Abstract is missing.
- Detection of Lurkers in Online Social NetworksFlora Amato, Aniello Castiglione, Vincenzo Moscato, Antonio Picariello, Giancarlo Sperlì. 1-15 [doi]
- Static Taint Analysis Method for Intent Injection Vulnerability in Android ApplicationsBin Xiong, Guangli Xiang, Tianyu Du, Jing (Selena) He, Shouling Ji. 16-31 [doi]
- Achieving Differential Privacy of Data Disclosure from Non-intrusive Load Monitoring in Smart GridHui Cao, Shubo Liu, Zhitao Guan, Longfei Wu, Tian Wang. 32-42 [doi]
- Protecting In-memory Data Cache with Secure Enclaves in Untrusted CloudYuxia Cheng, Qing Wu, Bei Wang, Wenzhi Chen. 43-56 [doi]
- An Anonymization Method to Improve Data Utility for ClassificationJianmin Han, Juan Yu, Jianfeng Lu, Hao Peng, Jiandang Wu. 57-71 [doi]
- A Fair Three-Party Contract Singing Protocol Based on BlockchainHui Huang, Kuan-Ching Li, Xiaofeng Chen 0001. 72-85 [doi]
- Securely Outsourcing Decentralized Multi-authority Attribute Based SignatureJiameng Sun, Jing Qin, Jixin Ma. 86-102 [doi]
- Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based EncryptionDawei Li, Jie Chen, Jianwei Liu, Qianhong Wu, Weiran Liu. 103-118 [doi]
- CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via Reversible SketchJie Li, Jinshu Su, Xiaofeng Wang, Hao Sun, Shuhui Chen. 119-134 [doi]
- Noisy Smoothing Image Source IdentificationYuying Liu, Yonggang Huang, Jun Zhang, Xu Liu, Hualei Shen. 135-147 [doi]
- Privacy-Preserving Comparable Encryption Scheme in Cloud ComputingQian Meng, Jianfeng Ma, Kefei Chen, Yinbin Miao, Tengfei Yang. 148-162 [doi]
- Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral ProfilingWeizhi Meng, Wenjuan Li, Yu Wang, Man Ho Au. 163-175 [doi]
- Two-Phase Locality-Sensitive Hashing for Privacy-Preserving Distributed Service RecommendationLianyong Qi, Wanchun Dou, Xuyun Zhang. 176-188 [doi]
- A DP Canopy K-Means Algorithm for Privacy Preservation of Hadoop PlatformTao Shang, Zheng Zhao, Zhenyu Guan, Jianwei Liu. 189-198 [doi]
- HypTracker: A Hypervisor to Detect Malwares Through System Call Analysis on ARMDong Shen, Xiaojing Su, Zhoujun Li. 199-214 [doi]
- A Fibonacci Based Batch Auditing Protocol for Cloud DataJian Shen, Jun Shen, Chen Wang, Anxi Wang. 215-222 [doi]
- A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual DistanceWenqi Shi, Xiangyang Luo, Fan Zhao, Ziru Peng, Yong Gan. 223-235 [doi]
- An Online Approach to Defeating Return-Oriented-Programming AttacksDonghai Tian, Xiaoqi Jia, Li Zhan, Changzhen Hu, Jingfeng Xue. 236-247 [doi]
- An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSALiangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi, Yu Long. 248-266 [doi]
- A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog ComputingYu Wang, Lin Xie, Wenjuan Li, Weizhi Meng, Jin Li. 267-279 [doi]
- Predicting Vulnerable Software Components Using Software Network GraphShengjun Wei, Xiaojiang Du, Changzhen Hu, Chun Shan. 280-290 [doi]
- My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against SmartbandsJun Xie, Sha Wu, Yansong Li, Jun Guo, Wen Sun, Jiajia Liu. 291-306 [doi]
- A Novel Image Encryption Scheme Using Josephus Permutation and Image FilteringBinxuan Xu, Zhongyun Hua, Hejiao Huang. 307-319 [doi]
- Modeling and Hopf Bifurcation Analysis of Benign Worms with Quarantine StrategyYu Yao, Qiang Fu, Chuan-Sheng, Wei Yang. 320-336 [doi]
- Accountable Multi-authority Ciphertext-Policy Attribute-Based Encryption Without Key Escrow and Key AbuseGang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Junjie Zeng. 337-351 [doi]
- Optimization of Cloud Workflow Scheduling Based on Balanced ClusteringLei Zhang, Dongjin Yu, Hongsheng Zheng. 352-366 [doi]
- DexPro: A Bytecode Level Code Protection System for Android ApplicationsBeibei Zhao, Zhanyong Tang, Zhen Li, Lina Song, Xiaoqing Gong, Dingyi Fang, Fangyuan Liu, Zheng Wang. 367-382 [doi]
- IP Geolocation Base on Local Delay Distribution SimilarityFan Zhao, Xiangyang Luo, Yong Gan, Shuodi Zu, Fenlin Liu. 383-395 [doi]
- Privacy Preserving Authenticating and Billing Scheme for Video Streaming ServiceXingwen Zhao, Hui Li. 396-410 [doi]
- Secure Role-Based Access Control over Outsourced EMRs Against Unwanted LeakageXingguang Zhou, Jie Chen, Zongyang Zhang, Jianwei Liu, Qianhong Wu. 411-426 [doi]
- Users' Perceived Control, Trust and Expectation on Privacy Settings of SmartphoneYun Zhou, Alexander Raake, Tao Xu, Xuyun Zhang. 427-441 [doi]
- A New Way for Extracting Region of Interest from Palmprint by Detecting Key PointsZhiqiang Gao, Yong Ding, Huiyong Wang, Jilin Wang. 442-451 [doi]
- Efficient Privacy-Preservation Multi-factor Ranking with Approximate Search over Encrypted Big Cloud DataJing He, Yiming Wu, Guangli Xiang, Zhendong Wu, Shouling Ji. 452-459 [doi]
- Cloud Data Integrity Checking with Deduplication for Confidential Data StorageHongyu Liu, Leiting Chen, Liyao Zeng. 460-467 [doi]
- Supporting User Authorization Queries in RBAC Systems by Role-Permission ReassignmentJianfeng Lu, Yun Xin, Hao Peng, Jianmin Han, Feilong Lin. 468-476 [doi]
- An Information Theory Based Approach for Identifying Influential Spreaders in Temporal NetworksLiang Luo, Li Tao, Hongyi Xu, Zhenyun Yuan, Hong Lai, Zili Zhang. 477-484 [doi]
- TICS: Trusted Industry Control System Based on Hardware Security ModuleYu Qin, Yingjun Zhang, Wei Feng. 485-493 [doi]
- On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference ApproachChao Shen, Ziqiang Ren, Yufei Chen, Zhao Wang. 494-502 [doi]
- An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic EncryptionHuiyong Wang, Yong Ding, Shijie Tang, Jilin Wang. 503-512 [doi]
- An Improved Authentication Scheme for the Integrated EPR Information SystemPei Wang, Hua Guo, Yuanfei Huang. 513-522 [doi]
- KGBIAC: Knowledge Graph Based Intelligent Alert Correlation FrameworkWei Wang, Rong Jiang, Yan Jia, Aiping Li, Yi Chen. 523-530 [doi]