Abstract is missing.
- Sentiment Analysis Based Online Restaurants Fake Reviews Hype DetectionXiaolong Deng, Runyu Chen. 1-10 [doi]
- A Hybrid Method of Sentiment Key Sentence Identification Using Lexical Semantics and Syntactic DependenciesChong Feng, Chun Liao, Zhirun Liu, Heyan Huang. 11-22 [doi]
- Influence Maximization in Independent Cascade Model with Limited Propagation DistanceShunming Lv, Li Pan. 23-34 [doi]
- Online Social Network Model Based on Local Preferential AttachmentYang Yang, Shuyuan Jin, Yang Zuo, Jin Xu. 35-46 [doi]
- Temporal Curve Patterns Discovery of Information in BBSYanyu Yu, Yue Hu, Ge Li. 47-57 [doi]
- Understanding Popularity Evolution Patterns of Hot Topics Based on Time Series FeaturesChangjun Hu, Ying Hu, Wenwen Xu, Peng Shi, Shushen Fu. 58-68 [doi]
- VxBPEL_ODE: A Variability Enhanced Service Composition EngineChang-ai Sun, Pan Wang, Xin Zhang, Marco Aiello. 69-81 [doi]
- Predicting User Likes in Online Media Based on Conceptualized Social Network ProfilesQiang Liu, Yuanzhuo Wang, Jingyuan Li, Yantao Jia, Yan Ren. 82-92 [doi]
- Demographic Prediction of Online Social Network Based on Epidemic ModelXiang Zhu, Yuanping Nie, Aiping Li. 93-103 [doi]
- Analysis on Chinese Microblog Sentiment Based on Syntax Parsing and Support Vector MachineZiyan Su, Bin Zhou, Aiping Li, Yi Han. 104-114 [doi]
- A Parallel and Scalable Framework for Non-overlapping Community Detection AlgorithmsSongchang Jin, Yuchao Zhang, Yuanping Nie, Xiang Zhu, Hong Yin, Aiping Li, Shuqiang Yang. 115-126 [doi]
- Microblog Sentiment Analysis Model Based on EmoticonsShaojie Pei, Lumin Zhang, Aiping Li. 127-135 [doi]
- Detect and Analyze Flu Outlier Events via Social NetworkQuanquan Fu, Changjun Hu, Wenwen Xu, Xiao He, TieShan Zhang. 136-147 [doi]
- An Advanced Spam Detection Technique Based on Self-adaptive Piecewise Hash AlgorithmJunxing Zhu, Aiping Li. 148-157 [doi]
- DNFStore: A Distributed Netflow Storage System Supports Fast RetrievalFengguang Gong, Wenting Huang, Hao Luo, Hailong Zhu. 158-166 [doi]
- A Novel Road Topology-aware Routing in VANETsHongli Zhang, Qiang Zhang. 167-176 [doi]
- Toward Identifying and Understanding User-Agent Strings in HTTP TrafficYe Xu, Gang Xiong, Yong Zhao, Li Guo. 177-187 [doi]
- Cloud-Oriented SAT Solver Based on Obfuscating CNF FormulaYing Qin, ShengYu Shen, Jingzhu Kong, Huadong Dai. 188-199 [doi]
- The Improved AC High-Performance Pattern-Matching Algorithm for Intrusion DetectionDongliang Xu, Hongli Zhang, Miao Hou. 200-213 [doi]
- The Research of Partitioning Model Based on Virtual Identity DataLu Deng, Weihong Han, Aiping Li, Yong Quan. 214-224 [doi]
- Implemention of Cyber Security Situation Awareness Based on Knowledge Discovery with Trusted ComputerJiemei Zeng, Xuewei Feng, Dongxia Wang, Lan Fang. 225-234 [doi]
- NNSDS: Network Nodes' Social Attributes Discovery System Based on NetflowShuo Mao, Zhigang Wu, Bo Sun, Shoufeng Cao, Xiongjie Du, Kaifeng Wang. 235-245 [doi]
- A Survey of Network Attacks Based on Protocol VulnerabilitiesGang Xiong, Jiayin Tong, Ye Xu, Hongliang Yu, Yong Zhao. 246-257 [doi]
- Evaluation Scheme for Traffic Classification SystemsYong Zhao, Yuan Yuan, Yong Wang, Yao Yao, Gang Xiong. 258-264 [doi]
- Winnowing Multihashing Structure with Wildcard QueryYichen Wei, Xu Fei, Xiaojun Chen, Jinqiao Shi, Sihan Qing. 265-281 [doi]
- Efficient IEEE 802.15.4 AHB Slave of Security Accelerator in Wireless Senor NetworksRui Chen, Lan Chen, Ying Li. 282-290 [doi]
- A Survey of Role Mining Methods in Role-Based Access Control SystemLiang Fang, Yunchuan Guo. 291-300 [doi]
- A Modified-k-Anonymity Towards Spatial-Temporal Historical Data in Location-Based Social Network ServiceChao Lee, Lihua Yin, Lan Dong. 301-311 [doi]
- A General Framework of Nonleakage-Based Authentication Using CSP for the Internet of ThingsLicai Liu, Bingxing Fang, Beiting Yi. 312-324 [doi]
- A Security Routing Mechanism against Sybil Attacks in Mobile Social NetworksYan Sun, Lihua Yin. 325-332 [doi]
- Attribute-Role-Based Hybrid Access Control in the Internet of ThingsKaiwen Sun, Lihua Yin. 333-343 [doi]
- A Dynamic Feature-Based Security Detector in Wireless Sensor Network TransceiverXin Tong, Jikang Xia, Lan Chen, Ying Li. 344-352 [doi]
- A Highly Adaptable Reputation System Based on Dirichlet DistributionXia Xiao, Lan Chen, Ying Li. 353-364 [doi]
- Research on Covert Channels Based on Multiple NetworksDongyan Zhang, Pingxin Du, Zhiwen Yang, Lan Dong. 365-375 [doi]
- Detecting Insider Threat Based on Document Access Behavior AnalysisRui Zhang, Xiaojun Chen, Jinqiao Shi, Fei Xu, Yiguo Pu. 376-387 [doi]
- Enhanced Sample Selection for SVM on Face RecognitionXiaofei Zhou, Wenhan Jiang, Jianlong Tan. 388-401 [doi]