|
The 8th International Symposium on Security and Privacy on Internet of Things (SPIoT 2019) |
|
|
|
Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices |
|
|
5 | (15) |
|
|
|
|
|
A Weighted Risk Score Model for IoT Devices |
|
|
20 | (15) |
|
|
|
|
|
Connected Vehicles: A Privacy Analysis |
|
|
35 | (10) |
|
|
|
|
Privacy-Preserving Big Data Analytics: From Theory to Practice |
|
|
45 | (20) |
|
|
|
The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) |
|
|
|
A Framework to Identify People in Unstructured Environments Incorporating Biometrics |
|
|
65 | (11) |
|
|
|
|
|
Continuous Authentication Using Mouse Clickstream Data Analysis |
|
|
76 | (10) |
|
|
|
|
Presentation Attack Detection Using Wavelet Transform and Deep Residual Neural Net |
|
|
86 | (9) |
|
|
|
|
|
|
|
Cost-Efficient Task Scheduling for Geo-distributed Data Analytics |
|
|
95 | (10) |
|
|
|
|
|
|
|
Task Scheduling for Streaming Applications in a Cloud-Edge System |
|
|
105 | (14) |
|
|
|
|
|
The 5th International Symposium on Sensor-Cloud Systems (SCS 2019) |
|
|
|
Limited Memory Eigenvector Recursive Principal Component Analysis in Sensor-Cloud Based Adaptive Operational Modal Online Identification |
|
|
119 | (11) |
|
|
|
|
|
Optimization of Optical Imaging MIMO-OFDM Precoding Matrix for Underwater VLC |
|
|
130 | (19) |
|
|
|
|
|
|
|
Data Collection Scheme for Underwater Sensor Cloud System Based on Fog Computing |
|
|
149 | (11) |
|
|
|
|
|
|
A Survey on Fog Computing |
|
|
160 | (10) |
|
|
|
|
|
|
An Approximate Data Collection Algorithm in Space-Based Internet of Things |
|
|
170 | (15) |
|
|
|
|
|
Outlier Detection of Internet of Vehicles |
|
|
185 | (12) |
|
|
|
|
|
Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges |
|
|
197 | (10) |
|
|
|
|
|
|
CP-MCNN: Multi-label Chest X-ray Diagnostic Based on Confidence Predictor and CNN |
|
|
207 | (11) |
|
|
|
|
|
|
Naive Approach for Bounding Box Annotation and Object Detection Towards Smart Retail Systems |
|
|
218 | (10) |
|
|
|
|
|
|
Evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine |
|
|
228 | (17) |
|
|
|
|
The 11th International Symposium on UbiSafe Computing (UbiSafe 2019) |
|
|
|
An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation |
|
|
245 | (8) |
|
|
|
|
|
|
Lightweight Distributed Attribute Based Keyword Search System for Internet of Things |
|
|
253 | (12) |
|
|
|
|
|
Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks |
|
|
265 | (18) |
|
|
|
|
|
|
The 11th International Workshop on Security in e-Science and e-Research (ISSR 2019) Software Quality Assurance: Tools and Techniques |
|
|
283 | (9) |
|
|
|
|
A Campus Carpooling System Based on GPS Trajectories |
|
|
292 | (15) |
|
|
|
|
|
|
|
|
The 2019 International Workshop on Cybersecurity Metrics and Risk Modeling (CMRM 2019) Web-Based Intelligence for IDS |
|
|
307 | (10) |
|
|
|
Predictably Deterrable? The Case of System Trespassers |
|
|
317 | (14) |
|
|
|
|
|
Author Index |
|
331 | |