460 | -- | 474 | Wan-Li Lyu, Chin-Chen Chang 0001, Feng Wang 0020. Image Authentication and Self-Recovery Scheme Based on The Rehashing Model |
475 | -- | 488 | Hongfeng Zhu, Dan Zhu, Yifeng Zhang, Yan Zhang. A Novel On-Demand Password Scheme Based on BAN Logic |
489 | -- | 498 | Hejin Yuan, Chunhong Duo, Wei-hua Niu. A Human Behavior Recognition Method Based on Latent Semantic Analysis |
499 | -- | 509 | Lian-Lei Lin, Yang Wu, Gang Wang. A Simulation Method of Atmospheric Turbulence Based on Von Karman Model |
510 | -- | 520 | Jiaqi Zhen, Zhifang Wang, Bing Zhao, Linlin Tang. A Novel Super-Resolution Direction Finding Method for Wideband Signals Based on Multiple Small Aperture Subarrays |
521 | -- | 529 | Lin Liu, Fumin Zou. Research on the Data Collection Methods for Pavement Maintenance Based on the Internet of Vehicles |
530 | -- | 542 | Zhengwei Zhang, Lifa Wu, Haiguang Lai, Huabo Li, Chenghui Zheng. Double Reversible Watermarking Algorithm for Image Tamper Detection |
543 | -- | 557 | Chen Cui, Shen Wang 0004, Xiamu Niu. A Robust Depth-Image-Based-Rendering 3D Image Hashing Scheme Based on Histogram Shape |
558 | -- | 568 | Xin-Ling Guo, Zhe-Ming Lu. Urban Road Network and Taxi Network Modeling Based on Complex Network Theory |
569 | -- | 575 | Xiao Chen, Zhe-Ming Lu. Protection on Complex Networks with Geometric and Scale-Free Properties |
576 | -- | 586 | Qi Zhang, Yuchao Guo, Wangshu Li, Qun Ding. Image Encryption Method Based on Discrete Lorenz Chaotic Sequences |
587 | -- | 598 | Mingqian Wang, Xianfeng Liu, Wei-jie Gu. A DWT-Based Covert Timing Channel of High Concealment |
599 | -- | 609 | Feng-Cheng Chang, Hsiang-Cheh Huang. Reversible Data Hiding with Difference Prediction and Content Characteristics |
610 | -- | 619 | Lifei Zhan, Yuesheng Zhu, Zhiwei Mo. An Image Splicing Detection Method Based on PCA Minimum Eigenvalues |
620 | -- | 628 | Qingzhu Wang, Wanjun Kang. Lossy Compression for Compressive Sensing of Three-Dimensional Images |
629 | -- | 636 | Nong Si, Ke-bin Jia. One Communication Key Udate with Whitelist Attribute in SCADA System |
637 | -- | 644 | Nan Jia, Songyan Liu, Qun Ding, Shangru Wu, Xuming Pan. A New Method of Encryption Algorithm Based on Chaos and ECC |
645 | -- | 652 | Jia Zhao 0001, Li Lv, Hui Wang 0002, Dekun Tan, Jun Ye, Hui Sun, Yin-Tai Hu. Artifcial Bee Colony Based on Special Central and Adapt Number of Dimensions Learning |
653 | -- | 658 | Wei-Liang Tai, Ya-Fen Chang, Ti-Sheng Kwang. An Efficient Improvement on Safkhani et al.'s Hash-based Mutual Authentication Protocol for RFID Systems |
659 | -- | 673 | Meiling Li, Anhong Wang, Gang-Fei Wang. An Analysis Model for OFDMA-Based Inter-cell Interference |