researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2018
2019
2020
2021
2022
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Charles Roland Haruna
Chunhua Jin
Chunjie Cao
Chunxiang Xu
Dandan Zhao
Fagen Li
Guangquan Xu
Guanhua Chen
Hao Peng
Honggang Hu
Huiwen Jia
Jiehui Nan
Jinglu Hu
Jiyong Zhang
Juntao Gao
Lawrence Tandoh
Leyou Zhang
Mingming Jiang
Wen Si
Yudong Li
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
attack
blockchain
cloud
data
detection
efficient
encryption
key
lattice
learning
method
model
network
privacy
scheme
secure
security
smart
using
FCS (fcs2)
Editions
Publications
Viewing Publication 1 - 100 from 146
2022
Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage
Zhenhua Liu 0001
,
Jingwan Gong
,
Yuanju Ma
,
Yaxin Niu
,
Baocang Wang
.
fcs2 2022
:
324-345
[doi]
A Gas Cost Analytical Approach Based on Certificateless Key Encapsulation Protocol for Medicalized Blockchains
Abigail Akosua Addobea
,
Qianmu Li
,
Isaac Amankona Obiri
,
Jun Hou 0002
.
fcs2 2022
:
241-257
[doi]
Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings
Emmanuel Ahene
,
Fagen Li
, editors,
Volume 1726 of
Communications in Computer and Information Science
, Springer,
2022.
[doi]
Blockchain-Based Patient-to-Patient Health Data Sharing
Sandro Amofa
,
Jianbin Gao
,
Maame Gyamfua Asante-Mensah
,
Charles Roland Haruna
,
Xia Qi
.
fcs2 2022
:
198-210
[doi]
A Comparative Analysis of Security Features and Concerns in NoSQL Databases
Evans Ankomah
,
Charles Roland Haruna
,
Francis Xavier Kofi Akotoye
,
Brighter Agyemang
,
Kwame Opuni-Boachie Obour Agyekum
,
Alexander Asante
,
Lawrence Ephrim
,
Alexander N. T. Kissiedu
.
fcs2 2022
:
349-364
[doi]
Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms
Emmanuel Kwesi Baah
,
Steven Yirenkyi
,
Dominic Asamoah
,
Stephen Opoku Oppong
,
Edward Opoku-Mensah
,
Benjamin Tei Partey
,
Anthony Kingsley Sackey
,
Oliver Kornyo
,
Evans Obu
.
fcs2 2022
:
119-133
[doi]
Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source
Samuel Kelly Brew
,
Emmanuel Ahene
.
fcs2 2022
:
163-179
[doi]
Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers
Chunjie Cao
,
Yuqing Zhang 0001
,
Yuan Hong
,
Ding Wang
, editors,
Volume 1558 of
Communications in Computer and Information Science
, Springer,
2022.
[doi]
LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building
Otuekong Ekpo
,
Kate Takyi
,
Rose-mary Owusuaa Mensah Gyening
.
fcs2 2022
:
34-47
[doi]
Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing
Qikai Feng
,
Bai Liu
.
fcs2 2022
:
377-391
[doi]
A Rotating Multi-secret Color Visual Cryptography Scheme Based on Meaningful Shares
Yanyan Han
,
Yikun Zhou
,
Peng Li
,
Xinyang Liu
.
fcs2 2022
:
304-323
[doi]
Ethereum Contract Honeypot Risk Analysis
Motoya Ishimaki
,
Kazumasa Omote
.
fcs2 2022
:
226-240
[doi]
A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT
Chunhua Jin
,
Chenhao Li
,
Wenyu Qin
,
Xiaobing Chen
,
Guanhua Chen
.
fcs2 2022
:
3-17
[doi]
A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme
Yulian Li
,
Hua Shen
.
fcs2 2022
:
261-274
[doi]
Quantum Information Splitting Scheme of Arbitrary Three-Qubit State by Using a Four-Qubit Cluster State and a Bell State
Dongfen Li
,
Jie Zhou
,
Xiaolong Yang
,
Yuqaio Tan
,
Yundan Zheng
,
Xiaofang Liu
.
fcs2 2022
:
395-409
[doi]
Power Analysis Attack Based on Lightweight Convolutional Neural Network
Xiang Li
,
Ning Yang
,
Aidong Chen
,
Weifeng Liu
,
Xiaoxiao Liu
,
Na Huang
.
fcs2 2022
:
105-118
[doi]
Cross-site Scripting Threat Intelligence Detection Based on Deep Learning
Zhonglin Liu
,
Yong Fang
,
Yijia Xu
.
fcs2 2022
:
89-104
[doi]
New Trapdoor and Preimage Sampling on NTRU Lattice
Chengrong Liu
,
Chunming Tang 0003
,
Huiwen Jia
.
fcs2 2022
:
275-287
[doi]
A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things
Xiaoguang Liu
,
Yingying Sun
,
Hao Dong
.
fcs2 2022
:
69-86
[doi]
SVFLS: A Secure and Verifiable Federated Learning Training Scheme
Yi Liu
,
Guoxiong Hu
,
Yudi Zhang 0001
,
Mingwu Zhang
.
fcs2 2022
:
134-148
[doi]
AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-Based Smart Grid Environment
Egide Nkurunziza
,
Lawrence Tandoh
,
Elfadul Issameldeen
,
Mwitende Gervais
.
fcs2 2022
:
183-197
[doi]
Improving Online Restore Performance of Backup Storage via Historical File Access Pattern
Xingpeng Tang
,
Jingwei Li 0001
.
fcs2 2022
:
365-376
[doi]
A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles
Yangpeng Wang
,
Ling Xiong
,
Xianhua Niu
,
Yunxiang Wang
,
Dexin Liang
.
fcs2 2022
:
18-33
[doi]
A Pragmatic Label-Specific Backdoor Attack
Yu Wang
,
Haomiao Yang
,
Jiasheng Li
,
Mengyu Ge
.
fcs2 2022
:
149-162
[doi]
Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government
Jingting Xue
,
Shuqin Luo
,
Lingjie Shi
,
Xiaojun Zhang
,
Chunxiang Xu
.
fcs2 2022
:
48-68
[doi]
Secure EHR Sharing Scheme Based on Limited Sanitizable Signature
Yang Yang
,
Bixia Yi
,
Yonghua Zhan
,
Minming Huang
.
fcs2 2022
:
288-303
[doi]
A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage-Based Vehicle Intrusion Detection System
Long Yin
,
Jian Xu
,
Heqiu Chai
,
Chen Wang
.
fcs2 2022
:
413-428
[doi]
Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain
Xiangsong Zhang
,
Ming Yuan
,
Zhenhua Liu 0001
.
fcs2 2022
:
211-225
[doi]
2021
A Privacy-Preserving Medical Image Scheme Based on Secret Sharing and Reversible Data Hiding
Ming Cheng
,
Yang Yang
,
Yingqiu Ding
,
Weiming Zhang
.
fcs2 2022
:
288-307
[doi]
Correlation Power Analysis and Protected Implementation on Block Cipher RainDrop
Zhixuan Gao
,
Shuang Wang
,
Yaoling Ding
,
an Wang
,
Qingjun Yuan
.
fcs2 2022
:
308-323
[doi]
New Federation Algorithm Based on End-Edge-Cloud Architecture for Smart Grid
Xin Ji
,
Haifeng Zhang
,
Juan Chu
,
Linxiao Dong
,
Chengyue Yang
.
fcs2 2022
:
120-133
[doi]
A Review of Data Representation Methods for Vulnerability Mining Using Deep Learning
Ying Li
,
Mianxue Gu
,
Hongyu Sun
,
Yuhao Lin
,
Qiuling Yue
,
Zhen Guo
,
Jinglu Hu
,
He Wang
,
Yuqing Zhang
.
fcs2 2022
:
342-351
[doi]
Multi-modal Universal Embedding Representations for Language Understanding
Xi Luo
,
Chunjie Cao
,
Longjuan Wang
.
fcs2 2022
:
103-119
[doi]
Information System Security Risk Assessment Based on Entropy Weight Method - Bayesian Network
Xinjian Lv
,
Nan Shi
,
Jing Wei
,
Yuan Tian
,
Jie Li
,
Jian Li
.
fcs2 2022
:
152-162
[doi]
A GDIoU Loss Function-Based YOLOv4 Deep Learning Network for High-Performance Insulator Location in Field Images
Bin Ma
,
Yongkang Fu
,
Jian Li
,
Chunpeng Wang
,
Yuli Wang
.
fcs2 2022
:
245-256
[doi]
Identification of Synthetic Spoofed Speech with Deep Capsule Network
Terui Mao
,
Diqun Yan
,
Yongkang Gong
,
Randing Wang
.
fcs2 2022
:
257-265
[doi]
A Hybrid Network Intrusion Detection Model Based on CNN-LSTM and Attention Mechanism
Jieru Mu
,
Hua He
,
Lin Li
,
Shanchen Pang
,
Cong Liu
.
fcs2 2022
:
214-229
[doi]
Certificateless Authentication and Consensus for the Blockchain-Based Smart Grid
Egide Nkurunziza
,
Mwitende Gervais
,
Lawrence Tandoh
,
Fagen Li
.
fcs2 2022
:
134-151
[doi]
System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack
Hao Peng
,
Zhen Qian
,
Ming Zhong
,
Dandan Zhao
,
Guangquan Xu
,
Songyang Wu
,
Jianming Han
.
fcs2 2022
:
230-242
[doi]
Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports
Hansong Ren
,
Xuejun Li
,
Liao Lei
,
Guoliang Ou
,
Hongyu Sun
,
Gaofei Wu
,
Xiao Tian
,
Jinglu Hu
,
Yuqing Zhang 0001
.
fcs2 2022
:
78-99
[doi]
GWDGA: An Effective Adversarial DGA
Xiang Shu
,
Chunjie Cao
,
Longjuan Wang
,
Fangjian Tao
.
fcs2 2022
:
30-48
[doi]
Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding
Lawrence Tandoh
,
Fagen Li
,
Ikram Ali
,
Charles Roland Haruna
,
Michael Y. Kpiebaareh
,
Christopher Tandoh
.
fcs2 2022
:
181-196
[doi]
Research on Security Assessment of Cross Border Data Flow
Na Wang
,
Gaofei Wu
,
Qiuling Yue
,
Jinglu Hu
,
Yuqing Zhang 0001
.
fcs2 2022
:
327-341
[doi]
Architecture and Security Analysis of Federated Learning-Based Automatic Modulation Classification
Xianglin Wei
,
Chao Wang
,
Xiang Jiao
,
Qiang Duan
,
Yongyang Hu
.
fcs2 2022
:
63-77
[doi]
Research on Automatic Analysis and Exploitation Technology of Remote Code Execution Vulnerability for Grid System
Hongwen Wu
,
Xiaoming Wang
,
Ke Zhou
,
Jianming Zou
,
Congyun Wu
,
Wenjian Wen
,
Zhicheng Huang
,
Jiezhen Deng
,
Tingyu Qiu
.
fcs2 2022
:
14-29
[doi]
Network Security Situation Assessment Method Based on MHSA-FL Model
Kejun Zhang
,
Xinrui Jiang
,
Xinying Yu
,
Liwen Feng
.
fcs2 2022
:
197-213
[doi]
Imperceptible and Reliable Adversarial Attack
Jiawei Zhang
,
Jinwei Wang
,
Xiangyang Luo
,
Bin Ma
,
Naixue Xiong
.
fcs2 2022
:
49-62
[doi]
Survey of 3D Printer Security Offensive and Defensive
Jiayuan Zhang
,
Mengyue Feng
,
Yuhang Huang
,
Tao Feng 0007
,
Wenjie Wang
,
He Wang
,
Han Zhang
.
fcs2 2022
:
163-178
[doi]
Cloud-Aided Scalable Revocable Identity-Based Encryption with Ciphertext Update from Lattices
Yanhua Zhang
,
Ximeng Liu
,
Yupu Hu
,
Huiwen Jia
.
fcs2 2022
:
269-287
[doi]
DACN: Malware Classification Based on Dynamic Analysis and Capsule Networks
Binghui Zou
,
Chunjie Cao
,
Longjuan Wang
,
Fangjian Tao
.
fcs2 2022
:
3-13
[doi]
2020
Low-Speed Injection Attack Detection on CAN Bus
Chundong Wang 0002
,
Chuang Li
,
Tongle An
,
Xiaochun Cheng
.
fcs2 2020
:
30-43
[doi]
The Socio-economic Impacts of Social Media Privacy and Security Challenges
Feras N. Al-Obeidat
,
Anoud Bani-Hani
,
Oluwasegun A. Adedugbe
,
Munir Majdalawieh
,
Elhadj Benkhelifa
.
fcs2 2020
:
553-563
[doi]
Noninvasive Research on Cardiac Electrical Activity by Non-Gaussian Prior Bayesian Matching Pursuit
Lu Bing
,
Yudong Li
,
Wen Si
.
fcs2 2020
:
104-110
[doi]
Characterizing the Security Threats of Disposable Phone Numbers
Yanan Cheng
,
Han Wang
,
Zhaoxin Zhang
,
Ning Li
.
fcs2 2020
:
491-507
[doi]
NoPKI - a Point-to-Point Trusted Third Party Service Based on Blockchain Consensus Algorithm
Wei-Yang Chiu
,
Weizhi Meng 0001
,
Christian Damsgaard Jensen
.
fcs2 2020
:
197-214
[doi]
Automatic Repair of Semantic Defects Using Restraint Mechanisms
Yukun Dong
,
Li Zhang 0053
,
Shanchen Pang
,
Hao Liu
,
Wenjing Yin
,
Mengying Wu
,
Meng Wu
,
Haojie Li
.
fcs2 2020
:
567-583
[doi]
Efficient Discrete Distribution Estimation Schemes Under Local Differential Privacy
Wenlong Dun
,
Youwen Zhu
.
fcs2 2020
:
508-523
[doi]
Detecting Intrusions in Railway Signal Safety Data Networks with DBSCAN-ARIMA
Yuming Fan
,
Kaiyuan Tian
,
Xuyu Wang
,
Zhuo Lv
,
Jian Wang
.
fcs2 2020
:
254-270
[doi]
User Similarity-Aware Data Deduplication Scheme for IoT Applications
Yuan Gao
,
Hequn Xian
,
Yan Teng
.
fcs2 2020
:
44-52
[doi]
A Security Problem Caused by the State Database in Hyperledger Fabric
Zhen Gao
,
Dongbin Zhang
,
Jiuzhi Zhang
.
fcs2 2020
:
361-372
[doi]
Robust Android Malware Detection Based on Attributed Heterogenous Graph Embedding
Yonghao Gu
,
Liangxun Li
,
Yong Zhang
.
fcs2 2020
:
432-446
[doi]
Code Property Graph-Based Vulnerability Dataset Generation for Source Code Detection
Zhibin Guan
,
Xiaomeng Wang
,
Wei Xin
,
Jiajie Wang
.
fcs2 2020
:
584-591
[doi]
DNS Rebinding Detection for Local Internet of Things Devices
Xudong He
,
Jian Wang
,
Jiqiang Liu
,
Zhen Han
,
Zhuo Lv
,
Wei Wang 0012
.
fcs2 2020
:
19-29
[doi]
DexFus: An Android Obfuscation Technique Based on Dalvik Bytecode Translation
Naitian Hu
,
Xingkong Ma
,
Fuqiang Lin
,
Bo Liu
,
Tong Lu
.
fcs2 2020
:
419-431
[doi]
DPC: A Delay-Driven Prioritized TCP Congestion Control Algorithm for Data Center Networks
Xianliang Jiang
,
Jiahua Zhu
,
Guang Jin
.
fcs2 2020
:
459-474
[doi]
Heterogeneous Deniable Authenticated Encryption Protocol
Chunhua Jin
,
Ge Kan
,
Guanhua Chen
,
Changhui Yu
,
Chengjie Xu
.
fcs2 2020
:
331-346
[doi]
RF-AdaCost: WebShell Detection Method that Combines Statistical Features and Opcode
Wenzhuang Kang
,
Shangping Zhong
,
Kaizhi Chen
,
Jianhua Lai
,
Guangquan Xu
.
fcs2 2020
:
667-682
[doi]
Evil Chaincode: APT Attacks Based on Smart Contract
Zhenyu Li
,
Yujue Wang
,
Sheng Wen
,
Yong Ding 0005
.
fcs2 2020
:
178-196
[doi]
Privacy-Preserving and Outsourced Density Peaks Clustering Algorithm
Shaopeng Liang
,
Haomiao Yang
,
Qixian Zhou
,
Minglu Zhang
.
fcs2 2020
:
538-552
[doi]
A New Face Detection Framework Based on Adaptive Cascaded Network
Gangting Liu
,
Jianhong Lin
,
Yifan Ding
,
Shihong Yang
,
Yunhua Xu
.
fcs2 2020
:
233-242
[doi]
A Network Traffic Classification Method Based on Hierarchical Clustering
Yong Ma
,
Yang Hu
,
Chang Cai
.
fcs2 2020
:
449-458
[doi]
Data Auditing for the Internet of Things Environments Leveraging Smart Contract
Fang Peng
,
Hui Tian 0002
,
Hanyu Quan
,
Jing Lu
.
fcs2 2020
:
133-149
[doi]
Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategy
Hao Peng
,
Zhen Qian
,
Zhe Kan
,
Hongxia Ye
,
Zian Fang
,
Dandan Zhao
.
fcs2 2020
:
315-327
[doi]
Invulnerability of Heterogeneous CPFS Under Different Intranal Border-adding Strategies
Hao Peng
,
Can Liu
,
Dandan Zhao
,
Zhaolong Hu
,
Jianmin Han
.
fcs2 2020
:
294-304
[doi]
Robustness Enhancement Analysis of CPS Systems Under the Swapping Strategies Between Different Networks
Hao Peng
,
Can Liu
,
Dandan Zhao
,
Jianmin Han
,
Zhonglong Zheng
.
fcs2 2020
:
305-314
[doi]
SA Dots: A Sensitive and Self-adaptable Framework for Cross-Region DDoS Processing
Li Su
,
Meiling Chen
,
Wei Li
,
Peng Ran
,
Yang Sun
.
fcs2 2020
:
475-488
[doi]
A Novel Method to Improve Security and Imperceptibility of Image Steganography
Kymbat Taalaibekova
,
Xianjin Fang
,
Zhifeng Xu
.
fcs2 2020
:
611-627
[doi]
Atomic Cross-Chain Swap-Based Decentralized Management System in Vehicular Networks
Chenkai Tan
,
Zhengjun Jing
,
Shaoyi Bei
.
fcs2 2020
:
243-253
[doi]
Application of Blockchain Technology to the Credit Management of Supply Chain
Rong Tan
,
Yudong Li
,
Jing Zhang
,
Wen Si
.
fcs2 2020
:
121-132
[doi]
Design a Proof of Stake Based Directed Acyclic Graph Chain
Haibo Tian
,
Huizhi Lin
,
Fangguo Zhang
.
fcs2 2020
:
150-165
[doi]
Deep Attention Model with Multiple Features for Rumor Identification
Lina Wang
,
Wenqi Wang
,
Tong Chen
,
Jianpeng Ke
,
Benxiao Tang
.
fcs2 2020
:
65-82
[doi]
Multi-type Source Code Defect Detection Based on TextCNN
Xiaomeng Wang
,
Zhibin Guan
,
Wei Xin
,
Jiajie Wang
.
fcs2 2020
:
95-103
[doi]
Identify-Based Outsourcing Data Auditing Scheme with Lattice
Han Wang
,
Xu an Wang
,
Jiasen Liu
,
Chuan Lin
.
fcs2 2020
:
347-358
[doi]
Research on Database Anomaly Access Detection Based on User Profile Construction
Xuren Wang
,
Zhou Fang
,
Dong Wang
,
Anran Feng
,
Qiuyun Wang
.
fcs2 2020
:
388-399
[doi]
Blockchain-Based CP-ABE with Publicly Verifiable Outsourced Decryption in IoT
Mande Xie
,
Jifei Hu
,
Haibo Hong
.
fcs2 2020
:
3-18
[doi]
A Key Business Node Identification Model for Business Process Based on AE-VIKOR Method
Lixia Xie
,
Huiyu Ni
,
Guangquan Xu
,
Jiyong Zhang
.
fcs2 2020
:
643-653
[doi]
Analysis Model of Node Failures and Impact for AANET
Lixia Xie
,
Liping Yan
,
Guangquan Xu
,
Jiyong Zhang
.
fcs2 2020
:
55-64
[doi]
Video Investigation Analysis System Enhanced by Explicable Model
Jun Xing
,
Guangquan Xu
,
Chengbo Yin
.
fcs2 2020
:
111-117
[doi]
Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings
Guangquan Xu
,
Kaitai Liang
,
Chunhua Su
, editors,
Volume 1286 of
Communications in Computer and Information Science
, Springer,
2020.
[doi]
Privacy Prediction of Lightweight Convolutional Neural Network
Shiyin Yang
,
Yongbiao Li
,
Dehua Zhou
,
Linfeng Wei
,
Qingqing Gan
.
fcs2 2020
:
524-537
[doi]
Fuzzy Petri Nets Based Information System Security Situation Assessment Model
Hongyu Yang
,
Yuhao Feng
,
Guangquan Xu
,
Jiyong Zhang
.
fcs2 2020
:
283-293
[doi]
Multi-resolution Steganalysis of JPEG Images Using the Contrast of DCT Coefficients
Jiang Yu
,
Changqi Zhang
,
Yudong Li
,
Wen Si
.
fcs2 2020
:
628-640
[doi]
An Adaptive Utility Quantification Strategy for Penetration Semantic Knowledge Mining
Yichao Zang
,
Tairan Hu
,
Rongrong Cao
,
Junhu Zhu
.
fcs2 2020
:
654-666
[doi]
Dynamic Trajectory for Visual Perception of Abnormal Behavior
Changqi Zhang
,
Jiang Yu
,
Yudong Li
,
Wen Si
.
fcs2 2020
:
271-282
[doi]
Defending Poisoning Attacks in Federated Learning via Adversarial Training Method
Jiale Zhang
,
Di Wu
,
Chengyong Liu
,
Bing Chen 0002
.
fcs2 2020
:
83-94
[doi]
The Research on Covert Communication Model Based on Blockchain: A Case Study of Ethereum's Whisper Protocol
Zhijie Zhang
,
Lejun Zhang
,
Waqas Rasheed
,
Zilong Jin
,
Tinghuai Ma
,
Huiling Chen 0001
,
Guangquan Xu
.
fcs2 2020
:
215-230
[doi]
Design of Personal Credit Information Sharing Platform Based on Consortium Blockchain
Jing Zhang
,
Rong Tan
,
Yudong Li
.
fcs2 2020
:
166-177
[doi]
A Hybrid Quantum Secret Sharing Scheme Based on Mutually Unbiased Bases
Dan-Li Zhi
,
Zhi-Hui Li
,
Li-juan Liu
,
Zhao-Wei Han
.
fcs2 2020
:
595-607
[doi]
An Effective Occlusion Edge Prediction Method in Light Field Depth Estimation
Chao Zhou
,
Qian Zhang 0033
,
Bin Wang
,
Yunzhang Du
,
Tao Yan
,
Wen Si
.
fcs2 2020
:
403-416
[doi]
Efficient Boolean SSE: A Novel Encrypted Database (EDB)
Xueling Zhu
,
Huaping Hu
,
Shaojing Fu
,
Qing Wu
,
Bo Liu
.
fcs2 2020
:
373-387
[doi]
Sign in
or
sign up
to see more results.