Vai al contenuto principale della pagina

Innovative Mobile and Internet Services in Ubiquitous Computing : Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021)



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Barolli Leonard Visualizza persona
Titolo: Innovative Mobile and Internet Services in Ubiquitous Computing : Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021) Visualizza cluster
Pubblicazione: Cham : , : Springer International Publishing AG, , 2021
©2022
Descrizione fisica: 1 online resource (544 pages)
Soggetto genere / forma: Electronic books.
Altri autori: YimKangbin  
ChenHsing-Chung  
Nota di contenuto: Intro -- Welcome Message of IMIS-2021 International Conference Organizers -- IMIS-2021 Organizing Committee -- Honorary Co-chairs -- General Co-chairs -- Program Committee Co-chairs -- Advisory Committee Members -- Award Co-chairs -- International Liaison Co-chairs -- Publicity Co-chairs -- Finance Chair -- Local Arrangement Co-chairs -- Web Administrators -- Steering Committee Chair -- Track Areas and PC Members -- 1. Multimedia and Web Computing -- Track Co-chairs -- PC Members -- 2. Context and Location-aware Computing -- Track Co-chairs -- PC Members -- 3. Data Management and Big Data -- Track Co-chairs -- PC Members -- 4. Security, Trust and Privacy -- Track Co-chairs -- PC Members -- 5. Energy Aware and Pervasive Systems -- Track Co-chairs -- PC Member -- 6. Modeling, Simulation and Performance Evaluation -- Track Co-chairs -- PC Members -- 7. Wireless and Mobile Networks -- Track Co-chairs -- PC Members -- 8. Intelligent Technologies and Applications -- Track Co-chairs -- PC Members -- 9. Cloud Computing and Service-Oriented Applications -- Track Co-chairs -- PC Members -- 10. Ontology and Semantic Web -- Track Co-chairs -- PC Members -- 11. IoT and Social Networking -- Track Co-chairs -- PC Members -- 12. Embedded Systems and Wearable Computers -- Track Co-chairs -- PC Members -- IMIS-2021 Reviewers -- IMIS-2021 Keynote Talks -- Asking AI Why: Explainable Artificial Intelligence Jayh (Hyunhee) Park Myongji University, Yongin, Korea -- Co-evolution of Semantic and Blockchain Technologies Antonio Esposito University of Campania "Luigi Vanvitelli", Aversa, Italy -- Contents -- Implementation of a VR Preview Simulation System by Capturing the Human Body Movements -- 1 Introduction -- 2 Research Objective -- 3 System Configuration -- 3.1 VR Preview Space Control Function -- 3.2 VR Preview Space -- 3.3 Avatar Control Function.
3.4 Object Storage -- 4 System Architecture -- 5 VR Preview Simulation System -- 5.1 Walk-Through Function -- 5.2 Door/Window Opening/Closing Function -- 5.3 Interior Layout Function -- 6 Functionality Evaluation -- 7 Conclusion -- References -- Projection Region Detection Model Based on BASNet -- 1 Introduction -- 2 Related Work -- 2.1 Traditional Salient Object Detection Methods -- 2.2 Salient Object Detection Based on Deep Learning -- 3 CS-BASNet -- 3.1 CS-BASNet Architecture -- 3.2 Attention Module -- 3.3 Loss Function -- 4 Experimental Analysis -- 4.1 Dataset -- 4.2 Experimental Setup -- 4.3 Evaluation Metrics -- 4.4 Evaluation of BASNet and CS-BASNet -- 5 Conclusion -- References -- Analysis of Epidemic Events Based on Event Evolutionary Graph -- 1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 3.1 Design Knowledge Graph Based on EEG -- 3.2 Event Extraction -- 3.3 Relationship Recognition -- 4 Experiments -- 5 Conclusions -- References -- Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators -- 1 Introduction -- 1.1 Anonymously Processed Information -- 1.2 Definition of Terms -- 1.3 Aims of This Paper -- 2 Motivation and Related Works -- 3 Development of Anonymization Dictionary -- 3.1 Overview -- 3.2 Construction Procedure for Anonymization Dictionary -- 4 Evaluation -- 4.1 Evaluation Method -- 4.2 Scenario-Based Evaluation -- 5 Discussion -- 5.1 Synonym Retrieval -- 5.2 Automatic Update -- 5.3 Limitation -- 6 Conclusion -- References -- VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 1 Introduction -- 2 VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 2.1 System Architecture -- 2.2 Vehicle Certification -- 2.3 Road Condition Warning.
2.4 Reward and Punishment Mechanism -- 3 Security Analysis -- 3.1 Security Analysis -- 3.2 Performance Analysis -- 4 Conclusion -- References -- An Authentication Scheme for Car-Home Connectivity Services in Vehicular Ad-Hoc Networks -- 1 Introduction -- 2 Preliminaries -- 2.1 Zero-Knowledge Proof -- 2.2 Paillier's Homomorphic Encryption -- 3 The Proposed Scheme -- 3.1 Network Model -- 3.2 Construction -- 4 Use Case -- 5 Security Analysis and Performance Analysis -- 5.1 Security Analysis -- 5.2 Performance Analysis -- 6 Conclusions -- References -- Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C -- 1 Introduction -- 2 Related Works -- 3 Analysis of Copyright Protection Technology and Restriction Function of Software C -- 4 Software C Piracy Vulnerability Analysis -- 4.1 License Authentication Vulnerability Analysis -- 5 Conclusion -- References -- PtPeach: Improved Design and Implementation of Peach Fuzzing Test for File Format -- 1 Introduction -- 2 Background -- 2.1 Intel Processor Trace -- 2.2 Peach Test Cases Mutation Strategies -- 3 Design and Implementation -- 3.1 Getting the Coverage of the Program -- 3.2 Key Field Type Targeting -- 3.3 Mutation Strategy Optimization -- 3.4 Experiment and Evaluation -- 4 Conclusion -- References -- An Efficient Approach to Enhance the Robustness of Scale-Free Networks -- 1 Introduction -- 2 Related Work -- 3 Scale-Free Networks Topology and Robustness Optimization -- 3.1 Construction of Initial Topology -- 3.2 Centrality Measures -- 4 Simulation Results and Discussion -- 5 Conclusion -- References -- A Blockchain Based Secure Authentication and Routing Mechanism for Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Based Localization of Sensor Nodes -- 2.2 Authentication of Sensor Nodes -- 2.3 Secure Routing Schemes.
2.4 Blockchain for IoT Devices -- 2.5 Data Security and Attack Detection -- 3 Proposed System Model -- 4 Simulations and Results -- 5 Conclusion -- References -- Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Evaluation for Malicious Nodes Detection -- 2.2 Node's Authentication to Ensure Data Confidentiality and Validity -- 2.3 Secure Routing Protocols in a WSN -- 2.4 Lightweight Blockchain for IoT -- 2.5 Good Performance Regarding Data Storage -- 2.6 Data Security and Privacy -- 2.7 Blockchain Based Fair Non-repudiation Mechanism -- 3 System Model -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Towards Energy Efficient Smart Grids: Data Augmentation Through BiWGAN, Feature Extraction and Classification Using Hybrid 2DCNN and BiLSTM -- 1 Introduction -- 2 Related Work -- 3 Proposed System Model -- 4 Model Evaluation -- 4.1 Performance Metrics -- 4.2 Simulation Results -- 5 Conclusion -- References -- Comparative Study of Data Driven Approaches Towards Efficient Electricity Theft Detection in Micro Grids -- 1 Background Study -- 2 Acquiring Dataset and Handling Class Imbalanced Problem -- 3 State-of-the-Art NTL Detection Techniques -- 4 Experimental Results -- 5 Conclusion -- References -- Routing Strategy for Avoiding Obstacles During Message Forwarding in Mobile Ad-Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Adapted Predict Obstacle -- 3.1 Forwarding Direction -- 3.2 Phenomenon When Nodes Are Close to Obstacles -- 3.3 Connections Change Rate -- 3.4 The Oldest Survival Age -- 3.5 Probability for Predicting Obstacles -- 3.6 Select Unlimited Nodes -- 4 Performance Evaluation -- 5 Conclusion -- References.
Fuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP Protocol -- 1 Introduction -- 2 N2 Interface and NGAP Protocol Analysis -- 2.1 N2 Interface -- 2.2 NGAP Protocol -- 3 Fuzzing Tool Architecture -- 4 Selection Mutation Algorithms Based on Partition Weight Table -- 5 Experimental Results -- 5.1 Testing Environment Free5GC -- 5.2 Testing Results -- 6 Conclusion -- References -- Simulation Results of a DQN Based AAV Testbed in Corner Environment: A Comparison Study for Normal DQN and TLS-DQN -- 1 Introduction -- 2 DQN Based AAV Testbed -- 2.1 Quadrotor for AAV -- 2.2 DQN for AAV Mobility -- 3 TLS-DQN -- 4 Simulation Results -- 5 Conclusion -- References -- Stochastic Geometric Analysis of IRS-aided Wireless Networks Using Mixture Gamma Model -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions -- 2 Mixture Gamma Approximation Based Fading Model -- 3 System Model -- 3.1 Network Model -- 3.2 Channel Model -- 4 Performance Analysis -- 5 Numerical Results -- 6 Conclusion -- References -- Performance Evaluation of CM and RIWM Router Replacement Methods for WMNs by WMN-PSOHC Hybrid Intelligent Simulation System Considering Chi-square Distribution of Mesh Clients -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Hill Climbing -- 2.3 WMN-PSOHC System Description -- 3 WMN-PSOHC Web GUI Tool -- 4 Simulation Results -- 5 Conclusions -- References -- Web Page Classification Based on Graph Neural Network -- 1 Introduction -- 2 Related Word -- 2.1 Graph Neural Network -- 3 Problem Formulation and Definition -- 3.1 Web Page Html -- 3.2 Web Page Graph -- 4 Model -- 4.1 Overview -- 4.2 Build Web Page Graph -- 4.3 Web-GNN -- 5 Experiments -- 5.1 Baseline -- 5.2 Dataset -- 5.3 Experimental Setup and Tools -- 5.4 Experimental Results -- 6 Conclusion -- References.
Malicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep Learning.
Titolo autorizzato: Innovative Mobile and Internet Services in Ubiquitous Computing  Visualizza cluster
ISBN: 3-030-79728-7
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910497106203321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems Ser.