![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://fanyv88.com/img/search.dark.16x16.png)
default search action
15th IMIS 2021: Asan, Korea
- Leonard Barolli, Kangbin Yim, Hsing-Chung Chen:
Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), Asan, Korea, 1-3 July, 2021. Lecture Notes in Networks and Systems 279, Springer 2022, ISBN 978-3-030-79727-0 - Tomoyuki Ishida, Kyosuke Sakuma:
Implementation of a VR Preview Simulation System by Capturing the Human Body Movements. 1-9 - Yukang Zhao, Nan Guo, Xinbei Jiang:
Projection Region Detection Model Based on BASNet. 10-19 - Kang Xie, Tao Yang, Rourong Fan, Guoqing Jiang:
Analysis of Epidemic Events Based on Event Evolutionary Graph. 20-29 - Masahiro Fujita, Yasuoki Iida, Mitsuhiro Hattori, Tadakazu Yamanaka, Nori Matsuda, Satoshi Ito, Hiroaki Kikuchi:
Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators. 30-39 - Shuai Zhou, Tianhan Gao:
VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain. 40-49 - Cong Zhao, Nan Guo, Tianhan Gao, Jiayu Qi, Xinyang Deng:
An Authentication Scheme for Car-Home Connectivity Services in Vehicular Ad-Hoc Networks. 50-58 - Jaehyuk Lee
, Kangbin Yim, Kyungroul Lee:
Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C. 59-66 - Hua Yang, Jingling Zhao, Baojiang Cui:
PtPeach: Improved Design and Implementation of Peach Fuzzing Test for File Format. 67-75 - Syed Minhal Abbas, Nadeem Javaid, Muhammad Usman
, Shakira Musa Baig, Arsalan Malik, Anees Ur Rehman:
An Efficient Approach to Enhance the Robustness of Scale-Free Networks. 76-86 - Usman Aziz, Muhammad Usman Gurmani, Saba Awan, Maimoona Bint E. Sajid, Sana Amjad, Nadeem Javaid:
A Blockchain Based Secure Authentication and Routing Mechanism for Wireless Sensor Networks. 87-95 - Saba Awan, Maimoona Bint E. Sajid, Sana Amjad, Usman Aziz, Muhammad Usman Gurmani, Nadeem Javaid:
Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks. 96-107 - Muhammad Asif
, Benish Kabir, Pamir, Ashraf Ullah, Shoaib Munawar, Nadeem Javaid:
Towards Energy Efficient Smart Grids: Data Augmentation Through BiWGAN, Feature Extraction and Classification Using Hybrid 2DCNN and BiLSTM. 108-119 - Faisal Shehzad, Muhammad Asif, Zeeshan Aslam, Shahzaib Anwar, Hamza Rashid, Muhammad Ilyas, Nadeem Javaid:
Comparative Study of Data Driven Approaches Towards Efficient Electricity Theft Detection in Micro Grids. 120-131 - Qiang Gao, Tetsuya Shigeyasu, Chunxiang Chen:
Routing Strategy for Avoiding Obstacles During Message Forwarding in Mobile Ad-Hoc Network. 132-143 - Yang Hu, Wenchuan Yang, Baojiang Cui, Xiaohui Zhou, Zhijie Mao, Ying Wang:
Fuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP Protocol. 144-155 - Nobuki Saito, Tetsuya Oda, Aoto Hirata, Kyohei Toyoshima, Masaharu Hirota, Leonard Barolli:
Simulation Results of a DQN Based AAV Testbed in Corner Environment: A Comparison Study for Normal DQN and TLS-DQN. 156-167 - Yunli Li, Young Jin Chun
:
Stochastic Geometric Analysis of IRS-aided Wireless Networks Using Mixture Gamma Model. 168-178 - Shinji Sakamoto, Yi Liu, Leonard Barolli, Shusuke Okamoto:
Performance Evaluation of CM and RIWM Router Replacement Methods for WMNs by WMN-PSOHC Hybrid Intelligent Simulation System Considering Chi-square Distribution of Mesh Clients. 179-187 - Tao Guo, Baojiang Cui:
Web Page Classification Based on Graph Neural Network. 188-198 - Kunlin Li, Baojiang Cui:
Malicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep Learning. 199-208 - Wenyu Zhang, Tianhan Gao:
Improved Optimal Reciprocal Collision Avoidance Algorithm in Racing Games. 209-220 - Kyungmin Lee, Mincheol Shin, Yongho Kim, Hae-Duck J. Jeong:
An Intelligent Travel Application Using CNN-Based Deep Learning Technologies. 221-231 - Jiha Kim, Hyunhee Park:
Reduced CNN Model for Face Image Detection with GAN Oversampling. 232-241 - Feng Zhai, Lingda Kong, Yongjin Yu, Xin Ye:
Power Meter Software Quality Analysis Based on Dynamic Binary Instrumentation. 242-252 - Marco Lapegna
, Silvia Stranieri:
DClu: A Direction-Based Clustering Algorithm for VANETs Management. 253-262 - Khan Reaz
, Gerhard Wunder:
ComPass: Proximity Aware Common Passphrase Agreement Protocol for Wi-Fi Devices Using Physical Layer Security. 263-275 - Han Xu, Baojiang Cui, Chen Chen:
Fuzzing with Multi-dimensional Control of Mutation Strategy. 276-284 - Zheng Wang, Baojiang Cui, Yang Zhang:
An ELF Recovery Method for Linux Malicious Process Detection. 285-294 - Jiatong Wu, Baojiang Cui, Chen Chen, Xiang Long:
A High Efficiency and Accuracy Method for x86 Undocumented Instruction Detection and Classification. 295-303 - Fanglei Zhang, Baojiang Cui, Chen Chen, Yiqi Sun, Kairui Gong, Jinxin Ma:
Simulation-Based Fuzzing for Smart IoT Devices. 304-313 - Tzu-Liang Kung, Cheng-Kuan Lin, Chun-Nan Hung:
On the Neighborhood-Connectivity of Locally Twisted Cube Networks. 314-321 - Yuan-Hsiang Teng, Tzu-Liang Kung:
Assessing the Super Pk-Connectedness of Crossed Cubes. 322-329 - Hsing-Chung Chen, Eko Prasetyo, Prayitno, Sri Suning Kusumawardani, Shian-Shyong Tseng, Tzu-Liang Kung, Kuei-Yuan Wang:
Learning Performance Prediction with Imbalanced Virtual Learning Environment Students' Interactions Data. 330-340 - Anthony Y. H. Liao:
An APP-Based E-Learning Platform for Artificial Intelligence Cross-Domain Application Practices. 341-351 - Hsing-Chung Chen, Galang Wicaksana, Agung Mulyo Widodo, Andika Wisnujati
, Tzu-Liang Kung, Wen-Yen Lin:
Automatic Control System for Venetian Blind in Home Based on Fuzzy Sugeno Method. 352-361 - Sen-Tarng Lai, Heru Susanto, Fang-Yie Leu:
Combining Pipeline Quality with Automation to CI/CD Process for Improving Quality and Efficiency of Software Maintenance. 362-372 - Lung-Pin Chen, Fang-Yie Leu, Hsin-Ta Chiao, Hung-Jr Shiu
:
Efficient Adaptive Resource Management for Spot Workers in Cloud Computing Environment. 373-382 - Li-Gang Jiang, Yi-Hong Chan, Yao-Chung Fan
, Fang-Yie Leu:
You Draft We Complete: A BERT-Based Article Generation by Keyword Supplement. 383-392 - Zhi-Qian Hong, Heru Susanto, Fang-Yie Leu:
A Q-Learning Based Downlink Scheduling Algorithm for Multiple Traffics in 5G NR Systems. 393-402 - Yung-Shun Tsai, Chun-Ping Chang, Shyh-Weir Tzang:
Study on the Relationship Between Dividend, Business Cycle, Institutional Investor and Stock Risk. 403-411 - Chun-Ping Chang, Yung-Shun Tsai, Khunshagai Batjargal, Hong Nhung Nguyen, Shyh-Weir Tzang:
The Choice Between FDI and Selling Out with Externality and Exchange Rate. 412-419 - Shyh-Weir Tzang, Chun-Ping Chang, Tsatsral Ochirbal, Bolor Sukhbaatar, Yung-Shun Tsai:
Performance of the Initial Public Offering in the Taiwan Stock Market. 420-430 - Ying-Li Lin, Kuei-Yuan Wang, Jia-Yu Chen:
Analysis of the Causal Relationship Among Diversification Strategies, Financial Performance and Market Values by the Three-Stage Least Squares (3SLS). 431-437 - Mei-Hua Liao, Chun-Min Wang, Ya-Lan Chan:
Macroeconomic Variables and Investor Sentiment. 438-443 - Tin-Chang Chang, I-Tien Chu, Pei-Shih Chen:
College Students' Learning Motivation and Learning Effectiveness by Integrating Knowledge Sharing, Action Research and Cooperative Learning in Statistics. 444-463 - Kuei-Yuan Wang, Ying-Li Lin, Chien-Kuo Han, Shu-Tzu Shih:
A Feasibility Study of the Introduction of Service Apartment Operation Model on Long-Term Care Institutions. 464-471 - Ya-Lan Chan, Pei-Fang Lu, Sue-Ming Hsu, Mei-Hua Liao:
Research on the Integration of Information Technology into Aesthetic Teaching in Kindergartens. 472-477 - Mitsuki Tsuneyoshi, Masahiro Miwata, Daisuke Nishii, Makoto Ikeda, Leonard Barolli:
A Simulation System for Analyzing Attack Methods in Controller Area Network Using Fuzzing Methods. 478-484 - Lei Zhao, Tianhan Gao:
Combination of Pseudonym Changing with Blockchain-Based Data Credibility for Verifying Accuracy of Latest Vehicle Information in VANETs. 485-493 - Wontae Jung, Kangbin Yim, Kyungroul Lee:
Vulnerability Analysis of Intellectual Property Rights Using Reverse Engineering: Based on Software D. 494-500 - Hiroaki Kikuchi, Atsuki Ono, Satoshi Ito, Masahiro Fujita, Tadakazu Yamanaka:
Web Crawler for an Anonymously Processed Information Database. 501-510 - Yunxuan Su, Xu An Wang, Yu Ge:
A Scheme for Checking Similarity and Its Application in Outsourced Image Processing. 511-517
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
![](https://fanyv88.com/img/new-feature-top-right.156x64.png)