Abstract is missing.
- Zero-Determinant Strategy for Cooperation Enforcement in CrowdsourcingYue Miao, Changbing Tang, Jianfeng Lu 0002, Xiang Li. 1-6 [doi]
- Saving Energy on Processor Micro-Architecture Level for Big Data Stream Mobile ComputingZhiguo Liu, Ni Zhang, Qiu Tang, Ningning Song, Zengming Yu, Hongbin Zhang. 7-13 [doi]
- A Multi-modal Hashing Learning Framework for Automatic Image AnnotationJiale Wang, Guohui Li. 14-21 [doi]
- SDS2: Secure Data-Sharing Scheme for Crowd Owners in Public Cloud ServiceYou Zhou, Liangmin Wang. 22-29 [doi]
- On Study of Physical-Layer Attack Detection for Large Volumes of DataRuohan Cao, Yueming Lu. 30-34 [doi]
- Spatio-temporal Distribution Pattern of Cable Car Passenger Flow in Panholidays: A Case Study of Huangshan Scenic AreaWenxing Lu, Xiao Wei. 35-42 [doi]
- Mining Similarity-Aware Distinguishing Sequential Patterns from Biomedical SequencesTinghai Pang, Lei Duan, Jesse Li-Ling, Guozhu Dong. 43-52 [doi]
- A Remote Data Integrity Checking Scheme for Big Data StorageXingyue Chen, Tao Shang, Ilryong Kim, Jianwei Liu. 53-59 [doi]
- Research on Classification Method of High-Dimensional Class-Imbalanced Data Sets Based on SVMChunkai Zhang, Jianwei Guo, Junru Lu. 60-67 [doi]
- An Approximate Approach to Frequent Itemset MiningChunkai Zhang, Xudong Zhang, Panbo Tian. 68-73 [doi]
- A Survey on Data Cleaning Methods in CyberspaceJinlin Wang, Hongli Zhang, Binxing Fang, Xing Wang, Lin Ye. 74-81 [doi]
- A New Approach for Imbalanced Data Classification Based on Minimize Loss LearningChunkai Zhang, Guoquan Wang, Ying Zhou, Jiayao Jiang. 82-87 [doi]
- Semi-Supervised Collective Matrix Factorization for Topic Detection and Document ClusteringYe Wang, Yanchun Zhang, Bin Zhou, Yan Jia. 88-97 [doi]
- Extracting Sift Keypoints in DCT DomainChi Fei, Bin Liu, Nenghai Yu. 98-101 [doi]
- EMMBTT: A Novel Event Evolution Model Based on TFxIEF and TDC in Tracking News StreamsPengpeng Zhou, Bin Wu, Zhen Cao. 102-107 [doi]
- Learning Automata Based Approach for Influence Maximization Problem on Social NetworksHao Ge, Jinchao Huang, Chong Di, Jianhua Li, Shenghong Li. 108-117 [doi]
- A Personalized Next-Song Recommendation System Using Community Detection and Markov ModelKan Zhang, Zichao Zhang, Kaigui Bian, Jin Xu, Jie Gao. 118-123 [doi]
- Outsourced Privacy-Preserving C4.5 Algorithm over Arbitrarily Partitioned DatabasesYe Li, Zoe L. Jiang, Xuan Wang, S. M. Yiu, Qing Liao. 124-132 [doi]
- DPLK-Means: A Novel Differential Privacy K-Means MechanismJun Ren, Jinbo Xiong, Zhiqiang Yao, Rong Ma, Mingwei Lin. 133-139 [doi]
- A Network Coordinate System Constructing Algorithm Based on Optimal Neighbor NodesFan Zhao, Jingning Chen, Dengpan Ye, Xiangyang Luo. 140-144 [doi]
- Adaptive Text Steganography by Exploring Statistical and Linguistical DistortionHuanhuan Hu, Xin Zuo, Weiming Zhang, Nenghai Yu. 145-150 [doi]
- Predicting the Popularity of News Based on Competitive MatrixXiaomeng Wang, Binxing Fang, Hongli Zhang, XuanYu. 151-155 [doi]
- A Method of Emotional Analysis of Movie Based on Convolution Neural Network and Bi-directional LSTM RNNShudong Li, Zhou Yan, Xiaobo Wu, Aiping Li, Bin Zhou. 156-161 [doi]
- New Pseudorandom Number Generators from Block CiphersPing Zhang, Honggang Hu, Xianjun Hu, Xiaolong Yang. 162-171 [doi]
- Attribute-Based Encryption with Multi-keyword SearchRunhe Li, Dong Zheng, Yinghui Zhang, Haonan Su, Menglei Yang, Pengzhen Lang. 172-177 [doi]
- An Expressive Hidden Access Policy CP-ABEFawad Khan, Hui Li, Liangxuan Zhang, Jian Shen. 178-186 [doi]
- A Sensitive Information Protection Scheme in Named Data Networking Using Attribute-Based Ring-SigncryptionTao Feng, Ningning Liu. 187-194 [doi]
- Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud ComputingMaoxu Lyu, Xuejun Li, Hui Li. 195-204 [doi]
- Multi-authority Attribute-Based Encryption Access Control Scheme with Hidden Policy and Constant Length Ciphertext for Cloud StorageYundong Fan, Xiaoping Wu, Jiasheng Wang. 205-212 [doi]
- A Novel Contributory Cross-Domain Group Password-Based Authenticated Key Exchange Protocol with Adaptive SecurityLiehuang Zhu, Cong Guo, Zijian Zhang, Wei Fu, Rixin Xu. 213-222 [doi]
- A Fully Secure Verifiable and Outsourced Decryption Ranked Searchable Encryption Scheme Supporting Synonym QueryYaqian Kang, Zhenhua Liu. 223-231 [doi]
- SRAM: A State-Aware Risk Assessment Model for Intrusion ResponseFengHua Li, Fangxin Xiong, Chao Li, Lihua Yin, Guozhen Shi, Boxiu Tian. 232-237 [doi]
- A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSSHua Zhang, Fang Lou, Yunsheng Fu, Zhihong Tian. 238-241 [doi]
- A Framework to Construct Knowledge Base for Cyber SecurityHuaijun Shang, Rong Jiang, Aiping Li, Wei Wang. 242-248 [doi]
- Building Endgame Data set to Improve Opponent Modeling ApproachJiajia Zhang, Hong Liu. 255-260 [doi]
- Cyberspace-Oriented Access Control: Model and PoliciesFengHua Li, Zifu Li, Weili Han, Ting Wu, Lihua Chen, Yunchuan Guo. 261-266 [doi]
- ISLUS: An Immediate and Safe Live Update System for C ProgramZhikun Chen, Weizhong Qiang. 267-274 [doi]
- A Reputation-Based Resilient and Recoverable P2P BotnetJie Yin, Xiang Cui, Ke Li. 275-282 [doi]
- Mining Users' Important Locations and Semantics on Cellular Network DataYupeng Tuo, Xiaochun Yun, Yongzheng Zhang 0002. 283-291 [doi]
- ITM-LB: An Improved Traffic Matrix-Based Load Balancing Routing AlgorithmWeidong Lin, Chi Zhang. 298-303 [doi]
- FgDetector: Fine-Grained Android Malware DetectionDongfang Li, Zhaoguo Wang, Lixin Li, Zhihua Wang, Yucheng Wang, Yibo Xue. 311-318 [doi]
- Analysis of Android Malware Family Characteristic Based on Isomorphism of Sensitive API Call GraphHao Zhou, Wei Zhang, Fengqiong Wei, Yunfang Chen. 319-327 [doi]
- Research on Online Learning of Radar Emitter Recognition Based on Hull VectorWeigang Zhu, Meng Li, Chuangzhan Zeng. 328-332 [doi]
- Cloud-Based Lightweight RFID Mutual Authentication ProtocolKai Fan, Qi Luo, Hui Li, Yintang Yang. 333-338 [doi]
- Interactive Network Clustering Layout Method Based on Implicit ConnectionHuaquan Hu, Lingda Wu, Ronghuan Yu. 339-342 [doi]
- Visualization Study of High-Dimensional Data Classification Based on PCA-SVMZhongwen Zhao, Huanghuang Guo. 346-349 [doi]
- Auto-Encoder Based for High Spectral Dimensional Data Classification and VisualizationJiang Zhu, Lingda Wu, Hongxing Hao, Xiaorui Song, Yi Lu. 350-354 [doi]
- Research on the Space-Based Integrated Information Network Evolution Model Visualization Methods Based on the Super Network TheoryChengxiang Liu, Wei Xiong. 355-358 [doi]
- Research on Multi-resolution Isosurface Extraction Method for 3D Scalar FieldRonghuan Yu, Wei Xie, Lingda Wu, Hongxing Hao. 359-362 [doi]
- Two-Layer Network Visualization for Comprehensive AnalysisYingmei Wei, Xiaolei Du. 363-367 [doi]
- Tasks for Visual Analytics in Multilayer NetworksXitao Zhang, Lingda Wu, Huaquan Hu, Shaobo Yu. 368-371 [doi]
- A Movie Summary Generation SystemYuxiang Xie, Xidao Luan, Jingmeng He, Lili Zhang, Xin Zhang, Chen Li. 372-375 [doi]
- Temporal Multi-task Model Framework Using Multi-source Data for Bonds Credit AssessmentJiawei Shi, Xi Zhang. 376-381 [doi]
- Social Network Construction of the Role Relation in Unstructured Data Based on Multi-viewLili Zhou, Jinna Lv, Bin Wu. 382-388 [doi]
- Extracting Topics Based on Word2Vec and Improved Jaccard Similarity CoefficientChunzi Wu, Bai Wang. 389-397 [doi]
- Open Relation Extraction Based on Core Dependency Phrase ClusteringChengsen Ru, Shasha Li, Jintao Tang, Yi Gao, Ting Wang. 398-404 [doi]
- The CRFs-Based Chinese Open Entity Relation ExtractionXiaoyang Wu, Bin Wu. 405-411 [doi]
- An Arithmetic View on Generating NecklacesJiantao Wang. 412-416 [doi]
- Mobile Device Management System Based on AOSP and SELinuxXin-long Song, Chung-Huang Yang. 417-420 [doi]
- The Efficient Implementation of the Android Kernel with China Standard Cryptographic AlgorithmYu Shi, Dong Zheng, Chung-Huang Yang. 421-425 [doi]
- File-Based Encryption with SM4Chan Gao, Chung-Huang Yang. 426-430 [doi]
- Anonymous Fair Exchange Protocol with a Semitrusted Third PartyLijuan Guo, Xuelian Li, Xiaolin Lv, Juntao Gao. 431-440 [doi]
- Verifiable Attribute-Based Multi-keyword Search over Encrypted Cloud Data in Multi-owner SettingYaqing Fan, Zhenhua Liu. 441-449 [doi]
- MSDB: A Massive Sensor Data Processing Middleware for HBaseBowei Liu, Ruizhang Huang, Ting Huang, Yingying Yan. 450-456 [doi]
- Permutation-Based Tweakable On-line Cipher with Improved Security GuaranteesPing Zhang, Honggang Hu. 457-466 [doi]
- Time Series Discord Discovery Under Multi-party Privacy PreservingChunkai Zhang, Haodong Liu, Ye Li. 467-474 [doi]
- Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access StructuresLiangxuan Zhang, Hui Li, Yinghui Zhang, Fawad Khan. 475-482 [doi]
- Design and Implementation of the Components of the Symmetric Cryptographic AlgorithmYunfei Ci, Guozhen Shi, Feng Yang, Jiawen Diao, Cuijie Liu, Weihua Mao. 483-487 [doi]
- Privacy Preservation Strategy in Time-Sensitive LBSsWeihao Li, Ben Niu, Hui Li. 488-493 [doi]
- Improving Database Storage Usability with the Cloud-Based ArchitectureCuicui Su, Yongzhi Wang, Yulong Shen, Ke Cheng, Jiawen Ma. 494-499 [doi]
- A Deep Recurrent Network for Web Server Performance PredictionJiajun Peng, Zheng Huang, Jie Cheng. 500-504 [doi]
- Joint Dictionary Learning for Person Re-identificationYunlu Xu, Jie Guo, Zheng Huang. 505-510 [doi]
- Review of iOS Malware AnalysisYixiang Zhu, Kang Zhang. 511-515 [doi]
- SpongeMPH: A New Multivariate Polynomial Hash Function based on the Sponge ConstructionWeijie Li, Guohong Liao, Yamin Wen, Zheng Gong. 516-520 [doi]
- An Adaptive Honeypot Deployment Algorithm Based on Learning AutomataYan Zhang, Chong Di, Zhuoran Han, Yichen Li, Shenghong Li. 521-527 [doi]
- Big Data for Social Media Evaluation: A Case of Wechat Platform Rankings in ChinaQian Liu, Jingsi Ni, Jing Huang, Xiaochuan Shi. 528-533 [doi]
- Formal Analysis of Security Properties of Cyber-Physical System Based on Timed AutomataTing Wang, Qi Su, Tieming Chen. 534-540 [doi]
- CPS Information Security Risk Evaluation System Based on Petri NetYonggui Fu, Jianming Zhu, Sheng Gao. 541-548 [doi]
- A Defense Mechanism Against Location Cheating Attack in Social NetworkQing Li, Ayong Ye, Li Xu. 549-553 [doi]
- Evaluating Network Equipment Information Security Based on D-S Evidence Theory and Principal Components AnalysisChao Yuan, Yueming Lu, Jiefu Gan. 554-560 [doi]
- Construction of High-Availability Bank System in Virtualized EnvironmentsHuang Neng. 561-568 [doi]
- Embedding-Based Feature Extraction Methods for Chinese Sentiment ClassificationSheng Zhang, Hui Wang, Xin Zhang, Jiajun Cheng, Pei Li, Zhaoyun Ding. 569-577 [doi]
- Range Queries on Two Column DataCe Yang, Weiming Zhang, Nenghai Yu. 578-584 [doi]
- CNFL: Categorical to Numerical Feature Learning for Clustering and ClassificationEric Golinko, Thomas Sonderman, Xingquan Zhu. 585-594 [doi]
- An Information Security Evaluation Method Based on Entropy Theory and Improved TOPSISDongqing Wang, Yueming Lu, Jiefu Gan. 595-600 [doi]
- Analysis of Network Attack and Defense Game with the Average Recovery Time as the Quantitative Indicators of the Payment FunctionSun Yang, Xioing Wei. 601-605 [doi]
- Implementation and Evaluation of Different Parallel Designs of AES Using CUDAJianwei Ma, Xiaojun Chen 0004, Rui Xu, Jinqiao Shi. 606-614 [doi]
- Detecting Congestion and Detour of Taxi Trip via GPS DataJunfeng Tu, Yucong Duan. 615-618 [doi]
- Framework of Probabilistic Risk Assessment for Security and ReliabilityQisi Liu, Liudong Xing, Chaonan Wang. 619-624 [doi]
- Fast Copy-Move Detection of Digital AudioZihan Liu, Wei Lu. 625-629 [doi]
- Sentiment Lexical-Augmented Convolutional Neural Networks for Sentiment AnalysisRongchao Yin, Peng Li, Bin Wang. 630-635 [doi]
- A Trusted Power System Network in Electrical IndustryMengying Yuan, Xiangzhou Chen, Yang Wang, Huixia Ding. 636-643 [doi]
- Intelligent Discovery of Notable Product Features by Mining Large Scale Online ReviewsXin Ni, Yinghui Sai, Anning Wang, Qiang Zhang. 644-649 [doi]
- The Influence of Internal Control on Executive Pay-Performance Sensitivity: Based on the Background of the Reform of State-Owned Enterprise in ChinaXuan Zhang, Liang Zuo. 650-654 [doi]
- Data Driven Modeling of Continuous Time Information Diffusion in Social NetworksLiang Liu, Bin Chen, Bo Qu, Lingnan He, Xiaogang Qiu. 655-660 [doi]
- Research and Application of the Test Data VisualizationHui Yan, Junfeng Wang, Chensen Xia. 661-665 [doi]