Journal: IJCSE

Volume 19, Issue 2

153 -- 161Osama Hosam, Muhammad Hammad Ahmad. Hybrid design for cloud data security using combination of AES, ECC and LSB steganography
162 -- 168Yongkai Fan, Shengle Liu, Gang Tan, Xiaodong Lin. CSCAC: one constant-size CPABE access control scheme in trusted execution environment
169 -- 176Huan Zhao, Xiaoxiao Zhou, Yufeng Xiao. Recognising continuous emotions in dialogues based on DISfluencies and non-verbal vocalisation features for a safer network environment
177 -- 188Zeyu Sun, Guozeng Zhao, Xiaoyan Pan. PM-LPDR: a prediction model for lost packets based on data reconstruction on lossy links in sensor networks
189 -- 196Fang Wang, Renjun Feng, Haiyan Chen, Wen Wu, Fei Zhu. An information network security policy learning algorithm based on Sarsa with optimistic initial values
197 -- 205Sen Zhang, Yuping Hu, Chunmei Wang. Evaluation of borrower's credit of P2P loan based on adaptive particle swarm optimisation BP neural network
206 -- 214Guo-Sheng Zhou, Wei Du, Han-Chao Lin, Xiao-Wei Yan. An approach for public cloud trustworthiness assessment based on users' evaluation and performance indicators
215 -- 222Dongfang Li, Qiuyan Zhu, Hong Wang, Wenchao Liu, Zhihua Feng, Jianwei Zhang. A novel computational model for SRAM PUF min-entropy estimation
223 -- 232Xueshan Yu, Dezhi Han, Zhenxin Du, Qiuting Tian, Gongjun Yin. Design of DDoS attack detection system based on intelligent bee colony algorithm
233 -- 241Qiuting Tian, Dezhi Han, XingAo Liu, Xueshan Yu. LWE-based multi-authority attribute-based encryption scheme with hidden policies
242 -- 250Wei Zhu, Osama Hosam, Xiaodong Zheng. A secure hierarchical community detection algorithm
251 -- 258Bo Deng. Efficient security credential management for named data networking
259 -- 273Xin Su 0004, Yi Zheng, Jiuchuan Lin, Xuchong Liu. A network traffic-aware mobile application recommendation system based on network traffic cost consideration
274 -- 283Soundes Belkacem, Larbi Guezouli, Samir Zidat. Pseudo Zernike moments-based approach for text detection and localisation from lecture videos
284 -- 292Chuanrong Wu, Evgeniya Zapevalova, Deming Zeng. Optimisation model of price changes after knowledge transfer in the big data environment
293 -- 300Xiao-Zhang Liu, Hang-yu Ruan. Kernel-based tensor discriminant analysis with fuzzy fusion for face recognition
301 -- 310Qingtang Su. A blind image watermarking algorithm based on amalgamation domain method