


default search action
ICBDS 2020: Singapore
- Yuan Tian

, Tinghuai Ma
, Muhammad Khurram Khan
:
Big Data and Security - Second International Conference, ICBDS 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers. Communications in Computer and Information Science 1415, Springer 2021, ISBN 978-981-16-3149-8
Cybersecurity and Privacy
- Weiwei Kong, Jie Zhang, Peichun Pan, Jia Yu:

Application and Research of Power Communication Trusted Access Gateway. 3-14 - Ya Wei, Rongyan Cai, Lan Zhang, Qian Guo:

The Database Fine-Grained Access SQL Statement Control Model Based on the Dynamic Query Modification Algorithm. 15-26 - Weiwei Kong, Long Liu, Xingqi Wei, Shanyu Bi, Xinlei Yang:

Research on Application Technology and Security of VoLTE in Power Wireless Private Network. 27-40 - Hui Xiao, Donghai Guan, Rui Zhao, Weiwei Yuan, Yaofeng Tu, Asad Masood Khattak:

Semi-supervised Time Series Anomaly Detection Model Based on LSTM Autoencoder. 41-53 - Mengqiong Ge, Shengfang Lu, Yan Zhang, Cui Qin:

Fault Inspection of Brake Shoe Wear for TEDS Based on Machine Vision. 54-59 - Nannan Xie, Hongpeng Bai, Yanfeng Shi, Haiwei Wu:

Android Malware Detection Method Based on App-Image Conversion. 60-74 - Xiaoyuan Zhang, Peng Jia, Shaopeng Wanyan:

Research on IMS Security Access and Mechanism in Power System. 75-85 - Junhua Deng, Lei Zhao, Xuechong Yuan, Zhu Tang, Qian Guo:

Research on the Role-Based Access Control Model and Data Security Method. 86-96 - Junyao Zhang, Shanyu Bi, Liangliang Gong, Weiwei Kong, Xiaoyuan Zhang:

Research on Network Optimization and Network Security in Power Wireless Private Network. 97-110 - Xincong Li, Mingze Zhang, Jun Wang, Minhao Xia:

Research on Location Planning of Multi-station Integration Based on Particle Swarm Optimization. 111-121 - Zhuohao Weng, Jian Zhang, Cui Qin, Yan Zhang:

Quick Response Code Based on Least Significant Bit. 122-132 - Wenlin Zou, Lisheng Jia, Liuwen Li:

Event-Based H∞ Control for Networked Control System with Saturation Constraints. 133-141 - Randa Aljably:

Privacy Preserving Data Sharing in Online Social Networks. 142-152 - Bingsen Xia, Zhaozheng Zhou, Zhanghuang Zhang, Yang Li, Jia Yu:

Indoor and Outdoor Fusion Positioning and Security Technology Based on Beidou Satellite. 153-164 - Xue Gao, Sai Liu, Jun Liu, Jia Yu:

Research on Safety Protection Scheme of Distribution Network Automation. 165-176 - Ningzhe Xing, Shen Jin, Wei Song, Yang Li, Jia Yu:

Research on Experimental Verification Scheme of 5G in Power System. 177-193 - Xinlei Hu, Zhengxia Wang, Yunbing Hu:

Immune Network Based Anomaly Detection Algorithm. 194-203 - Yongliang Jia, Peng Tao, Dapeng Zhou, Bing Li:

Incremental Anonymous Privacy-Protecting Data Mining Method Based on Feature Correlation Algorithm. 204-214 - Wen Shen, Qian Guo, Hui Zhu, Kejian Tang, Shaohui Zhan, Zhiguo Hao:

The Privacy Data Protection Model Based on Random Projection Technology. 215-226 - Liuwen Li, Wenlin Zou, Haiqiang Liu:

Event-Driven H∞ Control for Networked Control Systems with Random Actuator Nonlinearity. 227-237 - Yunfeng Zou, Pengfei Yu, Chao Shan, Meng Wu:

Research on the Sensitive Data Protection Method Based on Game Theory Algorithm. 238-248 - Guofeng Tong, Yuanwen Jin, Kangyi Li, Jia Yu:

Research on Differential Protection and Security in Power System Under 5G Environment. 249-260 - Peng Jia, Shaopeng Wanyan, Xiaoyuan Zhang:

Research on Intelligent Fault and Security Handling Based on IMS in Power System. 261-273 - Weiwei Yan, Hui Chu:

Research on System Simulation and Data Analysis of Power Wireless Private Network. 274-284 - Zhan Shi, Yonghui Liu, Fengxian Zhao, Chenxu Liu:

Research on Attitude Control System of Four-Rotor Aircraft. 285-296
Big Data
- Chengtao Li, Li Chen, Jiafeng Wang, Tianjian Xia:

A Method for Image Big Data Utilization: Automated Progress Monitoring Based on Image Data for Large Construction Site. 299-313 - Guanzhe Zhao, Zaichao Duan, Chengbo Zhang, Zilong Jin, Benjamin Kwapong Osibo

:
Big Data from Collection to Use in Competitive Games - A Study Case on Badminton. 314-326 - Huanyu Fan, Yunan Zhu, Chao Shan:

The Interactive Query Method with Clustering and Differential Privacy Protection Model Under Big Data Environment. 327-336 - Xin He, Zhentao Han, Nan Zhang, Yixin Hou, Yutong Liu:

Research on Spatio-Temporal Characteristics of Distribution Network Voltage Based on Big Data. 337-352 - Shenglong Liu, Hongbin Zhu, Tao Zhao, Heng Wang, Xianzhou Gao, Ruxia Yang:

Oracle Data Privacy Protection System of Virtual Database. 353-363 - Caixin Kang, Mingrui Wan, Murong Du, Daokang Zhang:

Enterprise Credit Decisions Using Logistic Regression and Particle Swarm Optimization Based on Massive Data Records. 364-376 - Xinlei Hu, Zhengxia Wang, Yunbing Hu:

A Novel Artificial Immune Model on Hadoop for Anomaly Detection. 377-390 - Zuobin Liang, Zhaojun Lu, Fei Yuan, Qing Wang, Guangfeng Zhao, Han Zhang, Wei Zhang:

Research on Accurate Location of Line Loss Anomaly in Substation Area Based on Data Driven. 391-405 - Yibin Guan, Wenlong Wu, Jianhua Chen, Xiaochun Xu, Kanglin Cai, Wenhui Yuan:

A Reactive Power Reserve Prediction Method for EV Charging Piles Based on Big Data and Optimized Neural Network. 406-419 - Liu Lei, Zhu Hao, Weiye Xu:

Research on Scattered Point Cloud Coordinate Reduction and Hole Repair Technology Based on Big Data Model. 420-432 - Huiting Sun, Yanfang Fan, Shuang Yuan, Ying Cai:

Survey on Computation Offloading Schemes in Resource-Constrained Mobile Edge Computing. 433-444
Blockchain and Internet of Things
- Yanan Li, Hui Pang, Zhixin Liu, Shijie Li:

Discussion on the Influence of 5G and Blockchain Technology on Digital Virtual Assets. 447-457 - Shaopeng Wanyan, Peng Jia, Xiaoyuan Zhang:

Research on Power Universal Service Access Gateway Based on Blockchain. 458-470 - Weiwei Yan, Hui Chu:

Application of Whole-Service Ubiquitous Internet of Things in Power System. 471-482
Artificial Intelligence/Machine Learning Security
- Lei Han, Xiaohua Huang

, Zhan Shi, Shengnan Zheng:
Learning Depth from Light Field via Deep Convolutional Neural Network. 485-496 - Yuting Guo, Zifan Ma, Zhiying Song, Ruocong Tang, Linfeng Liu:

Cycle-Derain: Enhanced CycleGAN for Single Image Deraining. 497-509 - Sheng Ye, Yong Cheng, Yonggang Yang, Qian Guo:

Sensitive Data Recognition and Filtering Model of Webpage Content Based on Decision Tree Algorithm. 510-521 - Rui Zhao, Donghai Guan, Yuanfeng Jin, Hui Xiao, Weiwei Yuan, Yaofeng Tu, Asad Masood Khattak:

Hard Disk Failure Prediction via Transfer Learning. 522-536 - Hao Zhu, Mulan Wang, Weiye Xu:

Design and Application of CMAC Neural Network Based on Software Hardening Technology. 537-548 - Shi Zhan, Tingting Zhang, Han Lei, Qian Yin, Lu Ali:

Research on Path Planning of Mobile Robot Based on Deep Reinforcement Learning. 549-560 - Lulu Zhang, Yu Shu:

Research on K-Means Clustering Algorithm Based on Improved Genetic Algorithm. 561-571 - Zeyu Zhang, Xizhong Li, Xuan Fei, Xin Cao, Qian Xu:

Research on Low Voltage Early Warning of Distribution Network Based on Improved DNN-LSTM Algorithm. 572-584 - Guo-Xiang Li, Yao-Feng Tu, Sheng-Jun Huang:

Cross-Task and Cross-Model Active Learning with Meta Features. 585-598 - Yihe Wang, Yufei Jin, Yuancheng Zhu, Xiyuan Li, Dazhi Li:

Improved Random Forest Algorithm Based on Attribute Comprehensive Weighting Used in Identification of Missing Data in Power Grid. 599-611 - Jiaze He, Qian Lu, Ying Tong, Yiyang Chen:

Course Classification of Online Learning Platform Based on Sentence-Bert Model. 612-623 - Bo Yang, Bo Jia, Wanchao Jiang, Yongxin Miao, Yang Wang:

Analysis of Economic Loss of Voltage Sag Based on Artificial Intelligence Algorithm. 624-638 - Jie Pan, Yaofeng Tu:

Posterior Transfer Learning with Active Sampling. 639-651

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














