Abstract is missing.
- SIRS Model and Stability Based on Open Cyber EcosystemXin Hu, Gang Wang, Hongtao Qin, Runnian Ma. 1-4 [doi]
- Routing the Cyber-Attack Path with the Bayesian Network Deducing ApproachYingying Huangfu, Liang Zhou, Chenming Yang. 5-10 [doi]
- Differential Privacy Data Protection Method Based on ClusteringLi-Xin Li, Yong-Shan Ding, Jia-Yan Wang. 11-16 [doi]
- Analyzing and Recognizing Android Malware via Semantic-Based Malware GeneJin Han, Rongcai Zhao, Zhen-shan, Fudong Liu, Bingling Zhao, Xi Meng, Hongyan Wang. 17-20 [doi]
- CENTRA: CENtrally Trusted Routing vAlidation for IGPHao Zeng, Baosheng Wang, Wenping Deng, Xianming Gao. 21-24 [doi]
- Social Engineering and Insider ThreatsXiangyu Liu, Qiuyang Li, Sonali Chandel. 25-34 [doi]
- Differential-Privacy-Based Correlation Analysis in Railway Freight Service ApplicationsYajuan Shi, Chunhui Piao, Li-Juan Zheng. 35-39 [doi]
- Evaluating Features and Effectiveness of Secure QR Code ScannersRishabh Dudheria. 40-49 [doi]
- A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense ArchitectureWenyan Liu, Fucai Chen, Hongchao Hu, Guozhen Cheng, Shumin Huo, Hao Liang. 50-53 [doi]
- Resist the Database Intrusion Caused by Functional DependencyJingwen Wang, Jie Yang, Fen Guo, HuaQing Min. 54-57 [doi]
- A New Chosen IV Statistical Attack on Grain-128a CipherVahid Amin Ghafari, Honggang Hu. 58-62 [doi]
- Performance Analysis of Turbo Code and Trellis BICM-ID on PNC over Impulsive ChannelYuanyi Zhao. 63-71 [doi]
- An IPv6-based Load Balancing Strategy for Ecological Monitoring NetworkXiaojun Xiao, Wanming Luo. 72-79 [doi]
- 6LoWPAN Hierarchical Cluster Routing ProtocolXiaojun Xiao, Wanming Luo. 80-83 [doi]
- Design and Implementation of the Prototype of High-Available Distributed Communication SystemXiang Gao, Guanghui Li. 84-88 [doi]
- Energy-Efficient and Fair Power Allocation Approach for NOMA in Ultra-Dense Heterogeneous NetworksLanhua Xiang, Hongbin Chen. 89-94 [doi]
- P&D Graph Cube: Model and Parallel Materialization for Multidimensional Heterogeneous NetworkXinyu Wu, Bin Wu, Bai Wang. 95-104 [doi]
- Measurement and Evaluation for Docker Container NetworkingHao Zeng, Baosheng Wang, Wenping Deng, Weiqi Zhang. 105-108 [doi]
- POPBrick: A High-Elasticity, Reconfigurable Network Infrastructure to Support POP ApplicationsHao Zeng, Xianming Gao, Baosheng Wang. 109-112 [doi]
- Time-Domain Greedy Heuristic Approximation Algorithm for Multi-channel Assignment in Wireless Mesh NetworkWei Wei Zhang, Jia-feng He, Guo-wang Gao, Li-li Ren, ShenXuan Jing. 113-117 [doi]
- JPEG Image Security by Block Size Estimation and Quality Factor ClassificationMasoud Attarifar, Mohammadamin Baniasadi. 118-121 [doi]
- Image Hiding Algorithm Based on Secure Steganography MechanismLian Zhao, Yingzhou Zhang, Xing Wang, Xinghao Chen. 122-129 [doi]
- Real Time Target Tracking Scale Adaptive Based on LBP Operator and Nonlinear MeanshiftZhenghua Shu, Guodong Liu, Zhihua Xie. 130-133 [doi]
- Geomagnetic Fingerprint Maps for Indoor PositioningXiaolong Xu, Licheng Lin. 134-141 [doi]
- SigRA: A New Similarity Computation Method in Recommendation SystemXiaokun Wu, Yongfeng Huang. 148-154 [doi]
- Dead Code Detection Method Based on Program SlicingXing Wang, Yingzhou Zhang, Lian Zhao, Xinghao Chen. 155-158 [doi]
- A Faster without Scarifying Accuracy Online Decomposition Approach for Higher-Order TensorsYiwei Xu, Yonggen Gu, Duc Minh Quan Do, Hongtianchen Xie, Lunke Qing. 159-166 [doi]
- Searching BWT against Pattern Matching Machine to Find Multiple String MatchesYangjun Chen, Yujia Wu. 167-176 [doi]
- Fault Data Diagnosis of Energy Consumption Equipment for Urban Rail Transit Based on ART2 ModelJinbing Ha, Yunping Yu. 177-181 [doi]
- Recognize Facial Expression Using Active Appearance Model and Neural NetworkTaihao Li, Jianshe Zhou, Naren Tuya, Cuifen Du, Zhiqiang Chen, Shupeng Liu. 182-185 [doi]
- Test-Suite Reduction Based on K-Medoids Clustering AlgorithmFeng Liu, Jun Zhang, Erzhou Zhu. 186-192 [doi]
- The Keyword Extraction of Chinese Medical Web Page Based on WF-TF-IDF AlgorithmPeng Sun, Lihua Wang, Qianchen Xia. 193-198 [doi]
- Selection Strategy of Nodes with the Greatest Influence on Community StructurePo Yang, Xuebin Ma. 199-205 [doi]
- Multi-label Classification Using Random Walk with RestartJinhong Liu, Juan Yang. 206-212 [doi]
- Internet Traffic Analysis Using Community Detection and Apache SparkJiake Ni, WeiTao Weng, Jiayu Chen, Kai Lei. 213-219 [doi]
- A Method of Building Fault Repository for Cloud InfrastructureQingfeng Du, Yue Tian, Tiandi Xie, Kanglin Yin, Juan Qiu. 220-228 [doi]
- A Novel Attribute Based Keyword Search Scheme for Mobile Cloud StorageLei Sun, Hang Su, Zhiqiang Zhu, Zuohui Li. 229-234 [doi]
- Public Auditing Scheme of Dynamic Data Sharing Suiting for Cloud-Based EHR SystemJianhong Zhang, Hao Xiao. 235-243 [doi]
- Cloud Computing Security Threats and Attacks with Their Mitigation TechniquesAmara Naseer, Zhiqui Huang, Ali Awais. 244-251 [doi]
- Implementation of Subject Recommendation and Practice System for Mobile Terminal UsersZhichao Song, Xiangyu Bai, Haodong Bian. 252-257 [doi]
- VM Reliability Modeling and Analysis for IaaS CouldQingfeng Du, Huan Li, Kanglin Yin, Juan Qiu. 258-265 [doi]
- ActiRecognizer: Design and Implementation of a Real-Time Human Activity Recognition SystemLiang Cao, Yufeng Wang, Qun Jin, Jianhua Ma. 266-271 [doi]
- MCSMGS: Malware Classification Model Based on Deep LearningXi Meng, Zhen-shan, Fudong Liu, Bingling Zhao, Jin Han, Hongyan Wang, Jing Wang. 272-275 [doi]
- A Zero-Watermarking Scheme for Prose WritingsYingjie Meng, Huiran Liu, Tong Shang, Xiaoyu Teng. 276-282 [doi]
- Implementation and Performance Optimization of Dynamic Random ForestXiaolong Xu, Wen Chen. 283-289 [doi]
- Congestion Prediction for Urban Areas by Spatiotemporal Data MiningLihua Wang, Zijun Zhou. 290-297 [doi]
- Improving the Forecasting Accuracy of Civil Aviation Passengers Based on Machine Learning ModelsXia Liu, Xia Huang, Lei Chen, Zhao Qiu, Mingrui Chen. 298-304 [doi]
- Wearable Social Sensing and Its Application in Anxiety AssesmentJun Gu, Bin Gao, Yuanpeng Chen, Long Jiang, Zhao Gao, Xiaole Ma, Yong Ma, Wai Lok Woo. 305-308 [doi]
- Topic Crawler for OpenStack QA Knowledge BaseJuan Qiu, Qingfeng Du, Wei Wang, Kanglin Yin, Changsheng Lin, Chongshu Qian. 309-317 [doi]
- A Recommendation System Based on Text MiningDongchen Miao, Fei Lang. 318-321 [doi]
- A Chinese Text Corrector Based on Seq2Seq ModelSunyan Gu, Fei Lang. 322-325 [doi]
- A Binary-Classification Method Based on Dictionary Learning and ADMM for Network Intrusion DetectionXiu Yin, Yingzhou Zhang, Xinghao Chen. 326-333 [doi]
- Research on Correlation Models Between QoS and Application Layer QoE in IoT-NDN EnvironmentWenjing Sun, Song Jin, Ruide Li, Yangyang Li, Qianru Yang, Ning Cao. 334-337 [doi]
- Forecasting Maturity of IoT Technologies in Top 5 Countries Using Bibliometrics and Patent AnalysisSanju Lokuhitige, Suzana Brown. 338-341 [doi]
- Trust and Attribute-Based Dynamic Access Control Model for Internet of ThingsJunshe Wang, Han Wang, Hongbin Zhang, Ning Cao. 342-345 [doi]
- An IoT Application-Layer Protocol Modem: A Case Study on Interfacing IEEE 1888 with AT CommandsZhiqing Zhang, Hideya Ochiai, Hiroshi Esaki. 346-349 [doi]
- A Study on Smart Monitoring and Management of Track Running Self-Testing System Based on Internet of ThingsHuiyang Sun, Hongjun Li, Yuanyuan Zhang, Wanmin Zhang. 350-353 [doi]
- Internet of Things for Ambient Assisted Living: Challenges and Future OpportunitiesJie Wan, Xiang Gu, Liang Chen, Jin Wang 0005. 354-357 [doi]
- Mobile RFID Mutual Authentication Protocol Based on Hash FunctionWenjin Yu, Yixiang Jiang. 358-361 [doi]
- A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor NetworksAlexander S. Basan, Elena Basan, Oleg B. Makarevich. 369-372 [doi]
- A Demand-Aware Transmission Optimization Control Scheme Based on Multichannel CoordinationHaitao Zhao, Kaiqiang Gao, Mengkang Zhang, Dapeng Li, Hongbo Zhu. 373-377 [doi]
- A Survey of Recent Achievements for Wireless Sensor Networks TestbedsJunyan Ma, Jin Wang, Te Zhang. 378-381 [doi]
- Content Delivery Routing Strategy Based on Energy Constraint in MDTN-CCN Integrated NetworkNa Dang, Xiangyu Bai, Haodong Bian. 382-390 [doi]
- Research on Time Synchronization Technology of Wireless Sensor NetworkChunqiang Liu, Haijie Pang, Ning Cao. 391-394 [doi]
- An Auxiliary Blind Guide System Based on Multi-sensor Data FusionYufang Huang, Yi Lin, Rongzhen Miao. 395-398 [doi]
- Analysis of the Approach to Predict Different Routing Protocols in WSNsNing Cao, Yuanyuan Zhang, Yan Li, Bin Xue, Hua Yu, Yingying Wang, Yuyan Shen, Na Li. 399-402 [doi]
- An Energy-Saving Clustering Strategy of Hybrid Network of Sensors and Mobile CR NodesYi-Wei Deng, Cheng Zhong, Jun Yu, Sujie Shao, Xuesong Qiu. 403-411 [doi]
- A Survey of Wireless Sensor Technique Applications for Medical CareQi Xie, Qiang Wang, Ning Cao, Shuqing Gao, Guang Liang, Tong Zhang, Yanbing Chen, Yi Zhai, Na Li. 412-415 [doi]
- Transmission Probability Strategies for Cluster-Based Event-Driven Wireless Sensor NetworksMario E. Rivero-Angeles, Gerardo Rubino. 416-419 [doi]
- Dynamic Duty-Cycle Control for Wireless Sensor Networks Using Artificial Neural Network (ANN)Anwar Ahmed Khan, Mohammad Shoaib Jamal, Shama Siddiqui. 420-424 [doi]
- DPR-MAC: Dynamic Polling for Rare Events in Wireless Sensor NetworksShama Siddiqui, Anwar Ahmed Khan, Sayeed Ghani. 425-428 [doi]
- Implementation and Verification of a High-Throughput Reconfigurable MIMO DetectorZhen Wang, Hai Qin, Yu Gong, Bo Liu. 429-432 [doi]
- Loop-Free Forwarding in Hierarchical Location-Based RoutingZhan-Zhen Wei, Feng Wang, Zhaobin Li. 433-436 [doi]
- Investigations of 5G Multiple Radio Access Technology Performance and Resource Selection BehaviorShun-Ping Chen, Jens Gebert. 437-444 [doi]
- A Bit Sampled Wake-Up Receiver with Logarithmic Detector ArchitectureTao Ma. 445-449 [doi]
- A Heuristic D2D Communication Mode Selection AlgorithmWeifeng Lu, Weijun Lin, Lijun Yang, Siguang Chen. 450-453 [doi]
- A Classifier Method for Detection of Covert Channels over LTEZukui Wang, Liusheng Huang, Wei Yang, Zhiqiang He. 454-460 [doi]
- The Limited Feedback Precoding Based on the Triplex CodebooksGuihua Kang, Kaiyue Xu, Hongbo Kang, Kun-Bei Pan. 461-465 [doi]
- Performance of Polarized Channel Coding in TRPC-UWB Communication SystemsLaning Ma, Zhonghua Liang, Danli Liu. 466-470 [doi]
- Modeling and Verification of Circuit with Stable-EventTingting Jia, Caihong Li, Anping He. 471-475 [doi]
- Multi-channel Allocation Algorithm Based on AODV Protocol in Wireless Mesh NetworksZhang Wei-wei, He Jia-feng, Gao Guo-wang, Ren Li-li, ShenXuan Jing. 476-481 [doi]
- Controller Cluster-Based Interconnecting for Multi-domain SDN NetworksKun Li, Qinghai Ou, Hong Chen, Baoping Zou. 482-485 [doi]
- DDS: Distributed Decision Strategy Based on Switch Migration towards SDN Control PlaneJianhui Zhang, Tao Hu, Wei Zhao, Dan Qiao. 486-493 [doi]
- Scheduling of Security Resources in Software Defined Security ArchitectureGang Zhang, Xiaofeng Qiu, Wei Chang. 494-503 [doi]
- A Software Defined Security Scheme Based on SDN EnvironmentXiaolong Xu, Liuyun Hu. 504-512 [doi]
- SDN-based Architecture for Big Data NetworkYuhua Xu, Zhe Sun, Zhixin Sun. 513-516 [doi]
- MPLB: A Load Balance Scheme of Joint Resource Scheduling in Heterogeneous Wireless NetworkXiaoyong Lin, Pengwei Yin, Yun Xia, Yang Yu, Tingting Qiu, Xiaoming Wang, Lixiang Li. 517-524 [doi]