1964 | -- | 1965 | Guojun Wang. Foreword |
1966 | -- | 1973 | Huaqun Wang, Keqiu Li, Kaoru Ota, Jian Shen. Remote Data Integrity Checking and Sharing in Cloud-Based Health Internet of Things |
1974 | -- | 1981 | Remi Ando, Shigeyoshi Shima, Toshihiko Takemura. Analysis of Privacy and Security Affecting the Intention of Use in Personal Data Collection in an IoT Environment |
1982 | -- | 1990 | Licheng Wang, Jing Li, Haseeb Ahmad. Challenges of Fully Homomorphic Encryptions for the Internet of Things |
1991 | -- | 2001 | Zhikai Xu, Hongli Zhang, Xiang-Zhan Yu, Shen Su. Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense |
2002 | -- | 2009 | Jinli Rao, Zhangqing He, Shu Xu, Kui Dai, Xuecheng Zou. BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks |
2010 | -- | 2018 | Anfeng Liu, Xiao Liu, He Li, Jun Long. MDMA: A Multi-Data and Multi-ACK Verified Selective Forwarding Attack Detection Scheme in WSNs |
2019 | -- | 2026 | Guangquan Xu, Yuanyuan Ren, Yuanbin Han, Xiaohong Li, Zhiyong Feng. Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems |
2027 | -- | 2035 | Kai Fan, Zhao Du, Yuanyuan Gong, Yue Wang, Tongjiang Yan, Hui Li 0006, Yintang Yang. A Secure RFID Application Revocation Scheme for IoT |
2036 | -- | 2043 | Lu Shen, Shifang Feng, Jinjin Sun, Zhongwei Li, Ming Su, Gang Wang, Xiaoguang Liu. CloudS: A Multi-Cloud Storage System with Multi-Level Security |
2044 | -- | 2055 | Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin. A Matrix Based ORAM: Design, Implementation and Experimental Analysis |
2056 | -- | 2060 | Toshifumi Nishinaga, Masahiro Mambo. Implementation of µNaCl on 32-bit ARM Cortex-M0 |
2061 | -- | 2068 | GuanJun Liu, Changjun Jiang. Behavioral Equivalence of Security-Oriented Interactive Systems |
2069 | -- | 2078 | Mohammad Rasool Sarrafi Aghdam, Noboru Sonehara. Achieving High Data Utility K-Anonymization Using Similarity-Based Clustering Model |
2079 | -- | 2089 | Yoshinori Aono, Takuya Hayashi 0001, Le Trieu Phong, Lihua Wang. Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption |
2090 | -- | 2099 | Min Shao, Min Sik Kim, Victor C. Valgenti, Jungkeun Park. Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems |
2100 | -- | 2108 | Komang Oka Saputra, Wei-Chung Teng, Takaaki Nara. Hough Transform-Based Clock Skew Measurement by Dynamically Locating the Region of Offset Majority |
2109 | -- | 2120 | Jessada Karnjana, Masashi Unoki, Pakinee Aimmanee, Chai Wutiwiwatchai. Singular-Spectrum Analysis for Digital Audio Watermarking with Automatic Parameterization and Parameter Estimation |
2121 | -- | 2130 | Hyeongboo Baek, Jaewoo Lee, Yongjae Lee, Hyunsoo Yoon. Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems |
2131 | -- | 2139 | Shutchon Premchaisawatt, Nararat Ruangchaijatupon. The Novel Performance Evaluation Method of the Fingerprinting-Based Indoor Positioning |
2140 | -- | 2150 | Sila Chunwijitra, Chanchai Junlouchai, Sitdhibong Laokok, Pornchai Tummarattananont, Kamthorn Krairaksa, Chai Wutiwiwatchai. An Interoperability Framework of Open Educational Resources and Massive Open Online Courses for Sustainable e-Learning Platform |
2151 | -- | 2160 | Tetsuya Watanabe, Kosuke Araki, Toshimitsu Yamaguchi, Kazunori Minatani. Development of Tactile Graph Generation Web Application Using R Statistics Software Environment |
2161 | -- | 2171 | Chien-Quang Le, Sang Phan, Thanh Duc Ngo, Duy-Dinh Le, Shin'ichi Satoh, Duc Anh Duong. Human Action Recognition from Depth Videos Using Pool of Multiple Projections with Greedy Selection |
2172 | -- | 2176 | So Jin Ahn, Dae-Yon Hwang, Miyoung Kang, Jin-Young Choi. Hierarchical System Schedulability Analysis Framework Using UPPAAL |
2177 | -- | 2181 | Duc Tiep Vu, Kyungbaek Kim. Flow Clustering Based Efficient Consolidated Middlebox Positioning Approach for SDN/NFV-Enabled Network |
2182 | -- | 2185 | Hideo Fujiwara, Katsuya Fujiwara. Realization of SR-Equivalents Using Generalized Shift Registers for Secure Scan Design |
2186 | -- | 2189 | Huawei Tao, Ruiyu Liang, Cheng Zha, Xinran Zhang, Li Zhao. Spectral Features Based on Local Hu Moments of Gabor Spectrograms for Speech Emotion Recognition |
2190 | -- | 2193 | Guohao Lyu, Hui Yin, Xinyan Yu, Siwei Luo. A Local Characteristic Image Restoration Based on Convolutional Neural Network |
2194 | -- | 2198 | Jun-Sang Yoo, Ji-Hoon Choi, Kang-Sun Choi, Dae Yeol Lee, Hui-Yong Kim, Jong-Ok Kim. Fast Search of a Similar Patch for Self-Similarity Based Image Super Resolution |