V-Matrix-Based Scalable Data
Visualizing Three-Dimensional Ocean Eddies in Web Browsers
Visualization of Location-Referenced Web Textual Information Based on Map Mashups
Verifiable and Multi-keyword Searchable Attribute-based Encryption Scheme for Cloud Storage
User Modeling for Churn Prediction in E-Commerce
Traffic Analysis Attack for Identifying Users’ Online Activities
Towards Thwarting Template Side-channel Attacks
Towards Efficient U-Nets A Coupled and Quantized Approach
Towards AI-Powered Multiple Cloud Management
The Soft Underbelly of Cloud Security
Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model
Siva_FogFogFog-centric Secure Cloud Storage Scheme
Sentiment Analysis of Comment Texts Based on BiLSTM
Secure Data Group Sharing and Conditional
Scheduling Real-Time Security Aware tasks in
Recurrent Neural Network-Based Approach for Sparse Geomagnetic Data Interpolation and Reconstruction
Platform-Independent Dynamic Taint Analysis for JavaScript
PBCert Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management
Old and Young Users’ White Space Preferences for Online News Web Pages
NOSQL_CHARON A Secure Cloud-of-Clouds System
Neural Binary Representation Learning for Large-Scale Collaborative Filtering
Network Representation Learning Enhanced Recommendation Algorithm
NASM Nonlinearly Attentive Similarity Model for Recommendation System via Locally Attentive Embedding
Motion Based Inference of Social Circles via Self-Attention and Contextualized Embedding
Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis
Machine Ethics The Design and Governance of Ethical AI and Autonomous Systems
LBOA Location-Based Secure Outsourced
Platform-Independent Dynamic Taint Analysis for JavaScript
Large-Margin Regularized Softmax Cross-Entropy Loss
Intelligent Security Planning for Regional
Incorporating Data Context to Cost-Effectively Automate End-to-End Data Wrangling
FS-PEKS Lattice-based Forward Secure
Fast Boolean Queries With Minimized Leakage
Evading Anti-Malware Engines With Deep Reinforcement Learning
Epistasis Analysis Using an Improved Fuzzy
FS-PEKS Lattice-based Forward Secure
Effective and Efficient Content Redundancy Detection of Web Videos
EB_A Novel Load Image Profile-Based Electricity
Dynamic Demand Prediction and Allocation in Cloud Service Brokerage
Design of Secure Authenticated Key
DCCR Deep Collaborative Conjunctive Recommender for Rating Prediction
Crypt-DAC Cryptographically Enforced Dynamic
Coverless Information Hiding Method Based on Web Text
Composition Context-Based Web Services Similarity Measure
Comparison of Swam Intelligence Clustering Algorithms for Analysis of Big Data in Healthcare
Clustering-Based Collaborative Filtering Using an Incentivized or Penalized User Model
BD2K Training Coordinating Centers ERuDIte the Educational Resource Discovery Index for Data Science
Analysis and Accurate Prediction of User’s Response Behavior in Incentive-Based Demand Response
An Attribute-based Controlled Collaborative Access
A Query-based Framework for Searching, Sorting, and Exploring Data Ensembles
A Particle Swarm Optimized Learning Model of Fault Classification in Web-Apps
A New Encrypted Data Switching
A Hybrid Approach to Service Recommendation Based on Network Representation Learning
A Hierarchical Attention Model for Social Contextual Image Recommendation
A Generalized Locally Linear Factorization Machine with Supervised Variational Encoding