Keke Gai

Orcid: 0000-0001-6784-0221

According to our database1, Keke Gai authored at least 203 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
RAC-Chain: An Asynchronous Consensus-based Cross-chain Approach to Scalable Blockchain for Metaverse.
ACM Trans. Multim. Comput. Commun. Appl., July, 2024

Toward Secure and Robust Federated Distillation in Distributed Cloud: Challenges and Design Issues.
IEEE Netw., July, 2024

A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT.
IEEE Internet Things J., June, 2024

Trustworthy Access Control for Multiaccess Edge Computing in Blockchain-Assisted 6G Systems.
IEEE Trans. Ind. Informatics, May, 2024

SAMCU: Secure and Anonymous Multi-Channel Updates in Payment Channel Networks.
IEEE Trans. Inf. Forensics Secur., 2024

HCA: Hashchain-Based Consensus Acceleration Via Re-Voting.
IEEE Trans. Dependable Secur. Comput., 2024

Blockchain-Based Shared Data Integrity Auditing and Deduplication.
IEEE Trans. Dependable Secur. Comput., 2024

ADS-CNN: Adaptive Dataflow Scheduling for lightweight CNN accelerator on FPGAs.
Future Gener. Comput. Syst., 2024

A2-DIDM: Privacy-preserving Accumulator-enabled Auditing for Distributed Identity of DNN Model.
CoRR, 2024

DiffuseTrace: A Transparent and Flexible Watermarking Scheme for Latent Diffusion Model.
CoRR, 2024

Binary Linear Tree Commitment-based Ownership Protection for Distributed Machine Learning.
CoRR, 2024

Visual-Semantic Decomposition and Partial Alignment for Document-based Zero-Shot Learning.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

T2VIndexer: A Generative Video Indexer for Efficient Text-Video Retrieval.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

ReVFed: Representation-Based Privacy-Preserving Vertical Federated Learning with Heterogeneous Models.
Proceedings of the Knowledge Science, Engineering and Management, 2024

KDTSS: A Blockchain-Based Scheme for Knowledge Data Traceability and Secure Sharing.
Proceedings of the Knowledge Science, Engineering and Management, 2024

IIU: Independent Inference Units for Knowledge-Based Visual Question Answering.
Proceedings of the Knowledge Science, Engineering and Management, 2024

Adversarial Examples for Preventing Diffusion Models from Malicious Image Edition.
Proceedings of the Knowledge Science, Engineering and Management, 2024

KEEN: Knowledge Graph-Enabled Governance System for Biological Assets.
Proceedings of the Knowledge Science, Engineering and Management, 2024

A Joint Client-Server Watermarking Framework for Federated Learning.
Proceedings of the Knowledge Science, Engineering and Management, 2024

DICES: Diffusion-Based Contrastive Learning with Knowledge Graphs for Recommendation.
Proceedings of the Knowledge Science, Engineering and Management, 2024

Index Multilinear Tree-based Cross Chain for Decentralized Identity Governance.
Proceedings of the 10th IEEE International Conference on High Performance and Smart Computing, 2024

Lightweight Privacy-Preserving Mechanisms for Cross-Chain Transactions.
Proceedings of the 11th IEEE International Conference on Cyber Security and Cloud Computing, 2024

LRPAFL: Layer-Wise Relevance Propagation-Based Adaptive Federated Learning.
Proceedings of the 11th IEEE International Conference on Cyber Security and Cloud Computing, 2024

A Trustworthy Biological Assets Governance System Using Decentralized Identity.
Proceedings of the 11th IEEE International Conference on Cyber Security and Cloud Computing, 2024

Decision Tree-based Privacy Protection in Federated Learning: A Survey.
Proceedings of the 10th IEEE Conference on Big Data Security on Cloud, 2024

Exploiting Multi-Model Collaborative Inference for Privacy Enhancement in Text Classification.
Proceedings of the 10th IEEE Conference on Big Data Security on Cloud, 2024

Context-I2W: Mapping Images to Context-Dependent Words for Accurate Zero-Shot Composed Image Retrieval.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Blockchain-Based Multisignature Lock for UAC in Metaverse.
IEEE Trans. Comput. Soc. Syst., October, 2023

A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing.
ACM Trans. Internet Techn., August, 2023

AsyFed: Accelerated Federated Learning With Asynchronous Communication Mechanism.
IEEE Internet Things J., May, 2023

Blockchain-Based Privacy-Preserving Positioning Data Sharing for IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

Blockchain-Enabled Service Optimizations in Supply Chain Digital Twin.
IEEE Trans. Serv. Comput., 2023

Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network.
J. Syst. Archit., 2023

BESIFL: Blockchain-Empowered Secure and Incentive Federated Learning Paradigm in IoT.
IEEE Internet Things J., 2023

Cross-Chain-Based Trustworthy Node Identity Governance in Internet of Things.
IEEE Internet Things J., 2023

Blockchain-Based Anonymous Data Sharing With Accountability for Internet of Things.
IEEE Internet Things J., 2023

Watermarking Vision-Language Pre-trained Models for Multi-modal Embedding as a Service.
CoRR, 2023

VFedMH: Vertical Federated Learning for Training Multi-party Heterogeneous Models.
CoRR, 2023

Align before Search: Aligning Ads Image to Text for Accurate Cross-Modal Sponsored Search.
CoRR, 2023

A Blockchain-Based Hierarchical Storage Method for Supply Chain Data.
Proceedings of the 8th IEEE International Conference on Smart Cloud, 2023

BDVFL: Blockchain-based Decentralized Vertical Federated Learning.
Proceedings of the IEEE International Conference on Data Mining, 2023

Blockchain-Empowered Search Over Encrypted Data With Forward and Backward Privacy.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

Efficiency-enhanced Blockchain-based Client Selection in Heterogeneous Federated Learning.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
Scientific Workflows in IoT Environments: A Data Placement Strategy Based on Heterogeneous Edge-Cloud Computing.
ACM Trans. Manag. Inf. Syst., December, 2022

Digital Twin-enabled AI Enhancement in Smart Critical Infrastructures for 5G.
ACM Trans. Sens. Networks, 2022

Multi-Access Filtering for Privacy-Preserving Fog Computing.
IEEE Trans. Cloud Comput., 2022

Blockchain-Empowered Efficient Data Sharing in Internet of Things Settings.
IEEE J. Sel. Areas Commun., 2022

Coordinate-based efficient indexing mechanism for intelligent IoT systems in heterogeneous edge computing.
J. Parallel Distributed Comput., 2022

Edge Computing and Lightning Network Empowered Secure Food Supply Management.
IEEE Internet Things J., 2022

Attacking the Edge-of-Things: A Physical Attack Perspective.
IEEE Internet Things J., 2022

Modelization and analysis of dynamic heterogeneous redundant system.
Concurr. Comput. Pract. Exp., 2022

A Dynamic Taint Analysis-Based Smart Contract Testing Approach.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

An Auxiliary Classifier GAN-Based DDoS Defense Solution in Blockchain-Based Software Defined Industrial Network.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Cross-Chain-Based Distributed Digital Identity: A Survey.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Blockchain Applications in Smart City: A Survey.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

ARC: An Asynchronous Consensus and Relay Chain-based Cross-chain Solution to Consortium Blockchain.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

A Searchable Re-encryption-based Scheme for Massive Data Transactions.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

Work-in-Progress: Towards a Smaller than Grain Stream Cipher: Optimized FPGA Implementations of Fruit-80.
Proceedings of the International Conference on Compilers, 2022

Blockchain-based Secure Medical Data Management and Disease Prediction.
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022

Message from the Program Chairs HPSC 2022.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

A Semantic Analysis-Based Method for Smart Contract Vulnerability.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

BSCI 2022: The 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
A Framework for Mimic Defense System in Cyberspace.
J. Signal Process. Syst., 2021

A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Time-Efficient Ensemble Learning with Sample Exchange for Edge Computing.
ACM Trans. Internet Techn., 2021

Blockchain-Enabled Trustworthy Group Communications in UAV Networks.
IEEE Trans. Intell. Transp. Syst., 2021

An Energy-Aware High Performance Task Allocation Strategy in Heterogeneous Fog Computing Environments.
IEEE Trans. Computers, 2021

Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing.
IEEE Trans. Big Data, 2021

Blockchain-enabled secure communications in smart cities.
J. Parallel Distributed Comput., 2021

SearchBC: A Blockchain-Based PEKS Framework for IoT Services.
IEEE Internet Things J., 2021

IoT Microservice Deployment in Edge-Cloud Hybrid Environment Using Reinforcement Learning.
IEEE Internet Things J., 2021

Optimal Data Placement for Data-Sharing Scientific Workflows in Heterogeneous Edge-Cloud Computing Environments.
CoRR, 2021

A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management.
Comput. Secur., 2021

A Privacy-Preserving Auditable Approach Using Threshold Tag-Based Encryption in Consortium Blockchain.
Proceedings of the Smart Computing and Communication - 6th International Conference, 2021

SM9-based Traceable and Accountable Access Control for Secure Multi-user Cloud Storage.
Proceedings of the 6th IEEE International Conference on Smart Cloud, 2021

A Blockchain-Assisted Privacy-Preserving Cloud Computing Method with Multiple Keys.
Proceedings of the 6th IEEE International Conference on Smart Cloud, 2021

GAN-Enabled Code Embedding for Reentrant Vulnerabilities Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Blockchain-Based Privacy-Preserving Medical Data Sharing Scheme Using Federated Learning.
Proceedings of the Knowledge Science, Engineering and Management, 2021

BS-KGS: Blockchain Sharding Empowered Knowledge Graph Storage.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Cross-Chain-Based Decentralized Identity for Mortgage Loans.
Proceedings of the Knowledge Science, Engineering and Management, 2021

An Edge Trajectory Protection Approach Using Blockchain.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Blockchain-as-a-Service Powered Knowledge Graph Construction.
Proceedings of the Knowledge Science, Engineering and Management, 2021

SM9-based Anonymous Search over Encrypted Data.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Heuristic-based Blockchain Assignment: An Empirical Study.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

2020
Zero-to-Stable Driver Identification: A Non-Intrusive and Scalable Driver Identification Scheme.
IEEE Trans. Veh. Technol., 2020

Differential Privacy-Based Blockchain for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2020

Cost-Aware Multimedia Data Allocation for Heterogeneous Memory Using Genetic Algorithm in Cloud Computing.
IEEE Trans. Cloud Comput., 2020

Machine Learning Empowered Content Delivery: Status, Challenges, and Opportunities.
IEEE Netw., 2020

Achieving a Covert Channel over an Open Blockchain Network.
IEEE Netw., 2020

A machine learning based golden-free detection method for command-activated hardware Trojan.
Inf. Sci., 2020

WiPOS: A POS Terminal Password Inference System Based on Wireless Signals.
IEEE Internet Things J., 2020

Intelligent security and optimization in Edge/Fog Computing.
Future Gener. Comput. Syst., 2020

Blockchain Meets Cloud Computing: A Survey.
IEEE Commun. Surv. Tutorials, 2020

ChainIDE 2.0: Facilitating Smart Contract Development for Consortium Blockchain.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Novel Data Placement Strategy for Data-Sharing Scientific Workflows in Heterogeneous Edge-Cloud Computing Environments.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020

Consensus in Lens of Consortium Blockchain: An Empirical Study.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Edge-Assisted Federated Learning: An Empirical Study from Software Decomposition Perspective.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Reputation-Based Trustworthy Supply Chain Management Using Smart Contract.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Blockchain Meets DAG: A BlockDAG Consensus Mechanism.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

LNBFSM: A Food Safety Management System Using Blockchain and Lightning Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Understanding Privacy-Preserving Techniques in Digital Cryptocurrencies.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Message from the Program Chairs EdgeCom 2020 CSCloud-EdgeCom 2020.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

2019
Fusion of Cognitive Wireless Networks and Edge Computing.
IEEE Wirel. Commun., 2019

Optimal solution to intelligent multi-channel wireless communications using dynamic programming.
J. Supercomput., 2019

Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid.
IEEE Trans. Ind. Informatics, 2019

Toward Smart Treatment Management for Personalized Healthcare.
IEEE Netw., 2019

An Efficient and Accurate Nonintrusive Load Monitoring Scheme for Power Consumption.
IEEE Internet Things J., 2019

Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks.
IEEE Internet Things J., 2019

Controllable and trustworthy blockchain-based cloud data management.
Future Gener. Comput. Syst., 2019

Location-based Privacy-preserving Techniques in Connected Environment: A Survey.
Proceedings of the IEEE International Conference on Smart Cloud, 2019

Efficiency Issues and Solutions in Blockchain: A Survey.
Proceedings of the Smart Blockchain - Second International Conference, 2019

An Approach of Secure Two-Way-Pegged Multi-sidechain.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

A New Complex Network Robustness Attack Algorithm.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

Blockchain-enabled Data Provenance in Cloud Datacenter Reengineering.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

Session details: Session 1: Blockchain Consensus, Framework, and Architecture.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

A Geographical Behavior-Based Point-of-Interest Recommendation.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

Blockchain Technology in Internet of Things
Springer, ISBN: 978-3-030-21765-5, 2019

2018
Cloud-Based Adaptive Particle Swarm Optimization for Waveband Selection in Big Data.
J. Signal Process. Syst., 2018

Resource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computing.
IEEE Trans. Sustain. Comput., 2018

Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers.
IEEE Trans. Ind. Informatics, 2018

Reinforcement Learning-based Content-Centric Services in Mobile Sensing.
IEEE Netw., 2018

Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing.
J. Parallel Distributed Comput., 2018

Cost-aware optimal data allocations for multiple dimensional heterogeneous memories using dynamic programming in big data.
J. Comput. Sci., 2018

A survey on FinTech.
J. Netw. Comput. Appl., 2018

Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things.
IEEE Internet Things J., 2018

Privacy-preserving wireless communications using bipartite matching in social big data.
Future Gener. Comput. Syst., 2018

Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry.
Future Gener. Comput. Syst., 2018

Privacy-preserving multi-channel communication in Edge-of-Things.
Future Gener. Comput. Syst., 2018

In-memory big data analytics under space constraints using dynamic programming.
Future Gener. Comput. Syst., 2018

Research on the Security of Blockchain Data: A Survey.
CoRR, 2018

Privacy-preserving smart data storage for financial industry in cloud computing.
Concurr. Comput. Pract. Exp., 2018

Blockchain-Enabled Reengineering of Cloud Datacenters.
IEEE Cloud Comput., 2018

Optimal resource allocation using reinforcement learning for IoT content-centric services.
Appl. Soft Comput., 2018

Side-Channel Attack on a Protected RFID Card.
IEEE Access, 2018

Privacy-Aware Efficient Fine-Grained Data Access Control in Internet of Medical Things Based Fog Computing.
IEEE Access, 2018

Privacy-Preserving Data Synchronization Using Tensor-Based Fully Homomorphic Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A New Sustainable Interchain Design on Transport Layer for Blockchain.
Proceedings of the Smart Blockchain - First International Conference, 2018

An Improved Consensus Mechanism for Blockchain.
Proceedings of the Smart Blockchain - First International Conference, 2018

Ontology-Based Personalized Telehealth Scheme in Cloud Computing.
Proceedings of the Web Services - ICWS 2018, 2018

Heterogeneous Assignment of Functional Units with Gaussian Execution Time on A Tree.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

An Approach of Fog Detecting Magnitude Using Referenceless Perceptual Image Defogging.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

Privacy-Preserving Access Control Using Dynamic Programming in Fog Computing.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

2017
Static Node Center Opportunistic Coverage and Hexagonal Deployment in Hybrid Crowd Sensing.
J. Signal Process. Syst., 2017

Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks.
IEEE Trans. Smart Grid, 2017

SA-EAST: Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing.
ACM Trans. Embed. Comput. Syst., 2017

Intelligent cryptography approach for secure distributed big data storage in cloud computing.
Inf. Sci., 2017

A novel social network access control model using logical authorization language in cloud computing.
Concurr. Comput. Pract. Exp., 2017

Adaptive human detection approach using FPGA-based parallel architecture in reconfigurable hardware.
Concurr. Comput. Pract. Exp., 2017

Secure cyber incident analytics framework using Monte Carlo simulations for financial cybersecurity insurance in cloud computing.
Concurr. Comput. Pract. Exp., 2017

Empirical Study of Data Allocation in Heterogeneous Memory.
Proceedings of the Smart Computing and Communication, 2017

Smart Resource Allocation Using Reinforcement Learning in Content-Centric Cyber-Physical Systems.
Proceedings of the Smart Computing and Communication, 2017

Waveband Selection Based Feature Extraction Using Genetic Algorithm.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

Brain-Based Computer Interfaces in Virtual Reality.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

Advanced Fully Homomorphic Encryption Scheme Over Real Numbers.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

An Optimal Fully Homomorphic Encryption Scheme.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017

2016
Intercrossed Access Controls for Secure Financial Services on Multimedia Big Data in Cloud Systems.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Intrusion detection techniques for mobile cloud computing in heterogeneous 5G.
Secur. Commun. Networks, 2016

Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing.
J. Netw. Comput. Appl., 2016

Smart data deduplication for telehealth systems in heterogeneous cloud computing.
J. Commun. Inf. Networks, 2016

Data transfer minimization for financial derivative pricing using Monte Carlo simulation with GPU in 5G.
Int. J. Commun. Syst., 2016

A novel pre-cache schema for high performance Android system.
Future Gener. Comput. Syst., 2016

Cost Reduction for Data Allocation in Heterogenous Cloud Computing Using Dynamic Programming.
Proceedings of the Smart Computing and Communication, 2016

Security and Privacy Issues: A Survey on FinTech.
Proceedings of the Smart Computing and Communication, 2016

Optimal Big Data Sharing Approach for Tele-Health in Cloud Computing.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Privacy-Preserving Adaptive Multi-channel Communications Under Timing Constraints.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Smart Energy-Aware Data Allocation for Heterogeneous Memory.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

A Semantic Approach to Intelligent and Personal Tutoring System.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Drug Side Effects Data Representation and Full Spectrum Inferencing Using Knowledge Graphs in Intelligent Telehealth.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Energy-Aware Optimal Task Assignment for Mobile Heterogeneous Embedded Systems in Cloud Computing.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Cyber Incident Classifications Using Ontology-Based Knowledge Representation for Cybersecurity Insurance in Financial Industry.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Understanding Taxonomy of Cyber Risks for Cybersecurity Insurance of Financial Industry in Cloud Computing.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Improving Data Governance in Large Organizations through Ontology and Linked Data.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Powering Filtration Process of Cyber Security Ecosystem Using Knowledge Graph.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Reducing Complexity of Diagnostic Message Pattern Specification and Recognition on In-Bound Data Using Semantic Techniques.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

A Classification Algorithm Based on Ensemble Feature Selections for Imbalanced-Class Dataset.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

Information Security Policy for E-Commerce in Saudi Arabia.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

RuleSN: Research and Application of Social Network Access Control Model.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

Security-Aware Efficient Mass Distributed Storage Approach for Cloud Systems in Big Data.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

Security-Aware Information Classifications Using Supervised Learning for Cloud-Based Cyber Risk Management in Financial Big Data.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

A Novel Secure Big Data Cyber Incident Analytics Framework for Cloud-Based Cybersecurity Insurance.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm.
IEEE Trans. Computers, 2015

A Reusable Software Component for Integrated Syntax and Semantic Validation for Services Computing.
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015

Novel Differential Schema for High Performance Big Data Telehealth Systems Using Pre-cache.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Analysis on Urban Collective Call Behavior to Earthquake.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Empirical Study on Preprocessing High-Dimensional Class-Imbalanced Data for Classification.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Internet-Based Anti-Counterfeiting Pattern with Using Big Data in China.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Research on Campus Mobile Model Based on Periodic Purpose for Opportunistic Network.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Electronic Health Record Error Prevention Approach Using Ontology in Big Data.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Maintainable Mobile Model Using Pre-Cache Technology for High Performance Android System.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

An Investigation on Cyber Security Threats and Security Models.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Understanding Model Risk Management - Model Rationalization in Financial Industry.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Model Risk Management Systems-Back-End, Middleware, Front-End and Analytics.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Meta Meta-Analytics for Risk Forecast Using Big Data Meta-Regression in Financial Industry.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Anti-Counterfeit Scheme Using Monte Carlo Simulation for E-commerce in Cloud Systems.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Ontology-Based Knowledge Representation for Secure Self-Diagnosis in Patient-Centered Teleheath with Cloud Systems.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Efficiency-Aware Workload Optimizations of Heterogeneous Cloud Computing for Capacity Planning in Financial Industry.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Adaptive Resource Allocation Optimization in Heterogeneous Mobile Cloud Systems.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

City of White Plains Parking App: Case Study of a Smart City Web Application.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2013
<i>Teaching Case</i>: Enterprise Architecture Specification Case Study.
J. Inf. Syst. Educ., 2013

2010
A Report about Suggestions on Developing E-learning in China.
Proceedings of the International Conference on E-Business and E-Government, 2010


  Loading...