Default Cover Image

2023 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)

Nov. 2 2023 to Nov. 4 2023

Jiangsu, China

ISBN: 979-8-3503-0869-3

Table of Contents

Title Page IFreely available from IEEE.pp. 1-1
Title Page IIIFreely available from IEEE.pp. 3-3
CopyrightFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-12
InstroductionFreely available from IEEE.pp. 13-13
Message from the Technical Program ChairsFreely available from IEEE.pp. 14-14
Message from the Steering CommitteeFreely available from IEEE.pp. 15-15
Program CommitteeFreely available from IEEE.pp. 16-18
ReviewersFreely available from IEEE.pp. 19-20
KeynotesFreely available from IEEE.pp. 21-26
SponsorsFreely available from IEEE.pp. 27-27
GRU-CP: Non-stationary Time Series Forecasting with Change Point DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Large Language Models guided Generative Prompt for Dialogue GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 10-17
A Spatial Maximal Co-location Pattern Mining Algorithm Based on Maximal CliqueFull-text access may be available. Sign in or learn about subscription options.pp. 18-26
EEG-based Anxiety Detection with Feature SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 32-39
Civil Aviation Data Classification and Grading Method Based on Intelligent AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 40-43
Artificial Immune-Based Semi-supervised Learning for ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 44-50
Neural Authorship Attribution: Stylometric Analysis on Large Language ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 51-54
Urban Social Segregation with Quantum Walk AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 55-58
Optimization of Merkle Tree Structures: A Focus on Subtree ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 59-67
Hard-Negatives Focused Self-Supervised LearningFull-text access may be available. Sign in or learn about subscription options.pp. 68-77
Event-Based Weak Target Detection and Tracking for Space Situational AwarenessFull-text access may be available. Sign in or learn about subscription options.pp. 78-83
Nested Named Entity Recognition Based on Multi-word Fusion and Boundary DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 92-95
DouRN: Improving DouZero by Residual Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 96-99
Application of Voformer-EC Clustering Algorithm to Stock Multivariate Time Series DataFull-text access may be available. Sign in or learn about subscription options.pp. 100-107
Study on Fault Prediction Methods for Short-wave Transmitting System Based on SSA and CKF-LSSVRFull-text access may be available. Sign in or learn about subscription options.pp. 108-114
Time-Aware Attentional Knowledge Tracing based on Pre-training and Feature ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 115-122
Deep research and analysis of ChatGPT based on multiple testing experimentsFull-text access may be available. Sign in or learn about subscription options.pp. 123-131
Transformer-based Spatial-Temporal Graph Attention Network for Traffic Flow PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 132-135
Visual-Based Hearing-Dog Robots For Users With Hearing ImpairmentFull-text access may be available. Sign in or learn about subscription options.pp. 136-145
On the Basin of Attraction and Capacity of Restricted Hopfield Network as an Auto-Associative MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 146-154
BS-GSA: Speech Emotion Recognition via Blend-Sample Empowered Global & Spectral Attentive ParadigmFull-text access may be available. Sign in or learn about subscription options.pp. 155-158
An On-Demand Customized Service Function Chain Method with Quality of Service GuaranteeFull-text access may be available. Sign in or learn about subscription options.pp. 159-164
Exploring Event-based Dynamic Topic Modeling*Full-text access may be available. Sign in or learn about subscription options.pp. 165-174
ACLPSO with Dynamic Interval Scaling and Learning Probability Tradeoff CoefficientsFull-text access may be available. Sign in or learn about subscription options.pp. 175-178
Appearance-Motion United Memory Autoencoder for Video Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 179-187
Improvement of Neural Cognitive Diagnosis for Intelligent Education Systems Based on Response Time FactorFull-text access may be available. Sign in or learn about subscription options.pp. 188-191
Point Cloud Compression Method Based on Curvature Grading and Inter-point Compression for Industrial ProductsFull-text access may be available. Sign in or learn about subscription options.pp. 192-199
Graph Sketch Based Heavy Change Detection for Temporal Network Traffic AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 200-209
Multimodal Deep Learning for Enhanced Arrhythmia Detection Using ECG Time Series and Image DataFull-text access may be available. Sign in or learn about subscription options.pp. 210-216
Image Gradient inspired Generative Adversarial Network for Non-Uniform Deblurring*Full-text access may be available. Sign in or learn about subscription options.pp. 217-224
Encoding Block Pixel Compensation With Motion Vector on DNNFull-text access may be available. Sign in or learn about subscription options.pp. 234-238
Improvement in On-road Object Detection Using YOLOv7 with High-order Spatial Interaction and Attention MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 249-258
Using Statistical Distribution to Identify the Influence Connections in Brain NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 259-262
Privacy-preserving Deep Learning for Grey Scale Image Classification with Pixel-based EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 263-271
A Type of Recharging Scheduling Strategy based on Adjustable Request Threshold in WRSNsFull-text access may be available. Sign in or learn about subscription options.pp. 272-280
A Node Confidence Determination Based Moving Target Defense Strategy for SDNFull-text access may be available. Sign in or learn about subscription options.pp. 281-288
An Iterative RBSF Kalman Equalizer for MIMO ISI ChannelsFull-text access may be available. Sign in or learn about subscription options.pp. 289-294
Covert Communication in TDCS with Spectrum Measurement Mismatch and Noise UncertaintyFull-text access may be available. Sign in or learn about subscription options.pp. 301-305
Trust Maintenance in IoT for Smart Cities with Complex Network MetricsFull-text access may be available. Sign in or learn about subscription options.pp. 306-315
A Concept Drift Tolerant Abnormal Detection Method for Network TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 323-330
An IoT-Based Smart Irrigation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 335-338
Blockchain-Based Virtual Skin System for Metaverse: Design and ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 339-346
Improvement of Passkey Entry Protocol for Secure Simple PairingFull-text access may be available. Sign in or learn about subscription options.pp. 347-356
Collaborative Vehicle Collision Warning Based on Consensus ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 361-370
Safety Verification Model of Desensitization Algorithm for Civil Aviation Passenger Data Based on StatisticsFull-text access may be available. Sign in or learn about subscription options.pp. 371-374
UAV-assisted Blockchain-based Electric Power Grid Inspection SystemFull-text access may be available. Sign in or learn about subscription options.pp. 375-382
A Chaotic Encryption Approach Improving Digital Image SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 383-392
Walking to Authenticate: Identifying Robust Behavioral Biometrics from Step Count DataFull-text access may be available. Sign in or learn about subscription options.pp. 393-396
Classification and Identification of Phishing Websites based on Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 397-403
On Hybrid Artificial Neural Networks and Variational Quantum Classifier for Network Intrusion DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 410-416
Author IndexFreely available from IEEE.pp. 407-409
Showing 69 out of 69