1 | -- | 16 | Kun Niu, Changgen Peng, Youliang Tian, Weijie Tan. K -implicit Tracking Data Publishing Scheme against Geo-matching Attacks |
17 | -- | 39 | Qinghua Zhu 0001, Jiajie Huang, Yan Hou. Multi-objective Scheduling of Cloud Data Centers Prone to Failures |
41 | -- | 56 | Priyanka Kumari, Sudip Kumar Sahana. PSO-DQ: An Improved Routing Protocol Based on PSO using Dynamic Queue Mechanism for MANETs |
57 | -- | 82 | Kang Xiang, Youliang Tian, Sheng Gao, Changgen Peng, Weijie Tan. Game-based Theory Rational Delegation Learning Scheme |
83 | -- | 100 | Samir Berrani, Ali Yachir, Saïd Mahmoudi, Badis Djamaa, Mohamed Aissani. Towards a New Semantic Model for Service-Based IoT Applications |
101 | -- | 120 | Pankaj Kumar Mishra, Shashi Kant Verma. ABCRF: Atomic Bond Connectivity Based Range Optimized Fuzzy Clustering Algorithm for WSN |
121 | -- | 138 | Liang Zhu, Liping Yu, Zengyu Cai, Xiaowei Liu, Jianwei Zhang. K -Anonymous Based Anti-Positioning Security Strategy in Mobile Networks |
139 | -- | 164 | Zhao Li, Yuyu Hu, Zhendong Hu, Jingling Li, Shitong Zhu, Yang Xu. Incremental-Compensation based Low-Cost Offline Robust Topology Control for Micro/Nano Satellite Network |
165 | -- | 183 | Jiuren Qin, Kai Gao, Lujie Zhong, Shujie Yang. Q-Learning based and Energy-Aware Multipath Congestion Control in Mobile Wireless Network |
185 | -- | 205 | Hsiu-Chuan Huang, Zhi-Kai Zhang, Chung-Kuan Chen, Wei-da Hong, Jui-Chien Jao, Shiuhpyng Shieh. Adaptive Entry Point Discovery for Web Vulnerability Scanning |
207 | -- | 221 | Rashmeet Toor, Inderveer Chana. DIDACE: Literature Mining and Exploration of Disease-Diet Associations |
223 | -- | 251 | Fan Guo, Jun-Feng Qiu, Jin Tang, Weiqing Li. Traffic Image Dehazing Using Sky Segmentation and Color Space Conversion |
253 | -- | 271 | Hao-Chiang Shao, Lu-Hung Hsu, Yung-Chang Chen, Ying-Chu Huang, Shih-Ting Huang. Drosophila Brain Aligner: Registering 3D Point Clouds in 2D Parameterization Domain |