scispace - formally typeset
Search or ask a question
Conference

IEEE International Conference on Smart Computing 

About: IEEE International Conference on Smart Computing is an academic conference. The conference publishes majorly in the area(s): Computer science & Cloud computing. Over the lifetime, 432 publications have been published by the conference receiving 4072 citations.

Papers published on a yearly basis

Papers
More filters
Proceedings ArticleDOI
Shan Jiang, Jiannong Cao, Hanqing Wu, Yanni Yang, Mingyu Ma, Jianfei He1 
18 Jun 2018
TL;DR: A Blockchain-based platform for healthcare information exchange that combines off-chain storage and on-chain verification to satisfy the requirements of both privacy and authenticability, and proposes two fairness-based packing algorithms to improve the system throughput and the fairness among users jointly.
Abstract: Nowadays, a great number of healthcare data are generated every day from both medical institutions and individuals. Healthcare information exchange (HIE) has been proved to benefit the medical industry remarkably. To store and share such large amount of healthcare data is important while challenging. In this paper, we propose BlocHIE, a Blockchain-based platform for healthcare information exchange. First, we analyze the different requirements for sharing healthcare data from different sources. Based on the analysis, we employ two loosely-coupled Blockchains to handle different kinds of healthcare data. Second, we combine off-chain storage and on-chain verification to satisfy the requirements of both privacy and authenticability. Third, we propose two fairness-based packing algorithms to improve the system throughput and the fairness among users jointly. To demonstrate the practicability and effectiveness of BlocHIE, we implement BlocHIE in a minimal-viable-product way and evaluate the proposed packing algorithms extensively.

268 citations

Proceedings ArticleDOI
29 May 2017
TL;DR: A recurrent deep neural network to learn patterns from sequences of network traffic and trace network attack activities and reduces the error rate compared with conventional machine learning method in the larger data set.
Abstract: Distributed Denial of Service (DDoS) attacks grow rapidly and become one of the fatal threats to the Internet. Automatically detecting DDoS attack packets is one of the main defense mechanisms. Conventional solutions monitor network traffic and identify attack activities from legitimate network traffic based on statistical divergence. Machine learning is another method to improve identifying performance based on statistical features. However, conventional machine learning techniques are limited by the shallow representation models. In this paper, we propose a deep learning based DDoS attack detection approach (DeepDefense). Deep learning approach can automatically extract high-level features from low-level ones and gain powerful representation and inference. We design a recurrent deep neural network to learn patterns from sequences of network traffic and trace network attack activities. The experimental results demonstrate a better performance of our model compared with conventional machine learning models. We reduce the error rate from 7.517% to 2.103% compared with conventional machine learning method in the larger data set.

261 citations

Proceedings ArticleDOI
18 May 2016
TL;DR: This paper explores the container-based virtualization on smart objects in the perspective of a IoT Cloud scenarios analyzing its advantages and performances.
Abstract: The advent of both Cloud computing and Internet of Things (IoT) is changing the way of conceiving information and communication systems. Generally, we talk about IoT Cloud to indicate a new type of distributed system consisting of a set of smart objects, e.g., single board computers running Linux- based operating systems, interconnected with a remote Cloud infrastructure, platform, or software through the Internet and able to provide IoT as a Service (IoTaaS). In this context, container-based virtualization is a lightweight alternative to the hypervisor-based approach that can be adopted on smart objects, for enhancing the IoT Cloud service provisioning. In particular, considering different IoT application scenarios, container-based virtualization allows IoT Cloud providers to deploy and customize in a flexible fashion pieces of software on smart objects. In this paper, we explore the container-based virtualization on smart objects in the perspective of a IoT Cloud scenarios analyzing its advantages and performances.

102 citations

Proceedings ArticleDOI
18 May 2016
TL;DR: In this article, a Hidden Markov Model (HMM) is used to detect malicious behaviors and issue alerts, while a vehicle is in operation, in order to detect anomalies in vehicles.
Abstract: Vehicles can be considered as a specialized form of Cyber Physical Systems with sensors, ECU''s and actuators working together to produce a coherent behavior. With the advent of external connectivity, a larger attack surface has opened up which not only affects the passengers inside vehicles, but also people around them. One of the main causes of this increased attack surface is because of the advanced systems built on top of old and less secure common bus frameworks which lacks basic authentication mechanisms. To make such systems more secure, we approach this issue as a data analytic problem that can detect anomalous states. To accomplish that we collected data flowing between different components from real vehicles and using a Hidden Markov Model, we detect malicious behaviors and issue alerts, while a vehicle is in operation. Our evaluations using single parameter and two parameters together provide enough evidence that such techniques could be successfully used to detect anomalies in vehicles. Moreover our method could be used in new vehicles as well as older ones.

88 citations

Proceedings ArticleDOI
29 May 2017
TL;DR: What it means to provide mobility support in a Fog environment is examined in depth and what are the main challenges to be faced and the main research directions in the field are pointed out.
Abstract: The Internet of Things (IoT) conceives a world where everyday objects are able to join the Internet and exchange data as well as process, store, collect them from the surrounding environment, and actively intervene on it. An unprecedented number of services may be envisioned by exploiting the Internet of Things. Fog Computing, which is also known as Edge Computing, was proposed in 2012 as the ideal paradigm to support the resource-constrained IoT devices in data processing and information delivery. Indeed, the Fog, which does not replace the centralized Cloud but cooperates with it, distributes Cloud Computing technologies and principles anywhere along the Cloud-to-Things continuum and particularly at the network edge. The Fog proximity to the IoT devices allows for several advantages that must be continuously guaranteed, also when end devices move from one place to another. In this paper, we aim at examining in depth what it means to provide mobility support in a Fog environment and at investigating what are the main challenges to be faced. Besides, in order to highlight the importance of this topic in everyday life, we provide the reader with three scenarios where there is an integration between the IoT and Fog Computing, and in which mobility support is essential. We finally point out the main research directions in the field.

79 citations

Performance
Metrics
No. of papers from the Conference in previous years
YearPapers
202168
202072
201974
201880
201783
201655