852-1\_6}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WangSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WangWCZ21, author = {Rui Wang and Xueli Wang and Yunfang Chen and Wei Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Design Guidance for Lightweight Object Detection Models}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {203--217}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_16}, doi = {10.1007/978-981-19-0852-1\_16}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WangWCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WangYC21, author = {Jiayuan Wang and Shengbin Yang and Chong Cheng}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Navigation Algorithm Model of Virtual Tourism System Based on {GIS}}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {183--193}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_14}, doi = {10.1007/978-981-19-0852-1\_14}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WangYC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WuLMZPYZ21, author = {Yao Wu and Yong Lu and Chengcheng Ma and Xiuyang Zhang and Ziyang Pan and Xiang Yu and Yameng Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Spinal Posture Recognition Device Using Cloud Storage and {BP} Neural Network Approach Based on Surface Electromyographic Signal}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {507--517}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_40}, doi = {10.1007/978-981-19-0852-1\_40}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WuLMZPYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/XiaCY21, author = {Shangguan Xia and Rongyan Cai and Sheng Ye}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Data Privacy Protection in Power Industry Control System}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {90--104}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_7}, doi = {10.1007/978-981-19-0852-1\_7}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/XiaCY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/XiongCWYW21, author = {Hongzhang Xiong and Jie Cheng and YanJin Wang and Xiaokun Yang and Kuo Wang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Cloud Computing Security Technology of Power System}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {269--283}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_21}, doi = {10.1007/978-981-19-0852-1\_21}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/XiongCWYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Xu21, author = {Junyi Xu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Smart Hotel Management Under the Background of Big Data}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {348--359}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_26}, doi = {10.1007/978-981-19-0852-1\_26}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Xu21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/XuCYFDLC21, author = {Hao Xu and Shihui Chen and Mengxue Yi and Ke Feng and Xi Ding and Yilin Liu and Yiyang Chen}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Methodology-Driven Characteristics of Scientific Research Collaboration Networks in the Field of Economic Management: Mining and Analysis Based on Big Data}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {329--347}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_25}, doi = {10.1007/978-981-19-0852-1\_25}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/XuCYFDLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/YangMZ21, author = {Yu{-}qing Yang and Weiwei Miao and Zeng Zeng}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {The Application of Beidou and Ultra-Broadband Positioning Technology in the Power Security Protection System}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {171--182}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_13}, doi = {10.1007/978-981-19-0852-1\_13}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/YangMZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/YangX21, author = {Wenbo Yang and Quan Xia}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research and Design of Agrometeorological Disaster Monitoring and Early Warning and Intelligent Service System Based on Data Mining}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {726--737}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_58}, doi = {10.1007/978-981-19-0852-1\_58}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/YangX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/YaoS21, author = {Juncai Yao and Jing Shen}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Image Watermark Combining with Discrete Wavelet Transform and Singular Value Decomposition}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {115--124}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_9}, doi = {10.1007/978-981-19-0852-1\_9}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/YaoS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/YeLQJ021, author = {Zi Ye and Weichen Liu and Qiang Qu and Qingshan Jiang and Yi Pan}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {A Cryptocurrency Price Prediction Model Based on Twitter Sentiment Indicators}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {411--425}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_32}, doi = {10.1007/978-981-19-0852-1\_32}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/YeLQJ021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/YuNL21, author = {Guohong Yu and Chenggong Ni and Tianquan Liu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Blockchain Security Risk Analysis and Coping Strategies}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {230--242}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_18}, doi = {10.1007/978-981-19-0852-1\_18}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/YuNL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/YuWZ21, author = {Pengfei Yu and Danni Wang and Shijun Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Identification Method of Sensitive Data in Power System}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {45--57}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_4}, doi = {10.1007/978-981-19-0852-1\_4}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/YuWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhangCZLF21, author = {Yu Zhang and Ying Cai and Meng Zhang and Xin Li and Yanfang Fan}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {A Survey on Privacy-Preserving Deep Learning with Differential Privacy}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {18--30}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_2}, doi = {10.1007/978-981-19-0852-1\_2}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhangCZLF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhangCZLF21a, author = {Meng Zhang and Ying Cai and Yu Zhang and Xin Li and Yanfang Fan}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {A Survey on Content-Based Encrypted Image Retrieval in Cloud Computing}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {312--325}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_24}, doi = {10.1007/978-981-19-0852-1\_24}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhangCZLF21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhangLLDLY21, author = {Xiaoliang Zhang and Yan Li and Weiliang Li and Jiaqi Duan and Shunming Lv and Mei Yan}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Optimization on Service Function Chain Deployment for Cloud Network Collaborative Operation Platform}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {545--559}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_43}, doi = {10.1007/978-981-19-0852-1\_43}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhangLLDLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhangWY21, author = {Lan Zhang and Xianjun Wang and Sheng Ye}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Research on Security Protection Model of Power Big Data}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {31--44}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_3}, doi = {10.1007/978-981-19-0852-1\_3}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhangWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhangYHWZ21, author = {Shuwei Zhang and Xinghua Yang and Benran Hu and Yongjia Wang and Huiqi Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Based on Data Mining New Energy Medium - and Long - Term Electricity Market Trading Power Decomposition Strategy}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {584--596}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_46}, doi = {10.1007/978-981-19-0852-1\_46}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icbds/ZhangYHWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Zhao21, author = {Yunhai Zhao}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {The Training Mode of Experimental Talents in Colleges and Universities Based on Big Data}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {372--379}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_28}, doi = {10.1007/978-981-19-0852-1\_28}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Zhao21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhuS021, author = {Xiangru Zhu and Yanfeng Shi and Yuan Tian}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Vehicle Road Privacy Recommendation System Equipped with Markov Chain}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {58--72}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_5}, doi = {10.1007/978-981-19-0852-1\_5}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhuS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Zong21, author = {Han Zong}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Chemical Fault Diagnosis Modeling Optimization Based on Machine Learning}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {716--725}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_57}, doi = {10.1007/978-981-19-0852-1\_57}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Zong21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icbds/2020, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-3150-4}, doi = {10.1007/978-981-16-3150-4}, isbn = {978-981-16-3149-8}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/0002HSZ20, author = {Lei Han and Xiaohua Huang and Zhan Shi and Shengnan Zheng}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Learning Depth from Light Field via Deep Convolutional Neural Network}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {485--496}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_40}, doi = {10.1007/978-981-16-3150-4\_40}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icbds/0002HSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Aljably20, author = {Randa Aljably}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Privacy Preserving Data Sharing in Online Social Networks}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {142--152}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_13}, doi = {10.1007/978-981-16-3150-4\_13}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Aljably20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/DengZYTG20, author = {Junhua Deng and Lei Zhao and Xuechong Yuan and Zhu Tang and Qian Guo}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on the Role-Based Access Control Model and Data Security Method}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {86--96}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_8}, doi = {10.1007/978-981-16-3150-4\_8}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/DengZYTG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Fan0S20, author = {Huanyu Fan and Yunan Zhu and Chao Shan}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {The Interactive Query Method with Clustering and Differential Privacy Protection Model Under Big Data Environment}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {327--336}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_28}, doi = {10.1007/978-981-16-3150-4\_28}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Fan0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/GaoLLY20, author = {Xue Gao and Sai Liu and Jun Liu and Jia Yu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Safety Protection Scheme of Distribution Network Automation}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {165--176}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_15}, doi = {10.1007/978-981-16-3150-4\_15}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/GaoLLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/GeLZQ20, author = {Mengqiong Ge and Shengfang Lu and Yan Zhang and Cui Qin}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Fault Inspection of Brake Shoe Wear for {TEDS} Based on Machine Vision}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {54--59}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_5}, doi = {10.1007/978-981-16-3150-4\_5}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/GeLZQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/GuanWCXCY20, author = {Yibin Guan and Wenlong Wu and Jianhua Chen and Xiaochun Xu and Kanglin Cai and Wenhui Yuan}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {A Reactive Power Reserve Prediction Method for {EV} Charging Piles Based on Big Data and Optimized Neural Network}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {406--419}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_34}, doi = {10.1007/978-981-16-3150-4\_34}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/GuanWCXCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/GuoMST020, author = {Yuting Guo and Zifan Ma and Zhiying Song and Ruocong Tang and Linfeng Liu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Cycle-Derain: Enhanced CycleGAN for Single Image Deraining}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {497--509}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_41}, doi = {10.1007/978-981-16-3150-4\_41}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/GuoMST020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/HeHZHL20, author = {Xin He and Zhentao Han and Nan Zhang and Yixin Hou and Yutong Liu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Spatio-Temporal Characteristics of Distribution Network Voltage Based on Big Data}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {337--352}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_29}, doi = {10.1007/978-981-16-3150-4\_29}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/HeHZHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/HeLTC20, author = {Jiaze He and Qian Lu and Ying Tong and Yiyang Chen}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Course Classification of Online Learning Platform Based on Sentence-Bert Model}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {612--623}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_50}, doi = {10.1007/978-981-16-3150-4\_50}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/HeLTC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/HuWH20, author = {Xinlei Hu and Zhengxia Wang and Yunbing Hu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Immune Network Based Anomaly Detection Algorithm}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {194--203}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_17}, doi = {10.1007/978-981-16-3150-4\_17}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/HuWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/HuWH20a, author = {Xinlei Hu and Zhengxia Wang and Yunbing Hu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {A Novel Artificial Immune Model on Hadoop for Anomaly Detection}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {377--390}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_32}, doi = {10.1007/978-981-16-3150-4\_32}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/HuWH20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/JiaTZL20, author = {Yongliang Jia and Peng Tao and Dapeng Zhou and Bing Li}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Incremental Anonymous Privacy-Protecting Data Mining Method Based on Feature Correlation Algorithm}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {204--214}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_18}, doi = {10.1007/978-981-16-3150-4\_18}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/JiaTZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/JiaWZ20, author = {Peng Jia and Shaopeng Wanyan and Xiaoyuan Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Intelligent Fault and Security Handling Based on {IMS} in Power System}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {261--273}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_23}, doi = {10.1007/978-981-16-3150-4\_23}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/JiaWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/KangWDZ20, author = {Caixin Kang and Mingrui Wan and Murong Du and Daokang Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Enterprise Credit Decisions Using Logistic Regression and Particle Swarm Optimization Based on Massive Data Records}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {364--376}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_31}, doi = {10.1007/978-981-16-3150-4\_31}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/KangWDZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/KongLWBY20, author = {Weiwei Kong and Long Liu and Xingqi Wei and Shanyu Bi and Xinlei Yang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Application Technology and Security of VoLTE in Power Wireless Private Network}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {27--40}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_3}, doi = {10.1007/978-981-16-3150-4\_3}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/KongLWBY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/KongZPY20, author = {Weiwei Kong and Jie Zhang and Peichun Pan and Jia Yu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Application and Research of Power Communication Trusted Access Gateway}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {3--14}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_1}, doi = {10.1007/978-981-16-3150-4\_1}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/KongZPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LeiHX20, author = {Liu Lei and Zhu Hao and Weiye Xu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Scattered Point Cloud Coordinate Reduction and Hole Repair Technology Based on Big Data Model}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {420--432}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_35}, doi = {10.1007/978-981-16-3150-4\_35}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LeiHX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LiCWX20, author = {Chengtao Li and Li Chen and Jiafeng Wang and Tianjian Xia}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {A Method for Image Big Data Utilization: Automated Progress Monitoring Based on Image Data for Large Construction Site}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {299--313}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_26}, doi = {10.1007/978-981-16-3150-4\_26}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LiCWX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LiP0L20, author = {Yanan Li and Hui Pang and Zhixin Liu and Shijie Li}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Discussion on the Influence of 5G and Blockchain Technology on Digital Virtual Assets}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {447--457}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_37}, doi = {10.1007/978-981-16-3150-4\_37}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LiP0L20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LiTH20, author = {Guo{-}Xiang Li and Yao{-}Feng Tu and Sheng{-}Jun Huang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Cross-Task and Cross-Model Active Learning with Meta Features}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {585--598}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_48}, doi = {10.1007/978-981-16-3150-4\_48}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LiTH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LiZL20, author = {Liuwen Li and Wenlin Zou and Haiqiang Liu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Event-Driven H\({}_{\mbox{{\(\infty\)} }}\) Control for Networked Control Systems with Random Actuator Nonlinearity}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {227--237}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_20}, doi = {10.1007/978-981-16-3150-4\_20}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LiZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LiZWX20, author = {Xincong Li and Mingze Zhang and Jun Wang and Minhao Xia}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Location Planning of Multi-station Integration Based on Particle Swarm Optimization}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {111--121}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_10}, doi = {10.1007/978-981-16-3150-4\_10}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LiZWX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LiangLYWZZZ20, author = {Zuobin Liang and Zhaojun Lu and Fei Yuan and Qing Wang and Guangfeng Zhao and Han Zhang and Wei Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Accurate Location of Line Loss Anomaly in Substation Area Based on Data Driven}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {391--405}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_33}, doi = {10.1007/978-981-16-3150-4\_33}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LiangLYWZZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LiuZZWGY20, author = {Shenglong Liu and Hongbin Zhu and Tao Zhao and Heng Wang and Xianzhou Gao and Ruxia Yang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Oracle Data Privacy Protection System of Virtual Database}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {353--363}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_30}, doi = {10.1007/978-981-16-3150-4\_30}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LiuZZWGY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/PanT20, author = {Jie Pan and Yaofeng Tu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Posterior Transfer Learning with Active Sampling}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {639--651}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_52}, doi = {10.1007/978-981-16-3150-4\_52}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/PanT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ShenGZTZH20, author = {Wen Shen and Qian Guo and Hui Zhu and Kejian Tang and Shaohui Zhan and Zhiguo Hao}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {The Privacy Data Protection Model Based on Random Projection Technology}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {215--226}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_19}, doi = {10.1007/978-981-16-3150-4\_19}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ShenGZTZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ShiLZL20, author = {Zhan Shi and Yonghui Liu and Fengxian Zhao and Chenxu Liu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Attitude Control System of Four-Rotor Aircraft}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {285--296}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_25}, doi = {10.1007/978-981-16-3150-4\_25}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ShiLZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/SunFYC20, author = {Huiting Sun and Yanfang Fan and Shuang Yuan and Ying Cai}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Survey on Computation Offloading Schemes in Resource-Constrained Mobile Edge Computing}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {433--444}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_36}, doi = {10.1007/978-981-16-3150-4\_36}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/SunFYC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/TongJLY20, author = {Guofeng Tong and Yuanwen Jin and Kangyi Li and Jia Yu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Differential Protection and Security in Power System Under 5G Environment}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {249--260}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_22}, doi = {10.1007/978-981-16-3150-4\_22}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/TongJLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WangJZLL20, author = {Yihe Wang and Yufei Jin and Yuancheng Zhu and Xiyuan Li and Dazhi Li}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Improved Random Forest Algorithm Based on Attribute Comprehensive Weighting Used in Identification of Missing Data in Power Grid}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {599--611}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_49}, doi = {10.1007/978-981-16-3150-4\_49}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WangJZLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WanyanJZ20, author = {Shaopeng Wanyan and Peng Jia and Xiaoyuan Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Power Universal Service Access Gateway Based on Blockchain}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {458--470}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_38}, doi = {10.1007/978-981-16-3150-4\_38}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WanyanJZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WeiCZG20, author = {Ya Wei and Rongyan Cai and Lan Zhang and Qian Guo}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {The Database Fine-Grained Access {SQL} Statement Control Model Based on the Dynamic Query Modification Algorithm}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {15--26}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_2}, doi = {10.1007/978-981-16-3150-4\_2}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WeiCZG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WengZQZ20, author = {Zhuohao Weng and Jian Zhang and Cui Qin and Yan Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Quick Response Code Based on Least Significant Bit}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {122--132}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_11}, doi = {10.1007/978-981-16-3150-4\_11}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WengZQZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/XiaZZLY20, author = {Bingsen Xia and Zhaozheng Zhou and Zhanghuang Zhang and Yang Li and Jia Yu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Indoor and Outdoor Fusion Positioning and Security Technology Based on Beidou Satellite}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {153--164}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_14}, doi = {10.1007/978-981-16-3150-4\_14}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/XiaZZLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/XiaoGZYTK20, author = {Hui Xiao and Donghai Guan and Rui Zhao and Weiwei Yuan and Yaofeng Tu and Asad Masood Khattak}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Semi-supervised Time Series Anomaly Detection Model Based on {LSTM} Autoencoder}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {41--53}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_4}, doi = {10.1007/978-981-16-3150-4\_4}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/XiaoGZYTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/XieBSW20, author = {Nannan Xie and Hongpeng Bai and Yanfeng Shi and Haiwei Wu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Android Malware Detection Method Based on App-Image Conversion}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {60--74}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_6}, doi = {10.1007/978-981-16-3150-4\_6}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/XieBSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/XingJSLY20, author = {Ningzhe Xing and Shen Jin and Wei Song and Yang Li and Jia Yu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Experimental Verification Scheme of 5G in Power System}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {177--193}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_16}, doi = {10.1007/978-981-16-3150-4\_16}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/XingJSLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/YanC20, author = {Weiwei Yan and Hui Chu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on System Simulation and Data Analysis of Power Wireless Private Network}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {274--284}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_24}, doi = {10.1007/978-981-16-3150-4\_24}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/YanC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/YanC20a, author = {Weiwei Yan and Hui Chu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Application of Whole-Service Ubiquitous Internet of Things in Power System}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {471--482}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_39}, doi = {10.1007/978-981-16-3150-4\_39}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/YanC20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/YangJJMW20, author = {Bo Yang and Bo Jia and Wanchao Jiang and Yongxin Miao and Yang Wang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Analysis of Economic Loss of Voltage Sag Based on Artificial Intelligence Algorithm}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {624--638}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_51}, doi = {10.1007/978-981-16-3150-4\_51}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/YangJJMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/YeCYG20, author = {Sheng Ye and Yong Cheng and Yonggang Yang and Qian Guo}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Sensitive Data Recognition and Filtering Model of Webpage Content Based on Decision Tree Algorithm}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {510--521}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_42}, doi = {10.1007/978-981-16-3150-4\_42}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/YeCYG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhanZ0YA20, author = {Shi Zhan and Tingting Zhang and Han Lei and Qian Yin and Lu Ali}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Path Planning of Mobile Robot Based on Deep Reinforcement Learning}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {549--560}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_45}, doi = {10.1007/978-981-16-3150-4\_45}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhanZ0YA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhangBGKZ20, author = {Junyao Zhang and Shanyu Bi and Liangliang Gong and Weiwei Kong and Xiaoyuan Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Network Optimization and Network Security in Power Wireless Private Network}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {97--110}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_9}, doi = {10.1007/978-981-16-3150-4\_9}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhangBGKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhangJW20, author = {Xiaoyuan Zhang and Peng Jia and Shaopeng Wanyan}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on {IMS} Security Access and Mechanism in Power System}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {75--85}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_7}, doi = {10.1007/978-981-16-3150-4\_7}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhangJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhangLFCX20, author = {Zeyu Zhang and Xizhong Li and Xuan Fei and Xin Cao and Qian Xu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Low Voltage Early Warning of Distribution Network Based on Improved {DNN-LSTM} Algorithm}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {572--584}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_47}, doi = {10.1007/978-981-16-3150-4\_47}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhangLFCX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhangS20, author = {Lulu Zhang and Yu Shu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on K-Means Clustering Algorithm Based on Improved Genetic Algorithm}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {561--571}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_46}, doi = {10.1007/978-981-16-3150-4\_46}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhangS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhaoDZJO20, author = {Guanzhe Zhao and Zaichao Duan and Chengbo Zhang and Zilong Jin and Benjamin Kwapong Osibo}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Big Data from Collection to Use in Competitive Games - {A} Study Case on Badminton}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {314--326}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_27}, doi = {10.1007/978-981-16-3150-4\_27}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhaoDZJO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhaoGJXYTK20, author = {Rui Zhao and Donghai Guan and Yuanfeng Jin and Hui Xiao and Weiwei Yuan and Yaofeng Tu and Asad Masood Khattak}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Hard Disk Failure Prediction via Transfer Learning}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {522--536}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_43}, doi = {10.1007/978-981-16-3150-4\_43}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhaoGJXYTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhuWX20, author = {Hao Zhu and Mulan Wang and Weiye Xu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Design and Application of {CMAC} Neural Network Based on Software Hardening Technology}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {537--548}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_44}, doi = {10.1007/978-981-16-3150-4\_44}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhuWX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZouJL20, author = {Wenlin Zou and Lisheng Jia and Liuwen Li}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Event-Based H\({}_{\mbox{{\(\infty\)} }}\) Control for Networked Control System with Saturation Constraints}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {133--141}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_12}, doi = {10.1007/978-981-16-3150-4\_12}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZouJL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZouYSW20, author = {Yunfeng Zou and Pengfei Yu and Chao Shan and Meng Wu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on the Sensitive Data Protection Method Based on Game Theory Algorithm}, booktitle = {Big Data and Security - Second International Conference, {ICBDS} 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1415}, pages = {238--248}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-3150-4\_21}, doi = {10.1007/978-981-16-3150-4\_21}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZouYSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icbds/2019, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-7530-3}, doi = {10.1007/978-981-15-7530-3}, isbn = {978-981-15-7529-7}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/0007G19, author = {Dawei Li and Xue Gao}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {A Blockchain Based Terminal Security of IoT}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {445--454}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_34}, doi = {10.1007/978-981-15-7530-3\_34}, timestamp = {Fri, 08 Sep 2023 09:17:06 +0200}, biburl = {https://dblp.org/rec/conf/icbds/0007G19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Ahmad19, author = {Muhammad Ovais Ahmad}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Agile Methods and Cyber-Physical Systems Development - {A} Review with Preliminary Analysis}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {274--285}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_20}, doi = {10.1007/978-981-15-7530-3\_20}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Ahmad19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Al-Nabhan19, author = {Najla Al{-}Nabhan}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Security, Safety and Privacy Issues of Unmanned Aerial Vehicle Systems}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {28--39}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_3}, doi = {10.1007/978-981-15-7530-3\_3}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Al-Nabhan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Al-Nabhan19a, author = {Najla Al{-}Nabhan}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {An IoT-Based Congestion-Aware Emergency Evacuation Approach}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {468--478}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_36}, doi = {10.1007/978-981-15-7530-3\_36}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Al-Nabhan19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Al-NabhanOJG19, author = {Najla Al{-}Nabhan and Aseel Bin Othman and Anura Jayasumana and Mahindre Gunjan}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Directional Virtual Coordinate Approach for 3-D IoT Systems in Smart Cities}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {479--498}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_37}, doi = {10.1007/978-981-15-7530-3\_37}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Al-NabhanOJG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/AlHamedAT19, author = {Shadan AlHamed and Mznah AlRodhaan and Yuan Tian}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Privacy Preservation of Future Trajectory Using Dummy Rotation Algorithm in Fog Computing}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {501--513}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_38}, doi = {10.1007/978-981-15-7530-3\_38}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/AlHamedAT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/AliAIKA19, author = {Rahman Ali and Asmat Ali and Farkhund Iqbal and Asad Masood Khattak and Saiqa Aleem}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {A Systematic Review of Artificial Intelligence and Machine Learning Techniques for Cyber Security}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {584--593}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_44}, doi = {10.1007/978-981-15-7530-3\_44}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/AliAIKA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/AltwaijryAA19, author = {Najwa Altwaijry and Ameerah ALQahtani and Isra Alturaiki}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {A Deep Learning Approach for Anomaly-Based Network Intrusion Detection}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {603--615}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_46}, doi = {10.1007/978-981-15-7530-3\_46}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/AltwaijryAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Alwabel19, author = {Alaa A. Alwabel}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Privacy Issues in Big Data from Collection to Use}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {382--391}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_29}, doi = {10.1007/978-981-15-7530-3\_29}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Alwabel19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/AyoubPRL19, author = {A. Ayoub and Vidyasagar M. Potdar and A. Rudra and Hoa Luong}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Human Factors Affecting {XBRL} Adoption Success in Lebanese Small to Medium-Sized Enterprises}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {98--115}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_8}, doi = {10.1007/978-981-15-7530-3\_8}, timestamp = {Sat, 11 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icbds/AyoubPRL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/AyoubPRL19a, author = {A. Ayoub and Vidyasagar M. Potdar and A. Rudra and Hoa Luong}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Impact of Nepotism on the Human Resources Component of {ERP} Systems Implementation in Lebanon}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {116--134}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_9}, doi = {10.1007/978-981-15-7530-3\_9}, timestamp = {Sat, 11 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icbds/AyoubPRL19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/AyoubPRL19b, author = {A. Ayoub and Vidyasagar M. Potdar and A. Rudra and Hoa Luong}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {The Impact of Organizational Culture on the Internal Controls Components of Accounting Information Systems in the City of Beirut, Lebanon}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {157--177}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_11}, doi = {10.1007/978-981-15-7530-3\_11}, timestamp = {Sat, 11 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icbds/AyoubPRL19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/BiZKLL19, author = {Shanyu Bi and Junyao Zhang and Weiwei Kong and Long Liu and Pengpeng Lv}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Interference of {LTE} Wireless Network in Electric Power System}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {309--318}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_23}, doi = {10.1007/978-981-15-7530-3\_23}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/BiZKLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/CaiZYW19, author = {Yuexiao Cai and Yunlong Zhao and Jinqian Yang and Changxin Wang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {A Bus Passenger Flow Estimation Method Based on {POI} Data and {AFC} Data Fusion}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {352--367}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_27}, doi = {10.1007/978-981-15-7530-3\_27}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/CaiZYW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ChenLZ19, author = {Yu Chen and Kun Liu and Ziqian Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Service Support Ability of Power Wireless Private Network}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {330--339}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_25}, doi = {10.1007/978-981-15-7530-3\_25}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ChenLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ChenWQZ19, author = {Yunfang Chen and Li Wang and Dehao Qi and Wei Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Community Detection Based on DeepWalk in Large Scale Networks}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {568--583}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_43}, doi = {10.1007/978-981-15-7530-3\_43}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ChenWQZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ChenYYL19, author = {Yi Chen and Zhuoran Yang and Zhicong Ye and Hui Liu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research Character Analyzation of Urban Security Based on Urban Resilience Using Big Data Method}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {371--381}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_28}, doi = {10.1007/978-981-15-7530-3\_28}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ChenYYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/GongC19, author = {Yonghua Gong and Lei Chen}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {A Trust Model for Evaluating Trust and Centrality Based on Entropy Weight Method in Social Commerce}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {40--50}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_4}, doi = {10.1007/978-981-15-7530-3\_4}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/GongC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/GuoWY19, author = {Lihong Guo and Haitao Wu and Jie Yang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Trusted Query Method Based on Authorization Index and Triangular Matrix in Big Data}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {392--401}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_30}, doi = {10.1007/978-981-15-7530-3\_30}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/GuoWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/HouHW019, author = {Zelei Hou and Chao Huang and Jiagao Wu and Linfeng Liu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Distributed Image Retrieval Base on {LSH} Indexing on Spark}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {429--441}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_33}, doi = {10.1007/978-981-15-7530-3\_33}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/HouHW019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/JiangD19, author = {Chengzhi Jiang and Song Deng}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Data Leakage Prevention System for Smart Grid}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {541--549}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_41}, doi = {10.1007/978-981-15-7530-3\_41}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/JiangD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/JinDPWSZ19, author = {Ming Jin and Chenchen Dou and Peichun Pan and Ming Wan and Biying Sun and Wenxuan Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {A Blockchain-Based IoT Workflow Management Approach}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {633--644}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_48}, doi = {10.1007/978-981-15-7530-3\_48}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/JinDPWSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LianW19, author = {Yongbing Lian and Xiaogang Wei}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Lightweight Identity Authentication Scheme Based on {IBC} Identity Cryptograph}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {190--198}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_13}, doi = {10.1007/978-981-15-7530-3\_13}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LianW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LiuP19, author = {Yubin Liu and Ming Pang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Medical Image Encryption Method Based on Chaotic Scrambling and Compressed Sensing}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {238--246}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_17}, doi = {10.1007/978-981-15-7530-3\_17}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LiuP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LiuZM19, author = {Xinyu Liu and Xin Zhang and Qianyun Miao}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {A Click Fraud Detection Scheme Based on Cost-Sensitive {CNN} and Feature Matrix}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {65--79}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_6}, doi = {10.1007/978-981-15-7530-3\_6}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LiuZM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LvHWTWZT19, author = {Zongsheng Lv and Kaiwen Huang and Yuanzhi Wang and Ruikang Tao and Guanghan Wu and Jiande Zhang and Yuan Tian}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Distributed Differential Privacy Protection System for Personalized Recommendation}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {211--222}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_15}, doi = {10.1007/978-981-15-7530-3\_15}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LvHWTWZT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/LvL19, author = {Congdong Lv and Yucai Li}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {A Security Vehicle Network Organization Method for Railway Freight Train Based on Lightweight Authentication and Property Verification}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {178--189}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_12}, doi = {10.1007/978-981-15-7530-3\_12}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/LvL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/MohammedPY19, author = {Abubakar Mohammed and Vidyasagar M. Potdar and Li Yang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Key Factors Affecting Blockchain Adoption in Organizations}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {455--467}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_35}, doi = {10.1007/978-981-15-7530-3\_35}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/MohammedPY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/Murad0A19, author = {Miada Murad and Yuan Tian and Mznah Al{-}Rodhaan}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Computationally Efficient Fine-Grain Cube {CP-ABE} Scheme with Partially Hidden Access Structure}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {135--156}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_10}, doi = {10.1007/978-981-15-7530-3\_10}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/Murad0A19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/PanHTL19, author = {Shuaicheng Pan and Lei Han and Yi Tao and Qingyu Liu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Study on Indicator Recognition Method of Water Meter Based on Convolution Neural Network}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {594--602}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_45}, doi = {10.1007/978-981-15-7530-3\_45}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/PanHTL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/PanZ19, author = {Lina Pan and Bo Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Optimizing the Reservoir Connection Structure Using Binary Symbiotic Organisms Search Algorithm: {A} Case Study on Electric Load Forecasting}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {286--297}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_21}, doi = {10.1007/978-981-15-7530-3\_21}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/PanZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ShiHZZ0Q19, author = {Zhan Shi and Chenrong Huang and Xiaoqin Zeng and Jiande Zhang and Lei Han and Ying Qian}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {A Method of {UML} Sequence Diagram Verification Based on a Graph Grammar}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {340--351}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_26}, doi = {10.1007/978-981-15-7530-3\_26}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ShiHZZ0Q19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ShiQL19, author = {Yanfeng Shi and Shuo Qiu and Jiqiang Liu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {An Efficient Lattice-Based {IBE} Scheme Using Combined Public Key}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {3--16}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_1}, doi = {10.1007/978-981-15-7530-3\_1}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ShiQL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/SunCHSYL19, author = {Pei Sun and Baojing Chen and Shaocong Han and Huizhong Shi and Zhenwei Yang and Xing Li}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {An Evolutionary Task Offloading Schema for Edge Computing}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {529--540}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_40}, doi = {10.1007/978-981-15-7530-3\_40}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/SunCHSYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/SunLZH19, author = {Haiyan Sun and Lingling Li and Jianwei Zhang and Wanwei Huang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {An Improved Dynamic Certificateless Authenticated Asymmetric Group Key Agreement Protocol with Trusted {KGC}}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {223--237}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_16}, doi = {10.1007/978-981-15-7530-3\_16}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/SunLZH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/SunZL19, author = {Tianxu Sun and Yunlong Zhao and Zuowei Lian}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {People Flow Analysis Based on Anonymous {OD} Trip Data}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {263--273}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_19}, doi = {10.1007/978-981-15-7530-3\_19}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/SunZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/TangHWWL19, author = {Liyuan Tang and Haoren Hu and Zhonghua Wang and Jiansheng Wang and Yahui Li}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Microservice Architecture Design for Big Data in Tactical Cloud}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {402--416}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_31}, doi = {10.1007/978-981-15-7530-3\_31}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/TangHWWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/TangJ19, author = {Zewei Tang and Chengzhi Jiang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on High Reliability Planning Method in Electric Wireless Network}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {319--329}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_24}, doi = {10.1007/978-981-15-7530-3\_24}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/TangJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/TuSG19, author = {Yuanfei Tu and Qingjian Su and Yang Geng}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Enabling Secure and Efficient Data Sharing and Integrity Auditing for Cloud-Assisted Industrial Control System}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {514--528}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_39}, doi = {10.1007/978-981-15-7530-3\_39}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/TuSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/UllahAHAKK19, author = {Anwar Ullah and Muhammad Zubair Asghar and Anam Habib and Saiqa Aleem and Fazal Masud Kundi and Asad Masood Khattak}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Optimizing the Efficiency of Machine Learning Techniques}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {553--567}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_42}, doi = {10.1007/978-981-15-7530-3\_42}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icbds/UllahAHAKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WangGZ19, author = {Haiyong Wang and Weizheng Guan and Kaixin Zhang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Over-Sampling Multi-classification Method Based on Centroid Space}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {616--632}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_47}, doi = {10.1007/978-981-15-7530-3\_47}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WangGZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WangSZC19, author = {Li Wang and Xin Shu and Wei Zhang and Yunfang Chen}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Design and Optimization of Evaluation Metrics in Object Detection and Tracking for Low-Altitude Aerial Video}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {247--262}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_18}, doi = {10.1007/978-981-15-7530-3\_18}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WangSZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WangZJSZHT19, author = {Wenxi Wang and Weilong Zhang and Zhang Jin and Keyan Sun and Runlin Zou and Chenrong Huang and Yuan Tian}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {A Novel Location Privacy Protection Scheme with Generative Adversarial Network}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {17--27}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_2}, doi = {10.1007/978-981-15-7530-3\_2}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WangZJSZHT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/WeiL19, author = {Xiaogang Wei and Yongbing Lian}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Identity-Based Cryptograph and Its Application in Power IoT}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {645--654}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_49}, doi = {10.1007/978-981-15-7530-3\_49}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/WeiL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/XieXZZ19, author = {Shengxu Xie and Chang{-}you Xing and Guomin Zhang and Jinlong Zhao}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Research on Table Overflow Ldos Attack Detection and Defense Method in Software Defined Networks}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {80--97}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_7}, doi = {10.1007/978-981-15-7530-3\_7}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/XieXZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/XuPK19, author = {Yueqiang Xu and Tero P{\"{a}}iv{\"{a}}rinta and Pasi Kuvaja}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Digital Twins as Software and Service Development Ecosystems in Industry 4.0: Towards a Research Agenda}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {51--64}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_5}, doi = {10.1007/978-981-15-7530-3\_5}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/XuPK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/YuLJ19, author = {Hai Yu and Zi{-}Xuan Li and Yu{-}Yan Jiang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Using GitHub Open Sources and Database Methods Designed to Auto-Generate Chinese Tang Dynasty Poetry}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {417--428}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_32}, doi = {10.1007/978-981-15-7530-3\_32}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/YuLJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/YuanGW19, author = {Guangyao Yuan and Lihong Guo and Gang Wang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {Security Analysis and Improvement on Kerberos Authentication Protocol}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {199--210}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_14}, doi = {10.1007/978-981-15-7530-3\_14}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/YuanGW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZouZJ019, author = {Runtong Zou and Xuecheng Zhang and Wei Jiang and Linfeng Liu}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan}, title = {On the Character Relations Between Nodes for Data Forwarding in Mobile Opportunistic Networks}, booktitle = {Big Data and Security - First International Conference, {ICBDS} 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1210}, pages = {298--308}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-7530-3\_22}, doi = {10.1007/978-981-15-7530-3\_22}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZouZJ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.