Big Data Technologies and Applications
13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023, Proceedings
Book and Conference Proceedings
13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023, Proceedings
Chapter and Conference Paper
Pervasive rumors in social networks have significantly harmed society due to their seditious and misleading effects. Existing rumor detection studies only consider practical features from a propagation tree, b...
Article
Book
Article
Chapter
Author Osama Zwaid Alsulami name is updated to Osama Zwaid Aletri throughout the book.
Chapter
The fifth generation mobile wireless communications steered services across a wide range of sectors such as transport, healthcare, retail, finance, factories, etc. Deployment of ultra-low latency and high band...
Chapter
This chapter provides details of the existing work related to our study. It introduces the schemes related to privacy protection and behavior accountability in Sect. 2.1. In this book, we not only provide the sol...
Chapter
Privacy protection and behavior accountability are two important factors of network security, and they are a pair of conflicting requirements. If we want to strengthen the supervision and accountability of use...
Chapter
This chapter introduces the research background of this book and provides definitions of privacy and accountability that apply to this book. It discusses the privacy protection and behavior accountability from...
Chapter
With the increasing emphasis on information security by users, many encrypted traffic is being transmitted over the network. However, even if the data is encrypted, it is not enough to protect the privacy of u...
Chapter
Information-Centric Networking (ICN) has become a promising candidate for future Internet architectures. Named Data Networking (NDN) is one of the most typical ICN architectures, where communication is driven ...
Chapter and Conference Paper
Users in the Bitcoin system adopt a pseudonym-Bitcoin address as the transaction account, making Bitcoin address correlation analysis a challenging task. Under this circumstance, this paper provides a new Bitc...
Chapter
This chapter introduces an architecture based on content that can be used to balance privacy protection and behavior accountability in the network. The terms requester and receiver are used interchangeably in thi...
Chapter
This chapter introduces a service-based architecture that can be used to achieve a balance between privacy protection and behavior accountability. In practice, the architecture proposed in this chapter can be ...
Chapter
This chapter introduces a flow-based architecture that can be used to achieve a balance between privacy protection and behavior accountability. A self-certifying identifier is proposed to efficiently identify ...
Article
Due to the increasing volume of network traffic and growing complexity of network environment, rapid identification of heavy hitters is quite challenging. To deal with the massive data streams in real-time, ac...
Article
In this study, we investigated inorganic cesium lead halide perovskite semiconductor and tested its application in photovoltaics. Highly crystalline material was synthesized by two different approaches, includ...
Book and Conference Proceedings
Proceedings of ICACNI 2016, Volume 1
Chapter and Conference Paper