Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings

In this paper, we consider a secrecy wireless-powered cognitive radio network, where an energy harvesting secondary system can share the spectrum of the primary system by assisting its transmission. In particular, we focus on the secure information transmission for the secondary system when an eavesdropper is existed to intercept the secondary user’s confidential information. Closed-form analytical expressions of primary outage probability, secondary secrecy outage probability (SOP) and the probability of non-zero secrecy capacity (PNSC) are derived. We also aim to joint design optimal time-switching ratio and power-splitting coefficient for maximizing the secondary secrecy outage probability under primary requirement constraint. To solve this nonconvex problem, we prove the biconvexity of optimization problem and then develop a corresponding algorithm to solve that optimization problem. Numerical results show that our proposed transmission scheme can provide greater secure information transmission for secondary system and guarantee the outage performance for primary system.

[1]  吴晓波,et al.  Vulnerability of complex networks under multiple node-based attacks , 2013 .

[2]  Lida Xu,et al.  Diverse task scheduling for individualized requirements in cloud manufacturing , 2018, Enterp. Inf. Syst..

[3]  Muhammad Arif,et al.  Efficient facial expression detection by using the Adaptive-Neuro-Fuzzy-Inference-System and the Bezier curve , 2016 .

[4]  I. V. Atanov,et al.  Formalization of the process of directional composition of structures of autonomous power-supply systems during design , 2017 .

[5]  G. Lorenzo,et al.  Minería de datos: Cómo hallar una aguja en un pajar , 2011 .

[6]  Anirudha Sahoo,et al.  Stochastic Model Based Opportunistic Channel Access in Dynamic Spectrum Access Networks , 2014, IEEE Transactions on Mobile Computing.

[7]  Atsushi Fujioka,et al.  A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.

[8]  Chen Wang,et al.  A Service-Oriented System for Optimizing Residential Energy Use , 2009, 2009 IEEE International Conference on Web Services.

[9]  Lorrie Faith Cranor,et al.  Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging , 2015, CHI.

[10]  Lei Ren,et al.  Cloud manufacturing: a new manufacturing paradigm , 2014, Enterp. Inf. Syst..

[11]  Fang Qi,et al.  Efficient Private Matching Scheme for Friend Information Exchange , 2015, ICA3PP.

[12]  久志 半田,et al.  Evolutionary Algorithm を活用した改良型コモンスゲーム , 2006 .

[13]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[14]  Konstantinos Demertzis,et al.  A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security , 2015 .

[15]  Navdeep Jaitly,et al.  Towards End-To-End Speech Recognition with Recurrent Neural Networks , 2014, ICML.

[16]  Ahmed E. Hassan,et al.  Security versus performance bugs: a case study on Firefox , 2011, MSR '11.

[17]  Turan Gonen,et al.  Electric power distribution system engineering , 1985 .

[18]  Vasilios Katos,et al.  Malevolent app pairs: an Android permission overpassing scheme , 2016, Conf. Computing Frontiers.

[19]  Dan Boneh,et al.  An Analysis of Private Browsing Modes in Modern Browsers , 2010, USENIX Security Symposium.

[20]  Michael Kuby,et al.  The flow-refueling location problem for alternative-fuel vehicles , 2005 .

[21]  Geoffrey C. Fox,et al.  Twister: a runtime for iterative MapReduce , 2010, HPDC '10.

[22]  Jie Tang,et al.  Representation Learning for Attributed Multiplex Heterogeneous Network , 2019, KDD.

[23]  Constantinos Patsakis,et al.  The All Seeing Eye: Web to App Intercommunication for Session Fingerprinting in Android , 2017, SpaCCS.

[24]  Barney,et al.  Theoretical Coding : Text Analysis in Grounded Theory , 2004 .

[25]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[26]  Mike Surridge,et al.  Towards a Model of User-centered Privacy Preservation , 2017, ARES.

[27]  Adam Joinson,et al.  Human aspects of cyber security: Behaviour or culture change? , 2018 .

[28]  Madhav V. Marathe,et al.  PATRIC: a parallel algorithm for counting triangles in massive networks , 2013, CIKM.

[29]  Michael J. Franklin,et al.  Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing , 2012, NSDI.

[30]  Josef Bigün,et al.  Motion Features from Lip Movement for Person Authentication , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[31]  Sergio de la Fé Dotres,et al.  Pronóstico de las pérdidas en redes de distribución mediante redes neuronales , 2005 .

[32]  Massimo Marchiori,et al.  A topological analysis of the Italian electric power grid , 2004 .

[33]  David Camacho,et al.  Genetic boosting classification for malware detection , 2016, 2016 IEEE Congress on Evolutionary Computation (CEC).

[34]  Amelec Viloria,et al.  Fuzzy Logic Applied to the Performance Evaluation. Honduran Coffee Sector Case , 2018, ICSI.

[35]  Michael Devetsikiotis,et al.  A hierarchical optimization model for a network of electric vehicle charging stations , 2017 .

[36]  Özgür B. Akan,et al.  Energy Harvesting Cognitive Radio Networking for IoT-enabled Smart Grid , 2018, Mob. Networks Appl..

[37]  Akihiro Nakao,et al.  In-network P2P packet cache processing using scalable P2P network test platform , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.

[38]  Lin Zhang,et al.  Modeling of manufacturing service supply-demand matching hypernetwork in service-oriented manufacturing systems , 2017 .

[39]  Ahmad-Reza Sadeghi,et al.  XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks , 2011 .

[40]  H. Fernandes,et al.  Darwin's unfinished symphony: How culture made the human mind Kevin N. Laland Darwin's unfinished symphony: How c , 2017, Animal Behaviour.

[41]  Arun Ross,et al.  Biometric recognition by gait: A survey of modalities and features , 2018, Comput. Vis. Image Underst..

[42]  Yu He,et al.  The YouTube video recommendation system , 2010, RecSys '10.

[43]  Guojun Wang,et al.  A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks , 2016, SpaCCS.

[44]  Dawei Zhao,et al.  Multiple routes transmitted epidemics on multiplex networks , 2013, ArXiv.

[45]  L. Cranor,et al.  Nudges for Privacy and Security , 2017, ACM Comput. Surv..

[46]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[47]  J. Bouvrie Hierarchical learning : theory with applications in speech and vision , 2009 .

[48]  Andreas Zeller,et al.  How Long Will It Take to Fix This Bug? , 2007, Fourth International Workshop on Mining Software Repositories (MSR'07:ICSE Workshops 2007).

[49]  Wojciech Mazurczyk,et al.  Exploiting IP telephony with silence suppression for hidden data transfers , 2018, Comput. Secur..

[50]  Yves Le Traon,et al.  Automatically securing permission-based software by reducing the attack surface: an application to Android , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.

[51]  Dileep George,et al.  How the brain might work: a hierarchical and temporal model for learning and recognition , 2008 .

[52]  Xiaolei Dong,et al.  TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[53]  Muhammad Arif,et al.  Ubiquitous Healthcare System Based on the Sensors Network and Android Internet of Things Gateway , 2018, 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[54]  Zexin Lu,et al.  A Data Dissemination Algorithm Based on Geographical Quorum System in Wireless Sensor Networks , 2009, 2009 Seventh Annual Communication Networks and Services Research Conference.

[55]  Jasni Mohamad Zain,et al.  HILBERT-LSB-C as authentication system for color medical images , 2015, 2015 4th International Conference on Software Engineering and Computer Systems (ICSECS).

[56]  Mohsen Guizani,et al.  A data-driven method for future Internet route decision modeling , 2019, Future Gener. Comput. Syst..

[57]  Quanyan Zhu,et al.  Optimizing mission critical data dissemination in massive IoT networks , 2017, 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).

[58]  Paul A. Viola,et al.  A unified learning framework for real time face detection and classification , 2002, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition.

[59]  J. Friedman Special Invited Paper-Additive logistic regression: A statistical view of boosting , 2000 .

[60]  Amelec Viloria,et al.  Models of Multivariate Regression for Labor Accidents in Different Production Sectors: Comparative Study , 2018, DMBD.

[61]  Qiang Fu,et al.  Combating the evolving spammers in online social networks , 2018, Comput. Secur..

[62]  Tobias Scheffer,et al.  Finding association rules that trade support optimally against confidence , 2001, Intell. Data Anal..

[63]  Ray Y. Zhong,et al.  Workload-based multi-task scheduling in cloud manufacturing , 2017 .

[64]  Juan Carlos Sanclemente Téllez,et al.  Las ventas y el mercadeo, actividades indisociables y de gran impacto social y económico. El aporte de Tosdal , 2007 .

[65]  Li Tian-tian Optimal Location of Urban Electric Vehicle Charging Stations Using a Two-Step Method , 2013 .

[66]  Srikanth V. Krishnamurthy,et al.  TIDE: A User-centric Tool for Identifying Energy Hungry Applications on Smartphones , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[67]  Song Wang,et al.  An Uncertainty-Aware Evolutionary Scheduling Method for Cloud Service Provisioning , 2016, 2016 IEEE International Conference on Web Services (ICWS).

[68]  Matthias Bethge,et al.  Approximating CNNs with Bag-of-local-Features models works surprisingly well on ImageNet , 2019, ICLR.

[69]  Amelec Viloria,et al.  Methodology for the Design of a Student Pattern Recognition Tool to Facilitate the Teaching - Learning Process Through Knowledge Data Discovery (Big Data) , 2018, DMBD.

[70]  Shaobo Zhang,et al.  A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services , 2019, Future Gener. Comput. Syst..

[71]  Muhammad Arif,et al.  Virtualization Security: Analysis and Open Challenges , 2015 .

[72]  Junwei Tang,et al.  Detecting Permission Over-claim of Android Applications with Static and Semantic Analysis Approach , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.

[73]  Ronald V. Clarke,et al.  Superhighway Robbery: Preventing E-commerce Crime , 2003 .

[74]  Josephine Sullivan,et al.  One millisecond face alignment with an ensemble of regression trees , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[75]  Cao Yijia REVIEW ON MODELS OF CASCADING FAILURE IN COMPLEX POWER GRID , 2005 .

[76]  Yang Li,et al.  Sustainable and Efficient Data Collection from WSNs to Cloud , 2019, IEEE Transactions on Sustainable Computing.

[77]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[78]  Michael McGuire Hypercrime: The New Geometry of Harm , 2007 .

[79]  Ma Wei,et al.  Electric Vehicle Charging Station Planning Based on Computational Geometry Method , 2012 .

[80]  Christine Halverson,et al.  Considering an organization's memory , 1998, CSCW '98.

[81]  Joon Son Chung,et al.  Lip Reading Sentences in the Wild , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[82]  Wenjing Jia,et al.  Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model , 2019, Inf. Sci..

[83]  Anthony J. Maeder,et al.  A Study of Block-Based Medical Image Watermarking Using a Perceptual Similarity Metric , 2005, Digital Image Computing: Techniques and Applications (DICTA'05).

[84]  Premkumar T. Devanbu,et al.  Asking for (and about) permissions used by Android apps , 2013, 2013 10th Working Conference on Mining Software Repositories (MSR).

[85]  潘欢,et al.  实际电网动态结构脆弱性分析与评估 Analysis and Assessment of a Realistic Power Grid’s Dynamic Structure Vulnerability , 2017 .

[86]  Yu He,et al.  HeteSpaceyWalk: A Heterogeneous Spacey Random Walk for Heterogeneous Information Network Embedding , 2019, CIKM.

[87]  Ming Li,et al.  FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.

[88]  Raghavendra Pal,et al.  Clustering Based Single-hop and Multi-hop Message Dissemination Evaluation Under Varying Data Rate in Vehicular Ad-hoc Network , 2016 .

[89]  D. Shier A Min-Max Theorem for p-Center Problems on a Tree , 1977 .

[90]  Christian Biemann,et al.  What do we need to build explainable AI systems for the medical domain? , 2017, ArXiv.

[91]  Minhui Xue,et al.  Revisiting Localization Attacks in Mobile App People-Nearby Services , 2017, SpaCCS.

[92]  Guojun Wang,et al.  Fast curvelet transform through genetic algorithm for multimodal medical image fusion , 2019, Soft Computing.

[93]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[94]  Jun He,et al.  Electric Vehicle Charging Station Planning Based on Multiple-Population Hybrid Genetic Algorithm , 2012, 2012 International Conference on Control Engineering and Communication Technology.

[95]  Frank Piessens,et al.  FPDetective: dusting the web for fingerprinters , 2013, CCS.

[96]  Johannes Gehrke,et al.  Intelligible Models for HealthCare: Predicting Pneumonia Risk and Hospital 30-day Readmission , 2015, KDD.

[97]  Paul Ekblom,et al.  Crime Prevention, Security and Community Safety Using the 5Is Framework , 2010 .

[98]  Stefano Soatto,et al.  Dynamic Textures , 2003, International Journal of Computer Vision.

[99]  Sanjeev Khanna,et al.  Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks , 2012, IEEE/ACM Transactions on Networking.

[100]  Lixiang Li,et al.  Revealing the process of edge-based-attack cascading failures , 2012 .

[101]  Norman R. Swanson,et al.  Forecasting economic time series using flexible versus fixed specification and linear versus nonlinear econometric models , 1997 .

[102]  Peng Shi,et al.  Two-Dimensional Dissipative Control and Filtering for Roesser Model , 2015, IEEE Transactions on Automatic Control.

[103]  Francesco Palmieri,et al.  New Steganographic Techniques for the OOXML File Format , 2011, ARES.

[104]  Zidong Wang,et al.  Distributed Filtering for Switched Nonlinear Positive Systems With Missing Measurements Over Sensor Networks , 2016, IEEE Sensors Journal.

[105]  Linghe Kong,et al.  An algorithm of lane change using two-lane NaSch model in traffic networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[106]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[107]  John C. Mitchell,et al.  Third-Party Web Tracking: Policy and Technology , 2012, 2012 IEEE Symposium on Security and Privacy.

[108]  Guojun Wang,et al.  Aggregating Author Profiles from Multiple Publisher Networks to Build Author Knowledge Graph , 2018, 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[109]  Hui Han,et al.  Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning , 2005, ICIC.

[110]  Guojun Wang,et al.  Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext , 2017, SpaCCS.

[111]  Giulio Sandini,et al.  A Survey of Artificial Cognitive Systems: Implications for the Autonomous Development of Mental Capabilities in Computational Agents , 2007, IEEE Transactions on Evolutionary Computation.

[112]  Youngho Park,et al.  A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure , 2015, J. Inf. Sci. Eng..

[113]  Md Zakirul Alam Bhuiyan,et al.  Fog-Based Computing and Storage Offloading for Data Synchronization in IoT , 2019, IEEE Internet of Things Journal.

[114]  Rafael Moreno-Vozmediano,et al.  Elastic management of cluster-based services in the cloud , 2009, ACDC '09.

[115]  Lijun Yin,et al.  Static and dynamic 3D facial expression recognition: A comprehensive survey , 2012, Image Vis. Comput..

[116]  McGuire Technology Crime and Technology Control: contexts and history , 2016 .

[117]  J. Contreras,et al.  Forecasting electricity prices for a day-ahead pool-based electric energy market , 2005 .

[118]  Suli Zou,et al.  A Distributed Charging Coordination for Large-Scale Plug-In Electric Vehicles Considering Battery Degradation Cost , 2015, IEEE Transactions on Control Systems Technology.

[119]  Vladik Kreinovich,et al.  Security games with interval uncertainty , 2013, AAMAS.

[120]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[121]  Zbigniew Kwecka Application layer covert channel analysis and detection. , 2006 .

[122]  Virgílio A. F. Almeida,et al.  Detecting Spammers on Twitter , 2010 .

[123]  M. C. Cervantes,et al.  Estudio de validación de un método para seleccionar técnicas de pronóstico de series de tiempo mediante redes neuronales artificiales , 2013 .

[124]  Lucas D. Panjer Predicting Eclipse Bug Lifetimes , 2007, Fourth International Workshop on Mining Software Repositories (MSR'07:ICSE Workshops 2007).

[125]  Pinit Kumhom,et al.  Classification of speaking activity based on lip features in a sequence of video frames , 2019, Other Conferences.

[126]  Phu H. Phung,et al.  HybridGuard: A Principal-Based Permission and Fine-Grained Policy Enforcement Framework for Web-Based Mobile Applications , 2017, 2017 IEEE Security and Privacy Workshops (SPW).

[127]  Subariah Ibrahim,et al.  Morphed Virus Family Classification Based on Opcodes Statistical Feature Using Decision Tree , 2011 .

[128]  Nuno Vasconcelos,et al.  Modeling, Clustering, and Segmenting Video with Mixtures of Dynamic Textures , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[129]  Andrew Lippman,et al.  MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).

[130]  Sebastián Ventura,et al.  Educational Data Mining: A Review of the State of the Art , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[131]  Wanlei Zhou,et al.  Traceback of DDoS Attacks Using Entropy Variations , 2011, IEEE Transactions on Parallel and Distributed Systems.

[132]  Olvi L. Mangasarian,et al.  Arbitrary-norm separating plane , 1999, Oper. Res. Lett..

[133]  Sándor Imre,et al.  User Tracking on the Web via Cross-Browser Fingerprinting , 2011, NordSec.

[134]  Witawas Srisa-an,et al.  SigPID: significant permission identification for android malware detection , 2016, 2016 11th International Conference on Malicious and Unwanted Software (MALWARE).

[135]  Cheng Wang,et al.  Applications integration in a hybrid cloud computing environment: modelling and platform , 2013, Enterp. Inf. Syst..

[136]  Alexander Ilic,et al.  Collaborative Filtering on the Blockchain: A Secure Recommender System for e-Commerce , 2016, AMCIS.

[137]  Hong-Sen Yan,et al.  A Forecasting Model Based Support Vector Machine and Particle Swarm Optimization , 2008, 2008 Workshop on Power Electronics and Intelligent Transportation System.

[138]  Ralf C. Staudemeyer,et al.  Extracting salient features for network intrusion detection using machine learning methods , 2014, South Afr. Comput. J..

[139]  Nhat-Phuong Tran,et al.  High performance string matching for security applications , 2013, International Conference on ICT for Smart Society.

[140]  Zachary A. Collier,et al.  Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management , 2020, Risk analysis : an official publication of the Society for Risk Analysis.

[141]  Roy T. Fielding,et al.  Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.

[142]  Walter Rudametkin,et al.  Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[143]  Yuan Tian,et al.  Chinese Named Entity Recognition Based on B-LSTM Neural Network with Additional Features , 2017, SpaCCS.

[144]  Matti Pietikäinen,et al.  Dynamic Texture Recognition Using Local Binary Patterns with an Application to Facial Expressions , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[145]  Yee Whye Teh,et al.  A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.

[146]  Nicanor Quijano,et al.  Integrity Attacks on Real-Time Pricing in Smart Grids: Impact and Countermeasures , 2017, IEEE Transactions on Smart Grid.

[147]  He Chen,et al.  Cooperative Strategies for Wireless-Powered Communications: An Overview , 2018, IEEE Wireless Communications.

[148]  John Jenkins,et al.  Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data , 2019, SpaCCS.

[149]  Xuexian Geng,et al.  People-Centric Service Intelligence for Smart Cities , 2019, Smart Cities.

[150]  Hui Fang,et al.  A Novel Robust Reversible Watermarking Scheme for Protecting Authenticity and Integrity of Medical Images , 2019, IEEE Access.

[151]  Amit Kumar Singh,et al.  Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications , 2018, Multimedia Tools and Applications.

[152]  Fei Tao,et al.  FC-PACO-RM: A Parallel Method for Service Composition Optimal-Selection in Cloud Manufacturing System , 2013, IEEE Transactions on Industrial Informatics.

[153]  Evgenios M. Kornaropoulos,et al.  Fast approximation of betweenness centrality through sampling , 2014, Data Mining and Knowledge Discovery.

[154]  Wojciech Mazurczyk,et al.  A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression , 2017, ARES.

[155]  Ali Vatankhah Barenji,et al.  A dynamic multi-agent-based scheduling approach for SMEs , 2017 .

[156]  Hyun-chong Cho,et al.  Improved Spam Filter via Handling of Text Embedded Image E-mail , 2015 .

[157]  Aleksandra Mileva,et al.  Covert channels in TCP/IP protocol stack - extended version- , 2014, Central European Journal of Computer Science.

[158]  Yang Xiao,et al.  Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.

[159]  Fuchun Joseph Lin,et al.  Situation awareness in a smart home environment , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[160]  Ming Zhu,et al.  An Online Ride-Sharing Path-Planning Strategy for Public Vehicle Systems , 2017, IEEE Transactions on Intelligent Transportation Systems.

[161]  Shahid Alam,et al.  Current Trends and the Future of Metamorphic Malware Detection , 2014, SIN.

[162]  Jun Li,et al.  A Review of Tournament Selection in Genetic Programming , 2010, ISICA.

[163]  Nancy A. Lynch,et al.  Perspectives on the CAP Theorem , 2012, Computer.

[164]  Ehab Al-Shaer,et al.  A Novel Class of Robust Covert Channels Using Out-of-Order Packets , 2017, IEEE Transactions on Dependable and Secure Computing.

[165]  Norman M. Sadeh,et al.  Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings , 2014, SOUPS.

[166]  Li Deng,et al.  Switching Dynamic System Models for Speech Articulation and Acoustics , 2004 .

[167]  Paul A. Viola,et al.  Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[168]  Ismail Mohamad,et al.  Standardization and Its Effects on K-Means Clustering Algorithm , 2013 .

[169]  Adilson E Motter,et al.  Cascade-based attacks on complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[170]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[171]  Guo Zhizhong,et al.  Electric power grid structural vulnerability assessment , 2006, 2006 IEEE Power Engineering Society General Meeting.

[172]  Nicola Casagli,et al.  Continuous, semi-automatic monitoring of ground deformation using Sentinel-1 satellites , 2018, Scientific Reports.

[173]  Yunhao Liu,et al.  Learning Resource Management Specifications in Smartphones , 2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS).

[174]  María Antonia Murazzo,et al.  Desarrollo de aplicaciones colaborativas para Cloud Computing , 2013 .

[175]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[176]  Jingzheng Wu,et al.  PACS: Pemission abuse checking system for android applictions based on review mining , 2017, 2017 IEEE Conference on Dependable and Secure Computing.

[177]  Chenliang Chang,et al.  Speckle reduced lensless holographic projection from phase-only computer-generated hologram. , 2017, Optics express.

[178]  Shahnawaz Talpur,et al.  SEGMENTATION AND CLASSIFICATION OF CALCIFICATION AND HEMORRHAGE IN THE BRAIN USING FUZZY C-MEAN AND ADAPTIVE NEURO-FUZZY INFERENCE SYSTEM , 2016 .

[179]  Piet Van Mieghem,et al.  A network approach for power grid robustness against cascading failures , 2015, 2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM).

[180]  Khubaib Amjad Alam,et al.  Application of Data Mining Using Artificial Neural Network: Survey , 2015 .

[181]  Jing Li,et al.  Blockchain Based Provenance Sharing of Scientific Workflows , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[182]  Amelec Viloria,et al.  Conglomerates of Latin American Countries and Public Policies for the Sustainable Development of the Electric Power Generation Sector , 2018, DMBD.

[183]  M. Brauer,et al.  Long-term Residential Exposure to Air Pollution and Lung Cancer Risk , 2013, Epidemiology.

[184]  Chuan Pham,et al.  Efficient forwarding and popularity based caching for Content Centric Network , 2015, 2015 International Conference on Information Networking (ICOIN).

[185]  J.M. Zain,et al.  Medical Image Watermarking with Tamper Detection and Recovery , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[186]  José Luis Gómez Barroso Experiments on personal information disclosure: Past and future avenues , 2018, Telematics Informatics.

[187]  Varun Singh,et al.  Energy Cost of Advertisements in Mobile Games on the Android Platform , 2012, 2012 Sixth International Conference on Next Generation Mobile Applications, Services and Technologies.

[188]  S. L. Hakimi,et al.  Optimum Locations of Switching Centers and the Absolute Centers and Medians of a Graph , 1964 .

[189]  Edgar Galván López,et al.  locoGP: Improving Performance by Genetic Programming Java Source Code , 2015, GECCO.

[190]  Darwin Ramiro Mercado Polo,et al.  Comparación de Redes Neuronales aplicadas a la predicción de Series de Tiempo Comparison of Neural Network applied to prediction of Time Series , 2015 .

[191]  Xianghan Zheng,et al.  Distributed multi-hop clustering algorithm for VANETs based on neighborhood follow , 2015, EURASIP J. Wirel. Commun. Netw..

[192]  Martín Abadi,et al.  Host Fingerprinting and Tracking on the Web: Privacy and Security Implications , 2012, NDSS.

[193]  Chai Xu-dong,et al.  Cloud manufacturing:a new service-oriented networked manufacturing model , 2010 .

[194]  F. Ernawan,et al.  Multiple watermarking technique based on RDWT-SVD and human visual characteristics , 2019 .

[195]  Wang,et al.  Optimal Planning of Charging Station for Electric Vehicle Based on Quantum PSO Algorithm , 2012 .

[196]  Hanif Ullah,et al.  5G Communication: An Overview of Vehicle-to-Everything, Drones, and Healthcare Use-Cases , 2019, IEEE Access.

[197]  Shengyu Zhang,et al.  Algorithms for Trip-Vehicle Assignment in Ride-Sharing , 2018, AAAI.

[198]  Erol Gelenbe,et al.  Energy-Efficient Cloud Computing , 2010, Comput. J..

[199]  Hao Wu,et al.  Information fusion-based method for distributed domain name system cache poisoning attack detection and identification , 2016, IET Inf. Secur..

[200]  Chao Huang,et al.  Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges , 2019, SpaCCS Workshops.

[201]  Md Zakirul Alam Bhuiyan,et al.  Deep Irregular Convolutional Residual LSTM for Urban Traffic Passenger Flows Prediction , 2020, IEEE Transactions on Intelligent Transportation Systems.

[202]  Mohsen Guizani,et al.  When Traffic Flow Prediction and Wireless Big Data Analytics Meet , 2019, IEEE Network.

[203]  Abien Fred Agarap A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data , 2017, ICMLC.

[204]  Li Deng,et al.  Computational Models for Speech Production , 2018, Speech Processing.

[205]  Muhammad Arif,et al.  Segmentation of Calcification and Brain Hemorrhage with Midline Detection , 2017, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC).

[206]  Ivan Martinovic,et al.  SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis , 2016, SPSM@CCS.

[207]  Xiao Chen,et al.  Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones , 2018, ArXiv.

[208]  Daniel R. Tauritz,et al.  Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) , 2015, GECCO.

[209]  Xiao Luo,et al.  A Data-Driven Network Intrusion Detection Model Based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection , 2019, SpaCCS.

[210]  Dawei Zhao,et al.  Identifying influential spreaders in interconnected networks , 2013 .

[211]  Shaikh Arifuzzaman,et al.  Scalable Mining, Analysis, and Visualization of Protein-Protein Interaction Networks , 2019 .

[212]  Ma Zhengyuan Application of Hopfield artificial nerve network for place selection optimization of delivery center of logistics , 2003 .

[213]  Philipp M. Grulich,et al.  Bringing Big Data into the Car: Does it Scale? , 2017, 2017 International Conference on Big Data Innovations and Applications (Innovate-Data).

[214]  Dawei Zhao,et al.  Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).

[215]  Mark O. Riedl,et al.  Rationalization: A Neural Machine Translation Approach to Generating Natural Language Explanations , 2017, AIES.

[216]  Donghoon Chang,et al.  Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks , 2015, ICISC.

[217]  Joelle Pineau,et al.  An Actor-Critic Algorithm for Sequence Prediction , 2016, ICLR.

[218]  David Windridge,et al.  Detection of Face Spoofing Using Visual Dynamics , 2015, IEEE Transactions on Information Forensics and Security.

[219]  Zuo Zhi A Spatiotemporal Location Model for Locating Electric Vehicle Charging Stations , 2012 .

[220]  YiDing Wang,et al.  Improving generalization for gender classification , 2008, 2008 15th IEEE International Conference on Image Processing.

[221]  Jürgen Beyerer,et al.  PrivacyInsight: The Next Generation Privacy Dashboard , 2016, APF.

[222]  Rosa Maria Dangelico,et al.  Smart cities: definitions, dimensions, and performance , 2013 .

[223]  William H. Sanders,et al.  RRE: A Game-Theoretic Intrusion Response and Recovery Engine , 2014, IEEE Transactions on Parallel and Distributed Systems.

[224]  Jeroen Famaey,et al.  Real-Time data dissemination and analytics platform for challenging IoT environments , 2017, 2017 Global Information Infrastructure and Networking Symposium (GIIS).

[225]  Zahi A Fayad,et al.  Arterial Thrombus Stability: Does It Matter and Can We Detect It? , 2017, Journal of the American College of Cardiology.

[226]  Steve Hanna,et al.  Android permissions demystified , 2011, CCS '11.

[227]  Paolo Giorgini,et al.  Toward GDPR-Compliant Socio-Technical Systems: Modeling Language and Reasoning Framework , 2017, PoEM.

[228]  Rohan Arora,et al.  Comparing Apache Spark and Map Reduce with Performance Analysis using K-Means , 2015 .

[229]  S. Shankar Sastry,et al.  Optimal thresholds for intrusion detection systems , 2016, HotSoS.

[230]  Clément Ballabriga,et al.  EnergyPatch: Repairing Resource Leaks to Improve Energy-Efficiency of Android Apps , 2018, IEEE Transactions on Software Engineering.

[231]  Padmavathi Kora,et al.  An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine , 2020, Biomed. Signal Process. Control..

[232]  Jianer Chen,et al.  A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing , 2018, SpaCCS.

[233]  Subhajyoti Bandyopadhyay,et al.  Cloud computing - The business perspective , 2011, Decis. Support Syst..

[234]  Chung-Ho Su,et al.  A novel price-pattern detection method based on time series to forecast stock market , 2011 .

[235]  Aman Jantan,et al.  A Framework for Optimizing Malware Classification by Using Genetic Algorithm , 2011, ICSECS.

[236]  Ming Fan,et al.  DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis , 2017, IEEE Transactions on Information Forensics and Security.

[237]  Jinqiao Shi,et al.  Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services , 2019, IEEE Internet of Things Journal.

[238]  Lawrence D. Jackel,et al.  Explaining How a Deep Neural Network Trained with End-to-End Learning Steers a Car , 2017, ArXiv.

[239]  Alessandra Gorla,et al.  How Do Apps Evolve in Their Permission Requests? A Preliminary Study , 2017, 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR).

[240]  Amelec Viloria,et al.  Econometric Analysis of the Industrial Growth Determinants in Colombia , 2018, ADC.

[241]  Hugo Proença,et al.  Biometric recognition in surveillance scenarios: a survey , 2016, Artificial Intelligence Review.

[242]  Rasoul Azizipanah-Abarghooee,et al.  Optimal sizing of battery energy storage for micro-grid operation management using a new improved bat algorithm , 2014 .

[243]  Ram Krishnan,et al.  Toward a Framework for Detecting Privacy Policy Violations in Android Application Code , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).

[244]  David A. Wagner,et al.  Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.

[245]  Guoqing Li,et al.  Big spatial vector data management: a review , 2018 .

[246]  Ronald V. Clarke,et al.  Seven misconceptions of situational crime prevention , 2017 .

[247]  Wei Xi,et al.  SALM: Smartphone-Based Identity Authentication Using Lip Motion Characteristics , 2017, 2017 IEEE International Conference on Smart Computing (SMARTCOMP).

[248]  Leonidas Anthopoulos,et al.  Understanding Smart Cities: A Tool for Smart Government or an Industrial Trick? , 2017 .

[249]  Wojciech Mazurczyk,et al.  Covert Channels in Personal Cloud Storage Services: The Case of Dropbox , 2017, IEEE Transactions on Industrial Informatics.

[250]  Wing Kam Liu,et al.  Finite element simulation of saw-tooth chip in high-speed machining based on multiresolution continuum theory , 2018, The International Journal of Advanced Manufacturing Technology.

[251]  Liusheng Huang,et al.  Concealed in web surfing: Behavior-based covert channels in HTTP , 2018, J. Netw. Comput. Appl..

[252]  Gail C. Murphy,et al.  Who should fix this bug? , 2006, ICSE.

[253]  Anupam Das,et al.  Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice , 2018, IEEE Pervasive Computing.

[254]  Tomislav Dragicevic,et al.  Future effectual role of energy delivery: A comprehensive review of Internet of Things and smart grid , 2018, Renewable and Sustainable Energy Reviews.

[255]  Tao Peng,et al.  Intelligent route planning on large road networks with efficiency and privacy , 2019, J. Parallel Distributed Comput..

[256]  Richard B. Chase,et al.  Administración de operaciones : producción y cadena de suministros , 2014 .

[257]  Wei Wang,et al.  Game theoretical security detection strategy for networked systems , 2018, Inf. Sci..

[258]  Praveen Paritosh,et al.  Freebase: a collaboratively created graph database for structuring human knowledge , 2008, SIGMOD Conference.

[259]  A. Umamageswari,et al.  Enhancing Security in Medical Image Informatics using Geometrical Attacks , 2019, Current Science.

[260]  Hans Hedbom,et al.  A Survey on Transparency Tools for Enhancing Privacy , 2008, FIDIS.

[261]  Seth Flaxman,et al.  European Union Regulations on Algorithmic Decision-Making and a "Right to Explanation" , 2016, AI Mag..

[262]  Hella Kaffel-Ben Ayed,et al.  Privacy risk assessment and users' awareness for mobile apps permissions , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[263]  P. Glöckner,et al.  Extracting Rules from Deep Neural Networks , 2015 .

[264]  Tranos Zuva,et al.  Comprehensive Diversity in Recommender Systems , 2017, SpaCCS.

[265]  Yihong Gong,et al.  Active contour model based on local and global intensity information for medical image segmentation , 2016, Neurocomputing.

[266]  Shan He,et al.  Research on Visual Speech Recognition Based on Local Binary Pattern and Stacked Sparse Autoencoder , 2018, IHSED.

[267]  Lilian Mitrou,et al.  Reengineering the user: privacy concerns about personal data on smartphones , 2015, Inf. Comput. Secur..

[268]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[269]  Kash Barker,et al.  Flow-based vulnerability measures for network component importance: Experimentation with preparedness planning , 2016, Reliab. Eng. Syst. Saf..

[270]  Esteban Inga,et al.  Fault Diagnosis on Electrical Distribution Systems Based on Fuzzy Logic , 2018, ICSI.

[271]  Li Gu Planning of battery-switching and vehicle-charging network based on battery switching mode , 2013 .

[272]  Alessandro Acquisti,et al.  Gone in 15 Seconds: The Limits of Privacy Transparency and Control , 2013, IEEE Security & Privacy.

[273]  Emin Anarim,et al.  An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..

[274]  Bin Ma,et al.  A code division multiplexing and block classification-based real-time reversible data-hiding algorithm for medical images , 2019, Journal of Real-Time Image Processing.

[275]  Yoshua Bengio,et al.  Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.

[276]  Richard Wolski,et al.  The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[277]  Christian Cachin,et al.  Architecture of the Hyperledger Blockchain Fabric , 2016 .

[278]  Constantinos Patsakis,et al.  Monkey Says, Monkey Does: Security and Privacy on Voice Assistants , 2017, IEEE Access.

[279]  Ge Shao-yu Planning of electric vehicle charging stations considering users' convenience , 2014 .

[280]  GhemawatSanjay,et al.  The Google file system , 2003 .

[281]  Di Hu,et al.  Research on services encapsulation and virtualization access model of machine for cloud manufacturing , 2015, Journal of Intelligent Manufacturing.

[282]  Salvatore J. Stolfo,et al.  Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[283]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[284]  Shen Su,et al.  Block-DEF: A secure digital evidence framework using blockchain , 2019, Inf. Sci..

[285]  Kai Fan,et al.  An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement , 2017, SpaCCS.

[286]  Prem Chandra Saxena,et al.  A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme , 2017, ICISS.

[287]  Abhinav Sinha,et al.  Incentive Mechanisms for Fairness Among Strategic Agents , 2017, IEEE Journal on Selected Areas in Communications.

[288]  Xiangbin Ye,et al.  Combining Convolutional Neural Network and Support Vector Machine for Gait-based Gender Recognition , 2018, 2018 Chinese Automation Congress (CAC).

[289]  Evgenios Konstantinou,et al.  Metamorphic Virus: Analysis and Detection , 2008 .

[290]  Marijn Janssen,et al.  A Privacy Risk Assessment Model for Open Data , 2017, BMSD.

[291]  María Antonia Murazzo,et al.  Interoperabilidad en cloud computing , 2011 .

[292]  Binoy Ravindran,et al.  CQS-Pair: Cyclic Quorum System Pair for Wakeup Scheduling in Wireless Sensor Networks , 2008, OPODIS.

[293]  G. Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[294]  Xin Liu,et al.  Learning Multi-Boosted HMMs for Lip-Password Based Speaker Verification , 2014, IEEE Transactions on Information Forensics and Security.

[295]  Bo An,et al.  PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.

[296]  Alessandra Gorla,et al.  Checking app behavior against app descriptions , 2014, ICSE.

[297]  Chun Kiat Tan,et al.  Security Protection of DICOM Medical Images Using Dual-Layer Reversible Watermarking with Tamper Detection Capability , 2011, Journal of Digital Imaging.

[298]  Paul S. Bradley,et al.  Feature Selection via Concave Minimization and Support Vector Machines , 1998, ICML.

[299]  B. Santhi,et al.  A Novel Visual Medical Image Encryption for Secure Transmission of Authenticated Watermarked Medical Images , 2019, Mobile Networks and Applications.

[300]  Anirban Basu,et al.  MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data , 2017, SpaCCS Workshops.

[301]  Francisco Rodríguez-Henríquez,et al.  A Pairing-Based Blind Signature E-Voting Scheme , 2014, Comput. J..

[302]  Fabrizio Giulio Luca Pilo,et al.  The Italian smart grid pilot projects: Selection and assessment of the test beds for the regulation of smart electricity distribution , 2015 .

[303]  Li Hai-feng Optimization Model of Electric Vehicle Charging Station Siting Based on Game Theory , 2011 .

[304]  Jennifer King,et al.  Taken Out of Context: An Empirical Analysis of Westin’s Privacy Scale , 2014 .

[305]  B. Misra,et al.  Impact of Data Normalization on Stock Index Forecasting , 2013 .

[306]  Martin C. Libicki,et al.  Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar , 2014 .

[307]  Helmut Krcmar,et al.  Modeling and Simulating Apache Spark Streaming Applications , 2016, Softwaretechnik-Trends.

[308]  Sevil Sen,et al.  Automatic Generation of Mobile Malwares Using Genetic Programming , 2015, EvoApplications.

[309]  Azzedine Boukerche,et al.  A novel multi-hop clustering scheme for vehicular ad-hoc networks , 2011, MobiWac '11.

[310]  Wang Yun-fa Location and algorithm of multi-level electric vehicle charging stations , 2011 .

[311]  Zhi Zhou,et al.  Efficient Resource Allocation for On-Demand Mobile-Edge Cloud Computing , 2018, IEEE Transactions on Vehicular Technology.

[312]  Michael D. Ernst,et al.  HaLoop , 2010, Proc. VLDB Endow..

[313]  Giuseppe Lugano,et al.  Virtual assistants and self-driving cars , 2017, 2017 15th International Conference on ITS Telecommunications (ITST).

[314]  Juergen Luettin,et al.  Audio-Visual Speech Modeling for Continuous Speech Recognition , 2000, IEEE Trans. Multim..

[315]  Santiago Aja-Fernández,et al.  A local fuzzy thresholding methodology for multiregion image segmentation , 2015, Knowl. Based Syst..

[316]  Kat Krol,et al.  Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours , 2016, SOUPS.

[317]  M. Angela Sasse,et al.  Users are not the enemy , 1999, CACM.

[318]  Maleq Khan,et al.  Fast parallel conversion of edge list to adjacency list for large-scale graphs , 2015, SpringSim.

[319]  Ioannis Pitas,et al.  Visual Lip Activity Detection and Speaker Detection Using Mouth Region Intensities , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[320]  J. Carman Consumer perceptions of service quality: an assessment of the SERVQUAL dimensions , 1990 .

[321]  Carlos García-Martínez,et al.  Local Search Based on Genetic Algorithms , 2008, Advances in Metaheuristics for Hard Optimization.

[322]  Ole Agesen,et al.  A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.

[323]  Zhu Han,et al.  When Mobile Blockchain Meets Edge Computing , 2017, IEEE Communications Magazine.

[324]  Federico Caprotti,et al.  The Smart City as Global Discourse: Storylines and Critical Junctures across 27 Cities , 2019, Journal of Urban Technology.

[325]  Liang Guo,et al.  Research on selection strategy of machining equipment in cloud manufacturing , 2014 .

[326]  Igor Santos,et al.  Opcode sequences as representation of executables for data-mining-based unknown malware detection , 2013, Inf. Sci..

[327]  Fei Shi,et al.  Cluster based emergency message dissemination scheme for vehicular ad hoc networks , 2015, IMCOM.

[328]  John A. Clark,et al.  Evolutionary Improvement of Programs , 2011, IEEE Transactions on Evolutionary Computation.

[329]  Muhammad Zubair Shafiq,et al.  Malware detection using statistical analysis of byte-level file content , 2009, CSI-KDD '09.

[330]  Ming Zhu,et al.  Joint Transportation and Charging Scheduling in Public Vehicle Systems—A Game Theoretic Approach , 2017, IEEE Transactions on Intelligent Transportation Systems.

[331]  Marco Luise,et al.  Cramer-Rao bounds in the parametric estimation of fading radiotransmission channels , 1998, IEEE Trans. Commun..

[332]  Min Ouyang,et al.  Vulnerability assessment and mitigation for the Chinese railway system under floods , 2015, Reliab. Eng. Syst. Saf..

[333]  Manish Jain,et al.  Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.

[334]  Sangjin Lee,et al.  Intelligent Virtual Assistant knows Your Life , 2018, ArXiv.

[335]  Kwan-Liu Ma,et al.  A Declarative Grammar of Flexible Volume Visualization Pipelines , 2019, IEEE Transactions on Visualization and Computer Graphics.

[336]  Philip Bachman,et al.  Data Generation as Sequential Decision Making , 2015, NIPS.

[337]  Md. Zakirul Alam Bhuiyan,et al.  Privacy-friendly platform for healthcare data in cloud based on blockchain environment , 2019, Future Gener. Comput. Syst..

[338]  Amelec Viloria,et al.  Demand Forecasting Method Using Artificial Neural Networks , 2019, DependSys.

[339]  Li Fan,et al.  Web caching and Zipf-like distributions: evidence and implications , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[340]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[341]  Xu Li,et al.  Smartphone Bloatware: An Overlooked Privacy Problem , 2017, SpaCCS.

[342]  Josephine Lau,et al.  Alexa, Are You Listening? , 2018, Proc. ACM Hum. Comput. Interact..

[343]  Sung-Yeul Park,et al.  A Seamless Control Strategy of a Distributed Generation Inverter for the Critical Load Safety Under Strict Grid Disturbances , 2013, IEEE Transactions on Power Electronics.

[344]  Md Abdul Motaleb Faysal,et al.  A Comparative Analysis of Large-scale Network Visualization Tools , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[345]  Patricio Córdova Analysis of Real Time Stream Processing Systems Considering Latency , 2022 .

[346]  Malcolm I. Heywood,et al.  On evolving buffer overflow attacks using genetic programming , 2006, GECCO '06.

[347]  Amelec Viloria,et al.  Greenhouse Gases Emissions and Electric Power Generation in Latin American Countries in the Period 2006-2013 , 2018, DMBD.

[348]  Mugdha Jain,et al.  Adapting k-means for Clustering in Big Data , 2014 .

[349]  WenAn Tan,et al.  A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing , 2014, IEEE Systems Journal.

[350]  K C Gouda,et al.  Virtualization Approaches in Cloud Computing , 2014 .

[351]  Jixin Ma,et al.  FDCT and Perceptual Hash-Based Watermarking Algorithm for Medical Images , 2019, Innovation in Medicine and Healthcare Systems, and Multimedia.

[352]  Andrew Walenstein,et al.  Normalizing Metamorphic Malware Using Term Rewriting , 2006, 2006 Sixth IEEE International Workshop on Source Code Analysis and Manipulation.

[353]  R. Mansell,et al.  Cyber trust and crime prevention: a synthesis of the state-of-the-art science reviews , 2004 .

[354]  Faqihza Mukhlish,et al.  The Risks of Low Level Narrow Artificial Intelligence , 2018, 2018 IEEE International Conference on Intelligence and Safety for Robotics (ISR).

[355]  Prasant Mohapatra,et al.  Predicting user traits from a snapshot of apps installed on a smartphone , 2014, MOCO.

[356]  Moni Naor,et al.  The load, capacity and availability of quorum systems , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[357]  Axel Küpper,et al.  Designing a GDPR-Compliant and Usable Privacy Dashboard , 2017, Privacy and Identity Management.

[358]  Alan Wee-Chung Liew,et al.  Physiological and behavioral lip biometrics: A comprehensive study of their discriminative power , 2012, Pattern Recognit..

[359]  Scott Shenker,et al.  Discretized streams: fault-tolerant streaming computation at scale , 2013, SOSP.

[360]  A. Karvonen,et al.  Stretching “smart”: advancing health and well-being through the smart city agenda , 2019, Smart and Sustainable Cities?.

[361]  Allyson L. Umberger Distributed Generation: How Localized Energy Production Reduces Vulnerability to Outages and Environmental Damage in the Wake of Climate Change , 2012 .

[362]  Mehdi Dehghan,et al.  Adaptive S-grid: A new adaptive quorum-based power saving protocol for multi-hop ad hoc networks , 2017, 2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI).

[363]  Xun Xu,et al.  From cloud computing to cloud manufacturing , 2012 .

[364]  Da Ruan,et al.  Fuzzy systems and soft computing in nuclear engineering , 2000 .

[365]  Madhav V. Marathe,et al.  A fast parallel algorithm for counting triangles in graphs using dynamic load balancing , 2015, 2015 IEEE International Conference on Big Data (Big Data).

[366]  Zheng Yan,et al.  PerRec: A Permission Configuration Recommender System for Mobile Apps , 2017, ICA3PP.

[367]  Ling Gao,et al.  An Intrusion Detection Model Based on Deep Belief Networks , 2014, 2014 Second International Conference on Advanced Cloud and Big Data.

[368]  Lei Gu,et al.  Memory or Time: Performance Evaluation for Iterative Operation on Hadoop and Spark , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[369]  Wim Bernasco,et al.  FORAGING STRATEGIES OF HOMO CRIMINALIS : LESSONS FROM BEHAVIORAL ECOLOGY , 2009 .

[370]  Jahangir H. Sarker,et al.  Mobile RFID System in the Presence of Denial-of-Service Attacking Signals , 2017, IEEE Transactions on Automation Science and Engineering.

[371]  Eliana Mirledy Toro Ocampo,et al.  PRONÓSTICO DE VENTAS USANDO REDES NEURONALES , 2004 .

[372]  Marit Hansen,et al.  Marrying Transparency Tools with User-Controlled Identity Management , 2007, FIDIS.

[373]  Viloria Silva,et al.  Indicators Systems for Evaluating the Efficiency of Political Awareness of Rational Use of Electricity , 2012 .

[374]  Mark Harman,et al.  Ieee Transactions on Evolutionary Computation 1 , 2022 .

[375]  Matti Pietikäinen,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON MULTIMEDIA 1 Lipreading with Local Spatiotemporal Descriptors , 2022 .

[376]  Supreet Kaur,et al.  A Survey in fog Computing , 2018 .

[377]  Ali Al-Haj,et al.  Secured Telemedicine Using Region-Based Watermarking with Tamper Localization , 2014, Journal of Digital Imaging.

[378]  Anabel Quan-Haase,et al.  Privacy Attitudes and Concerns in the Digital Lives of Older Adults: Westin’s Privacy Attitude Typology Revisited , 2018, American Behavioral Scientist.

[379]  Xing Fang,et al.  IBM Cloud Computing Powering a Smarter Planet , 2009, CloudCom.

[380]  Yanmei Li,et al.  Traceable and Complete Fine-Grained Revocable Multi-authority Attribute-Based Encryption Scheme in Social Network , 2017, SpaCCS.

[381]  Amelec Viloria,et al.  Statistical Adjustment Module Advanced Optimizer Planner and SAP Generated the Case of a Food Production Company , 2016 .

[382]  Paul Ekblom Terrorism - lessons from natural and human co-evolutionary arms races , 2015 .

[383]  Dale R. Thompson,et al.  Visualization of DNS Tunneling Attacks Using Parallel Coordinates Technique , 2019, SpaCCS.

[384]  Wei Wang,et al.  APP Vetting Based on the Consistency of Description and APK , 2014, INTRUST.

[385]  Zhiyuan Liu,et al.  Network representation learning: an overview , 2017 .

[386]  Michele Nappi,et al.  Gender classification on 2D human skeleton , 2019, 2019 3rd International Conference on Bio-engineering for Smart Technologies (BioSMART).

[387]  Jesus Alonso-Zarate,et al.  A Survey on Application Layer Protocols for the Internet of Things , 2015 .

[388]  Xu Xiao-hui Distribution Network Planning by Considering Siting and Sizing of Electric Vehicle Charging Stations , 2013 .

[389]  Ashutosh Kumar Singh,et al.  A Comparative Study of the Approach Provided for Preventing the Data Leakage , 2017 .

[390]  Balachander Krishnamurthy,et al.  Privacy leakage vs . Protection measures : the growing disconnect , 2011 .

[391]  Wei Wang,et al.  A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems , 2018, IEEE Transactions on Information Forensics and Security.

[392]  Kim-Kwang Raymond Choo,et al.  Internet data budget allocation policies for diverse smartphone applications , 2016, EURASIP J. Wirel. Commun. Netw..

[393]  Md. Arafatur Rahman,et al.  Cloud Enabled e-Glossary System: A Smart Campus Perspective , 2018, SpaCCS.

[394]  Xing Xu,et al.  Prediction of academic performance associated with internet usage behaviors using machine learning algorithms , 2019, Comput. Hum. Behav..

[395]  Madhusudan Singh,et al.  Blockchain: A game changer for securing IoT data , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).

[396]  Jiri Fridrich,et al.  New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[397]  Nandakishore Santhi,et al.  Understanding Cascading Failures in Power Grids , 2010, ArXiv.

[398]  Ken-ichi Matsumoto,et al.  Predicting Re-opened Bugs: A Case Study on the Eclipse Project , 2010, 2010 17th Working Conference on Reverse Engineering.

[399]  Todd Litman,et al.  Transportation and public health. , 2013, Annual review of public health.

[400]  Yanjun Qi,et al.  Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers , 2016, NDSS.

[401]  Leandros A. Maglaras,et al.  HEART-IS: A novel technique for evaluating human error-related information security incidents , 2019, Comput. Secur..

[402]  Nicholas R. Jennings,et al.  Intention-Aware Routing of Electric Vehicles , 2016, IEEE Transactions on Intelligent Transportation Systems.

[403]  Rajesh Kumar,et al.  A hybrid approach for gait based gender classification using gei and spatio temporal parameters , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[404]  Eun-Ju Lee,et al.  Design and evaluation of a cluster-based fuzzy cooperative caching method for MANETs , 2011 .

[405]  Scott Shenker,et al.  Spark: Cluster Computing with Working Sets , 2010, HotCloud.

[406]  Peter Eckersley,et al.  How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.

[407]  Alfredo De Santis,et al.  E-mail-Based Covert Channels for Asynchronous Message Steganography , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[408]  Domenico Pascarella,et al.  Dependability issues in visual-haptic interfaces , 2010, J. Vis. Lang. Comput..

[409]  Amit Kumar Singh,et al.  Quantization based multiple medical information watermarking for secure e-health , 2017, Multimedia Tools and Applications.

[410]  Su Hua,et al.  Daily Sales Forecasting for Grapes by Support Vector Machine , 2013, CCTA.

[411]  Xiaoyan Gu,et al.  An appearance‐preserving simplification method for complex 3D building models , 2019, Trans. GIS.

[412]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[413]  Shaikh Arifuzzaman,et al.  Overcoming MPI Communication Overhead for Distributed Community Detection , 2018 .

[414]  Walid Maalej,et al.  Towards understanding and detecting fake reviews in app stores , 2019, Empirical Software Engineering.

[415]  L. Erlikh,et al.  Leveraging legacy system dollars for e-business , 2000 .

[416]  Xiaohui Zhao,et al.  Efficient Sharing and Fine-Grained Scheduling of Virtualized GPU Resources , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).

[417]  Peter Butala,et al.  Decentralised network architecture for cloud manufacturing , 2017, Int. J. Comput. Integr. Manuf..

[418]  Xizheng Zhang,et al.  Autonomous path tracking control of intelligent electric vehicles based on lane detection and optimal preview method , 2019, Expert Syst. Appl..

[419]  Alexander M. Rush,et al.  Image-to-Markup Generation with Coarse-to-Fine Attention , 2016, ICML.

[420]  Bai Wang,et al.  Attention Based Meta Path Fusion for Heterogeneous Information Network Embedding , 2018, PRICAI.

[421]  Andrea F. Abate,et al.  An interactive virtual guide for the AR based visit of archaeological sites , 2011, J. Vis. Lang. Comput..

[422]  K.-C. Liu Colour image watermarking for tamper proofing and pattern-based recovery , 2012 .

[423]  Paul S. Bradley,et al.  Mathematical Programming for Data Mining: Formulations and Challenges , 1999, INFORMS J. Comput..

[424]  Xiaohui Zhao,et al.  Research on CTR Prediction Based on Deep Learning , 2019, IEEE Access.

[425]  Hui Wan,et al.  Research on Innovation of Management Concept of Urban Underground Pipelines Based on Big-Knowledge-Thinking in the Big Data Era , 2017, 2017 IEEE International Conference on Big Knowledge (ICBK).

[426]  Amelec Viloria,et al.  Measures of Concentration and Stability: Two Pedagogical Tools for Industrial Organization Courses , 2018, ICSI.

[427]  Mohammed Azmi Al-Betar,et al.  Text feature selection with a robust weight scheme and dynamic dimension reduction to text document clustering , 2017, Expert Syst. Appl..

[428]  Claire Le Goues,et al.  A genetic programming approach to automated software repair , 2009, GECCO.

[429]  Amelec Viloria,et al.  An intelligent strategy for faults location in distribution networks with distributed generation , 2019, J. Intell. Fuzzy Syst..

[430]  G. Leitmann On generalized Stackelberg strategies , 1978 .

[431]  Michele Nappi,et al.  Context awareness in biometric systems and methods: State of the art and future scenarios , 2018, Image Vis. Comput..

[432]  Qin Liu,et al.  A Dual Privacy Preserving Scheme in Continuous Location-Based Services , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.

[433]  A. Murat Tekalp,et al.  Discriminative Analysis of Lip Motion Features for Speaker Identification and Speech-Reading , 2006, IEEE Transactions on Image Processing.

[434]  Gary B. Lamont,et al.  A retrovirus inspired algorithm for virus detection & optimization , 2006, GECCO.

[435]  Tiberiu Popa,et al.  Time series matching for biometric visual passwords , 2017, SIGGRAPH Posters.

[436]  Luigi Barone,et al.  Nature-Inspired Techniques in the Context of Fraud Detection , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[437]  Jasni Mohamad Zain,et al.  Digital watermarking for recovering attack areas of medical images using spiral numbering , 2013, 2013 International Conference on Electronics, Computer and Computation (ICECCO).

[438]  Md Zakirul Alam Bhuiyan,et al.  A survey on security attacks in VANETs: Communication, applications and challenges , 2019, Veh. Commun..

[439]  Jehn-Ruey Jiang Expected quorum overlap sizes of quorum systems for asynchronous power-saving in mobile ad hoc networks , 2008, Comput. Networks.

[440]  Petar S. Aleksic,et al.  Keyword spotting for Google assistant using contextual speech recognition , 2017, 2017 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU).

[441]  Robert E. Kooij,et al.  Context-independent centrality measures underestimate the vulnerability of power grids , 2013, Int. J. Crit. Infrastructures.

[442]  Jie Jia,et al.  Joint Optimization on Both Routing and Resource Allocation for Millimeter Wave Cellular Networks , 2019, IEEE Access.

[443]  Sohail Jabbar,et al.  A collision avoidance scheme for autonomous vehicles inspired by human social norms , 2018, Comput. Electr. Eng..

[444]  Kai Rannenberg,et al.  Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns , 2015, Comput. Secur..

[445]  Dongqing Xie,et al.  Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study , 2017, 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[446]  Mohsen Guizani,et al.  Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory , 2019, IEEE Transactions on Vehicular Technology.

[447]  Peter Regner,et al.  Bayesian network construction using a fuzzy rule based approach for medical decision support , 2015, Expert Syst. J. Knowl. Eng..

[448]  Yang Xu,et al.  An adaptive and configurable protection framework against android privilege escalation threats , 2019, Future Gener. Comput. Syst..

[449]  Pascale Carayon,et al.  Human and organizational factors in computer and information security: Pathways to vulnerabilities , 2009, Comput. Secur..

[450]  Bin Wu,et al.  Meta-path-based link prediction in schema-rich heterogeneous information network , 2017, International Journal of Data Science and Analytics.

[451]  Tzi-cker Chiueh,et al.  Automatic Generation of String Signatures for Malware Detection , 2009, RAID.

[452]  Ferda Ernawan,et al.  Tchebichef image watermarking along the edge using YCoCg-R color space for copyright protection , 2019, International Journal of Electrical and Computer Engineering (IJECE).

[453]  Yang Ju Planning of Charging Facilities of Electric Vehicles Based on Geographical Zonal Charging Demand Coefficients , 2015 .

[454]  Gang Ma,et al.  Study on multi-task oriented services composition and optimisation with the ‘Multi-Composition for Each Task’ pattern in cloud manufacturing systems , 2013, Int. J. Comput. Integr. Manuf..

[455]  Lara Khansa,et al.  How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management , 2009, Computers & security.

[456]  Santiago Segarra,et al.  Stability and continuity of centrality measures in weighted graphs , 2014, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[457]  Arturo Peralta,et al.  Optimal scalability of fiwi networks based on multistage stochastic programming and policies , 2017, IEEE/OSA Journal of Optical Communications and Networking.

[458]  Kin Keung Lai,et al.  Demand forecasting of perishable farm products using support vector machine , 2013, Int. J. Syst. Sci..

[459]  Gianluca Dini,et al.  Risk analysis of Android applications: A user-centric solution , 2018, Future Gener. Comput. Syst..

[460]  Xin Zhong,et al.  A High-Capacity Reversible Watermarking Scheme Based on Shape Decomposition for Medical Images , 2018, Int. J. Pattern Recognit. Artif. Intell..

[461]  Nicholas R. Magliocca,et al.  Modeling cocaine traffickers and counterdrug interdiction forces as a complex adaptive system , 2019, Proceedings of the National Academy of Sciences.

[462]  Wojciech Mazurczyk,et al.  Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach , 2017, 2017 IEEE 42nd Conference on Local Computer Networks (LCN).

[463]  Harry Eugene Stanley,et al.  Catastrophic cascade of failures in interdependent networks , 2009, Nature.

[464]  Michele Nappi,et al.  Deceiving faces: When plastic surgery challenges face recognition , 2016, Image Vis. Comput..

[465]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[466]  Thomas Wischgoll,et al.  Display Systems for Visualization and Simulation in Virtual Environments , 2017, Visualization and Data Analysis.

[467]  George Q. Huang,et al.  A cooperative approach to service booking and scheduling in cloud manufacturing , 2019, Eur. J. Oper. Res..

[468]  Bo Lang,et al.  Topic Model Based Android Malware Detection , 2019, SpaCCS.

[469]  Tara N. Sainath,et al.  Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.

[470]  Francisco Javier Ferrández Pastor,et al.  Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture , 2016, Sensors.

[471]  H. Varian Computer Mediated Transactions , 2010 .

[472]  Laura Pasculli Henao,et al.  Visión agrícola del TLC entre Colombia y Estados Unidos: preparación, negociación, implementación y aprovechamiento , 2013 .

[473]  Latifur Khan,et al.  A Machine Learning Approach to Android Malware Detection , 2012, 2012 European Intelligence and Security Informatics Conference.

[474]  Yasuhiko Morimoto,et al.  A new e-voting scheme based on revised simplified verifiable re-encryption mixnet , 2017, 2017 International Conference on Networking, Systems and Security (NSysS).

[475]  Mark Stamp,et al.  Compression-based analysis of metamorphic malware , 2015, Int. J. Secur. Networks.

[476]  Witawas Srisa-an,et al.  Significant Permission Identification for Machine-Learning-Based Android Malware Detection , 2018, IEEE Transactions on Industrial Informatics.

[477]  M. John Hodgson,et al.  A network location-allocation model trading off flow capturing andp-median objectives , 1992, Ann. Oper. Res..

[478]  Shen Su,et al.  Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment , 2019, IEEE Transactions on Industrial Informatics.

[479]  Bo Hu,et al.  Universal framework for vulnerability assessment of power grid based on complex networks , 2018, 2018 Chinese Control And Decision Conference (CCDC).

[480]  Robert P Skelton,et al.  No local adaptation in leaf or stem xylem vulnerability to embolism, but consistent vulnerability segmentation in a North American oak. , 2019, The New phytologist.

[481]  Nai-Wei Lo,et al.  An analysis framework for information loss and privacy leakage on Android applications , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).

[482]  Ferenc Huszar,et al.  How (not) to Train your Generative Model: Scheduled Sampling, Likelihood, Adversary? , 2015, ArXiv.

[483]  E. Weippl,et al.  Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting , 2013 .

[484]  Wu He,et al.  A state-of-the-art survey of cloud manufacturing , 2015, Int. J. Comput. Integr. Manuf..

[485]  Virgil D. Gligor,et al.  A guide to understanding covert channel analysis of trusted systems , 1993 .

[486]  Yi Wang,et al.  Clustering of Electricity Consumption Behavior Dynamics Toward Big Data Applications , 2016, IEEE Transactions on Smart Grid.

[487]  Pengfei Zhang,et al.  Localizing Wireless Jamming Attacks with Minimal Network Resources , 2017, SpaCCS Workshops.

[488]  Guozhu Jia,et al.  Multi-Objective Service Selection and Scheduling with Linguistic Preference in Cloud Manufacturing , 2019, Sustainability.

[489]  Jie Tao,et al.  The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning , 2018, SpaCCS.

[490]  Chengcheng Hu,et al.  Mortality and Prehospital Blood Pressure in Patients With Major Traumatic Brain Injury: Implications for the Hypotension Threshold , 2017, JAMA surgery.

[491]  Xiong Li,et al.  Event detection and evolution in multi-lingual social streams , 2020, Frontiers of Computer Science.

[492]  Ahmad-Reza Sadeghi,et al.  Invited: Can IoT be secured: Emerging challenges in connecting the unconnected , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[493]  Chris Mattmann,et al.  SciSpark: Applying in-memory distributed computing to weather event detection and tracking , 2015, 2015 IEEE International Conference on Big Data (Big Data).

[494]  Li Shen,et al.  A Novel Hardware Assisted Full Virtualization Technique , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[495]  Mark Stamp,et al.  Chi-squared distance and metamorphic virus detection , 2013, Journal of Computer Virology and Hacking Techniques.

[496]  Wang Dong-rui Vulnerability analysis on power communication network based on complex network theory , 2009 .

[497]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[498]  Rk Wortley Affordance and Situational Crime Prevention: Implications for Counter-terrorism , 2012 .

[499]  R. Collorec,et al.  Relevance of watermarking in medical imaging , 2000, Proceedings 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine. ITAB-ITIS 2000. Joint Meeting Third IEEE EMBS International Conference on Information Technol.

[500]  Wojciech Mazurczyk,et al.  YouSkyde: information hiding for Skype video traffic , 2016, Multimedia Tools and Applications.

[501]  Paul Ekblom The conjunction of criminal opportunity theory , 2010 .

[502]  Wang Long An Optimization Approach for the Layout and Location of Electric Vehicle Charging Stations , 2012 .

[503]  Jie Wu,et al.  Big Data Reduction for a Smart City’s Critical Infrastructural Health Monitoring , 2018, IEEE Communications Magazine.

[504]  Yuan Tian,et al.  Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home , 2018, ArXiv.

[505]  Witold Pedrycz,et al.  Uncertainty-Aware Online Scheduling for Real-Time Workflows in Cloud Service Environment , 2021, IEEE Transactions on Services Computing.

[506]  Mauricio Barahona,et al.  Structure of complex networks: Quantifying edge-to-edge relations by failure-induced flow redistribution , 2013, Network Science.

[507]  Dmitry Efimov,et al.  Smart Technologies in Emergency Control of Russia's Unified Energy System , 2013, IEEE Transactions on Smart Grid.

[508]  Maria Tsinidou,et al.  Evaluation of the factors that determine quality in higher education: an empirical study , 2010 .

[509]  Yann-Gaël Guéhéneuc,et al.  On the Analysis of Co-Occurrence of Anti-Patterns and Clones , 2017, 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS).

[510]  Wojciech Mazurczyk,et al.  Steganography in Modern Smartphones and Mitigation Techniques , 2014, IEEE Communications Surveys & Tutorials.

[511]  A V Netto Visualization System Integrated for Electric Power Distribution Networks , 2010, IEEE Latin America Transactions.

[512]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[513]  Pallab Dutta,et al.  A Novel Approach to Trust based Identification of Leaders in Social Networks , 2016 .

[514]  Sunghun Kim,et al.  How long did it take to fix bugs? , 2006, MSR '06.

[515]  Xin Yao,et al.  Mathematical modeling and multi-objective evolutionary algorithms applied to dynamic flexible job shop scheduling problems , 2015, Inf. Sci..

[516]  Mark Stamp,et al.  Structural entropy and metamorphic malware , 2013, Journal of Computer Virology and Hacking Techniques.

[517]  Juan-Zi Li,et al.  Learning to Infer Competitive Relationships in Heterogeneous Networks , 2018, ACM Trans. Knowl. Discov. Data.

[518]  Milad Shokouhi,et al.  Inferring the demographics of search users: social data meets search queries , 2013, WWW.

[519]  Barry Wellman,et al.  Local Virtuality in an Organization: Implications for Community of Practice , 2005 .

[520]  Tim French,et al.  On the Interactions of Awareness and Certainty , 2011, Australasian Conference on Artificial Intelligence.

[521]  Sacha Brostoff,et al.  Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .

[522]  John S. Oakland,et al.  Total Quality Management in Services , 1994 .

[523]  Fung Po Tso,et al.  SDN-based Virtual Machine management for Cloud Data Centers , 2014, 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet).

[524]  Wolfgang Spohn,et al.  Two Coherence Principles , 1999 .

[525]  Chris Reed,et al.  A Data Protection Impact Assessment Methodology for Cloud , 2015, APF.

[526]  A. Haurie,et al.  Sequential Stackelberg equilibria in two-person games , 1985 .

[527]  Toly Chen,et al.  Strengthening the Competitiveness and Sustainability of a Semiconductor Manufacturer with Cloud Manufacturing , 2014 .

[528]  David Evans,et al.  Privacy Protection for Social Networking Platforms , 2008 .

[529]  Andrea F. Abate,et al.  Fast Iris Recognition on Smartphone by means of Spatial Histograms , 2014, BIOMET.

[530]  Henri Luchian,et al.  Feature Extraction Using Genetic Programming with Applications in Malware Detection , 2015, 2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC).

[531]  Ravi Sankar,et al.  Time Series Prediction Using Support Vector Machines: A Survey , 2009, IEEE Computational Intelligence Magazine.

[532]  Matthias Bauer New covert channels in HTTP: adding unwitting Web browsers to anonymity sets , 2003, WPES '03.

[533]  Steven Warach,et al.  Cerebral Microbleeds : A Field Guide to their Detection and Interpretation , 2012 .

[534]  Fei Tao,et al.  SDMSim: A manufacturing service supply–demand matching simulator under cloud environment , 2017 .

[535]  Muhammad Arif,et al.  A Hybrid Technique for De-Noising Multi-Modality Medical Images by Employing Cuckoo's Search with Curvelet Transform , 2018 .

[536]  Zibin Zheng,et al.  MalPat: Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs , 2018, IEEE Transactions on Reliability.

[537]  Alfredo De Santis,et al.  Steganography and Secure Communication on Online Social Networks and Online Photo Sharing , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.

[538]  Carlos Andújar,et al.  Error-aware construction and rendering of multi-scan panoramas from massive point clouds , 2017, Comput. Vis. Image Underst..

[539]  Davide Castelvecchi,et al.  Can we open the black box of AI? , 2016, Nature.

[540]  Elizabeth Fife,et al.  The Privacy Calculus: Mobile Apps and User Perceptions of Privacy and Security , 2012 .

[541]  SAMANTHA KLEINBERG,et al.  Why: A Guide to Finding and Using Causes , 2015 .

[542]  Nor Aniza Abdullah,et al.  Maximizing Information of Multimodality Brain Image Fusion Using Curvelet Transform with Genetic Algorithm , 2014, 2014 International Conference on Computer Assisted System in Health.

[543]  David Yeregui Marcos del Blanco,et al.  Review of Cryptographic Schemes applied to Remote Electronic Voting systems: remaining challenges and the upcoming post-quantum paradigm , 2018 .

[544]  Jian Shen,et al.  S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks , 2017, SpaCCS.

[545]  Mahir Oner In the Perspective of Big Data , 2019 .

[546]  Amelec Viloria Commercial Strategies Providers Pharmaceutical Chains for Logistics Cost Reduction , 2016 .

[547]  Dimitris Gritzalis,et al.  Delegate the smartphone user? Security awareness in smartphone platforms , 2013, Comput. Secur..

[548]  Josiah A. B. S. Dykstra,et al.  Acting in the unknown: the cynefin framework for managing cybersecurity risk in dynamic decision making , 2016, 2016 International Conference on Cyber Conflict (CyCon U.S.).

[549]  Fang Tao A New Integrative Vulnerability Evaluation Model to Power Grid Based on Running State and Structure , 2009 .

[550]  Honggang Zhang,et al.  WAF-Based Chinese Character Recognition for Spam Image Filtering , 2018 .

[551]  Andrew H. Sung,et al.  Static analyzer of vicious executables (SAVE) , 2004, 20th Annual Computer Security Applications Conference.

[552]  Peng Liu,et al.  A Comprehensive Survey of Privacy-Preserving in Smart Grid , 2016, SpaCCS.

[553]  Guoqiang Peter Zhang,et al.  Time series forecasting using a hybrid ARIMA and neural network model , 2003, Neurocomputing.

[554]  Kuokkwee Wee,et al.  A method for root cause analysis with a Bayesian belief network and fuzzy cognitive map , 2015, Expert Syst. Appl..

[555]  Aravind Srinivasan,et al.  Allocation Problems in Ride-sharing Platforms , 2017, AAAI.

[556]  Dazhong Wu,et al.  Cloud manufacturing: Strategic vision and state-of-the-art☆ , 2013 .

[557]  José Gabriel Gómez Cortés,et al.  Desarrollo de un modelo de redes neuronales artificiales para predecir la resistencia a la compresión y la resistividad eléctrica del concreto , 2007 .

[558]  Ming Zhu,et al.  Traffic efficiency improvement and passengers comfort in ridesharing systems in VANETs , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).

[559]  Md. Arafatur Rahman Reliability Analysis of ZigBee Based Intra-Vehicle Wireless Sensor Networks , 2014, Nets4Cars/Nets4Trains/Nets4Aircraft.

[560]  Jürgen Schmidhuber,et al.  LSTM: A Search Space Odyssey , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[561]  Yaling Zhang,et al.  A keyword searchable attribute-based encryption scheme with attribute update for cloud storage , 2018, PloS one.

[562]  Raja R. A. Issa,et al.  Location Optimization with Uncertainty for Industrial Project Using Discrete Block Model and Spatial Meshing Algorithm , 2019, J. Comput. Civ. Eng..

[563]  Jianxin Li,et al.  Event Detection and Evolution Based on Knowledge Base , 2017 .

[564]  Zhong Chen,et al.  AutoCog: Measuring the Description-to-permission Fidelity in Android Applications , 2014, CCS.

[565]  Michael Wagner,et al.  "liveness" Verification in Audio-video Authentication , 2004, INTERSPEECH.

[566]  Dit-Yan Yeung,et al.  Towards Bayesian Deep Learning: A Framework and Some Existing Methods , 2016, IEEE Transactions on Knowledge and Data Engineering.

[567]  Xiaoyong Li,et al.  Secure Transfer Protocol Between App and Device of Internet of Things , 2017, SpaCCS Workshops.

[568]  Mattia Monga,et al.  Code Normalization for Self-Mutating Malware , 2007, IEEE Security & Privacy.

[569]  Lingfeng Wang,et al.  A Game-Theoretic Framework for Vehicle-to-Grid Frequency Regulation Considering Smart Charging Mechanism , 2017, IEEE Transactions on Smart Grid.

[570]  Lujo Bauer,et al.  Modeling and Enhancing Android's Permission System , 2012, ESORICS.

[571]  Alagan Anpalagan,et al.  Industrial Internet of Things Driven by SDN Platform for Smart Grid Resiliency , 2019, IEEE Internet of Things Journal.

[572]  Yizhou Sun,et al.  Graph Regularized Transductive Classification on Heterogeneous Information Networks , 2010, ECML/PKDD.

[573]  Rajkumar Buyya,et al.  Energy-Efficient Management of Data Center Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges , 2010, PDPTA.

[574]  Symeon Papavassiliou,et al.  Network intrusion and fault detection: a statistical anomaly approach , 2002, IEEE Commun. Mag..

[575]  Been Kim,et al.  Interactive and interpretable machine learning models for human machine collaboration , 2015 .

[576]  Yan Jia,et al.  Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks , 2013 .

[577]  Moayad Aloqaily,et al.  Connected, Autonomous and Electric Vehicles: The Optimum Value for a Successful Business Model , 2018, 2018 Fifth International Conference on Internet of Things: Systems, Management and Security.

[578]  Kusprasapta Mutijarsa,et al.  Secure IoT Communication using Blockchain Technology , 2018, 2018 International Symposium on Electronics and Smart Devices (ISESD).

[579]  Joshua B. Tenenbaum,et al.  Building machines that learn and think like people , 2016, Behavioral and Brain Sciences.

[580]  N. Tilley,et al.  Situational Crime Prevention , 2022, Encyclopedia of Violence, Peace, & Conflict.

[581]  Ziming Zhao,et al.  RiskMon: continuous and automated risk assessment of mobile applications , 2014, CODASPY '14.

[582]  Alfredo De Santis,et al.  An asynchronous covert channel using spam , 2012, Comput. Math. Appl..

[583]  George Loukas,et al.  Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework , 2018, Comput. Secur..

[584]  Md. Zakirul Alam Bhuiyan,et al.  A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function , 2019, SpaCCS.

[585]  Sven Strauss,et al.  Theory Of The Location Of Industries , 2016 .

[586]  Eduardo Huedo,et al.  Dynamic Provision of Computing Resources from Grid Infrastructures and Cloud Providers , 2009, 2009 Workshops at the Grid and Pervasive Computing Conference.

[587]  M. J. Hodgson A Flow-Capturing Location-Allocation Model , 2010 .

[588]  Hans-Arno Jacobsen,et al.  Distributed Convex Optimization for Electric Vehicle Aggregators , 2017, IEEE Transactions on Smart Grid.

[589]  Axel Jantsch,et al.  Fog Computing in the Internet of Things , 2018 .

[590]  Elisa Bertino,et al.  Android resource usage risk assessment using hidden Markov model and online learning , 2017, Comput. Secur..

[591]  Jie Wu,et al.  Content-Centric Event-Insensitive Big Data Reduction in Internet of Things , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[592]  Yang Lu,et al.  From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues , 2020, HICSS.

[593]  Ponnurangam Kumaraguru,et al.  Privacy Indexes: A Survey of Westin's Studies , 2005 .

[594]  Kyoung-Yun Kim,et al.  Systematic causal knowledge acquisition using FCM Constructor for product design decision support , 2011, Expert Syst. Appl..

[595]  Erich Elsen,et al.  Deep Speech: Scaling up end-to-end speech recognition , 2014, ArXiv.

[596]  Yongkui Liu,et al.  Manufacturing Service Management in Cloud Manufacturing: Overview and Future Research Directions , 2015 .

[597]  Josef Bigün,et al.  Audio-visual person authentication using lip-motion from orientation maps , 2007, Pattern Recognit. Lett..

[598]  M. Shamim Hossain,et al.  New Zero-Watermarking Algorithm Using Hurst Exponent for Protection of Privacy in Telemedicine , 2018, IEEE Access.

[599]  Yan Zhang,et al.  Deep Learning for Secure Mobile Edge Computing in Cyber-Physical Transportation Systems , 2019, IEEE Network.

[600]  Omar Montoya Suárez,et al.  APLICACIÓN DEL ANÁLISIS FACTORIAL A LA INVESTIGACIÓN DE MERCADOS. CASO DE ESTUDIO Application of the factorial analysis to the investigation of markets. Case of study , 2007 .

[601]  Karl N. Levitt,et al.  MCF: a malicious code filter , 1995, Comput. Secur..

[602]  Ingmar Weber,et al.  The demographics of web search , 2010, SIGIR.

[603]  Chen Guan Multi-objective Optimal Planning of Electric Vehicle Charging Stations Considering Carbon Emission , 2014 .

[604]  Wu Ying,et al.  Location and Capacity Planning of Electric Vehicles Charging Piles , 2019, IOP Conference Series: Materials Science and Engineering.

[605]  Ralf C. Staudemeyer,et al.  Applying long short-term memory recurrent neural networks to intrusion detection , 2015 .

[606]  Toby Velte,et al.  Cloud Computing, A Practical Approach , 2009 .

[607]  Chin-Chen Chang,et al.  Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery , 2008, Pattern Recognit..

[608]  Juliana Freire,et al.  Spatio-Temporal Urban Data Analysis: A Visual Analytics Perspective , 2018, IEEE Computer Graphics and Applications.

[609]  Kim-Kwang Raymond Choo,et al.  Context Aware Ubiquitous Biometrics in Edge of Military Things , 2017, IEEE Cloud Computing.

[610]  Tom Fitfield Introduction to OpenStack , 2013 .

[611]  Dirk Helbing,et al.  Transient dynamics increasing network vulnerability to cascading failures. , 2007, Physical review letters.

[612]  Lei Zhou,et al.  Research on the Intelligent Monitoring System of Indoor Electrical Safety Based on the Internet of Things , 2014 .

[613]  Christian Jutten,et al.  An Analysis of Visual Speech Information Applied to Voice Activity Detection , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[614]  Mark West,et al.  I'd blush if I could: closing gender divides in digital skills through education , 2019 .

[615]  Vivek Kanhangad,et al.  Gender classification in smartphones using gait information , 2018, Expert Syst. Appl..

[616]  Chao Feng,et al.  Application of Comprehensive Evaluation Method Integrated by Delphi and GAHP in Optimal Siting of Electric Vehicle Charging Station , 2012, 2012 International Conference on Control Engineering and Communication Technology.

[617]  Adnan Mohsin Abdulazeez,et al.  Gait-Based Human Gender Classification Using Lifting 5/3 Wavelet and Principal Component Analysis , 2018, 2018 International Conference on Advanced Science and Engineering (ICOASE).

[618]  Zhenlong Yuan,et al.  Droid-Sec: deep learning in android malware detection , 2015, SIGCOMM 2015.