Abstract is missing.
- An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers EnsembleZhen Cao, Minqing Zhang, Xiaolong Chen, Wenjun Sun, Chun Shan. 1-12 [doi]
- Separable and Three-Dimensional Optical Reversible Data Hiding with Integral Imaging CryptosystemYiqun Liu. 13-21 [doi]
- Credit Risk Assessment of Peer-to-Peer Lending Borrower Utilizing BP Neural NetworkZhengnan Yuan, Zihao Wang, He Xu. 22-33 [doi]
- Implementation of a GA-based Simulation System for Placement of IoT Devices: Evaluation for a WSAN ScenarioMiralda Cuka, Kosuke Ozera, Ryoichiro Obukata, Donald Elmazi, Tetsuya Oda, Leonard Barolli. 34-42 [doi]
- A Cryptographically Secure Scheme for Preserving Privacy in Association Rule MiningHufsa Mohsin. 43-53 [doi]
- A BGN Type Outsourcing the Decryption of CP-ABE CiphertextsZhenlin Li, Wei Zhang, Yitao Ding, Ping Bai. 54-63 [doi]
- Performance Evaluation of WMN-PSOHC and WMN-PSO Simulation Systems for Node Placement in Wireless Mesh Networks: A Comparison StudyShinji Sakamoto, Kosuke Ozera, Tetsuya Oda, Makoto Ikeda, Leonard Barolli. 64-74 [doi]
- Effects of Number of Activities the Member Failures on Qualified Voting in P2P Mobile Collaborative Team: A Comparison Study for Two Fuzzy-Based SystemsYi Liu, Keita Matsuo, Makoto Ikeda, Leonard Barolli. 75-88 [doi]
- A User Prediction and Identification System for Tor Networks Using ARIMA ModelTetsuya Oda, Miralda Cuka, Ryoichiro Obukata, Makoto Ikeda, Leonard Barolli. 89-97 [doi]
- Implementation of an Actor Node for an Ambient Intelligence Testbed: Evaluation and Effects of Actor Node on Human Sleeping ConditionRyoichiro Obukata, Miralda Cuka, Donald Elmazi, Tetsuya Oda, Keita Matsuo, Leonard Barolli. 98-106 [doi]
- Designing the Light Weight Rotation Boolean Permutation on Internet of ThingsYu Zhou. 107-118 [doi]
- The Construction Method of Clue Words Thesaurus in Chinese Patents Based on Iteration and Self-filteringNa Deng, Xu Chen, Ou Ruan, Chunzhi Wang, Zhiwei Ye, Jingbai Tian. 119-125 [doi]
- Numerical Simulation for the Nonlinear Elliptic ProblemQingli Zhao, Jin Li, Lei Yang. 126-137 [doi]
- Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error ExpansionFuqiang Di, Junyi Duan, Minqing Zhang, Yingnan Zhang, Jia Liu. 138-149 [doi]
- Reversible Image Data Hiding with Homomorphic Encryption and Contrast EnhancementFuqiang Di, Junyi Duan, Minqing Zhang, Yingnan Zhang, Jia Liu. 150-159 [doi]
- A Deep Network with Composite Residual Structure for Handwritten Character RecognitionZheheng Rao, Chunyan Zeng, Nan Zhao, Min Liu, Minghu Wu, Zhifeng Wang. 160-166 [doi]
- An Ensemble Hashing Framework for Fast Image RetrievalHuanYu Li, Yunqiang Li. 167-177 [doi]
- A Novel Construction and Design of Network Learning Platform in Cloud Computing EnvironmentHuanYu Li, Jing Wang, Hua Shen. 178-186 [doi]
- Automatic Kurdish Text Classification Using KDC 4007 DatasetTarik A. Rashid, Arazo M. Mustafa, Ari M. Saeed. 187-198 [doi]
- Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier ParadigmBai Ping, Zhang Wei, Li Zhenlin, Xu an Wang. 199-211 [doi]
- A New Middleware Architecture for RFID Data ManagementWeiwei Shen, Han Wu, He Xu, Peng Li. 212-221 [doi]
- Multidimensional Zero-Correlation Linear Cryptanalysis on PRINCELu Cheng, Xiaozhong Pan, Yuechuan Wei, Liqun Lv. 222-232 [doi]
- Design and Implementation of Simulated DME/P Beaconing System Based on FPGAYe Sun, Jingyi Zhang, Xin Xiang, Kechu Yi. 233-242 [doi]
- LDPC Codes Estimation Model of Decoding Parameter and RealizationXiaobei Li, Jingyi Zhang, Rui Wang, Yazhou Zou. 243-252 [doi]
- A Novel Query Extension Method Based on LDAYongjun Zhang, Jialin Ma, Zhijian Wang, Bolun Chen. 253-261 [doi]
- Target Recognition Method Based on Multi-class SVM and Evidence TheoryWen Quan, Jian Wang, Lei Lei, Maolin Gao. 262-272 [doi]
- Selective Ensemble Based on Probability PSO AlgorithmWen Quan, Jian Wang, Zhongmin He, Jiaofeng Zuo. 273-280 [doi]
- The Research of QoS Monitoring-Based Cloud Service SelectionLing Li, Feng Ye, Qian Huang. 281-288 [doi]
- Developing Cloud-Based Tools for Water Resources Data Analysis Using R and ShinyFeng Ye, Yong Chen, Qian Huang, Ling Li. 289-297 [doi]
- Perception Mining of Network Protocol's Dormant BehaviorYan-Jing Hu. 298-307 [doi]
- Video Stabilization Algorithm Based on Kalman Filter and Homography TransformationCong Liu, Xiang Li, Minghu Wu. 308-313 [doi]
- Towards a Web-Based Teaching Tool to Measure and Represent the Emotional Climate of Virtual ClassroomsModesta Pousada, Santi Caballé, Jordi Conesa, Antoni Bertrán, Beni Gómez-Zúñiga, Eulà lia Hernández, Manuel Armayones, Joaquim Moré. 314-327 [doi]
- An Efficient and Secure Outsourcing Algorithm for Bilinear Pairing ComputationXiaoshuang Luo, Xiaoyuan Yang, Xiangzhou Niu. 328-339 [doi]
- A New Broadcast Encryption Scheme for Multi SetsLiqun Lv, Xiaoyuan Yang. 340-348 [doi]
- Key Encapsulation Mechanism from Multilinear MapsLiqun Lv, Wenjun Sun, Xiaoyuan Yang, Xuan Wang. 349-357 [doi]
- An Multi-hop Broadcast Protocol for VANETsYongqiang Li, Zhong Wang, Qinggang Fan, Yanning Cai, Baisong Chen. 358-366 [doi]
- DPHKMS: An Efficient Hybrid Clustering Preserving Differential Privacy in SparkZhi-Qiang Gao, Long-Jun Zhang. 367-377 [doi]
- Technique for Image Fusion Based on PCNN and Convolutional Neural NetworkWeiwei Kong, Yang Lei, Jing Ma. 378-389 [doi]
- Fast Iterative Reconstruction Based on Condensed Hierarchy TreeFang Wan, Huazhong Jin, GuangBo Lei, Ou Ruan. 390-399 [doi]
- An Optimal Model of Web Cache Based on Improved K-Means AlgorithmQiang Wang. 400-411 [doi]
- Detecting Crowdsourcing Spammers in Community Question Answering WebsitesKaiqing Hao, Lei Wang. 412-423 [doi]
- A Spam Message Detection Model Based on Bayesian ClassificationYitao Yang, Runqiu Hu, Chengyan Qiu, Guozi Sun, Huakang Li. 424-435 [doi]
- Spam Mail Filtering Method Based on Suffix TreeRunqiu Hu, Yitao Yang. 436-447 [doi]
- MP3 Audio Watermarking Algorithm Based on Unipolar QuantizationWenhui Wu, Xuan Guo, Zhiting Xiao, Renyi Wen. 448-456 [doi]
- Multi-documents Summarization Based on the TextRank and Its Application in Argumentation SystemCaiquan Xiong, Yuan Li, Ke Lv. 457-466 [doi]
- An Unconstrained Face Detection Algorithm Based on Visual SaliencyYing Tong, Rui Chen, Liangbao Jiao, Yu Yan. 467-474 [doi]
- Pavement Crack Detection Fused HOG and Watershed Algorithm of Range ImageHuazhong Jin, Fang Wan, Ou Ruan. 475-488 [doi]
- Compressed Video Sensing with Multi-hypothesis PredictionRui Chen, Ying Tong, Jie Yang, Minghu Wu. 489-496 [doi]
- Security Analysis and Improvements of Three-Party Password-Based Authenticated Key Exchange ProtocolQingping Wang, Ou Ruan, Zihao Wang. 497-508 [doi]
- A Combined Security Scheme for Network CodingChao Xu, Yonghui Chen, Hui Yu, Yan Jiang, Guomin Sun. 509-517 [doi]
- Gaussian Scale Patch Group Sparse Representation for Image RestorationYaqi Lu, Minghu Wu, Nan Zhao, Min Liu, Cong Liu. 518-523 [doi]
- An Efficient Identity-Based Homomorphic Signature Scheme for Network CodingYudi Zhang, Yan Jiang, Bingbing Li, Mingwu Zhang. 524-531 [doi]
- A Three-Dimensional Digital Watermarking Technique Based on Integral Image Cryptosystem and Discrete Fresnel DiffractionYiqun Liu, Jianqi Zhang, Zhen Zhang, Haining Luo, Xiaorui Wang. 532-540 [doi]
- Building Real-Time Travel Itineraries Using 'off-the-shelf' Data from the WebAyushi Gupta, Sharmistha Rai, Himali Singal, Monika Chaudhary, Rishabh Kaushal. 541-552 [doi]
- Energy Efficient Integration of Renewable Energy Sources in Smart GridGhulam Hafeez, Nadeem Javaid, Saman Zahoor, Itrat Fatima, Zahoor Ali Khan, Safeerullah. 553-562 [doi]
- Cost and Comfort Based Optimization of Residential Load in Smart GridFahim Ahmed, Nadeem Javaid, Awais Manzoor, Malik Ali Judge, Fozia Feroze, Zahoor Ali Khan. 563-572 [doi]
- Efficient Utilization of HEM Controller Using Heuristic Optimization TechniquesAsif Khan, Nadeem Javaid, Adnan Ahmed, Saqib Kazmi, Hafiz Majid Hussain, Zahoor Ali Khan. 573-584 [doi]
- A Shadow Elimination Algorithm Based on HSV Spatial Feature and Texture FeatureRanran Song, Min Liu, Minghu Wu, Juan Wang, Cong Liu. 585-591 [doi]
- A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server EnvironmentAlzubair Hassan, Nabeil Eltayieb, Rashad Elhabob, Fagen Li. 592-602 [doi]
- Improved Online/Offline Attribute Based Encryption and MoreJindan Zhang, Baocang Wang, Xu an Wang. 603-610 [doi]
- On the Security of a Cloud Data Storage Auditing Protocol IPADXu an Wang, Xiaoshuang Luo, Jindan Zhang, Xiaoyuan Yang 0002. 611-617 [doi]
- LF-LDA: A Topic Model for Multi-label ClassificationYongjun Zhang, Jialin Ma, Zijian Wang, Bolun Chen. 618-628 [doi]
- Data Analysis for Infant Formula NutrientsQian Huang, Chao Zhang, Feng Ye, Qi Wang, Sisi Chen. 629-636 [doi]
- A Classification Method Based on Improved BIA Model for Operation and Maintenance of Information System in Large Electric Power EnterpriseChong Wang, Qi Wang, Qian Huang, Feng Ye. 637-644 [doi]
- A Model Profile for Pattern-Based Definition and Verification of Composite Cloud ServicesFlora Amato, Nicola Mazzocca, Francesco Moscato 0001, Fatos Xhafa. 645-656 [doi]
- A Routing Based on Geographical Location Information for Wireless Ad Hoc NetworksYongqiang Li, Zhong Wang, Qinggang Fan, Yan-Ning Cai, Yubin Wu, Yunjie Zhu. 657-666 [doi]
- Cyber-Attack Risks Analysis Based on Attack-Defense TreesWenjun Sun, Liqun Lv, Yang Su, Xu an Wang. 667-678 [doi]
- Multi-focus Image Fusion Method Based on NSST and IICMYang Lei. 679-689 [doi]
- Pilot Contamination Elimination in Massive MIMO SystemsRui-Chao Hu, Bing-He Wang. 690-701 [doi]
- Improved Leader-Follower Method in Formation Transformation Based on Greedy AlgorithmYan-Yu Duan, Qing-Ge Gong, Zhen-Sheng Peng, Yun Wang, Zhi-Qiang Gao. 702-711 [doi]
- A Kind of Improved Hidden Native Bayesian ClassifierWenshuai Yang, Hongxu Zhao, Zhiqiang Gao. 712-720 [doi]
- Study of a Disaster Relief Troop's Transportation Problem Based on Minimum Cost Maximum FlowZhen-Sheng Peng, Qing-Ge Gong, Yan-Yu Duan, Yun Wang, Zhi-Qiang Gao. 721-733 [doi]
- A Cascading Diffusion Prediction Model in Micro-blog Based on Multi-dimensional FeaturesYun Wang, Zhi-Ming Zhang, Zhen-Shen Peng, Yan-Yu Duan, Zhi-Qiang Gao. 734-746 [doi]
- Multi-target Detection of FMCW Radar Based on Width FilteringMingfei Liu, Yi Qu, Yefeng Zhang. 747-755 [doi]
- DroidMark: A Lightweight Android Text and Space Watermark Scheme Based on Semantics of XML and DEXLingling Zeng, Wei Ren, Min Lei, Yu Yang. 756-766 [doi]
- Research on CSER Rumor Spreading Model in Online Social NetworkAn-Hui Li, Jing Wang, Ya-Qi Wang. 767-775 [doi]