Chunming Rong

According to our database1, Chunming Rong authored at least 141 papers between 1999 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Household Power Demand Prediction Using Evolutionary Ensemble Neural Network Pool with Multiple Network Structures.
Sensors, 2019

Evolutionary Ensemble LSTM based Household Peak Demand Prediction.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2019

Evaluating Feature Selection Methods for Short-Term Load Forecasting.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2019

2018
An efficient cascaded method for network intrusion detection based on extreme learning machines.
The Journal of Supercomputing, 2018

Parallel Blockchain: An Architecture for CPSS-Based Smart Societies.
IEEE Trans. Comput. Social Systems, 2018

Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption.
IEEE Access, 2018

Data Recovery and Security in Cloud.
Proceedings of the 9th International Conference on Information, 2018

Improve Security Over Multiple Cloud Service Providers for Resource Allocation.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Secure customer data over cloud forensic reconstruction.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Energy Informatics Applicability; Machine Learning and Deep Learning.
Proceedings of the 2018 IEEE International Conference on Big Data, 2018

2017
Framework for context-aware computation offloading in mobile cloud computing.
J. Cloud Computing, 2017

Adaptive real-time anomaly detection in cloud infrastructures.
Concurrency and Computation: Practice and Experience, 2017

Mobile contact synchronous with cloud server.
Appl. Soft Comput., 2017

Ushare: user controlled social media based on blockchain.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Scalable, Efficient Anonymization with INCOGNITO - Framework & Algorithm.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

Resource Allocation in Cloud-Based Distributed Cameras.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

2016
ELM-based spammer detection in social networks.
The Journal of Supercomputing, 2016

Fast algorithms to evaluate collaborative filtering recommender systems.
Knowl.-Based Syst., 2016

Using Spearman's correlation coefficients for exploratory data analysis on big dataset.
Concurrency and Computation: Practice and Experience, 2016

Big data and smart computing: methodology and practice.
Concurrency and Computation: Practice and Experience, 2016

Enrichment of machine learning based activity classification in smart homes using ensemble learning.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

Protein Function Detection Based on Machine Learning: Survey and Possible Solutions.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

Smart Home Security Monitor System.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

Adaptive Anomaly Detection in Cloud Using Robust and Scalable Principal Component Analysis.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

Perfect Gaussian integer sequences from cyclic difference sets.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Securing big data in the Cloud by protected mapping over multiple providers.
Proceedings of the Digital Media Industry & Academic Forum, 2016

SD-HDFS: Secure Deletion in Hadoop Distributed File System.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

2015
Resource Constrained Data Stream Clustering with Concept Drifting for Processing Sensor Data.
IJDWM, 2015

A secure user authentication protocol for sensor network in data capturing.
J. Cloud Computing, 2015

Detecting spammers on social networks.
Neurocomputing, 2015

Virtual Network Flavors: Differentiated Traffic Forwarding for Cloud Tenants.
Proceedings of the Wired/Wireless Internet Communications - 13th International Conference, 2015

Machine Learning Based Scalable and Adaptive Network Function Virtualization.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2015

AFFM: Auto Feature Engineering in Field-Aware Factorization Machines for Predictive Analytics.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

Cross-Device Consumer Identification.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

Risk Management Using Big Real Time Data.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Gaussian Mixture Model Based Interest Prediction In Social Networks.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Time Series Similarity Evaluation Based on Spearman's Correlation Coefficients and Distance Measures.
Proceedings of the Cloud Computing and Big Data, 2015

Survey on Software-Defined Networking.
Proceedings of the Cloud Computing and Big Data, 2015

Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model.
Proceedings of the Cloud Computing and Big Data, 2015

2014
A secure many-to-many routing protocol for wireless sensor and actuator networks.
Security and Communication Networks, 2014

Architecture-based integrated management of diverse cloud resources.
J. Cloud Computing, 2014

STSHC: secure and trusted scheme for Hadoop cluster.
IJHPSA, 2014

A new approach for accurate distributed cluster analysis for Big Data: competitive K-Means.
IJBDI, 2014

A distributed gaussian-means clustering algorithm for forecasting domestic energy usage.
Proceedings of the International Conference on Smart Computing, 2014

Flexible building blocks for software defined network function virtualization.
Proceedings of the 10th International Conference on Heterogeneous Networking for Quality, 2014

A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

Optimization Scheduling for Scientific Applications with Different Priorities across Multiple Clouds.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Predictive Analytics of Sensor Data Using Distributed Machine Learning Techniques.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

R2Time: A Framework to Analyse Open TSDB Time-Series Data in HBase.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Multiple Data Integration Service.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
Mobile cloud computing [Guest Editorial].
IEEE Wireless Commun., 2013

Semantic description of scholar-oriented social network cloud.
The Journal of Supercomputing, 2013

Beyond lightning: A survey on security challenges in cloud computing.
Computers & Electrical Engineering, 2013

Privacy Preserving Data Analytics for Smart Homes.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Multi-tenant Network Monitoring Based on Software Defined Networking.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013

TSHC: Trusted Scheme for Hadoop Cluster.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Competitive K-Means, a New Accurate and Distributed K-Means Algorithm for Large Datasets.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Safer@Home Analytics: A Big Data Analytical Solution for Smart Homes.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Performance Analysis and Optimization of Map Only Left Outer Join.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Resource Pool Oriented Trust Management for Cloud Infrastructure.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Reference deployment models for eliminating user concerns on cloud security.
The Journal of Supercomputing, 2012

Preface to special issue on Advances in Cloud Computing.
The Journal of Supercomputing, 2012

Purpose Based Access Control for Privacy Protection in E-Healthcare Services.
JSW, 2012

Special issue on security in cloud computing.
J. Cloud Computing, 2012

Evaluation of some optimisation techniques for semantic query answering on shared-nothing architecture.
IJSSC, 2012

A Novel Identity-Based Key Management and Encryption Scheme for Distributed System.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Accountability for cloud and other future Internet services.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

A fast estimation of shortest path distance for power-law network predominant cloud service.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Cluster analysis for the cloud: Parallel Competitive Fitness and parallel K-means++ for large dataset analysis.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

A multi-criteria design scheme for service federating inter-cloud applications.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Authenticated health monitoring scheme for wireless body sensor networks.
Proceedings of the 7th International Conference on Body Area Networks, 2012

Performance of Left Outer Join on Hadoop with Right Side within Single Node Memory Size.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
SWRL-F: a fuzzy logic extension of the semantic web rule language.
Proceedings of the International Conference on Web Intelligence, Mining and Semantics, 2011

Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

Applying SWRL-F to intercloud constraints analysis.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

Intercloud for simulation federations.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

An Initial Survey on Integration and Application of Cloud Computing to High Performance Computing.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Integer Factorization Using Hadoop.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Energy-Aware Task Consolidation Technique for Cloud Computing.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Using Mahout for Clustering Wikipedia's Latest Articles: A Comparison between K-means and Fuzzy C-means in the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Security Infrastructure for On-demand Provisioned Cloud Infrastructure Services.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Performance Analysis of Hadoop for Query Processing.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

K-means Clustering in the Cloud - A Mahout Test.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

Design and Analysis of a Secure Routing Protocol Algorithm for Wireless Sensor Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
A novel key pre-distribution scheme for wireless distributed sensor networks.
SCIENCE CHINA Information Sciences, 2010

DataStorm.
Proceedings of the 6th World Congress on Services, 2010

SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language.
Proceedings of the 6th International Workshop on Uncertainty Reasoning for the Semantic Web (URSW 2010), 2010

Deployment models: Towards eliminating security concerns from cloud computing.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

An efficient approach to intelligent real-time monitoring using ontologies and Hadoop.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

Trusted Data Sharing over Untrusted Cloud Storage Providers.
Proceedings of the Cloud Computing, Second International Conference, 2010

On the Sustainability Impacts of Cloud-Enabled Cyber Physical Space.
Proceedings of the Cloud Computing, Second International Conference, 2010

Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

Performance Considerations of Data Acquisition in Hadoop System.
Proceedings of the Cloud Computing, Second International Conference, 2010

Social Impact of Privacy in Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

Towards Free Task Overloading in Passive Replication Based Real-time Multiprocessors.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
A shadow zone aware routing protocol for acoustic underwater sensor networks.
IEEE Communications Letters, 2009

Secure many to many routing for wireless sensor and actuator networks.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Bayesian Networks for Fault Detection under Lack of Historical Data.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Automatic Web Service Detection in Oil and Gas.
Proceedings of the Communication and Networking, 2009

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

Industrial Cloud: Toward Inter-enterprise Integration.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

An Integrated Information Sharing Structure for Resuscitation Data.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Guest Editors' Introduction.
Journal of Computer Security, 2008

Protection against unauthorized access and computer crime in Norwegian enterprises.
Journal of Computer Security, 2008

On Ubiquitous Integrated Computing.
IJCSA, 2008

Towards Dataintegration from WITSML to ISO 15926.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

RFID System Security Using Identity-Based Cryptography.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

A System Prototype with Multiple Robots for Finding u-Objects in a Smart Space.
Proceedings of the International Conference on Embedded Software and Systems, 2008

Block Size Estimation for Time-Sensitive Applications under Wireless Network Coding.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

A Flexible Garbage Collect Algorithm for Flash Storage Management.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Di-GAFR: Directed Greedy Adaptive Face-Based Routing.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

SPM: A Security Policy Based on Micropayment in Ad Hoc Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Data Integration in Oil and Gas at Norwegian Continental Shelf.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Electronic Payment Scheme Using Identity-Based Cryptography.
Proceedings of the Public Key Infrastructure, 2007

ZigBee Security Using Identity-Based Cryptography.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Towards Integrated Services for Health Monitoring.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Effective Storage Security in Incompletely Trusted Environment.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Information Security Threats and Access Control Practices in Norwegian Businesses.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
A survey of key management in ad hoc networks.
IEEE Communications Surveys and Tutorials, 2006

On Use of Identity-Based Encryption for Secure Emailing.
Proceedings of the SECRYPT 2006, 2006

Securing Web Services Using Identity-Based Encryption (IBE).
Proceedings of the SECRYPT 2006, 2006

Combined Method for Nonlinear Systems of Equations.
Proceedings of the Computational Science, 2006

Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method.
Proceedings of the Computational Science, 2006

On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Analysis of IBS for MANET Security in Emergency and Rescue Operations.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
A Scalable Security Architecture for Grid.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Flooding Attack on the Binding Cache in Mobile IPv6.
Proceedings of the E-business and Telecommunication Networks, 2005

Flooding attack on the binding cache in mobile IPv6.
Proceedings of the ICETE 2005, 2005

2003
On-Line E-Wallet System with Decentralized Credential Keepers.
MONET, 2003

A Distributed Honeypot System for Grid Security.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2001
New 3-designs from Goethals codes over Z4.
Discrete Mathematics, 2001

On t-designs from codes over Z4.
Discrete Mathematics, 2001

1999
On algebraic decoding of the Z4-linear Calderbank-McGuire code.
IEEE Trans. Information Theory, 1999

New Families of Almost Perfect Nonlinear Power Mappings.
IEEE Trans. Information Theory, 1999

New infinite families of 3-designs from preparata codes over Z4.
Discrete Mathematics, 1999

Split Weight Enumerators for the Preparata Codes with Applications to Designs.
Des. Codes Cryptography, 1999


  Loading...