Abstract is missing.
- Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and ScramblingFei Peng, Shuai-ping Wang, Gang Luo, Min Long. 3-15 [doi]
- A New Universal Quantum Gates and Its Simulation on GPGPUHuiMin Luo, Jiabin Yuan, Wenjing Dai. 16-27 [doi]
- Data Hiding-Based Video Error Concealment Method Using Compressed SensingYanli Chen, Hongxia Wang, Hanzhou Wu. 28-38 [doi]
- A Novel Robust Reversible Watermarking Scheme Based on IWTShuang Yu, Jian Li, Jinwei Wang. 39-48 [doi]
- An Improved Reversible Information Hiding Scheme Based on AMBTC Compressed ImagesYi Puyang, Zhaoxia Yin, Guorui Feng, Andrew K. Abel. 49-60 [doi]
- An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-PointsYong Liu, Hong-Xia Wang, Han-Zhou Wu, Yi Chen. 61-73 [doi]
- Improved CMD Adaptive Image Steganography MethodYingbo Yu, Xin Liao. 74-84 [doi]
- Quantum Computer Simulation on GPU Cluster Incorporating Data LocalityZhen Li, Jiabin Yuan. 85-97 [doi]
- Tampering Detection in Oral History Video Using WatermarkingJianfeng Lu, Peng Gao, Shanqing Zhang, Li Li, Wenqiang Yuan, Qili Zhou. 98-109 [doi]
- Steganalysis with CNN Using Multi-channels Filtered ResidualsYafei Yuan, Wei Lu, Bingwen Feng, Jian Weng. 110-120 [doi]
- Coverless Text Information Hiding Method Using the Frequent Words DistanceJianjun Zhang, Yicheng Xie, Lucai Wang, HaiJun Lin. 121-132 [doi]
- Improved STDM Watermarking Using Semantic Information-Based JND ModelChun-Xing Wang, Teng Zhang, Wenbo Wan, Jiande Sun, Jing Li, Meiling Xu. 133-142 [doi]
- The Categories of Quantum Information Hiding ProtocolShujiang Xu, Lianhai Wang, Guangqi Liu, Xiaohui Han, Dawei Zhao, Lijuan Xu. 143-152 [doi]
- Coverless Information Hiding Technology Research Based on News AggregationConghua Liu, Gang Luo, Zuwei Tian. 153-163 [doi]
- SIEM Based on Big Data AnalysisTianmu Li, Leiming Yan. 167-175 [doi]
- Workload-Aware VM Consolidation in Cloud Based on Max-Min Ant SystemHongjie Zhang, Guansheng Shu, Shasha Liao, Xi Fu, Jing Li. 176-188 [doi]
- Parallel Service Selection Method Based on Adaptive Cloud Model for Mobile ApplicationLongchang Zhang, Yanhong Yang, Decai Sun. 189-200 [doi]
- A Hybrid Artificial Bee Colony Algorithm to Solve Multi-objective Hybrid Flowshop in Cloud Computing SystemsJun-qing Li, Yu-Yan Han, Cun-gang Wang. 201-213 [doi]
- A Group-Based Replica Consistency Schema for Cloud StorageGuoping Du, Wenbin Yao, Dongbin Wang, Xiaole Wen. 214-225 [doi]
- A Multi-objective Optimization Scheduling Method Based on the Improved Differential Evolution Algorithm in Cloud ComputingZhe Zheng, Kun Xie, Shiming He, Jun Deng. 226-238 [doi]
- A Network Calculus Analysis for the Baseband Processing Capacity in Cloud Radio Access NetworkMuzhou Xiong, Haixin Liu, Deze Zeng. 239-250 [doi]
- Live Migration Among CloudBased on MOOSE AddressYubing Mao, ZhengYou Xia. 251-261 [doi]
- Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud ApplicationsYuanyuan Zhang, Jinbo Xiong, Mingwei Lin, Lili Wang, Xuan Li. 262-274 [doi]
- Design and Test of the Intelligent Rubber Tapping Technology Evaluation Equipment Based on Cloud ModelJieren Cheng, Kuanqi Cai, Boyi Liu, Xiangyan Tang. 275-287 [doi]
- An Affective Computing and Fuzzy Logic Framework to Recognize Affect for Cloud-based E-Learning Environment Using EmoticonsKyle Morton, Yanzhen Qu, Marilyn Carroll. 288-299 [doi]
- Cloud Management Systems and Virtual Desktop Infrastructure Load Balancing Algorithms - A SurveyMicheal Ernest Taylor, Jian Shen. 300-309 [doi]
- Design and Deployment of Wireless Sensor Networks for Flood Detection in IndonesiaIrfan Dwiguna Sumitra, Rongtao Hou, Sri Supatmi. 313-325 [doi]
- An Android App Recommendation Approach by Merging Network Traffic CostXin Su, Xuchong Liu, Jiuchuan Lin, Yu Tong. 326-338 [doi]
- A Virtual Grid-Based Routing Protocol for Mobile Sink-Based WSNsQi Liu, Weixin Bu, Kai Zhang, Xiaodong Liu, Nigel Linge. 339-348 [doi]
- Low-Energy Security-Enhanced Routing Protocol Based on DBSCAN PartitionYating Hou, Feng Xu, Ruilin Ding. 349-360 [doi]
- Power Consuming Activity Recognition in Home EnvironmentXiaodong Liu, Qi Liu. 361-372 [doi]
- A Pre-partition Based Uneven Clustering Multi-hop Routing ProtocolYating Hou, Feng Xu, Mingming Su, Kaibo Yu. 373-384 [doi]
- A Credibility Evaluation Method in Opportunistic NetworksJinxia Dou, Wenbin Yao, Dongbin Wang. 385-397 [doi]
- Unsupervised Energy Disaggregation of Home AppliancesKondwani M. Kamoto, Qi Liu, Xiaodong Liu. 398-409 [doi]
- Planar-Based Visual Positioning for a Mobile Robot with Monocular VisionYang Guo, Zheng Xiao, Hui Chen, Ling Huang. 410-421 [doi]
- Energy Efficient MAC Protocol for Wireless Sensor Networks: A SurveyZichun Wang, Meng Feng, Tiantian Miao, Wei Jiang, Jian Shen. 422-429 [doi]
- A Particle Swarm Optimization and Mutation Operator Based Node Deployment Strategy for WSNsJin Wang, Chunwei Ju, Huan Ji, Geumran Youn, Jeong Uk Kim. 430-437 [doi]
- A Distributed Sparse Signal Reconstruction Algorithm in Wireless Sensor NetworkZhi Zhao, Peng Pin, Weiyu Yu. 438-449 [doi]
- An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNsXiaodong Liu, Qi Liu. 450-459 [doi]
- Energy-Efficient Power Control and Resource Allocation for D2D Communications in Underlaying Cellular NetworksXiaoxiao Guan, Xiangping Zhai, Jiabin Yuan, Hu Liu. 460-471 [doi]
- Virtual Machine Placement Based on Metaheuristic for IoT CloudShin-Yun Huang, Chen-Chi Liao, Yao-Chung Chang, Han-Chieh Chao. 472-482 [doi]
- A Novel Kalman Filter Based NLOS Localization Method for Wireless Sensor NetworksLong Cheng 0002, Yuchao Shao, Yan Wang. 483-494 [doi]
- An Improved Localization Algorithm for Anisotropic Sensor NetworksXiaoyong Yan, Zhong Yang, Yu Liu, Zhong Su, Huijun Li. 495-507 [doi]
- Further Results on Finite-Time Stability of Switched Static Neural NetworksZhihua Diao, Chunying Diao, Xiaoliang Qian, Yuanyuan Wu. 508-518 [doi]
- An Improved Artificial Immune Network Based on the Secondary Immune Mechanism for Data ClusteringYangyang Li, Xiaoju Hou, Licheng Jiao, Yu Xue. 519-530 [doi]
- Analysis of User's Abnormal Behavior Based on Behavior Sequence in Enterprise NetworkHaichao Guan, Huakang Li, Guozi Sun. 531-541 [doi]
- An Efficient Speeding up Algorithm of Frobenius Based Scalar Multiplication on Koblitz Curves for Cloud ComputingYunqi Dou, Chuangui Ma, Yanbin Li, Fushan Wei. 542-551 [doi]
- Consensus of Multi-agent Systems with State ConstraintsQingling Wang. 552-560 [doi]