Default Cover Image

2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)

Oct. 18 2018 to Oct. 20 2018

Zhengzhou, China

Table of Contents

Title Page iFreely available from IEEE.pp. 1-10
Technical Program CommitteeFreely available from IEEE.pp. 20-201
Decentralized Cross-Layer Optimization for Energy-Efficient Resource Allocation in HetNetsFull-text access may be available. Sign in or learn about subscription options.pp. 470-4704
A Full Multicast Reconfigurable Non-blocking Permutation NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 475-4753
Mesh Generation Technique and Object Identification for Robotic/Artificial IntelligenceFull-text access may be available. Sign in or learn about subscription options.pp. 479-4793
A Dynamic Proxy Based Crawler Strategy for Data Collection on CyberGISFull-text access may be available. Sign in or learn about subscription options.pp. 483-4834
Security of Multi-antenna Laptop Wirelessly Access to Internet of Things NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 488-4883
BDDS: An Efficient Data Screening Algorithm Based on Binary DigitFull-text access may be available. Sign in or learn about subscription options.pp. 492-4924
3D Indoor Localization Mechanism Based on Multiple SensorsFull-text access may be available. Sign in or learn about subscription options.pp. 497-4975
GR-PMS: A Geomagnetism-Based Real-Time Positioning Mechanism of Smart PhonesFull-text access may be available. Sign in or learn about subscription options.pp. 503-5034
ReviewersFreely available from IEEE.pp. 22-223
Evaluating and Detecting Internal Attacks in a Mobile Robotic NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 516-5168
Author IndexFreely available from IEEE.pp. 517-5173
Publisher's InformationFreely available from IEEE.pp. 522-5220
KeynotesFreely available from IEEE.pp. 26-264
Effect of Adversarial Examples on the Robustness of CAPTCHAFull-text access may be available. Sign in or learn about subscription options.pp. 1-109
An Algorithm to Generate Password Structure Dictionary Based on Gene BankFull-text access may be available. Sign in or learn about subscription options.pp. 11-117
Iterative UAV Trajectory Optimization for Physical Layer Secure Mobile RelayingFull-text access may be available. Sign in or learn about subscription options.pp. 19-194
Detecting Spammer on Micro-blogs Base on Fuzzy Multi-class SVMFull-text access may be available. Sign in or learn about subscription options.pp. 24-247
High-Rate Secret Key Generation Method Using Two-Way Random SignalFull-text access may be available. Sign in or learn about subscription options.pp. 32-324
Single Sample Per Person Face Recognition Based on Sparse Representation with Extended Generic SetFull-text access may be available. Sign in or learn about subscription options.pp. 37-375
[Title page iii]Freely available from IEEE.pp. 3-30
Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN VerifierFull-text access may be available. Sign in or learn about subscription options.pp. 43-435
Security Vulnerabilities and Countermeasures in the RPL-Based Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 49-495
Secure Outage Probability Analysis of Relay Networks Based on Cooperative JammingFull-text access may be available. Sign in or learn about subscription options.pp. 55-553
An Improved User Authentication Protocol for IoTFull-text access may be available. Sign in or learn about subscription options.pp. 59-593
Analysis of the Impact of Denial of Service Attacks on the Group of RobotsFull-text access may be available. Sign in or learn about subscription options.pp. 63-638
Improving Word Representation with Word Pair Distributional AsymmetryFull-text access may be available. Sign in or learn about subscription options.pp. 72-723
Spark Load Balancing Strategy Optimization Based on Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 76-763
Research on Auxiliary Content Distribution Based on OPNET on CampusFull-text access may be available. Sign in or learn about subscription options.pp. 80-808
Smart Control System Solution for Smart CitiesFull-text access may be available. Sign in or learn about subscription options.pp. 89-893
Title Page iiiFreely available from IEEE.pp. 4-40
An Efficient High Speed AES Implementation Using Traditional FPGA and LabVIEW FPGA PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 93-937
Improved Ant Colony Optimization for Ground Robot 3D Path PlanningFull-text access may be available. Sign in or learn about subscription options.pp. 106-1066
A Prototype Air Flow Control System for Home Automation Using MQTT Over Websocket in AWS IoT CoreFull-text access may be available. Sign in or learn about subscription options.pp. 111-1116
A Video Analytics-Based Intelligent Indoor Positioning System Using Edge Computing For IoTFull-text access may be available. Sign in or learn about subscription options.pp. 118-1187
The Optimization of Big Data Platform Under the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 126-1263
Design and Implementation of Video Analytics System Based on Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 130-1307
Application Research of YOLO v2 Combined with Color IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 138-1383
Copyright PageFreely available from IEEE.pp. 5-50
UWB-Based Real-Time Continuous Positioning System in NLOS Tunnel EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 142-1424
Research on Vehicle Taillight Detection and Semantic Recognition Based on Internet of VehicleFull-text access may be available. Sign in or learn about subscription options.pp. 147-1473
An IoT Based Smart Parking System Using LoRaFull-text access may be available. Sign in or learn about subscription options.pp. 151-1513
Structural Exploration of Chinese Character Combination NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 155-1554
Construction of MeSH-Like Obstetric Knowledge GraphFull-text access may be available. Sign in or learn about subscription options.pp. 160-1608
An Abnormal State Detection Method for Power Distribution Network Based on Big Data TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 169-1694
Text Cluster Analysis Based on Haikou 12345 Hotline DataFull-text access may be available. Sign in or learn about subscription options.pp. 174-1745
Research on Civic Hotline Complaint Text Classification Model Based on word2vecFull-text access may be available. Sign in or learn about subscription options.pp. 180-1803
A Binary Feature Extraction Based Data Provenance System Implemented on Flink PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 184-1847
Table of ContentsFreely available from IEEE.pp. 6-609
Evaluating Checkpoint Interval for Fault-Tolerance in MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 192-1925
Performance Evaluation for Real-Time Messaging System in Big Data Pipeline ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 198-1986
A Field Intensity Based Model for Initiative File Sharing in Mobile Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 205-20509
A Cloud Data Center Virtual Machine Placement Scheme Based on Energy OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 215-2156
Map Reduce by K-Nearest Neighbor JoinsFull-text access may be available. Sign in or learn about subscription options.pp. 222-22209
Progressive Perceptual Audio Rendering for Large Multi-source ScenesFull-text access may be available. Sign in or learn about subscription options.pp. 232-2325
Usage Demand Forecast and Quantity Recommendation for Urban Shared BicyclesFull-text access may be available. Sign in or learn about subscription options.pp. 238-2388
Monadic Dynamic Slicing of Object-Oriented ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 247-2477
Information Fusion VIA Optimized KECA with Application to Audio Emotion RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 255-25509
IntroductionFreely available from IEEE.pp. 16-160
Vehicle Accident Foresight System Using Bigdata Intelligent Random Forest AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 265-2657
ICC World Cup Prediction Based Data Analytics and Business Intelligent (BI) TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 273-2736
Prediction of Mobile APP Advertising Conversion Rate Based on Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 284-2845
Planning Station Capacity and Bike Rebalance Based on Visual Analytics of Taxi and Bike-Sharing DataFull-text access may be available. Sign in or learn about subscription options.pp. 305-3054
Credit Scoring Based on Transaction Sequence ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 310-3106
Message from the Technical Program ChairsFreely available from IEEE.pp. 17-170
Rate-Less Codes Aided Cooperation Based on Antenna Selection in Multi-user Massive MIMO SystemFull-text access may be available. Sign in or learn about subscription options.pp. 317-3173
QAM Division Based Space-Time Modulation for Two-User Uplink Massive MIMO SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 329-3293
Cooperative Jamming and Relay Beamforming Design for Physical Layer Secure Two-Way RelayingFull-text access may be available. Sign in or learn about subscription options.pp. 333-3336
A Reduced Overhead Low Complexity Sum Rate Optimization Algorithm for Massive MIMO SystemFull-text access may be available. Sign in or learn about subscription options.pp. 340-3404
A Nonlinear Precoding Design for Two-Group Alamouti System in MIMO Correlated ChannelFull-text access may be available. Sign in or learn about subscription options.pp. 345-3454
A Parafac-Based Blind Channel Estimation and Symbol Detection Scheme for Massive MIMO SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 350-3503
A Smart QoE Aware Network Selection Solution for IoT Systems in HetNets Based 5G ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 361-3617
Message from the Steering CommitteeFreely available from IEEE.pp. 18-180
Metric Dimension and Robot Navigation in Specific Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 369-3694
Asymmetric Cryptography Based Unidirectional Authentication Method for RFIDFull-text access may be available. Sign in or learn about subscription options.pp. 374-3743
Mobile Data Gathering and Charging in Wireless Rechargeable Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 378-3786
Performance Analysis of Support Vector Machine-Based Classifier for Spectrum Sensing in Cognitive Radio NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 385-3854
CPS Event Driving Method Based on Micro PMU of Distribution NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 390-3902
The Rainbow Restrained Domination in Torus NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 393-3937
Prior-Information Associated Channel Parameter Estimation for Aeronautical CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 401-4014
Research on Probability Statistics Method for Multi-sensor Data FusionFull-text access may be available. Sign in or learn about subscription options.pp. 406-4065
TTVT: A Two-Tier Voronoi Diagram Based Tracking Algorithm in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 412-4124
Ground Robot Path Planning Based on Simulated Annealing Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 417-4177
Conference OrganizationFreely available from IEEE.pp. 19-190
Maximum Data Rate and Error Performance Comparisons of SPAD Array Optical ReceiversFull-text access may be available. Sign in or learn about subscription options.pp. 425-4253
Research on Joint Mode Selection and Resource Allocation Scheme in D2D NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 429-4293
Drone Detection Based on FD-HOG DescriptorFull-text access may be available. Sign in or learn about subscription options.pp. 433-4333
A Cooperative Task Assignment Method of Multi-UAV Based on Self Organizing MapFull-text access may be available. Sign in or learn about subscription options.pp. 437-4375
Multi-UAV Task Allocation Based on Improved Algorithm of Multi-objective Particle Swarm OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 443-4437
Interpolation Method for Radio Map Establishment Based on RSS Clustering and Propagation Model OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 451-4513
Loading Analysis of Channelized SATCOM System with Link-Margin Degree OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 455-4554
IQ Imbalance Compensation Based on Cordic Algorithm in VLC-OFDM SystemFull-text access may be available. Sign in or learn about subscription options.pp. 460-4604
Showing 100 out of 101