


default search action
11th CSCloud 2024: Shanghai, China
- 11th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2024, Shanghai, China, June 28-30, 2024. IEEE 2024, ISBN 979-8-3503-7698-2
- Gérard Memmi, Han Qiu, Zakirul Alam:
Message from the Program Chairs; CSCloud2024. xii - Zhihui Lv, Jihe Wang, Sun-Yuan Kung:
Message from the General Chairs; IEEE CSCloud/EdgeCom 2024. xi - Yujia Liu, Tao Xu, Zhehan Su, Xinsong Li, Kaipeng Xue, Yuxin Liu:
Entity Alignment Through Joint Utilization of Multiple Pretrained Models for Attribution Relationship. 1-6 - Shuhan Yang, Hengqi Guo, Xiaozheng Du, Jirui Yang, Zhihui Lu:
An Adversarial Attack Method Against Financial Fraud Detection Model Beta Wavelet Graph Neural Network via Node Injection. 7-12 - Tsung-Yi Chen, Hung-I Wu, Zhi-Han Li, Jui-An Fu, Chiung-An Chen, Kuo-Chen Li, Sze-Teng Liong, Tsun-Kuang Chi, Shih-Lun Chen:
Innovative Approach to Supernumerary Teeth Identification: CNN-Based Intelligent Medical Auxiliary System for Occlusal Radiographs. 13-18 - Haodong Li, Junxiong Lin, Shaohua Zhang, Mengying Xie, Yicheng Zhou, Yuan Weng, Yu Liu, Hongbing Zhang:
Blockchain-Based Data Management and Control System in Rail Transit Security Scenario. 19-23 - Feng Zhou, Ming Yuan, Yu Liu, Hongbing Zhang, Mingyu Gu, Tongming Zhou:
Niect: A Model for Intrusion Security Detection Applied to Campus Video Surveillance Edge Networks. 24-29 - Binbin Ge, Bo Li, Xudong Mou, Jun Zhao, Xudong Liu:
A Few-Shot Network Flow Attack Classification via Graph Contrastive Learning. 30-35 - Zhengkang Fang, Jing Yu, Shufen Fang, Shuo Wang, Weilin Chan, Zexin Gao, Keke Gai:
A Trustworthy Biological Assets Governance System Using Decentralized Identity. 36-41 - Haina Li, Zuming Zhang:
SIAS-AT: Adversarial Training with Sample-Wise Individualized Adversarial Strategy. 42-47 - Gang Wu, Tianjing Lv, Fang Li, Quanlong Fu:
A Model and Method for Computing Resource Scoring in Supercomputing Centers. 48-52 - Nuno André Bernardino, Bernardo Sequeira, Eduardo Piza, Fábio Henriques, Filipe Neves, Catarina I. Reis
:
Enhancing DevSecOps: Three Custom Tools for Continuous Security. 53-58 - Jun Zhu, Keke Gai, Peng Jiang, Liehuang Zhu:
Lightweight Privacy-Preserving Mechanisms for Cross-Chain Transactions. 59-64 - Zhiyuan Cao, Zeyu Ma, Mingang Chen:
An Evaluation System for Large Language Models based on Open-Ended Questions. 65-72 - Xiaozheng Du, Xu Guo, Feng Zhou, Mingyu Gu, Zhihui Lu, Cheng Wang:
FinDS2: A Novel Data Synthesis System for Fintech Product Risks. 73-78 - Naiwang Guo, Quanjiang Shen, Chang Liu:
Power Data Quality Assessment based on Entropy Weight Method and Grey System Theory. 79-83 - Donghan Chen, Junxiong Lin, Shaohua Zhang, Yu Liu, Hongbing Zhang:
Hypeleger Fabric Smart Contract Vulnerability Detection Technology: An Overview. 84-89 - Xinyan Jiang, Xinping Ren, Yongxin Zhu, Xiaoying Zheng, Yueying Zhou, Li Tian:
Liver Fibrosis Classification based on Multimodal Imaging Feature Fusion. 90-95 - Jian Liu, Shaohua Zhang, Siying Yan, Xianchao Zhang, Wei Ren
:
Formal Analysis on Interaction Flow and Information Cocoon Based on Probabilistic Graph. 96-100 - Chenxi Yang, Xinyu Wang, Peng Chen, Zhihui Lu, Xiaozheng Du:
FINSEC: An Efficient Microservices-Based Detection Framework for Financial AI Model Security. 101-106 - HsunFang Cho, Li Zhang, Xiaozhen Jiang:
Paradigm of Trustworthy Data Element Circulation Transactions. 107-112 - Amine Barrak, Gildas Fofe, Léo Mackowiak, Emmanuel Kouam, Fehmi Jaafar:
Securing AWS Lambda: Advanced Strategies and Best Practices. 113-119 - Hongbing Zhang, Wei Pan, Zhiyuan Gao, Zhihui Lu, Yu Liu, Lingyu Hou, Jie Feng, Jiawei Li:
Efficiency Meets Security: A Delegated Transport Authentication Protocol for the Cloud. 120-125 - Dahan Pan, Jianqiang Wang, Yingpeng Chen, Donghui Yu, Wenbo Yang, Yuanyuan Zhang:
COMURICE: Closing Source Code Leakage in Cloud-Based Compiling via Enclave. 126-131 - Zhihua Duan, Jialin Wang:
AutoTest: Evolutionary Code Solution Selection with Test Cases. 132-134 - Tianxu Han, Qianhong Wu, Sipeng Xie, Kun Wang, Yingmiao Zhang:
Iterative Proof of Retrievability for Periodic Incremental Data Via Optimistic Tags Generation. 135-140 - Wenqi Pan, Bin Tan, Die Hu, Jun Wu:
A Congestion Control Algorithm for Live Video Streaming in Dynamic Network. 141-145 - Xiaojun Shen, Jinxia Jiang, Chao Ji, Huanjie Wu:
DER: A Novel Metric Based on Dynamic Efficiency Ratio for Evaluating Computing Resource Efficiency. 146-152 - Yingying Zhao, Naiwang Guo, Yi Wu, Yingjie Tian, Yun Su:
Leveraging Electric Power Data for Enhanced Credit Assessment and Risk Control: A Framework for Data Monetization and Innovation. 153-158 - Jiale Song, Cheng Chi, Faguo Wu, Zihang Yin:
Game Theory-Based Rational Secret Sharing Scheme with Quantum Resistant. 159-164 - Ming Feng, Jia Zhou, Yi Tang:
Enhancing Cloud-Native Security Through eBPF Technology. 165-168 - Binbin Wang, Lei Zhang, Cheng Zheng:
Research on Index Optimization Method Based on Line Quantification in Topic Network Crawler. 169-173 - Shuo Wang, Zhengkang Fang, Keke Gai:
LRPAFL: Layer-Wise Relevance Propagation-Based Adaptive Federated Learning. 174-179 - Chuangchuang Dai, Can Li, Ziang Li, Huaiwei Sun, Lei Guan, Lei Li:
Application of Transformer Model in Chemical Industry Safety Production. 180-186 - HsunFang Cho, Li Zhang, Xiaozhen Jiang:
Secure Cryptographic Technology Framework for Data Element Circulation Transactions. 187-193 - Xiangdong Tian, Kejun Wei, Shuqi Yang, Xianglan Gao, Yuwei Tang, ZhiChao Li:
cDEM: Extract Core Data Elements for Migration Accelerating from Legacy Platform to Modern Cloud Environment. 194-199 - Zlatan Moric, Vedran Dakic
, Matej Kulic:
Implementing a Security Framework for Container Orchestration. 200-206

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.