S. Huang, Weifeng Lv, Zhipu Xie, Bo Huang, Bowen Du
{"title":"SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing","authors":"S. Huang, Weifeng Lv, Zhipu Xie, Bo Huang, Bowen Du","doi":"10.1007/978-3-030-05345-1_28","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_28","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126469683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A High-Performance Adaptive Strategy of Container Checkpoint Based on Pre-replication","authors":"Shuo Zhang, Ningjiang Chen, Hanlin Zhang, Yijun Xue, Ruwei Huang","doi":"10.1007/978-3-030-05345-1_20","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_20","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129414670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning","authors":"Jie Tao, Shaobo Zhang, Da-lian Yang","doi":"10.1007/978-3-030-05345-1_42","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_42","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"22 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131991364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Salamai, Morteza Saberi, Md. Omar Khadeer Hussain, Elizabeth Chang
{"title":"Risk Identification-Based Association Rule Mining for Supply Chain Big Data","authors":"A. Salamai, Morteza Saberi, Md. Omar Khadeer Hussain, Elizabeth Chang","doi":"10.1007/978-3-030-05345-1_18","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_18","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114053975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics","authors":"Pascal Oser, F. Kargl, S. Lüders","doi":"10.1007/978-3-030-05345-1_36","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_36","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114422060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wang Wei, M. A. Rahman, Md Jahan Ali, Md. Zakirul Alam Bhuiyan, Liu Yao, Hai Tao
{"title":"Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective","authors":"Wang Wei, M. A. Rahman, Md Jahan Ali, Md. Zakirul Alam Bhuiyan, Liu Yao, Hai Tao","doi":"10.1007/978-3-030-05345-1_24","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_24","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130264245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SDN-Based Secure VANETs Communication with Fog Computing","authors":"Muhammad Arif, Guojun Wang, Tian Wang, Tao Peng","doi":"10.1007/978-3-030-05345-1_4","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_4","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122135391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Zakirul Alam Bhuiyan, Md. Monirul Islam, Guojun Wang, Tian Wang
{"title":"Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals","authors":"Md. Zakirul Alam Bhuiyan, Md. Monirul Islam, Guojun Wang, Tian Wang","doi":"10.1007/978-3-030-05345-1_44","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_44","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124597919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xuan Zhao, Md. Zakirul Alam Bhuiyan, Lianyong Qi, Hongli Nie, Wajid Rafique, Wanchun Dou
{"title":"TrCMP: An App Usage Inference Method for Mobile Service Enhancement","authors":"Xuan Zhao, Md. Zakirul Alam Bhuiyan, Lianyong Qi, Hongli Nie, Wajid Rafique, Wanchun Dou","doi":"10.1007/978-3-030-05345-1_19","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_19","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126480348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}