Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings
暂无分享,去创建一个
Krishna M. Sivalingam | Alfredo Cuzzocrea | Simone Diniz Junqueira Barbosa | Xiaokang Yang | Junsong Yuan | Sabrina De Capitani di Vimercati | Md Zakirul Alam Bhuiyan | Guojun Wang | Phoebe Chen | Orhun Kara | Ting Liu | Dominik Ślęzak | Takashi Washio | Xiaoyong Du | Yizhi Ren | Yizhi Ren Eds | S. Vimercati | Junsong Yuan | T. Washio | D. Ślęzak | Simone Diniz Junqueira Barbosa | Phoebe Chen | A. Cuzzocrea | Xiaoyong Du | Orhun Kara | Ting Liu | K. Sivalingam | Xiaokang Yang | Yizhi Ren | Guojun Wang
[1] 吴晓波,et al. Vulnerability of complex networks under multiple node-based attacks , 2013 .
[2] Lida Xu,et al. Diverse task scheduling for individualized requirements in cloud manufacturing , 2018, Enterp. Inf. Syst..
[3] Muhammad Arif,et al. Efficient facial expression detection by using the Adaptive-Neuro-Fuzzy-Inference-System and the Bezier curve , 2016 .
[4] I. V. Atanov,et al. Formalization of the process of directional composition of structures of autonomous power-supply systems during design , 2017 .
[5] G. Lorenzo,et al. Minería de datos: Cómo hallar una aguja en un pajar , 2011 .
[6] Anirudha Sahoo,et al. Stochastic Model Based Opportunistic Channel Access in Dynamic Spectrum Access Networks , 2014, IEEE Transactions on Mobile Computing.
[7] Atsushi Fujioka,et al. A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.
[8] Chen Wang,et al. A Service-Oriented System for Optimizing Residential Energy Use , 2009, 2009 IEEE International Conference on Web Services.
[9] Lorrie Faith Cranor,et al. Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging , 2015, CHI.
[10] Lei Ren,et al. Cloud manufacturing: a new manufacturing paradigm , 2014, Enterp. Inf. Syst..
[11] Fang Qi,et al. Efficient Private Matching Scheme for Friend Information Exchange , 2015, ICA3PP.
[12] 久志 半田,et al. Evolutionary Algorithm を活用した改良型コモンスゲーム , 2006 .
[13] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[14] Konstantinos Demertzis,et al. A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security , 2015 .
[15] Navdeep Jaitly,et al. Towards End-To-End Speech Recognition with Recurrent Neural Networks , 2014, ICML.
[16] Ahmed E. Hassan,et al. Security versus performance bugs: a case study on Firefox , 2011, MSR '11.
[17] Turan Gonen,et al. Electric power distribution system engineering , 1985 .
[18] Vasilios Katos,et al. Malevolent app pairs: an Android permission overpassing scheme , 2016, Conf. Computing Frontiers.
[19] Dan Boneh,et al. An Analysis of Private Browsing Modes in Modern Browsers , 2010, USENIX Security Symposium.
[20] Michael Kuby,et al. The flow-refueling location problem for alternative-fuel vehicles , 2005 .
[21] Geoffrey C. Fox,et al. Twister: a runtime for iterative MapReduce , 2010, HPDC '10.
[22] Jie Tang,et al. Representation Learning for Attributed Multiplex Heterogeneous Network , 2019, KDD.
[23] Constantinos Patsakis,et al. The All Seeing Eye: Web to App Intercommunication for Session Fingerprinting in Android , 2017, SpaCCS.
[24] Barney,et al. Theoretical Coding : Text Analysis in Grounded Theory , 2004 .
[25] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[26] Mike Surridge,et al. Towards a Model of User-centered Privacy Preservation , 2017, ARES.
[27] Adam Joinson,et al. Human aspects of cyber security: Behaviour or culture change? , 2018 .
[28] Madhav V. Marathe,et al. PATRIC: a parallel algorithm for counting triangles in massive networks , 2013, CIKM.
[29] Michael J. Franklin,et al. Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing , 2012, NSDI.
[30] Josef Bigün,et al. Motion Features from Lip Movement for Person Authentication , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[31] Sergio de la Fé Dotres,et al. Pronóstico de las pérdidas en redes de distribución mediante redes neuronales , 2005 .
[32] Massimo Marchiori,et al. A topological analysis of the Italian electric power grid , 2004 .
[33] David Camacho,et al. Genetic boosting classification for malware detection , 2016, 2016 IEEE Congress on Evolutionary Computation (CEC).
[34] Amelec Viloria,et al. Fuzzy Logic Applied to the Performance Evaluation. Honduran Coffee Sector Case , 2018, ICSI.
[35] Michael Devetsikiotis,et al. A hierarchical optimization model for a network of electric vehicle charging stations , 2017 .
[36] Özgür B. Akan,et al. Energy Harvesting Cognitive Radio Networking for IoT-enabled Smart Grid , 2018, Mob. Networks Appl..
[37] Akihiro Nakao,et al. In-network P2P packet cache processing using scalable P2P network test platform , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.
[38] Lin Zhang,et al. Modeling of manufacturing service supply-demand matching hypernetwork in service-oriented manufacturing systems , 2017 .
[39] Ahmad-Reza Sadeghi,et al. XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks , 2011 .
[40] H. Fernandes,et al. Darwin's unfinished symphony: How culture made the human mind Kevin N. Laland Darwin's unfinished symphony: How c , 2017, Animal Behaviour.
[41] Arun Ross,et al. Biometric recognition by gait: A survey of modalities and features , 2018, Comput. Vis. Image Underst..
[42] Yu He,et al. The YouTube video recommendation system , 2010, RecSys '10.
[43] Guojun Wang,et al. A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks , 2016, SpaCCS.
[44] Dawei Zhao,et al. Multiple routes transmitted epidemics on multiplex networks , 2013, ArXiv.
[45] L. Cranor,et al. Nudges for Privacy and Security , 2017, ACM Comput. Surv..
[46] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[47] J. Bouvrie. Hierarchical learning : theory with applications in speech and vision , 2009 .
[48] Andreas Zeller,et al. How Long Will It Take to Fix This Bug? , 2007, Fourth International Workshop on Mining Software Repositories (MSR'07:ICSE Workshops 2007).
[49] Wojciech Mazurczyk,et al. Exploiting IP telephony with silence suppression for hidden data transfers , 2018, Comput. Secur..
[50] Yves Le Traon,et al. Automatically securing permission-based software by reducing the attack surface: an application to Android , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[51] Dileep George,et al. How the brain might work: a hierarchical and temporal model for learning and recognition , 2008 .
[52] Xiaolei Dong,et al. TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[53] Muhammad Arif,et al. Ubiquitous Healthcare System Based on the Sensors Network and Android Internet of Things Gateway , 2018, 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).
[54] Zexin Lu,et al. A Data Dissemination Algorithm Based on Geographical Quorum System in Wireless Sensor Networks , 2009, 2009 Seventh Annual Communication Networks and Services Research Conference.
[55] Jasni Mohamad Zain,et al. HILBERT-LSB-C as authentication system for color medical images , 2015, 2015 4th International Conference on Software Engineering and Computer Systems (ICSECS).
[56] Mohsen Guizani,et al. A data-driven method for future Internet route decision modeling , 2019, Future Gener. Comput. Syst..
[57] Quanyan Zhu,et al. Optimizing mission critical data dissemination in massive IoT networks , 2017, 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).
[58] Paul A. Viola,et al. A unified learning framework for real time face detection and classification , 2002, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition.
[59] J. Friedman. Special Invited Paper-Additive logistic regression: A statistical view of boosting , 2000 .
[60] Amelec Viloria,et al. Models of Multivariate Regression for Labor Accidents in Different Production Sectors: Comparative Study , 2018, DMBD.
[61] Qiang Fu,et al. Combating the evolving spammers in online social networks , 2018, Comput. Secur..
[62] Tobias Scheffer,et al. Finding association rules that trade support optimally against confidence , 2001, Intell. Data Anal..
[63] Ray Y. Zhong,et al. Workload-based multi-task scheduling in cloud manufacturing , 2017 .
[64] Juan Carlos Sanclemente Téllez,et al. Las ventas y el mercadeo, actividades indisociables y de gran impacto social y económico. El aporte de Tosdal , 2007 .
[65] Li Tian-tian. Optimal Location of Urban Electric Vehicle Charging Stations Using a Two-Step Method , 2013 .
[66] Srikanth V. Krishnamurthy,et al. TIDE: A User-centric Tool for Identifying Energy Hungry Applications on Smartphones , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[67] Song Wang,et al. An Uncertainty-Aware Evolutionary Scheduling Method for Cloud Service Provisioning , 2016, 2016 IEEE International Conference on Web Services (ICWS).
[68] Matthias Bethge,et al. Approximating CNNs with Bag-of-local-Features models works surprisingly well on ImageNet , 2019, ICLR.
[69] Amelec Viloria,et al. Methodology for the Design of a Student Pattern Recognition Tool to Facilitate the Teaching - Learning Process Through Knowledge Data Discovery (Big Data) , 2018, DMBD.
[70] Shaobo Zhang,et al. A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services , 2019, Future Gener. Comput. Syst..
[71] Muhammad Arif,et al. Virtualization Security: Analysis and Open Challenges , 2015 .
[72] Junwei Tang,et al. Detecting Permission Over-claim of Android Applications with Static and Semantic Analysis Approach , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[73] Ronald V. Clarke,et al. Superhighway Robbery: Preventing E-commerce Crime , 2003 .
[74] Josephine Sullivan,et al. One millisecond face alignment with an ensemble of regression trees , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[75] Cao Yijia. REVIEW ON MODELS OF CASCADING FAILURE IN COMPLEX POWER GRID , 2005 .
[76] Yang Li,et al. Sustainable and Efficient Data Collection from WSNs to Cloud , 2019, IEEE Transactions on Sustainable Computing.
[77] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[78] Michael McGuire. Hypercrime: The New Geometry of Harm , 2007 .
[79] Ma Wei,et al. Electric Vehicle Charging Station Planning Based on Computational Geometry Method , 2012 .
[80] Christine Halverson,et al. Considering an organization's memory , 1998, CSCW '98.
[81] Joon Son Chung,et al. Lip Reading Sentences in the Wild , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[82] Wenjing Jia,et al. Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model , 2019, Inf. Sci..
[83] Anthony J. Maeder,et al. A Study of Block-Based Medical Image Watermarking Using a Perceptual Similarity Metric , 2005, Digital Image Computing: Techniques and Applications (DICTA'05).
[84] Premkumar T. Devanbu,et al. Asking for (and about) permissions used by Android apps , 2013, 2013 10th Working Conference on Mining Software Repositories (MSR).
[85] 潘欢,et al. 实际电网动态结构脆弱性分析与评估 Analysis and Assessment of a Realistic Power Grid’s Dynamic Structure Vulnerability , 2017 .
[86] Yu He,et al. HeteSpaceyWalk: A Heterogeneous Spacey Random Walk for Heterogeneous Information Network Embedding , 2019, CIKM.
[87] Ming Li,et al. FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[88] Raghavendra Pal,et al. Clustering Based Single-hop and Multi-hop Message Dissemination Evaluation Under Varying Data Rate in Vehicular Ad-hoc Network , 2016 .
[89] D. Shier. A Min-Max Theorem for p-Center Problems on a Tree , 1977 .
[90] Christian Biemann,et al. What do we need to build explainable AI systems for the medical domain? , 2017, ArXiv.
[91] Minhui Xue,et al. Revisiting Localization Attacks in Mobile App People-Nearby Services , 2017, SpaCCS.
[92] Guojun Wang,et al. Fast curvelet transform through genetic algorithm for multimodal medical image fusion , 2019, Soft Computing.
[93] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[94] Jun He,et al. Electric Vehicle Charging Station Planning Based on Multiple-Population Hybrid Genetic Algorithm , 2012, 2012 International Conference on Control Engineering and Communication Technology.
[95] Frank Piessens,et al. FPDetective: dusting the web for fingerprinters , 2013, CCS.
[96] Johannes Gehrke,et al. Intelligible Models for HealthCare: Predicting Pneumonia Risk and Hospital 30-day Readmission , 2015, KDD.
[97] Paul Ekblom,et al. Crime Prevention, Security and Community Safety Using the 5Is Framework , 2010 .
[98] Stefano Soatto,et al. Dynamic Textures , 2003, International Journal of Computer Vision.
[99] Sanjeev Khanna,et al. Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks , 2012, IEEE/ACM Transactions on Networking.
[100] Lixiang Li,et al. Revealing the process of edge-based-attack cascading failures , 2012 .
[101] Norman R. Swanson,et al. Forecasting economic time series using flexible versus fixed specification and linear versus nonlinear econometric models , 1997 .
[102] Peng Shi,et al. Two-Dimensional Dissipative Control and Filtering for Roesser Model , 2015, IEEE Transactions on Automatic Control.
[103] Francesco Palmieri,et al. New Steganographic Techniques for the OOXML File Format , 2011, ARES.
[104] Zidong Wang,et al. Distributed Filtering for Switched Nonlinear Positive Systems With Missing Measurements Over Sensor Networks , 2016, IEEE Sensors Journal.
[105] Linghe Kong,et al. An algorithm of lane change using two-lane NaSch model in traffic networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).
[106] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[107] John C. Mitchell,et al. Third-Party Web Tracking: Policy and Technology , 2012, 2012 IEEE Symposium on Security and Privacy.
[108] Guojun Wang,et al. Aggregating Author Profiles from Multiple Publisher Networks to Build Author Knowledge Graph , 2018, 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).
[109] Hui Han,et al. Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning , 2005, ICIC.
[110] Guojun Wang,et al. Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext , 2017, SpaCCS.
[111] Giulio Sandini,et al. A Survey of Artificial Cognitive Systems: Implications for the Autonomous Development of Mental Capabilities in Computational Agents , 2007, IEEE Transactions on Evolutionary Computation.
[112] Youngho Park,et al. A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure , 2015, J. Inf. Sci. Eng..
[113] Md Zakirul Alam Bhuiyan,et al. Fog-Based Computing and Storage Offloading for Data Synchronization in IoT , 2019, IEEE Internet of Things Journal.
[114] Rafael Moreno-Vozmediano,et al. Elastic management of cluster-based services in the cloud , 2009, ACDC '09.
[115] Lijun Yin,et al. Static and dynamic 3D facial expression recognition: A comprehensive survey , 2012, Image Vis. Comput..
[116] McGuire. Technology Crime and Technology Control: contexts and history , 2016 .
[117] J. Contreras,et al. Forecasting electricity prices for a day-ahead pool-based electric energy market , 2005 .
[118] Suli Zou,et al. A Distributed Charging Coordination for Large-Scale Plug-In Electric Vehicles Considering Battery Degradation Cost , 2015, IEEE Transactions on Control Systems Technology.
[119] Vladik Kreinovich,et al. Security games with interval uncertainty , 2013, AAMAS.
[120] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[121] Zbigniew Kwecka. Application layer covert channel analysis and detection. , 2006 .
[122] Virgílio A. F. Almeida,et al. Detecting Spammers on Twitter , 2010 .
[123] M. C. Cervantes,et al. Estudio de validación de un método para seleccionar técnicas de pronóstico de series de tiempo mediante redes neuronales artificiales , 2013 .
[124] Lucas D. Panjer. Predicting Eclipse Bug Lifetimes , 2007, Fourth International Workshop on Mining Software Repositories (MSR'07:ICSE Workshops 2007).
[125] Pinit Kumhom,et al. Classification of speaking activity based on lip features in a sequence of video frames , 2019, Other Conferences.
[126] Phu H. Phung,et al. HybridGuard: A Principal-Based Permission and Fine-Grained Policy Enforcement Framework for Web-Based Mobile Applications , 2017, 2017 IEEE Security and Privacy Workshops (SPW).
[127] Subariah Ibrahim,et al. Morphed Virus Family Classification Based on Opcodes Statistical Feature Using Decision Tree , 2011 .
[128] Nuno Vasconcelos,et al. Modeling, Clustering, and Segmenting Video with Mixtures of Dynamic Textures , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[129] Andrew Lippman,et al. MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).
[130] Sebastián Ventura,et al. Educational Data Mining: A Review of the State of the Art , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[131] Wanlei Zhou,et al. Traceback of DDoS Attacks Using Entropy Variations , 2011, IEEE Transactions on Parallel and Distributed Systems.
[132] Olvi L. Mangasarian,et al. Arbitrary-norm separating plane , 1999, Oper. Res. Lett..
[133] Sándor Imre,et al. User Tracking on the Web via Cross-Browser Fingerprinting , 2011, NordSec.
[134] Witawas Srisa-an,et al. SigPID: significant permission identification for android malware detection , 2016, 2016 11th International Conference on Malicious and Unwanted Software (MALWARE).
[135] Cheng Wang,et al. Applications integration in a hybrid cloud computing environment: modelling and platform , 2013, Enterp. Inf. Syst..
[136] Alexander Ilic,et al. Collaborative Filtering on the Blockchain: A Secure Recommender System for e-Commerce , 2016, AMCIS.
[137] Hong-Sen Yan,et al. A Forecasting Model Based Support Vector Machine and Particle Swarm Optimization , 2008, 2008 Workshop on Power Electronics and Intelligent Transportation System.
[138] Ralf C. Staudemeyer,et al. Extracting salient features for network intrusion detection using machine learning methods , 2014, South Afr. Comput. J..
[139] Nhat-Phuong Tran,et al. High performance string matching for security applications , 2013, International Conference on ICT for Smart Society.
[140] Zachary A. Collier,et al. Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management , 2020, Risk analysis : an official publication of the Society for Risk Analysis.
[141] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.
[142] Walter Rudametkin,et al. Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[143] Yuan Tian,et al. Chinese Named Entity Recognition Based on B-LSTM Neural Network with Additional Features , 2017, SpaCCS.
[144] Matti Pietikäinen,et al. Dynamic Texture Recognition Using Local Binary Patterns with an Application to Facial Expressions , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[145] Yee Whye Teh,et al. A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.
[146] Nicanor Quijano,et al. Integrity Attacks on Real-Time Pricing in Smart Grids: Impact and Countermeasures , 2017, IEEE Transactions on Smart Grid.
[147] He Chen,et al. Cooperative Strategies for Wireless-Powered Communications: An Overview , 2018, IEEE Wireless Communications.
[148] John Jenkins,et al. Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data , 2019, SpaCCS.
[149] Xuexian Geng,et al. People-Centric Service Intelligence for Smart Cities , 2019, Smart Cities.
[150] Hui Fang,et al. A Novel Robust Reversible Watermarking Scheme for Protecting Authenticity and Integrity of Medical Images , 2019, IEEE Access.
[151] Amit Kumar Singh,et al. Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications , 2018, Multimedia Tools and Applications.
[152] Fei Tao,et al. FC-PACO-RM: A Parallel Method for Service Composition Optimal-Selection in Cloud Manufacturing System , 2013, IEEE Transactions on Industrial Informatics.
[153] Evgenios M. Kornaropoulos,et al. Fast approximation of betweenness centrality through sampling , 2014, Data Mining and Knowledge Discovery.
[154] Wojciech Mazurczyk,et al. A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression , 2017, ARES.
[155] Ali Vatankhah Barenji,et al. A dynamic multi-agent-based scheduling approach for SMEs , 2017 .
[156] Hyun-chong Cho,et al. Improved Spam Filter via Handling of Text Embedded Image E-mail , 2015 .
[157] Aleksandra Mileva,et al. Covert channels in TCP/IP protocol stack - extended version- , 2014, Central European Journal of Computer Science.
[158] Yang Xiao,et al. Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.
[159] Fuchun Joseph Lin,et al. Situation awareness in a smart home environment , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).
[160] Ming Zhu,et al. An Online Ride-Sharing Path-Planning Strategy for Public Vehicle Systems , 2017, IEEE Transactions on Intelligent Transportation Systems.
[161] Shahid Alam,et al. Current Trends and the Future of Metamorphic Malware Detection , 2014, SIN.
[162] Jun Li,et al. A Review of Tournament Selection in Genetic Programming , 2010, ISICA.
[163] Nancy A. Lynch,et al. Perspectives on the CAP Theorem , 2012, Computer.
[164] Ehab Al-Shaer,et al. A Novel Class of Robust Covert Channels Using Out-of-Order Packets , 2017, IEEE Transactions on Dependable and Secure Computing.
[165] Norman M. Sadeh,et al. Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings , 2014, SOUPS.
[166] Li Deng,et al. Switching Dynamic System Models for Speech Articulation and Acoustics , 2004 .
[167] Paul A. Viola,et al. Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[168] Ismail Mohamad,et al. Standardization and Its Effects on K-Means Clustering Algorithm , 2013 .
[169] Adilson E Motter,et al. Cascade-based attacks on complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[170] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[171] Guo Zhizhong,et al. Electric power grid structural vulnerability assessment , 2006, 2006 IEEE Power Engineering Society General Meeting.
[172] Nicola Casagli,et al. Continuous, semi-automatic monitoring of ground deformation using Sentinel-1 satellites , 2018, Scientific Reports.
[173] Yunhao Liu,et al. Learning Resource Management Specifications in Smartphones , 2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS).
[174] María Antonia Murazzo,et al. Desarrollo de aplicaciones colaborativas para Cloud Computing , 2013 .
[175] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[176] Jingzheng Wu,et al. PACS: Pemission abuse checking system for android applictions based on review mining , 2017, 2017 IEEE Conference on Dependable and Secure Computing.
[177] Chenliang Chang,et al. Speckle reduced lensless holographic projection from phase-only computer-generated hologram. , 2017, Optics express.
[178] Shahnawaz Talpur,et al. SEGMENTATION AND CLASSIFICATION OF CALCIFICATION AND HEMORRHAGE IN THE BRAIN USING FUZZY C-MEAN AND ADAPTIVE NEURO-FUZZY INFERENCE SYSTEM , 2016 .
[179] Piet Van Mieghem,et al. A network approach for power grid robustness against cascading failures , 2015, 2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM).
[180] Khubaib Amjad Alam,et al. Application of Data Mining Using Artificial Neural Network: Survey , 2015 .
[181] Jing Li,et al. Blockchain Based Provenance Sharing of Scientific Workflows , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[182] Amelec Viloria,et al. Conglomerates of Latin American Countries and Public Policies for the Sustainable Development of the Electric Power Generation Sector , 2018, DMBD.
[183] M. Brauer,et al. Long-term Residential Exposure to Air Pollution and Lung Cancer Risk , 2013, Epidemiology.
[184] Chuan Pham,et al. Efficient forwarding and popularity based caching for Content Centric Network , 2015, 2015 International Conference on Information Networking (ICOIN).
[185] J.M. Zain,et al. Medical Image Watermarking with Tamper Detection and Recovery , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.
[186] José Luis Gómez Barroso. Experiments on personal information disclosure: Past and future avenues , 2018, Telematics Informatics.
[187] Varun Singh,et al. Energy Cost of Advertisements in Mobile Games on the Android Platform , 2012, 2012 Sixth International Conference on Next Generation Mobile Applications, Services and Technologies.
[188] S. L. Hakimi,et al. Optimum Locations of Switching Centers and the Absolute Centers and Medians of a Graph , 1964 .
[189] Edgar Galván López,et al. locoGP: Improving Performance by Genetic Programming Java Source Code , 2015, GECCO.
[190] Darwin Ramiro Mercado Polo,et al. Comparación de Redes Neuronales aplicadas a la predicción de Series de Tiempo Comparison of Neural Network applied to prediction of Time Series , 2015 .
[191] Xianghan Zheng,et al. Distributed multi-hop clustering algorithm for VANETs based on neighborhood follow , 2015, EURASIP J. Wirel. Commun. Netw..
[192] Martín Abadi,et al. Host Fingerprinting and Tracking on the Web: Privacy and Security Implications , 2012, NDSS.
[193] Chai Xu-dong,et al. Cloud manufacturing:a new service-oriented networked manufacturing model , 2010 .
[194] F. Ernawan,et al. Multiple watermarking technique based on RDWT-SVD and human visual characteristics , 2019 .
[195] Wang,et al. Optimal Planning of Charging Station for Electric Vehicle Based on Quantum PSO Algorithm , 2012 .
[196] Hanif Ullah,et al. 5G Communication: An Overview of Vehicle-to-Everything, Drones, and Healthcare Use-Cases , 2019, IEEE Access.
[197] Shengyu Zhang,et al. Algorithms for Trip-Vehicle Assignment in Ride-Sharing , 2018, AAAI.
[198] Erol Gelenbe,et al. Energy-Efficient Cloud Computing , 2010, Comput. J..
[199] Hao Wu,et al. Information fusion-based method for distributed domain name system cache poisoning attack detection and identification , 2016, IET Inf. Secur..
[200] Chao Huang,et al. Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges , 2019, SpaCCS Workshops.
[201] Md Zakirul Alam Bhuiyan,et al. Deep Irregular Convolutional Residual LSTM for Urban Traffic Passenger Flows Prediction , 2020, IEEE Transactions on Intelligent Transportation Systems.
[202] Mohsen Guizani,et al. When Traffic Flow Prediction and Wireless Big Data Analytics Meet , 2019, IEEE Network.
[203] Abien Fred Agarap. A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data , 2017, ICMLC.
[204] Li Deng,et al. Computational Models for Speech Production , 2018, Speech Processing.
[205] Muhammad Arif,et al. Segmentation of Calcification and Brain Hemorrhage with Midline Detection , 2017, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC).
[206] Ivan Martinovic,et al. SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis , 2016, SPSM@CCS.
[207] Xiao Chen,et al. Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones , 2018, ArXiv.
[208] Daniel R. Tauritz,et al. Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) , 2015, GECCO.
[209] Xiao Luo,et al. A Data-Driven Network Intrusion Detection Model Based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection , 2019, SpaCCS.
[210] Dawei Zhao,et al. Identifying influential spreaders in interconnected networks , 2013 .
[211] Shaikh Arifuzzaman,et al. Scalable Mining, Analysis, and Visualization of Protein-Protein Interaction Networks , 2019 .
[212] Ma Zhengyuan. Application of Hopfield artificial nerve network for place selection optimization of delivery center of logistics , 2003 .
[213] Philipp M. Grulich,et al. Bringing Big Data into the Car: Does it Scale? , 2017, 2017 International Conference on Big Data Innovations and Applications (Innovate-Data).
[214] Dawei Zhao,et al. Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).
[215] Mark O. Riedl,et al. Rationalization: A Neural Machine Translation Approach to Generating Natural Language Explanations , 2017, AIES.
[216] Donghoon Chang,et al. Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks , 2015, ICISC.
[217] Joelle Pineau,et al. An Actor-Critic Algorithm for Sequence Prediction , 2016, ICLR.
[218] David Windridge,et al. Detection of Face Spoofing Using Visual Dynamics , 2015, IEEE Transactions on Information Forensics and Security.
[219] Zuo Zhi. A Spatiotemporal Location Model for Locating Electric Vehicle Charging Stations , 2012 .
[220] YiDing Wang,et al. Improving generalization for gender classification , 2008, 2008 15th IEEE International Conference on Image Processing.
[221] Jürgen Beyerer,et al. PrivacyInsight: The Next Generation Privacy Dashboard , 2016, APF.
[222] Rosa Maria Dangelico,et al. Smart cities: definitions, dimensions, and performance , 2013 .
[223] William H. Sanders,et al. RRE: A Game-Theoretic Intrusion Response and Recovery Engine , 2014, IEEE Transactions on Parallel and Distributed Systems.
[224] Jeroen Famaey,et al. Real-Time data dissemination and analytics platform for challenging IoT environments , 2017, 2017 Global Information Infrastructure and Networking Symposium (GIIS).
[225] Zahi A Fayad,et al. Arterial Thrombus Stability: Does It Matter and Can We Detect It? , 2017, Journal of the American College of Cardiology.
[226] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[227] Paolo Giorgini,et al. Toward GDPR-Compliant Socio-Technical Systems: Modeling Language and Reasoning Framework , 2017, PoEM.
[228] Rohan Arora,et al. Comparing Apache Spark and Map Reduce with Performance Analysis using K-Means , 2015 .
[229] S. Shankar Sastry,et al. Optimal thresholds for intrusion detection systems , 2016, HotSoS.
[230] Clément Ballabriga,et al. EnergyPatch: Repairing Resource Leaks to Improve Energy-Efficiency of Android Apps , 2018, IEEE Transactions on Software Engineering.
[231] Padmavathi Kora,et al. An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine , 2020, Biomed. Signal Process. Control..
[232] Jianer Chen,et al. A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing , 2018, SpaCCS.
[233] Subhajyoti Bandyopadhyay,et al. Cloud computing - The business perspective , 2011, Decis. Support Syst..
[234] Chung-Ho Su,et al. A novel price-pattern detection method based on time series to forecast stock market , 2011 .
[235] Aman Jantan,et al. A Framework for Optimizing Malware Classification by Using Genetic Algorithm , 2011, ICSECS.
[236] Ming Fan,et al. DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis , 2017, IEEE Transactions on Information Forensics and Security.
[237] Jinqiao Shi,et al. Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services , 2019, IEEE Internet of Things Journal.
[238] Lawrence D. Jackel,et al. Explaining How a Deep Neural Network Trained with End-to-End Learning Steers a Car , 2017, ArXiv.
[239] Alessandra Gorla,et al. How Do Apps Evolve in Their Permission Requests? A Preliminary Study , 2017, 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR).
[240] Amelec Viloria,et al. Econometric Analysis of the Industrial Growth Determinants in Colombia , 2018, ADC.
[241] Hugo Proença,et al. Biometric recognition in surveillance scenarios: a survey , 2016, Artificial Intelligence Review.
[242] Rasoul Azizipanah-Abarghooee,et al. Optimal sizing of battery energy storage for micro-grid operation management using a new improved bat algorithm , 2014 .
[243] Ram Krishnan,et al. Toward a Framework for Detecting Privacy Policy Violations in Android Application Code , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).
[244] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[245] Guoqing Li,et al. Big spatial vector data management: a review , 2018 .
[246] Ronald V. Clarke,et al. Seven misconceptions of situational crime prevention , 2017 .
[247] Wei Xi,et al. SALM: Smartphone-Based Identity Authentication Using Lip Motion Characteristics , 2017, 2017 IEEE International Conference on Smart Computing (SMARTCOMP).
[248] Leonidas Anthopoulos,et al. Understanding Smart Cities: A Tool for Smart Government or an Industrial Trick? , 2017 .
[249] Wojciech Mazurczyk,et al. Covert Channels in Personal Cloud Storage Services: The Case of Dropbox , 2017, IEEE Transactions on Industrial Informatics.
[250] Wing Kam Liu,et al. Finite element simulation of saw-tooth chip in high-speed machining based on multiresolution continuum theory , 2018, The International Journal of Advanced Manufacturing Technology.
[251] Liusheng Huang,et al. Concealed in web surfing: Behavior-based covert channels in HTTP , 2018, J. Netw. Comput. Appl..
[252] Gail C. Murphy,et al. Who should fix this bug? , 2006, ICSE.
[253] Anupam Das,et al. Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice , 2018, IEEE Pervasive Computing.
[254] Tomislav Dragicevic,et al. Future effectual role of energy delivery: A comprehensive review of Internet of Things and smart grid , 2018, Renewable and Sustainable Energy Reviews.
[255] Tao Peng,et al. Intelligent route planning on large road networks with efficiency and privacy , 2019, J. Parallel Distributed Comput..
[256] Richard B. Chase,et al. Administración de operaciones : producción y cadena de suministros , 2014 .
[257] Wei Wang,et al. Game theoretical security detection strategy for networked systems , 2018, Inf. Sci..
[258] Praveen Paritosh,et al. Freebase: a collaboratively created graph database for structuring human knowledge , 2008, SIGMOD Conference.
[259] A. Umamageswari,et al. Enhancing Security in Medical Image Informatics using Geometrical Attacks , 2019, Current Science.
[260] Hans Hedbom,et al. A Survey on Transparency Tools for Enhancing Privacy , 2008, FIDIS.
[261] Seth Flaxman,et al. European Union Regulations on Algorithmic Decision-Making and a "Right to Explanation" , 2016, AI Mag..
[262] Hella Kaffel-Ben Ayed,et al. Privacy risk assessment and users' awareness for mobile apps permissions , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[263] P. Glöckner,et al. Extracting Rules from Deep Neural Networks , 2015 .
[264] Tranos Zuva,et al. Comprehensive Diversity in Recommender Systems , 2017, SpaCCS.
[265] Yihong Gong,et al. Active contour model based on local and global intensity information for medical image segmentation , 2016, Neurocomputing.
[266] Shan He,et al. Research on Visual Speech Recognition Based on Local Binary Pattern and Stacked Sparse Autoencoder , 2018, IHSED.
[267] Lilian Mitrou,et al. Reengineering the user: privacy concerns about personal data on smartphones , 2015, Inf. Comput. Secur..
[268] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[269] Kash Barker,et al. Flow-based vulnerability measures for network component importance: Experimentation with preparedness planning , 2016, Reliab. Eng. Syst. Saf..
[270] Esteban Inga,et al. Fault Diagnosis on Electrical Distribution Systems Based on Fuzzy Logic , 2018, ICSI.
[271] Li Gu. Planning of battery-switching and vehicle-charging network based on battery switching mode , 2013 .
[272] Alessandro Acquisti,et al. Gone in 15 Seconds: The Limits of Privacy Transparency and Control , 2013, IEEE Security & Privacy.
[273] Emin Anarim,et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..
[274] Bin Ma,et al. A code division multiplexing and block classification-based real-time reversible data-hiding algorithm for medical images , 2019, Journal of Real-Time Image Processing.
[275] Yoshua Bengio,et al. Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.
[276] Richard Wolski,et al. The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[277] Christian Cachin,et al. Architecture of the Hyperledger Blockchain Fabric , 2016 .
[278] Constantinos Patsakis,et al. Monkey Says, Monkey Does: Security and Privacy on Voice Assistants , 2017, IEEE Access.
[279] Ge Shao-yu. Planning of electric vehicle charging stations considering users' convenience , 2014 .
[280] GhemawatSanjay,et al. The Google file system , 2003 .
[281] Di Hu,et al. Research on services encapsulation and virtualization access model of machine for cloud manufacturing , 2015, Journal of Intelligent Manufacturing.
[282] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[283] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[284] Shen Su,et al. Block-DEF: A secure digital evidence framework using blockchain , 2019, Inf. Sci..
[285] Kai Fan,et al. An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement , 2017, SpaCCS.
[286] Prem Chandra Saxena,et al. A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme , 2017, ICISS.
[287] Abhinav Sinha,et al. Incentive Mechanisms for Fairness Among Strategic Agents , 2017, IEEE Journal on Selected Areas in Communications.
[288] Xiangbin Ye,et al. Combining Convolutional Neural Network and Support Vector Machine for Gait-based Gender Recognition , 2018, 2018 Chinese Automation Congress (CAC).
[289] Evgenios Konstantinou,et al. Metamorphic Virus: Analysis and Detection , 2008 .
[290] Marijn Janssen,et al. A Privacy Risk Assessment Model for Open Data , 2017, BMSD.
[291] María Antonia Murazzo,et al. Interoperabilidad en cloud computing , 2011 .
[292] Binoy Ravindran,et al. CQS-Pair: Cyclic Quorum System Pair for Wakeup Scheduling in Wireless Sensor Networks , 2008, OPODIS.
[293] G. Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[294] Xin Liu,et al. Learning Multi-Boosted HMMs for Lip-Password Based Speaker Verification , 2014, IEEE Transactions on Information Forensics and Security.
[295] Bo An,et al. PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.
[296] Alessandra Gorla,et al. Checking app behavior against app descriptions , 2014, ICSE.
[297] Chun Kiat Tan,et al. Security Protection of DICOM Medical Images Using Dual-Layer Reversible Watermarking with Tamper Detection Capability , 2011, Journal of Digital Imaging.
[298] Paul S. Bradley,et al. Feature Selection via Concave Minimization and Support Vector Machines , 1998, ICML.
[299] B. Santhi,et al. A Novel Visual Medical Image Encryption for Secure Transmission of Authenticated Watermarked Medical Images , 2019, Mobile Networks and Applications.
[300] Anirban Basu,et al. MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data , 2017, SpaCCS Workshops.
[301] Francisco Rodríguez-Henríquez,et al. A Pairing-Based Blind Signature E-Voting Scheme , 2014, Comput. J..
[302] Fabrizio Giulio Luca Pilo,et al. The Italian smart grid pilot projects: Selection and assessment of the test beds for the regulation of smart electricity distribution , 2015 .
[303] Li Hai-feng. Optimization Model of Electric Vehicle Charging Station Siting Based on Game Theory , 2011 .
[304] Jennifer King,et al. Taken Out of Context: An Empirical Analysis of Westin’s Privacy Scale , 2014 .
[305] B. Misra,et al. Impact of Data Normalization on Stock Index Forecasting , 2013 .
[306] Martin C. Libicki,et al. Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar , 2014 .
[307] Helmut Krcmar,et al. Modeling and Simulating Apache Spark Streaming Applications , 2016, Softwaretechnik-Trends.
[308] Sevil Sen,et al. Automatic Generation of Mobile Malwares Using Genetic Programming , 2015, EvoApplications.
[309] Azzedine Boukerche,et al. A novel multi-hop clustering scheme for vehicular ad-hoc networks , 2011, MobiWac '11.
[310] Wang Yun-fa. Location and algorithm of multi-level electric vehicle charging stations , 2011 .
[311] Zhi Zhou,et al. Efficient Resource Allocation for On-Demand Mobile-Edge Cloud Computing , 2018, IEEE Transactions on Vehicular Technology.
[312] Michael D. Ernst,et al. HaLoop , 2010, Proc. VLDB Endow..
[313] Giuseppe Lugano,et al. Virtual assistants and self-driving cars , 2017, 2017 15th International Conference on ITS Telecommunications (ITST).
[314] Juergen Luettin,et al. Audio-Visual Speech Modeling for Continuous Speech Recognition , 2000, IEEE Trans. Multim..
[315] Santiago Aja-Fernández,et al. A local fuzzy thresholding methodology for multiregion image segmentation , 2015, Knowl. Based Syst..
[316] Kat Krol,et al. Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours , 2016, SOUPS.
[317] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[318] Maleq Khan,et al. Fast parallel conversion of edge list to adjacency list for large-scale graphs , 2015, SpringSim.
[319] Ioannis Pitas,et al. Visual Lip Activity Detection and Speaker Detection Using Mouth Region Intensities , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[320] J. Carman. Consumer perceptions of service quality: an assessment of the SERVQUAL dimensions , 1990 .
[321] Carlos García-Martínez,et al. Local Search Based on Genetic Algorithms , 2008, Advances in Metaheuristics for Hard Optimization.
[322] Ole Agesen,et al. A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.
[323] Zhu Han,et al. When Mobile Blockchain Meets Edge Computing , 2017, IEEE Communications Magazine.
[324] Federico Caprotti,et al. The Smart City as Global Discourse: Storylines and Critical Junctures across 27 Cities , 2019, Journal of Urban Technology.
[325] Liang Guo,et al. Research on selection strategy of machining equipment in cloud manufacturing , 2014 .
[326] Igor Santos,et al. Opcode sequences as representation of executables for data-mining-based unknown malware detection , 2013, Inf. Sci..
[327] Fei Shi,et al. Cluster based emergency message dissemination scheme for vehicular ad hoc networks , 2015, IMCOM.
[328] John A. Clark,et al. Evolutionary Improvement of Programs , 2011, IEEE Transactions on Evolutionary Computation.
[329] Muhammad Zubair Shafiq,et al. Malware detection using statistical analysis of byte-level file content , 2009, CSI-KDD '09.
[330] Ming Zhu,et al. Joint Transportation and Charging Scheduling in Public Vehicle Systems—A Game Theoretic Approach , 2017, IEEE Transactions on Intelligent Transportation Systems.
[331] Marco Luise,et al. Cramer-Rao bounds in the parametric estimation of fading radiotransmission channels , 1998, IEEE Trans. Commun..
[332] Min Ouyang,et al. Vulnerability assessment and mitigation for the Chinese railway system under floods , 2015, Reliab. Eng. Syst. Saf..
[333] Manish Jain,et al. Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.
[334] Sangjin Lee,et al. Intelligent Virtual Assistant knows Your Life , 2018, ArXiv.
[335] Kwan-Liu Ma,et al. A Declarative Grammar of Flexible Volume Visualization Pipelines , 2019, IEEE Transactions on Visualization and Computer Graphics.
[336] Philip Bachman,et al. Data Generation as Sequential Decision Making , 2015, NIPS.
[337] Md. Zakirul Alam Bhuiyan,et al. Privacy-friendly platform for healthcare data in cloud based on blockchain environment , 2019, Future Gener. Comput. Syst..
[338] Amelec Viloria,et al. Demand Forecasting Method Using Artificial Neural Networks , 2019, DependSys.
[339] Li Fan,et al. Web caching and Zipf-like distributions: evidence and implications , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[340] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[341] Xu Li,et al. Smartphone Bloatware: An Overlooked Privacy Problem , 2017, SpaCCS.
[342] Josephine Lau,et al. Alexa, Are You Listening? , 2018, Proc. ACM Hum. Comput. Interact..
[343] Sung-Yeul Park,et al. A Seamless Control Strategy of a Distributed Generation Inverter for the Critical Load Safety Under Strict Grid Disturbances , 2013, IEEE Transactions on Power Electronics.
[344] Md Abdul Motaleb Faysal,et al. A Comparative Analysis of Large-scale Network Visualization Tools , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[345] Patricio Córdova. Analysis of Real Time Stream Processing Systems Considering Latency , 2022 .
[346] Malcolm I. Heywood,et al. On evolving buffer overflow attacks using genetic programming , 2006, GECCO '06.
[347] Amelec Viloria,et al. Greenhouse Gases Emissions and Electric Power Generation in Latin American Countries in the Period 2006-2013 , 2018, DMBD.
[348] Mugdha Jain,et al. Adapting k-means for Clustering in Big Data , 2014 .
[349] WenAn Tan,et al. A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing , 2014, IEEE Systems Journal.
[350] K C Gouda,et al. Virtualization Approaches in Cloud Computing , 2014 .
[351] Jixin Ma,et al. FDCT and Perceptual Hash-Based Watermarking Algorithm for Medical Images , 2019, Innovation in Medicine and Healthcare Systems, and Multimedia.
[352] Andrew Walenstein,et al. Normalizing Metamorphic Malware Using Term Rewriting , 2006, 2006 Sixth IEEE International Workshop on Source Code Analysis and Manipulation.
[353] R. Mansell,et al. Cyber trust and crime prevention: a synthesis of the state-of-the-art science reviews , 2004 .
[354] Faqihza Mukhlish,et al. The Risks of Low Level Narrow Artificial Intelligence , 2018, 2018 IEEE International Conference on Intelligence and Safety for Robotics (ISR).
[355] Prasant Mohapatra,et al. Predicting user traits from a snapshot of apps installed on a smartphone , 2014, MOCO.
[356] Moni Naor,et al. The load, capacity and availability of quorum systems , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[357] Axel Küpper,et al. Designing a GDPR-Compliant and Usable Privacy Dashboard , 2017, Privacy and Identity Management.
[358] Alan Wee-Chung Liew,et al. Physiological and behavioral lip biometrics: A comprehensive study of their discriminative power , 2012, Pattern Recognit..
[359] Scott Shenker,et al. Discretized streams: fault-tolerant streaming computation at scale , 2013, SOSP.
[360] A. Karvonen,et al. Stretching “smart”: advancing health and well-being through the smart city agenda , 2019, Smart and Sustainable Cities?.
[361] Allyson L. Umberger. Distributed Generation: How Localized Energy Production Reduces Vulnerability to Outages and Environmental Damage in the Wake of Climate Change , 2012 .
[362] Mehdi Dehghan,et al. Adaptive S-grid: A new adaptive quorum-based power saving protocol for multi-hop ad hoc networks , 2017, 2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI).
[363] Xun Xu,et al. From cloud computing to cloud manufacturing , 2012 .
[364] Da Ruan,et al. Fuzzy systems and soft computing in nuclear engineering , 2000 .
[365] Madhav V. Marathe,et al. A fast parallel algorithm for counting triangles in graphs using dynamic load balancing , 2015, 2015 IEEE International Conference on Big Data (Big Data).
[366] Zheng Yan,et al. PerRec: A Permission Configuration Recommender System for Mobile Apps , 2017, ICA3PP.
[367] Ling Gao,et al. An Intrusion Detection Model Based on Deep Belief Networks , 2014, 2014 Second International Conference on Advanced Cloud and Big Data.
[368] Lei Gu,et al. Memory or Time: Performance Evaluation for Iterative Operation on Hadoop and Spark , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[369] Wim Bernasco,et al. FORAGING STRATEGIES OF HOMO CRIMINALIS : LESSONS FROM BEHAVIORAL ECOLOGY , 2009 .
[370] Jahangir H. Sarker,et al. Mobile RFID System in the Presence of Denial-of-Service Attacking Signals , 2017, IEEE Transactions on Automation Science and Engineering.
[371] Eliana Mirledy Toro Ocampo,et al. PRONÓSTICO DE VENTAS USANDO REDES NEURONALES , 2004 .
[372] Marit Hansen,et al. Marrying Transparency Tools with User-Controlled Identity Management , 2007, FIDIS.
[373] Viloria Silva,et al. Indicators Systems for Evaluating the Efficiency of Political Awareness of Rational Use of Electricity , 2012 .
[374] Mark Harman,et al. Ieee Transactions on Evolutionary Computation 1 , 2022 .
[375] Matti Pietikäinen,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON MULTIMEDIA 1 Lipreading with Local Spatiotemporal Descriptors , 2022 .
[376] Supreet Kaur,et al. A Survey in fog Computing , 2018 .
[377] Ali Al-Haj,et al. Secured Telemedicine Using Region-Based Watermarking with Tamper Localization , 2014, Journal of Digital Imaging.
[378] Anabel Quan-Haase,et al. Privacy Attitudes and Concerns in the Digital Lives of Older Adults: Westin’s Privacy Attitude Typology Revisited , 2018, American Behavioral Scientist.
[379] Xing Fang,et al. IBM Cloud Computing Powering a Smarter Planet , 2009, CloudCom.
[380] Yanmei Li,et al. Traceable and Complete Fine-Grained Revocable Multi-authority Attribute-Based Encryption Scheme in Social Network , 2017, SpaCCS.
[381] Amelec Viloria,et al. Statistical Adjustment Module Advanced Optimizer Planner and SAP Generated the Case of a Food Production Company , 2016 .
[382] Paul Ekblom. Terrorism - lessons from natural and human co-evolutionary arms races , 2015 .
[383] Dale R. Thompson,et al. Visualization of DNS Tunneling Attacks Using Parallel Coordinates Technique , 2019, SpaCCS.
[384] Wei Wang,et al. APP Vetting Based on the Consistency of Description and APK , 2014, INTRUST.
[385] Zhiyuan Liu,et al. Network representation learning: an overview , 2017 .
[386] Michele Nappi,et al. Gender classification on 2D human skeleton , 2019, 2019 3rd International Conference on Bio-engineering for Smart Technologies (BioSMART).
[387] Jesus Alonso-Zarate,et al. A Survey on Application Layer Protocols for the Internet of Things , 2015 .
[388] Xu Xiao-hui. Distribution Network Planning by Considering Siting and Sizing of Electric Vehicle Charging Stations , 2013 .
[389] Ashutosh Kumar Singh,et al. A Comparative Study of the Approach Provided for Preventing the Data Leakage , 2017 .
[390] Balachander Krishnamurthy,et al. Privacy leakage vs . Protection measures : the growing disconnect , 2011 .
[391] Wei Wang,et al. A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems , 2018, IEEE Transactions on Information Forensics and Security.
[392] Kim-Kwang Raymond Choo,et al. Internet data budget allocation policies for diverse smartphone applications , 2016, EURASIP J. Wirel. Commun. Netw..
[393] Md. Arafatur Rahman,et al. Cloud Enabled e-Glossary System: A Smart Campus Perspective , 2018, SpaCCS.
[394] Xing Xu,et al. Prediction of academic performance associated with internet usage behaviors using machine learning algorithms , 2019, Comput. Hum. Behav..
[395] Madhusudan Singh,et al. Blockchain: A game changer for securing IoT data , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).
[396] Jiri Fridrich,et al. New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[397] Nandakishore Santhi,et al. Understanding Cascading Failures in Power Grids , 2010, ArXiv.
[398] Ken-ichi Matsumoto,et al. Predicting Re-opened Bugs: A Case Study on the Eclipse Project , 2010, 2010 17th Working Conference on Reverse Engineering.
[399] Todd Litman,et al. Transportation and public health. , 2013, Annual review of public health.
[400] Yanjun Qi,et al. Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers , 2016, NDSS.
[401] Leandros A. Maglaras,et al. HEART-IS: A novel technique for evaluating human error-related information security incidents , 2019, Comput. Secur..
[402] Nicholas R. Jennings,et al. Intention-Aware Routing of Electric Vehicles , 2016, IEEE Transactions on Intelligent Transportation Systems.
[403] Rajesh Kumar,et al. A hybrid approach for gait based gender classification using gei and spatio temporal parameters , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[404] Eun-Ju Lee,et al. Design and evaluation of a cluster-based fuzzy cooperative caching method for MANETs , 2011 .
[405] Scott Shenker,et al. Spark: Cluster Computing with Working Sets , 2010, HotCloud.
[406] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[407] Alfredo De Santis,et al. E-mail-Based Covert Channels for Asynchronous Message Steganography , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[408] Domenico Pascarella,et al. Dependability issues in visual-haptic interfaces , 2010, J. Vis. Lang. Comput..
[409] Amit Kumar Singh,et al. Quantization based multiple medical information watermarking for secure e-health , 2017, Multimedia Tools and Applications.
[410] Su Hua,et al. Daily Sales Forecasting for Grapes by Support Vector Machine , 2013, CCTA.
[411] Xiaoyan Gu,et al. An appearance‐preserving simplification method for complex 3D building models , 2019, Trans. GIS.
[412] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[413] Shaikh Arifuzzaman,et al. Overcoming MPI Communication Overhead for Distributed Community Detection , 2018 .
[414] Walid Maalej,et al. Towards understanding and detecting fake reviews in app stores , 2019, Empirical Software Engineering.
[415] L. Erlikh,et al. Leveraging legacy system dollars for e-business , 2000 .
[416] Xiaohui Zhao,et al. Efficient Sharing and Fine-Grained Scheduling of Virtualized GPU Resources , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).
[417] Peter Butala,et al. Decentralised network architecture for cloud manufacturing , 2017, Int. J. Comput. Integr. Manuf..
[418] Xizheng Zhang,et al. Autonomous path tracking control of intelligent electric vehicles based on lane detection and optimal preview method , 2019, Expert Syst. Appl..
[419] Alexander M. Rush,et al. Image-to-Markup Generation with Coarse-to-Fine Attention , 2016, ICML.
[420] Bai Wang,et al. Attention Based Meta Path Fusion for Heterogeneous Information Network Embedding , 2018, PRICAI.
[421] Andrea F. Abate,et al. An interactive virtual guide for the AR based visit of archaeological sites , 2011, J. Vis. Lang. Comput..
[422] K.-C. Liu. Colour image watermarking for tamper proofing and pattern-based recovery , 2012 .
[423] Paul S. Bradley,et al. Mathematical Programming for Data Mining: Formulations and Challenges , 1999, INFORMS J. Comput..
[424] Xiaohui Zhao,et al. Research on CTR Prediction Based on Deep Learning , 2019, IEEE Access.
[425] Hui Wan,et al. Research on Innovation of Management Concept of Urban Underground Pipelines Based on Big-Knowledge-Thinking in the Big Data Era , 2017, 2017 IEEE International Conference on Big Knowledge (ICBK).
[426] Amelec Viloria,et al. Measures of Concentration and Stability: Two Pedagogical Tools for Industrial Organization Courses , 2018, ICSI.
[427] Mohammed Azmi Al-Betar,et al. Text feature selection with a robust weight scheme and dynamic dimension reduction to text document clustering , 2017, Expert Syst. Appl..
[428] Claire Le Goues,et al. A genetic programming approach to automated software repair , 2009, GECCO.
[429] Amelec Viloria,et al. An intelligent strategy for faults location in distribution networks with distributed generation , 2019, J. Intell. Fuzzy Syst..
[430] G. Leitmann. On generalized Stackelberg strategies , 1978 .
[431] Michele Nappi,et al. Context awareness in biometric systems and methods: State of the art and future scenarios , 2018, Image Vis. Comput..
[432] Qin Liu,et al. A Dual Privacy Preserving Scheme in Continuous Location-Based Services , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[433] A. Murat Tekalp,et al. Discriminative Analysis of Lip Motion Features for Speaker Identification and Speech-Reading , 2006, IEEE Transactions on Image Processing.
[434] Gary B. Lamont,et al. A retrovirus inspired algorithm for virus detection & optimization , 2006, GECCO.
[435] Tiberiu Popa,et al. Time series matching for biometric visual passwords , 2017, SIGGRAPH Posters.
[436] Luigi Barone,et al. Nature-Inspired Techniques in the Context of Fraud Detection , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[437] Jasni Mohamad Zain,et al. Digital watermarking for recovering attack areas of medical images using spiral numbering , 2013, 2013 International Conference on Electronics, Computer and Computation (ICECCO).
[438] Md Zakirul Alam Bhuiyan,et al. A survey on security attacks in VANETs: Communication, applications and challenges , 2019, Veh. Commun..
[439] Jehn-Ruey Jiang. Expected quorum overlap sizes of quorum systems for asynchronous power-saving in mobile ad hoc networks , 2008, Comput. Networks.
[440] Petar S. Aleksic,et al. Keyword spotting for Google assistant using contextual speech recognition , 2017, 2017 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU).
[441] Robert E. Kooij,et al. Context-independent centrality measures underestimate the vulnerability of power grids , 2013, Int. J. Crit. Infrastructures.
[442] Jie Jia,et al. Joint Optimization on Both Routing and Resource Allocation for Millimeter Wave Cellular Networks , 2019, IEEE Access.
[443] Sohail Jabbar,et al. A collision avoidance scheme for autonomous vehicles inspired by human social norms , 2018, Comput. Electr. Eng..
[444] Kai Rannenberg,et al. Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns , 2015, Comput. Secur..
[445] Dongqing Xie,et al. Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study , 2017, 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).
[446] Mohsen Guizani,et al. Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory , 2019, IEEE Transactions on Vehicular Technology.
[447] Peter Regner,et al. Bayesian network construction using a fuzzy rule based approach for medical decision support , 2015, Expert Syst. J. Knowl. Eng..
[448] Yang Xu,et al. An adaptive and configurable protection framework against android privilege escalation threats , 2019, Future Gener. Comput. Syst..
[449] Pascale Carayon,et al. Human and organizational factors in computer and information security: Pathways to vulnerabilities , 2009, Comput. Secur..
[450] Bin Wu,et al. Meta-path-based link prediction in schema-rich heterogeneous information network , 2017, International Journal of Data Science and Analytics.
[451] Tzi-cker Chiueh,et al. Automatic Generation of String Signatures for Malware Detection , 2009, RAID.
[452] Ferda Ernawan,et al. Tchebichef image watermarking along the edge using YCoCg-R color space for copyright protection , 2019, International Journal of Electrical and Computer Engineering (IJECE).
[453] Yang Ju. Planning of Charging Facilities of Electric Vehicles Based on Geographical Zonal Charging Demand Coefficients , 2015 .
[454] Gang Ma,et al. Study on multi-task oriented services composition and optimisation with the ‘Multi-Composition for Each Task’ pattern in cloud manufacturing systems , 2013, Int. J. Comput. Integr. Manuf..
[455] Lara Khansa,et al. How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management , 2009, Computers & security.
[456] Santiago Segarra,et al. Stability and continuity of centrality measures in weighted graphs , 2014, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[457] Arturo Peralta,et al. Optimal scalability of fiwi networks based on multistage stochastic programming and policies , 2017, IEEE/OSA Journal of Optical Communications and Networking.
[458] Kin Keung Lai,et al. Demand forecasting of perishable farm products using support vector machine , 2013, Int. J. Syst. Sci..
[459] Gianluca Dini,et al. Risk analysis of Android applications: A user-centric solution , 2018, Future Gener. Comput. Syst..
[460] Xin Zhong,et al. A High-Capacity Reversible Watermarking Scheme Based on Shape Decomposition for Medical Images , 2018, Int. J. Pattern Recognit. Artif. Intell..
[461] Nicholas R. Magliocca,et al. Modeling cocaine traffickers and counterdrug interdiction forces as a complex adaptive system , 2019, Proceedings of the National Academy of Sciences.
[462] Wojciech Mazurczyk,et al. Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach , 2017, 2017 IEEE 42nd Conference on Local Computer Networks (LCN).
[463] Harry Eugene Stanley,et al. Catastrophic cascade of failures in interdependent networks , 2009, Nature.
[464] Michele Nappi,et al. Deceiving faces: When plastic surgery challenges face recognition , 2016, Image Vis. Comput..
[465] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[466] Thomas Wischgoll,et al. Display Systems for Visualization and Simulation in Virtual Environments , 2017, Visualization and Data Analysis.
[467] George Q. Huang,et al. A cooperative approach to service booking and scheduling in cloud manufacturing , 2019, Eur. J. Oper. Res..
[468] Bo Lang,et al. Topic Model Based Android Malware Detection , 2019, SpaCCS.
[469] Tara N. Sainath,et al. Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.
[470] Francisco Javier Ferrández Pastor,et al. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture , 2016, Sensors.
[471] H. Varian. Computer Mediated Transactions , 2010 .
[472] Laura Pasculli Henao,et al. Visión agrícola del TLC entre Colombia y Estados Unidos: preparación, negociación, implementación y aprovechamiento , 2013 .
[473] Latifur Khan,et al. A Machine Learning Approach to Android Malware Detection , 2012, 2012 European Intelligence and Security Informatics Conference.
[474] Yasuhiko Morimoto,et al. A new e-voting scheme based on revised simplified verifiable re-encryption mixnet , 2017, 2017 International Conference on Networking, Systems and Security (NSysS).
[475] Mark Stamp,et al. Compression-based analysis of metamorphic malware , 2015, Int. J. Secur. Networks.
[476] Witawas Srisa-an,et al. Significant Permission Identification for Machine-Learning-Based Android Malware Detection , 2018, IEEE Transactions on Industrial Informatics.
[477] M. John Hodgson,et al. A network location-allocation model trading off flow capturing andp-median objectives , 1992, Ann. Oper. Res..
[478] Shen Su,et al. Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment , 2019, IEEE Transactions on Industrial Informatics.
[479] Bo Hu,et al. Universal framework for vulnerability assessment of power grid based on complex networks , 2018, 2018 Chinese Control And Decision Conference (CCDC).
[480] Robert P Skelton,et al. No local adaptation in leaf or stem xylem vulnerability to embolism, but consistent vulnerability segmentation in a North American oak. , 2019, The New phytologist.
[481] Nai-Wei Lo,et al. An analysis framework for information loss and privacy leakage on Android applications , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).
[482] Ferenc Huszar,et al. How (not) to Train your Generative Model: Scheduled Sampling, Likelihood, Adversary? , 2015, ArXiv.
[483] E. Weippl,et al. Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting , 2013 .
[484] Wu He,et al. A state-of-the-art survey of cloud manufacturing , 2015, Int. J. Comput. Integr. Manuf..
[485] Virgil D. Gligor,et al. A guide to understanding covert channel analysis of trusted systems , 1993 .
[486] Yi Wang,et al. Clustering of Electricity Consumption Behavior Dynamics Toward Big Data Applications , 2016, IEEE Transactions on Smart Grid.
[487] Pengfei Zhang,et al. Localizing Wireless Jamming Attacks with Minimal Network Resources , 2017, SpaCCS Workshops.
[488] Guozhu Jia,et al. Multi-Objective Service Selection and Scheduling with Linguistic Preference in Cloud Manufacturing , 2019, Sustainability.
[489] Jie Tao,et al. The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning , 2018, SpaCCS.
[490] Chengcheng Hu,et al. Mortality and Prehospital Blood Pressure in Patients With Major Traumatic Brain Injury: Implications for the Hypotension Threshold , 2017, JAMA surgery.
[491] Xiong Li,et al. Event detection and evolution in multi-lingual social streams , 2020, Frontiers of Computer Science.
[492] Ahmad-Reza Sadeghi,et al. Invited: Can IoT be secured: Emerging challenges in connecting the unconnected , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[493] Chris Mattmann,et al. SciSpark: Applying in-memory distributed computing to weather event detection and tracking , 2015, 2015 IEEE International Conference on Big Data (Big Data).
[494] Li Shen,et al. A Novel Hardware Assisted Full Virtualization Technique , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[495] Mark Stamp,et al. Chi-squared distance and metamorphic virus detection , 2013, Journal of Computer Virology and Hacking Techniques.
[496] Wang Dong-rui. Vulnerability analysis on power communication network based on complex network theory , 2009 .
[497] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[498] Rk Wortley. Affordance and Situational Crime Prevention: Implications for Counter-terrorism , 2012 .
[499] R. Collorec,et al. Relevance of watermarking in medical imaging , 2000, Proceedings 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine. ITAB-ITIS 2000. Joint Meeting Third IEEE EMBS International Conference on Information Technol.
[500] Wojciech Mazurczyk,et al. YouSkyde: information hiding for Skype video traffic , 2016, Multimedia Tools and Applications.
[501] Paul Ekblom. The conjunction of criminal opportunity theory , 2010 .
[502] Wang Long. An Optimization Approach for the Layout and Location of Electric Vehicle Charging Stations , 2012 .
[503] Jie Wu,et al. Big Data Reduction for a Smart City’s Critical Infrastructural Health Monitoring , 2018, IEEE Communications Magazine.
[504] Yuan Tian,et al. Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home , 2018, ArXiv.
[505] Witold Pedrycz,et al. Uncertainty-Aware Online Scheduling for Real-Time Workflows in Cloud Service Environment , 2021, IEEE Transactions on Services Computing.
[506] Mauricio Barahona,et al. Structure of complex networks: Quantifying edge-to-edge relations by failure-induced flow redistribution , 2013, Network Science.
[507] Dmitry Efimov,et al. Smart Technologies in Emergency Control of Russia's Unified Energy System , 2013, IEEE Transactions on Smart Grid.
[508] Maria Tsinidou,et al. Evaluation of the factors that determine quality in higher education: an empirical study , 2010 .
[509] Yann-Gaël Guéhéneuc,et al. On the Analysis of Co-Occurrence of Anti-Patterns and Clones , 2017, 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS).
[510] Wojciech Mazurczyk,et al. Steganography in Modern Smartphones and Mitigation Techniques , 2014, IEEE Communications Surveys & Tutorials.
[511] A V Netto. Visualization System Integrated for Electric Power Distribution Networks , 2010, IEEE Latin America Transactions.
[512] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[513] Pallab Dutta,et al. A Novel Approach to Trust based Identification of Leaders in Social Networks , 2016 .
[514] Sunghun Kim,et al. How long did it take to fix bugs? , 2006, MSR '06.
[515] Xin Yao,et al. Mathematical modeling and multi-objective evolutionary algorithms applied to dynamic flexible job shop scheduling problems , 2015, Inf. Sci..
[516] Mark Stamp,et al. Structural entropy and metamorphic malware , 2013, Journal of Computer Virology and Hacking Techniques.
[517] Juan-Zi Li,et al. Learning to Infer Competitive Relationships in Heterogeneous Networks , 2018, ACM Trans. Knowl. Discov. Data.
[518] Milad Shokouhi,et al. Inferring the demographics of search users: social data meets search queries , 2013, WWW.
[519] Barry Wellman,et al. Local Virtuality in an Organization: Implications for Community of Practice , 2005 .
[520] Tim French,et al. On the Interactions of Awareness and Certainty , 2011, Australasian Conference on Artificial Intelligence.
[521] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[522] John S. Oakland,et al. Total Quality Management in Services , 1994 .
[523] Fung Po Tso,et al. SDN-based Virtual Machine management for Cloud Data Centers , 2014, 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet).
[524] Wolfgang Spohn,et al. Two Coherence Principles , 1999 .
[525] Chris Reed,et al. A Data Protection Impact Assessment Methodology for Cloud , 2015, APF.
[526] A. Haurie,et al. Sequential Stackelberg equilibria in two-person games , 1985 .
[527] Toly Chen,et al. Strengthening the Competitiveness and Sustainability of a Semiconductor Manufacturer with Cloud Manufacturing , 2014 .
[528] David Evans,et al. Privacy Protection for Social Networking Platforms , 2008 .
[529] Andrea F. Abate,et al. Fast Iris Recognition on Smartphone by means of Spatial Histograms , 2014, BIOMET.
[530] Henri Luchian,et al. Feature Extraction Using Genetic Programming with Applications in Malware Detection , 2015, 2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC).
[531] Ravi Sankar,et al. Time Series Prediction Using Support Vector Machines: A Survey , 2009, IEEE Computational Intelligence Magazine.
[532] Matthias Bauer. New covert channels in HTTP: adding unwitting Web browsers to anonymity sets , 2003, WPES '03.
[533] Steven Warach,et al. Cerebral Microbleeds : A Field Guide to their Detection and Interpretation , 2012 .
[534] Fei Tao,et al. SDMSim: A manufacturing service supply–demand matching simulator under cloud environment , 2017 .
[535] Muhammad Arif,et al. A Hybrid Technique for De-Noising Multi-Modality Medical Images by Employing Cuckoo's Search with Curvelet Transform , 2018 .
[536] Zibin Zheng,et al. MalPat: Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs , 2018, IEEE Transactions on Reliability.
[537] Alfredo De Santis,et al. Steganography and Secure Communication on Online Social Networks and Online Photo Sharing , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.
[538] Carlos Andújar,et al. Error-aware construction and rendering of multi-scan panoramas from massive point clouds , 2017, Comput. Vis. Image Underst..
[539] Davide Castelvecchi,et al. Can we open the black box of AI? , 2016, Nature.
[540] Elizabeth Fife,et al. The Privacy Calculus: Mobile Apps and User Perceptions of Privacy and Security , 2012 .
[541] SAMANTHA KLEINBERG,et al. Why: A Guide to Finding and Using Causes , 2015 .
[542] Nor Aniza Abdullah,et al. Maximizing Information of Multimodality Brain Image Fusion Using Curvelet Transform with Genetic Algorithm , 2014, 2014 International Conference on Computer Assisted System in Health.
[543] David Yeregui Marcos del Blanco,et al. Review of Cryptographic Schemes applied to Remote Electronic Voting systems: remaining challenges and the upcoming post-quantum paradigm , 2018 .
[544] Jian Shen,et al. S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks , 2017, SpaCCS.
[545] Mahir Oner. In the Perspective of Big Data , 2019 .
[546] Amelec Viloria. Commercial Strategies Providers Pharmaceutical Chains for Logistics Cost Reduction , 2016 .
[547] Dimitris Gritzalis,et al. Delegate the smartphone user? Security awareness in smartphone platforms , 2013, Comput. Secur..
[548] Josiah A. B. S. Dykstra,et al. Acting in the unknown: the cynefin framework for managing cybersecurity risk in dynamic decision making , 2016, 2016 International Conference on Cyber Conflict (CyCon U.S.).
[549] Fang Tao. A New Integrative Vulnerability Evaluation Model to Power Grid Based on Running State and Structure , 2009 .
[550] Honggang Zhang,et al. WAF-Based Chinese Character Recognition for Spam Image Filtering , 2018 .
[551] Andrew H. Sung,et al. Static analyzer of vicious executables (SAVE) , 2004, 20th Annual Computer Security Applications Conference.
[552] Peng Liu,et al. A Comprehensive Survey of Privacy-Preserving in Smart Grid , 2016, SpaCCS.
[553] Guoqiang Peter Zhang,et al. Time series forecasting using a hybrid ARIMA and neural network model , 2003, Neurocomputing.
[554] Kuokkwee Wee,et al. A method for root cause analysis with a Bayesian belief network and fuzzy cognitive map , 2015, Expert Syst. Appl..
[555] Aravind Srinivasan,et al. Allocation Problems in Ride-sharing Platforms , 2017, AAAI.
[556] Dazhong Wu,et al. Cloud manufacturing: Strategic vision and state-of-the-art☆ , 2013 .
[557] José Gabriel Gómez Cortés,et al. Desarrollo de un modelo de redes neuronales artificiales para predecir la resistencia a la compresión y la resistividad eléctrica del concreto , 2007 .
[558] Ming Zhu,et al. Traffic efficiency improvement and passengers comfort in ridesharing systems in VANETs , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).
[559] Md. Arafatur Rahman. Reliability Analysis of ZigBee Based Intra-Vehicle Wireless Sensor Networks , 2014, Nets4Cars/Nets4Trains/Nets4Aircraft.
[560] Jürgen Schmidhuber,et al. LSTM: A Search Space Odyssey , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[561] Yaling Zhang,et al. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage , 2018, PloS one.
[562] Raja R. A. Issa,et al. Location Optimization with Uncertainty for Industrial Project Using Discrete Block Model and Spatial Meshing Algorithm , 2019, J. Comput. Civ. Eng..
[563] Jianxin Li,et al. Event Detection and Evolution Based on Knowledge Base , 2017 .
[564] Zhong Chen,et al. AutoCog: Measuring the Description-to-permission Fidelity in Android Applications , 2014, CCS.
[565] Michael Wagner,et al. "liveness" Verification in Audio-video Authentication , 2004, INTERSPEECH.
[566] Dit-Yan Yeung,et al. Towards Bayesian Deep Learning: A Framework and Some Existing Methods , 2016, IEEE Transactions on Knowledge and Data Engineering.
[567] Xiaoyong Li,et al. Secure Transfer Protocol Between App and Device of Internet of Things , 2017, SpaCCS Workshops.
[568] Mattia Monga,et al. Code Normalization for Self-Mutating Malware , 2007, IEEE Security & Privacy.
[569] Lingfeng Wang,et al. A Game-Theoretic Framework for Vehicle-to-Grid Frequency Regulation Considering Smart Charging Mechanism , 2017, IEEE Transactions on Smart Grid.
[570] Lujo Bauer,et al. Modeling and Enhancing Android's Permission System , 2012, ESORICS.
[571] Alagan Anpalagan,et al. Industrial Internet of Things Driven by SDN Platform for Smart Grid Resiliency , 2019, IEEE Internet of Things Journal.
[572] Yizhou Sun,et al. Graph Regularized Transductive Classification on Heterogeneous Information Networks , 2010, ECML/PKDD.
[573] Rajkumar Buyya,et al. Energy-Efficient Management of Data Center Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges , 2010, PDPTA.
[574] Symeon Papavassiliou,et al. Network intrusion and fault detection: a statistical anomaly approach , 2002, IEEE Commun. Mag..
[575] Been Kim,et al. Interactive and interpretable machine learning models for human machine collaboration , 2015 .
[576] Yan Jia,et al. Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks , 2013 .
[577] Moayad Aloqaily,et al. Connected, Autonomous and Electric Vehicles: The Optimum Value for a Successful Business Model , 2018, 2018 Fifth International Conference on Internet of Things: Systems, Management and Security.
[578] Kusprasapta Mutijarsa,et al. Secure IoT Communication using Blockchain Technology , 2018, 2018 International Symposium on Electronics and Smart Devices (ISESD).
[579] Joshua B. Tenenbaum,et al. Building machines that learn and think like people , 2016, Behavioral and Brain Sciences.
[580] N. Tilley,et al. Situational Crime Prevention , 2022, Encyclopedia of Violence, Peace, & Conflict.
[581] Ziming Zhao,et al. RiskMon: continuous and automated risk assessment of mobile applications , 2014, CODASPY '14.
[582] Alfredo De Santis,et al. An asynchronous covert channel using spam , 2012, Comput. Math. Appl..
[583] George Loukas,et al. Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework , 2018, Comput. Secur..
[584] Md. Zakirul Alam Bhuiyan,et al. A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function , 2019, SpaCCS.
[585] Sven Strauss,et al. Theory Of The Location Of Industries , 2016 .
[586] Eduardo Huedo,et al. Dynamic Provision of Computing Resources from Grid Infrastructures and Cloud Providers , 2009, 2009 Workshops at the Grid and Pervasive Computing Conference.
[587] M. J. Hodgson. A Flow-Capturing Location-Allocation Model , 2010 .
[588] Hans-Arno Jacobsen,et al. Distributed Convex Optimization for Electric Vehicle Aggregators , 2017, IEEE Transactions on Smart Grid.
[589] Axel Jantsch,et al. Fog Computing in the Internet of Things , 2018 .
[590] Elisa Bertino,et al. Android resource usage risk assessment using hidden Markov model and online learning , 2017, Comput. Secur..
[591] Jie Wu,et al. Content-Centric Event-Insensitive Big Data Reduction in Internet of Things , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[592] Yang Lu,et al. From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues , 2020, HICSS.
[593] Ponnurangam Kumaraguru,et al. Privacy Indexes: A Survey of Westin's Studies , 2005 .
[594] Kyoung-Yun Kim,et al. Systematic causal knowledge acquisition using FCM Constructor for product design decision support , 2011, Expert Syst. Appl..
[595] Erich Elsen,et al. Deep Speech: Scaling up end-to-end speech recognition , 2014, ArXiv.
[596] Yongkui Liu,et al. Manufacturing Service Management in Cloud Manufacturing: Overview and Future Research Directions , 2015 .
[597] Josef Bigün,et al. Audio-visual person authentication using lip-motion from orientation maps , 2007, Pattern Recognit. Lett..
[598] M. Shamim Hossain,et al. New Zero-Watermarking Algorithm Using Hurst Exponent for Protection of Privacy in Telemedicine , 2018, IEEE Access.
[599] Yan Zhang,et al. Deep Learning for Secure Mobile Edge Computing in Cyber-Physical Transportation Systems , 2019, IEEE Network.
[600] Omar Montoya Suárez,et al. APLICACIÓN DEL ANÁLISIS FACTORIAL A LA INVESTIGACIÓN DE MERCADOS. CASO DE ESTUDIO Application of the factorial analysis to the investigation of markets. Case of study , 2007 .
[601] Karl N. Levitt,et al. MCF: a malicious code filter , 1995, Comput. Secur..
[602] Ingmar Weber,et al. The demographics of web search , 2010, SIGIR.
[603] Chen Guan. Multi-objective Optimal Planning of Electric Vehicle Charging Stations Considering Carbon Emission , 2014 .
[604] Wu Ying,et al. Location and Capacity Planning of Electric Vehicles Charging Piles , 2019, IOP Conference Series: Materials Science and Engineering.
[605] Ralf C. Staudemeyer,et al. Applying long short-term memory recurrent neural networks to intrusion detection , 2015 .
[606] Toby Velte,et al. Cloud Computing, A Practical Approach , 2009 .
[607] Chin-Chen Chang,et al. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery , 2008, Pattern Recognit..
[608] Juliana Freire,et al. Spatio-Temporal Urban Data Analysis: A Visual Analytics Perspective , 2018, IEEE Computer Graphics and Applications.
[609] Kim-Kwang Raymond Choo,et al. Context Aware Ubiquitous Biometrics in Edge of Military Things , 2017, IEEE Cloud Computing.
[610] Tom Fitfield. Introduction to OpenStack , 2013 .
[611] Dirk Helbing,et al. Transient dynamics increasing network vulnerability to cascading failures. , 2007, Physical review letters.
[612] Lei Zhou,et al. Research on the Intelligent Monitoring System of Indoor Electrical Safety Based on the Internet of Things , 2014 .
[613] Christian Jutten,et al. An Analysis of Visual Speech Information Applied to Voice Activity Detection , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[614] Mark West,et al. I'd blush if I could: closing gender divides in digital skills through education , 2019 .
[615] Vivek Kanhangad,et al. Gender classification in smartphones using gait information , 2018, Expert Syst. Appl..
[616] Chao Feng,et al. Application of Comprehensive Evaluation Method Integrated by Delphi and GAHP in Optimal Siting of Electric Vehicle Charging Station , 2012, 2012 International Conference on Control Engineering and Communication Technology.
[617] Adnan Mohsin Abdulazeez,et al. Gait-Based Human Gender Classification Using Lifting 5/3 Wavelet and Principal Component Analysis , 2018, 2018 International Conference on Advanced Science and Engineering (ICOASE).
[618] Zhenlong Yuan,et al. Droid-Sec: deep learning in android malware detection , 2015, SIGCOMM 2015.