Accepted Papers

Authors Title
Pengyu Yu User Portrait Technology Based on Stacking Model
Hangson Xu, Wei Yu, Xing Liu, David Griffin and Nada Golmie On Data Integrity Attacks against Industrial Internet of Things
Mohammed Yahya Alghamdi A Study Of Social Network Applications In University Education
Qingxain Pan, Tingwei Pan, Hongbin Dong, Zhaolong Gao, YingJie Wang https://ieeejointcst-2020.slack.com/archives/C017C8LD3QU/p1597385341004300Research on Task Assignment to Minimize Travel Cost for Spatio-temporal Crowdsourcing
Minghui Yang, Junqi Guo, Ludi Bai A Data Privacy-preserving Method for Students' Physical Health Monitoring by Using Smart Wearable Devices
Xiaohui Li, Hongbin Dong, Shuang Han Multiple Linear Regression with Kalman Filter for Predicting End Prices of Online Auctions
Emmanuel Onu Contextual Privacy Policy Modeling for IoT
Shubhangi Upadhyay Feature Extraction Approach to Unearth Domain Generating Algorithms (DGAs)
Arta Farahman Student Facing Dashboard for Online Learners
Nan Duan Human Moving Behavior Recognition Based on the D-S Evidence Theory and SVM Utilizing Smartphone
Chen Huang, Zhongyuan Gan, Feng Ye, Pan Wang, Moxuan Zhang KNCR Knowledge-Aware Neural Collaborative Ranking for Recommender Systems
Jie Pan, Yiwen Zhang, Qingren Wang, Dengcheng Yan A Novel Fog Node Aggregation Approach for Users in Fog Computing Environment
Jian Lu, Wei Lei, Qingren Wang, Yiwen Zhang Research on Data Quality Control of Crowdsourcing Annotation A Survey
Miao Yu A Novel Computer Vision Based Gait Analysis Technique for Normal and Parkinson's Gaits Classification
Yishui ZHU Analyzing Pre-braking Behaviors of Drivers with Varying Experience
Bo Wu, Yuan Wu, Yoko Aoki, Shoji Nishimura, Masayuki Kashiwagi Analyzing Mowing Behaviors on Sloping Land via Motion Capture Device
Jinkai Zi, Feng Jin, Jun Zhao, Wei Wang, Quanli Liu A Multi-objective Simulated Annealing Algorithm-based Coal Blending Optimization Approach in Coking Process
Jiayao Wang, Qianmin Zhang, Qilin Wu and Bo Liu, Yiwen An Energy Balance-aware Event Query Algorithm based on Chinese Remainder Theorem
Liu A Research of Distributed Security and QoS Testing Framework
Wei Huang Using Agent Solutions and Visualization Techniques to Manage Cloud-based Education System
Da Xiao and Meiyi Jiang Malicious Mail Filtering and Tracing System Based on KNN and Improved LSTM Algorithm
Zelei Cheng, Zuotian Li, Bowen Sun, Shuhan Zhang, Yuanrong Shao Reputation-based Q-Routing for Robust Inter-committee Routing in the Sharding-based Blockchain
Shengshi Li, Yujuan Si, Dunwei Wen, Weiyi Yang, Gong Zhang, Peiyu Zhu Automatic Recognition of Arrhythmia Using a CNN-based Broad Learning System
Kai Su, Chowdhury intisar, Qiangfu Zhao, Yoichi Tomioka Knowledge Distillation for Real-time On-Road Risk Detection
Pengzhan Nie, Jiulei Jiang, Zhanyou Ma CTL Symbolic Model Checking Based on Fuzzy Logic
Fang Wenbo, Zhang Linlin, Wang Chenyue, Hu Yingjie, Yu Yuaner, and Zhao Kai A Novel Approach of Android Malware Classification Using Multimodel Deep Learning
Nadia Kanwal, Mamoona Naveed Asghar, Mohammad Samar Ansari, Brian Lee, Martin Fleury, Macro Herbst, Yuansong Qiao Chain-of-Evidence in Secured Surveillance Videos Using Stenography and Hashing
Peter Aaby, William J Buchanan, Zhiyuan Tan Towards Continuous User Authentication Using Personalized Touch-Based Behavior
Mohammad Amiri-Zarandi Blockchain-based Trust Management in Social Internet of Things
Xu Yan Study on Classification of Maize Disease Image Based on Fast K-Nearest Neighbor Support
Guo Qi A Learning base 3D Reconstruction Method for Point Cloud
Xiangyue Yang A Survey of Key Issues in UAV Data Collection in the Internet of Things
Juan Li, Xiao-feng Wang, Wan-jing Feng A Recommendation Algorithm Based on Belief Propagation and Probability Matrix Factorization
Gurdip Kaur, Arash Habibi Lashkari, Abir Rahali Intrusion Traffic Detection and Characterization using Deep Image Learning
Abdullah, Eleni Stroulia and Faiza Nawaz Efficiency Optimization in Supply Chain Using RFID Technology
Mohammadreza MontazerShatoori, Logan Davidson, Gurdip Kaur, and Arash Habibi Lashkari Detecting of DoH Tunnels using Time-Series Classification of Encrypted Traffic
Huie-Wen Ferng An Authentication Scheme Designed for the Lightweight Precision Time Protocol in IoT
Debora Irene Christine Comparative Analysis of Cyber Resilience Strategy in Asia-Pacific Countries
Tale Saeidi Sub-6G Metamaterial-Based Flexible Wearable UWB Antenna for IoT and WBAN
Tale Saeidi Metamatrial-based Antipodal Vivaldi Wearable UWB Antenna for IoT and 5G Applications
YAN Yang, Dunwei Wen, Huang Wei-Bo, Wang Ke A Comparative Analysis of the STEM Education in Chinese Primary and Secondary Schools
Xiaoming Fan Extracting Advertisements from Content Marketing Articles based on TopicCNN
Long Chen, Nuo Xu, Yue Wang Legal Judgement Prediction with Label Dependencies
Peng Yang, Yong Wu, Tenglang Cheng, Xinyuan Lyu, Zhuang Wang Segment-Level Sentiment Classification for Online Comments of Legal Cases
Philip Kirkbride Game-Like Captchas for Intrusion Detection
Hongyu Jiang, Ao Guo, Jianhua Ma Genre-based Emoji Usage Analysis and Prediction in Video Comments
Ao Guo, Hongyu Jiang, Jianhua Ma Multi-Scenario Fusion for More Accurate Classifications of Personal Characteristics
Muath Obaidat and Joseph Brown Web Browser Extension User-Script XSS Vulnerabilities
Ruichao Xu, Zhigang Gao, Bo Wu, Wenjie Diao, Yucai Huang, Wei Zhao Mobile Book Reader Based on Reading Behavior Characteristics
Bili Chenkui Research on FJSP with Transportation Time Constraint Based on Improved Particle Swarm Optimization
Xu Junke Legal Regulation of Cyberbullying From a Chinese Perspective
Tian Liang, Xiaofeng Wang, Shuai Wang, Xingkai Wang An Improved ID3 Classification Algorithm for Solving the Backbone of Proposition Formulae
Dr Feng Xiaohua and Dawam E. AI Security Strategy Consideration - AN INVESTIGATION OF AI
E. S. Dawam, and X. Feng A Deep Neural Network Based Surface Marking Detection for Autonomous Vehicles Using YOLO
Dr Feng Xiaohua and Dawam E. AI Security Strategy Consideration - AN INVESTIGATION OF AI
E. S. Dawam, and X. Feng A Deep Neural Network Based Surface Marking Detection for Autonomous Vehicles Using YOLO
Fehmi Jaafar Behavioral Study of Malware Affecting Financial Institutions and Clients
Fehmi Jaafar Demystifying the Cyber Attribution An Exploratory Study
Katashi Nagao Cyber Trainground Building-Scale Virtual Reality for Immersive Presentation Training