153 | -- | 161 | Osama Hosam, Muhammad Hammad Ahmad. Hybrid design for cloud data security using combination of AES, ECC and LSB steganography |
162 | -- | 168 | Yongkai Fan, Shengle Liu, Gang Tan, Xiaodong Lin. CSCAC: one constant-size CPABE access control scheme in trusted execution environment |
169 | -- | 176 | Huan Zhao, Xiaoxiao Zhou, Yufeng Xiao. Recognising continuous emotions in dialogues based on DISfluencies and non-verbal vocalisation features for a safer network environment |
177 | -- | 188 | Zeyu Sun, Guozeng Zhao, Xiaoyan Pan. PM-LPDR: a prediction model for lost packets based on data reconstruction on lossy links in sensor networks |
189 | -- | 196 | Fang Wang, Renjun Feng, Haiyan Chen, Wen Wu, Fei Zhu. An information network security policy learning algorithm based on Sarsa with optimistic initial values |
197 | -- | 205 | Sen Zhang, Yuping Hu, Chunmei Wang. Evaluation of borrower's credit of P2P loan based on adaptive particle swarm optimisation BP neural network |
206 | -- | 214 | Guo-Sheng Zhou, Wei Du, Han-Chao Lin, Xiao-Wei Yan. An approach for public cloud trustworthiness assessment based on users' evaluation and performance indicators |
215 | -- | 222 | Dongfang Li, Qiuyan Zhu, Hong Wang, Wenchao Liu, Zhihua Feng, Jianwei Zhang. A novel computational model for SRAM PUF min-entropy estimation |
223 | -- | 232 | Xueshan Yu, Dezhi Han, Zhenxin Du, Qiuting Tian, Gongjun Yin. Design of DDoS attack detection system based on intelligent bee colony algorithm |
233 | -- | 241 | Qiuting Tian, Dezhi Han, XingAo Liu, Xueshan Yu. LWE-based multi-authority attribute-based encryption scheme with hidden policies |
242 | -- | 250 | Wei Zhu, Osama Hosam, Xiaodong Zheng. A secure hierarchical community detection algorithm |
251 | -- | 258 | Bo Deng. Efficient security credential management for named data networking |
259 | -- | 273 | Xin Su 0004, Yi Zheng, Jiuchuan Lin, Xuchong Liu. A network traffic-aware mobile application recommendation system based on network traffic cost consideration |
274 | -- | 283 | Soundes Belkacem, Larbi Guezouli, Samir Zidat. Pseudo Zernike moments-based approach for text detection and localisation from lecture videos |
284 | -- | 292 | Chuanrong Wu, Evgeniya Zapevalova, Deming Zeng. Optimisation model of price changes after knowledge transfer in the big data environment |
293 | -- | 300 | Xiao-Zhang Liu, Hang-yu Ruan. Kernel-based tensor discriminant analysis with fuzzy fusion for face recognition |
301 | -- | 310 | Qingtang Su. A blind image watermarking algorithm based on amalgamation domain method |