Abstract is missing.
- VH: A Lightweight Block Cipher Based on Dual Pseudo-random TransformationXuejun Dai, Yuhua Huang, Lu Chen, Tingting Lu, Fei Su. 3-13 [doi]
- Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation SchemeMingfu Xue, Jian Wang, Youdong Wang, Aiqun Hu. 14-24 [doi]
- Secure and Efficient Protocol for Outsourcing Large-Scale Systems of Linear Equations to the CloudCheng Qian, Jian Wang. 25-37 [doi]
- A Provably Secure Ciphertext-Policy Hierarchical Attribute-Based EncryptionZiying Wang, Jian Wang. 38-48 [doi]
- Privacy-Preserving Multidimensional Range Query on Real-Time DataZhong Ting, Han Xiao, Yang Yunshuo, Zhu Aixiang. 49-61 [doi]
- ARM-Based Privacy Preserving for Medical Data PublishingFengli Zhang, Yijing Bai. 62-73 [doi]
- Attribute-Based Encryption Without Key EscrowXing Zhang, Cancan Jin, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu. 74-87 [doi]
- An Efficient Access Control Optimizing Technique Based on Local Agency in Cryptographic Cloud StorageShidong Zhu, Liu Jiang, ZhenLiu Zhou. 88-100 [doi]
- Complete Separable Reversible Data Hiding in Encrypted ImageZhao-Xia Yin, Huabin Wang, Haifeng Zhao, Bin Luo, Xinpeng Zhang. 101-110 [doi]
- Multi-threshold Image Segmentation Through an Improved Quantum-Behaved Particle Swarm Optimization AlgorithmJiali Wang, Hongshen Liu, Yue Ruan. 111-122 [doi]
- Coverless Image Steganography Without EmbeddingZhili Zhou, Huiyu Sun, Rohan Harit, Xianyi Chen, Xingming Sun. 123-132 [doi]
- Coverless Information Hiding Method Based on the Chinese Mathematical ExpressionXianyi Chen, Huiyu Sun, Yoshito Tobe, Zhili Zhou, Xingming Sun. 133-143 [doi]
- Network Information Security Challenges and Relevant Strategic Thinking as Highlighted by "PRISM"Jing Li. 147-156 [doi]
- A Lightweight and Dependable Trust Model for Clustered Wireless Sensor NetworksNannan Shao, Zhiping Zhou, Ziwen Sun. 157-168 [doi]
- The Optimization Model of Trust for White-WashingZhidan Wang, Jian Wang, Yanfei Zhao. 169-180 [doi]
- Malware Clustering Based on SNN Density Using System CallsShuwei Wang, Baosheng Wang, Tang Yong, Bo Yu. 181-191 [doi]
- Analyzing Eventual Leader Election Protocols for Dynamic Systems by Probabilistic Model CheckingJiayi Gu, Yu Zhou, Weigang Wu, Taolue Chen. 192-205 [doi]
- A Dynamic Resource Allocation Model for Guaranteeing Quality of Service in Software Defined Networking Based Cloud Computing EnvironmentChenhui Xu, Bing Chen, Ping Fu, Hong-yan Qian. 206-217 [doi]
- Research and Development of Trust Mechanism in Cloud ComputingJun Xu, Feng Xu, Wenna Chang, Haiguang Lai. 218-229 [doi]
- Analysis of Advanced Cyber Attacks with Quantified ESMBlaz Ivanc, Tomaz Klobucar. 230-243 [doi]
- A Web Security Testing Method Based on Web Application StructureXueyong Yu, Guohua Jiang. 244-258 [doi]
- An Improved Data Cleaning Algorithm Based on SNMMiao Li, Qiang Xie, Qiulin Ding. 259-269 [doi]
- Enhancing Security of IaaS Cloud with Fraternal Security Cooperation Between Cloud Platform and Virtual PlatformJie Yang, Zhiqiang Zhu, Lei Sun, Jingci Zhang, Xianwei Zhu. 270-282 [doi]
- Cluster Analysis by Variance Ratio Criterion and Quantum-Behaved PSOShuihua Wang, Xingxing Zhou, Guangshuai Zhang, Genlin Ji, Jiquan Yang, Zheng Zhang, Zeyuan Lu, Yudong Zhang. 285-293 [doi]
- Failure Modes and Effects Analysis Using Multi-factors Comprehensive Weighted Fuzzy TOPSISWenjun Zhang, Fenglin Zhang. 294-305 [doi]
- Efficient Query Algorithm of Coallocation -Parallel-Hash-Join in the Cloud Data CenterYao Shen, Ping Lu, Xiaolin Qin, Yuming Qian, Sheng Wang. 306-320 [doi]
- Dynamic Data Driven Particle Filter for Agent-Based Traffic State EstimationXiang-Wen Feng, Xue-Feng Yan, Xiao-Lin Hu. 321-331 [doi]
- An Improved Dynamic Spectrum Access Scheme in Cognitive NetworksQingwei Du, Yinmeng Wang. 332-343 [doi]
- The Design and Implementation of a Dynamic Verification System of ZJun Wang, Yi Zhuang, Siru Ni. 344-355 [doi]
- Maximizing Positive Influence in Signed Social NetworksHuanhuan Wang, Qun Yang, Lei Fang, Weihua Lei. 356-367 [doi]
- OpenFlow-Based Load Balancing for Wireless Mesh NetworkHanjie Yang, Bing Chen, Ping Fu. 368-379 [doi]
- SPEMS: A Stealthy and Practical Execution Monitoring System Based on VMIJiangyong Shi, Yuexiang Yang, Chengye Li, Xiaolei Wang. 380-389 [doi]
- A Total Power Control Cooperative MAC Protocol for Wireless Sensor NetworksXiongli Rui, Xuehong Cao, Jie Yang. 390-403 [doi]
- Parallel Processing of SAR Imaging Algorithms for Large Areas Using Multi-GPUXue Wang, Jiabin Yuan, Xingfang Zhao. 404-416 [doi]
- An Extreme Learning Approach to Fast Prediction in the Reduce Phase of a Cloud PlatformQi Liu, Weidong Cai, Jian Shen, Baowei Wang, Zhangjie Fu, Nigel Linge. 417-423 [doi]
- Wind Speed and Direction Predictions Based on Multidimensional Support Vector Regression with Data-Dependent KernelDingcheng Wang, Yujia Ni, Beijing Chen, Zhili Cao, Yuhang Tian, Youzhi Zhao. 427-436 [doi]
- Research on Rootkit Detection Model Based on Intelligent Optimization Algorithm in the Virtualization EnvironmentLei Sun, Zhiyuan Zhao, Feiran Wang, Lei Jin. 437-447 [doi]
- Performance Analysis of (1+1)EA on the Maximum Independent Set ProblemXue Peng. 448-456 [doi]
- A Robust Iris Segmentation Algorithm Using Active Contours Without Edges and Improved Circular Hough TransformYueqing Ren, Zhiyi Qu, Xiaodong Liu. 457-468 [doi]
- An Adaptive Hybrid PSO and GSA Algorithm for Association Rules MiningZhiping Zhou, Daowen Zhang, Ziwen Sun, Jiefeng Wang. 469-479 [doi]
- Sequential Pattern Mining and Matching Method with Its Application on EarthquakesJiang Zhu, Dechang Pi, Pan Xiong, Xuhui Shen. 480-490 [doi]
- Teaching Quality Assessment Model Based on Analytic Hierarchy Process and LVQ Neural NetworkShuai Hu, Yan Gu, Hua Jiang. 491-500 [doi]
- Fast Sparse Representation Classification Using Transfer LearningQi Zhu, Baisheng Dai, Zizhu Fan, Zheng Zhang. 501-509 [doi]
- Probing the Scheduling Algorithms in the Cloud Based on OpenStackYang Luo, Qingni Shen, Cong Li, Kang Chen, Zhonghai Wu. 510-520 [doi]
- Top-k Distance-Based Outlier Detection on Uncertain DataYing Zhang, Hong Yuan Zheng, Qiulin Ding. 521-535 [doi]
- An Airport Noise Prediction Model Based on Selective Ensemble of LOF-FSVRHaiyan Chen, Jiajia Deng, Bo Sun, Jiandong Wang. 536-549 [doi]
- Application of Semantic-Based Laplacian Eigenmaps Method in 3D Model Classification and RetrievalXinying Wang, Fangming Gu, Gang Liu, ZhiYu Chen. 550-559 [doi]