Abstract is missing.
- Collusion Resistant Multi-Matrix Masking for Privacy-Preserving Data CollectionSamuel S. Wu, Shigang Chen, Abhishek Bhattacharjee, Ying He. 1-7 [doi]
- Experiments of Posture Estimation on Vehicles Using Wearable Acceleration SensorsYoji Yamato. 14-17 [doi]
- Security Patterns from Intelligent Data: A Map of Software Vulnerability AnalysisJinan Sun, Kefeng Pan, XueFeng Chen, Junfu Zhang. 18-25 [doi]
- Adaptive Audio Steganography Scheme Based on Wavelet Packet EnergyHanlin Liu, Jingju Liu, RongGui Hu, Xuehu Yan, Song Wan. 26-31 [doi]
- Participants Increasing for Shamir's Polynomial-Based Secret Image Sharing SchemeWanmeng Ding, Kesheng Liu, Lintao Liu, Xuehu Yan. 32-36 [doi]
- Breaking Two Remote User Authentication Systems for Mobile DevicesWenting Li, Qianchen Gu, Yiming Zhao, Ping Wang 0003. 37-42 [doi]
- Research on Building the Credibility Evaluation's Indicator System of Cloud End User's BehaviorRuilan Yang, Xuejun Yu. 43-47 [doi]
- Data Loss and Reconstruction for Wireless Environmental Sensor NetworksTing Bao, Zhangqin Huang, Da Li 0004. 48-52 [doi]
- Secure Multiparty Computation of Chi-Square Test Statistics and Contingency CoefficientsSun-Kyung Hong, Hajin Kim, Sanghun Lee, Yang-Sae Moon. 53-56 [doi]
- PBI: A Path-Based Bitmap Index for Efficient Process Analysis in Cloud Computing EnvironmentLinqing Yang, Shun Li, Wei Chen 0021, Kai Lei, Tengjiao Wang 0003. 57-62 [doi]
- Inhibiting Browser Fingerprinting and TrackingSakchan Luangmaneerote, Ed Zaluska, Leslie Carr. 63-68 [doi]
- A Novel Unsupervised Anomaly Detection Approach for Intrusion Detection SystemWeiwei Chen, Fangang Kong, Feng Mei, Guiqin Yuan, Bo Li 0005. 69-73 [doi]
- An Application Deployment Approach Based on Hybrid CloudFengtao Huang, Hao Li, Zhihao Yuan, Xian Li. 74-79 [doi]
- A Proxy Based Connection Mechanism for Hybrid Cloud Virtual NetworkShouming Chen, Yang Qian, Xiaoyu Zang, Rui Peng. 80-85 [doi]
- Secret Image Sharing Based on Error-Correcting CodesXuehu Yan, Yuliang Lu, Yuxin Chen, Canju Lu, Benmu Zhu, Qinglei Liao. 86-89 [doi]
- Towards Analyzing MongoDB NoSQL Security and Designing Injection Defense SolutionBoyu Hou, Yong Shi 0002, Kai Qian, Lixin Tao. 90-95 [doi]
- Research of XML-Based Web Report SystemKun Liang, Yujun Li, Jinghong Duan, Yiming Wang. 96-100 [doi]
- An Optimal Fully Homomorphic Encryption SchemeKeke Gai, Meikang Qiu. 101-106 [doi]
- Research on a Simulation Period Reference Model and Its General Description LanguageYu Huang 0004, Juntao Li, Wenhui Hu, Xueyang Liu. 107-111 [doi]
- New Steganography Scheme to Conceal a Large Amount of Secret Messages Using an Improved-AMBTC Algorithm Based on Hybrid Adaptive Neural NetworksYahya E. A. Al-Salhi, Songfeng Lu. 112-121 [doi]
- Under the Vision of the Big Data: The Internal Causes of Economic TransformationZhao Jing, Chen Ming. 122-126 [doi]
- A Review on Behavior-Based Detection for Network ThreatsXin Sun, Zixiang Wang, Bang Lv, Jing Ou. 127-132 [doi]
- Study on REST API Test Model Supporting Web Service IntegrationWenhui Hu, Yu Huang, Xueyang Liu, Chen Xu. 133-138 [doi]
- Recognition of Information Leakage of Computer via Conducted Emanations on the Power LineShanjing Yang, Xiaoyong Liao, Jianlin Hu, Weiqing Huang. 139-144 [doi]
- Study on Data Security Policy Based on Cloud StorageZhe Diao, Qinghong Wang, Naizheng Su, Yuhan Zhang. 145-149 [doi]
- Towards Formalizing of MapReduceYuxin Jing, Hanpin Wang, Yu Huang 0004, Lei Zhang, Yongzhi Cao. 150-155 [doi]
- Design of an Event Based Multi Processors Communication SystemMete Kart, Ensar Gul, Murat Ture. 156-159 [doi]
- Using Locality-Enhanced Distributed Memory Cache to Accelerate Applications on High Performance ComputersJie Yu, Guangming Liu, Wenrui Dong, Xiaoyong Li 0002. 160-166 [doi]
- Intelligent Transportation System(ITS): Concept, Challenge and OpportunityYangxin Lin, Ping Wang 0003, Meng Ma. 167-172 [doi]
- A Power and Performance Aware Routing Algorithm for Fat Tree NetworksYongqiang Gao, Lei Yu. 173-178 [doi]
- Energy-Efficient Task Scheduling and Synchronization for Multicore Real-Time SystemsJun Wu, Xu-Jia Hong. 179-184 [doi]
- A Storm-Based Tag Cloud Platform for Multiple SNS UsersSiwoon Son, Dasol Kim, Myeong-Seon Gil, Yang-Sae Moon. 185-189 [doi]
- Data and Decision Intelligence for Internet of Things: Putting Human in the LoopMeng Ma, Weilan Lin, Disheng Pan, Ping Wang, Yuchen Zhou, Xiaoxing Liang. 190-195 [doi]
- Implementation of Ant Colony Optimization Combined with Tabu Search for Multi-resource Fair Allocation in Heterogeneous Cloud ComputingXi Liu, Xiaolu Zhang, Qianna Cui, Weidong Li. 196-201 [doi]
- A Process Model for XBRL Taxonomy DevelopmentBiao Wang, Ding Wang. 202-206 [doi]
- Joint Computing and Storage Resource Allocation Based on Stable Matching in Data CentersQiao Chu, Lin Cui 0001, Yuxiang Zhang 0007. 207-212 [doi]
- A Dynamic Memory Allocation Approach for Virtualization PlatformsJun Wu, Shou-Liang Sun. 213-218 [doi]
- Model Based Energy Consumption Analysis of Wireless Cyber Physical SystemsJing Liu, Ping Wang, Jinlong Lin, Chao-Hsien Chu. 219-224 [doi]
- Optimizing Task Assignment with Minimum Cost on Heterogeneous Embedded Multicore Systems Considering Time ConstraintHua Zheng, Xi Zhang. 225-230 [doi]
- Ambiguous Multi-symmetric Cryptography Proof of Concept and ExperimentsRichard Bassous, Huirong Fu, Ye Zhu 0001. 231-236 [doi]
- Web Application Security Tools AnalysisAbdulrahman Alzahrani, Ali Alqazzaz, Ye Zhu 0001, Huirong Fu, Nabil Almashfi. 237-242 [doi]
- Location Privacy, Application Overhead and Congestion in VANET Location Based ServicesGeorge P. Corser, Abdelnasser Banihani, Johnathan Cox, Risalatul Hoque, Huirong Fu, Ye Zhu 0001. 243-248 [doi]
- Online Map-Matching Algorithm Using Object Motion LawsWei Kang, Shun Li, Wei Chen 0001, Kai Lei, Tengjiao Wang. 249-254 [doi]
- A Taxi Gap Prediction Method via Double Ensemble Gradient Boosting Decision TreeXiao Zhang, Xiaorong Wang, Wei Chen 0021, Jie Tao, Weijing Huang, Tengjiao Wang 0003. 255-260 [doi]
- Efficient Event Log Mining with LogClusterCChen Zhuge, Risto Vaarandi. 261-266 [doi]
- On Scaling and Accelerating Decentralized Private BlockchainsWei Xin, Tao Zhang, Chengjian Hu, Cong Tang, Chao Liu, Zhong Chen. 267-271 [doi]
- A Method for Hybrid Bayesian Network Structure Learning from Massive Data Using MapReduceShun Li, Biao Wang. 272-276 [doi]
- RealID: Building A Secure Anonymous Yet Transparent Immutable ID ServiceYixuan Zhu, Zhixiong Chen. 277-280 [doi]