Abstract is missing.
- Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the CloudShaojing Fu, Yunpeng Yu, Ming Xu. 3-15 [doi]
- Probability-p Order-Preserving EncryptionCe Yang, Weiming Zhang, Jiachen Ding, Nenghai Yu. 16-28 [doi]
- DLPDS: Learning Users' Information Sharing Behaviors for Privacy Default Setting in Recommender SystemHongchen Wu, Huaxiang Zhang. 29-39 [doi]
- New Construction of Low-Hit-Zone Frequency Hopping Sequence Sets with Optimal Partial Hamming CorrelationZhengqian Li, Pinhui Ke, Zhifan Ye. 40-49 [doi]
- Detecting and Preventing DDoS Attacks in SDN-Based Data Center NetworksPo-Ching Lin, Yu-Ting Hsu, Ren-Hung Hwang. 50-61 [doi]
- Bayesian Game Based Pseudo Honeypot Model in Social NetworksMiao Du, Yongzhong Li, Qing Lu, Kun Wang. 62-71 [doi]
- Conducting Correlated Laplace Mechanism for Differential PrivacyHao Wang 0033, ZhengQuan Xu, Lizhi Xiong, Tao Wang. 72-85 [doi]
- A Symmetric Authenticated Proxy Re-encryption Scheme with Provable SecurityZhiniang Peng, Shaohua Tang, Linzhi Jiang. 86-99 [doi]
- Quantum Secret Sharing in Noisy EnvironmentMing-Ming Wang, Zhiguo Qu, Mohamed Elhoseny. 100-112 [doi]
- SimHash-Based Similar Neighbor Finding for Scalable and Privacy-Preserving Service RecommendationYanwei Xu, Lianyong Qi. 113-122 [doi]
- Universally Composable Three-Party Password Authenticated Key ExchangeQihui Zhang, Xuexian Hu, Jianghong Wei, Wenfen Liu. 123-137 [doi]
- A High-Capacity Quantum Secret Sharing Protocol Based on Single D-Level ParticlesXiang Lin, Juan Xu, Hu Liu, Xuwei Tang, Maomao Fu. 138-146 [doi]
- An Inconsistency Detection Method for Security Policy and Firewall Policy Based on CSP SolverYi Yin, Yuichiro Tateiwa, Yun Wang, Yoshiaki Katayama, Naohisa Takahashi. 147-161 [doi]
- Reversible Data Hiding in Encrypted Image Based on Block Classification ScramblingFan Chen, HongJie He, Tinghuai Ma, Shu Yan. 162-174 [doi]
- A Mutation Approach of Detecting SQL Injection VulnerabilitiesYanyu Huang, Chuan Fu, Xuan Chen, Hao Guo, Xiaoyu He, Jin Li, Zheli Liu. 175-188 [doi]
- A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud ComputingFan Wu 0003, Lili Xu. 189-200 [doi]
- An Anonymous User Authentication and Key Distribution Protocol for Heterogenous Wireless Sensor NetworkXin Zhang, Fengtong Wen. 201-215 [doi]
- Privacy-Preserving Multi-party Aggregate Signcryption for Heterogeneous SystemsShufen Niu, Zhenbin Li, Caifen Wang. 216-229 [doi]
- An Enhanced Method of Trajectory Privacy Preservation Through Trajectory ReconstructionYan Dai, Jie Shao. 230-243 [doi]
- Efficient and Short Identity-Based Deniable Authenticated EncryptionChunhua Jin, Jianyang Zhao. 244-255 [doi]
- Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan SchemeGang Du, Chunguang Ma, Zengpeng Li, Ding Wang. 256-267 [doi]
- Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in CloudRui Guo, Xiong Li, Dong Zheng. 268-279 [doi]
- Detect Storage Vulnerability of User-Input Privacy in Android Applications with Static and Dynamic AnalysisLi Jiang, Yi Zhuang. 280-291 [doi]
- Certificateless Cryptography with KGC Trust Level 3 RevisitedFei Li 0006, Wei Gao, Dongqing Xie, Chunming Tang. 292-304 [doi]
- Server-Less Lightweight Authentication Protocol for RFID SystemJing Li, Zhiping Zhou, Ping Wang. 305-314 [doi]
- Efficient CP-ABE with Non-monotonic Access StructuresYong Cheng, Huaizhe Zhou, Jun Ma, Zhiying Wang. 315-325 [doi]
- Image Authentication Based on Least Significant Bit Hiding and Double Random Phase Encoding TechniqueFaliu Yi, Yousun Jeoung, Ruili Geng, Inkyu Moon. 326-335 [doi]
- On-Line Intrusion Detection Model Based on Approximate Linear Dependent Condition with Linear Latent Feature ExtractionJian Tang, Meijuan Jia, Jian Zhang, Meiying Jia. 336-345 [doi]
- Differential Direction Adaptive Based Reversible Information HidingFeipeng Lin, Bo Wang, Yabin Li. 346-356 [doi]
- Detection of Jitterbug Covert Channel Based on Partial Entropy TestHao Wang, Guangjie Liu, Weiwei Liu, Jiangtao Zhai, Yuewei Dai. 357-368 [doi]
- Frame-Deletion Detection for Static-Background Video Based on Multi-scale Mutual InformationYanjia Zhao, Tianming Pang, Xiaoyun Liang, Zhaohong Li. 371-384 [doi]
- Learning Based Fast H.264/AVC to HEVC INTRA Video Transcoding for Cloud Media ComputingYun Zhang, Na Li, Zongju Peng. 385-395 [doi]
- A Perceptual Encryption Scheme for HEVC Video with Lossless CompressionJuan Chen, Fei Peng, Min Long. 396-407 [doi]
- Spatial-Temporal Correlation Based Multi-resolution Hybrid Motion Estimation for Frame Rate Up-ConversionBingyu Ji, Ran Li, Chang-An Wu. 408-417 [doi]
- A Robust Seam Carving Forgery Detection Approach by Three-Element Joint Density of Difference MatrixWenwu Gu, Gaobo Yang, Dengyong Zhang, Ming Xia. 418-432 [doi]
- Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) ThresholdXuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu. 433-440 [doi]
- Kernel Searching Strategy for Recommender Searching MechanismLi Zhou, Weiwei Yuan, Kangya He, Chenliang Li, Qiang Li. 441-449 [doi]
- A Robust Quantum Watermark Algorithm Based on Quantum Log-Polar ImagesZhiguo Qu, Zhenwen Cheng, Ming-Ming Wang. 450-460 [doi]
- Adaptive Hybrid Wavelet Regularization Method for Compressive ImagingLingjun Liu, Weiyu Yu, Cui Yang. 461-470 [doi]
- Registration of OCT Fundus Images with Color Fundus Images Based on Invariant FeaturesPing Li, Qiang Chen, Wen Fan, Songtao Yuan. 471-482 [doi]
- View-Based 3D Model Retrieval Based on Distance LearningYang Shi, Nannan Liu, Xingjian Long, Lei Xu. 483-493 [doi]
- PCANet for Color Image Classification in Various Color SpacesJiasong Wu, Shijie Qiu, Rui Zeng, Lotfi Senhadji, Huazhong Shu. 494-505 [doi]
- A Method of Group Behavior Analysis for Enhanced Affinity PropagationXinning Li, Zhiping Zhou, Lele Liu. 506-517 [doi]
- A Median Filtering Forensics Approach Based on Machine LearningBin Yang, Zhenyu Li, Weifeng Hu, Enguo Cao. 518-527 [doi]
- Spatiotemporal Radio Tomographic Imaging with Bayesian Compressive Sensing for RSS-Based Indoor Target LocalizationBaolin Shang, Jiaju Tan, Xiaobing Hong, Xuemei Guo, Guoli Wang, Gonggui Liu, Shouren Xue. 528-540 [doi]
- Detection in SAR Images Based on Histogram and Improved Elitist Genetic Fuzzy ClusteringRonghua Shang, Weitong Zhang, Licheng Jiao. 541-553 [doi]
- Research on Cognitive Radio Spectrum Sensing Method Based on Information GeometryQiang Chen, Pin Wan, Yonghua Wang 0001, Jiangfan Li, Yirui Xiao. 554-564 [doi]
- Android Malware Detection Using Hybrid Analysis and Machine Learning TechniqueFan Yang, Yi Zhuang, Jun Wang. 565-575 [doi]
- Workload-Aware Page-Level Flash Translation Layer for NAND Flash-Based Storage SystemsHuibing Wang, Mingwei Lin, Jinbo Xiong, Li Lin, Ruliang Xiao. 576-588 [doi]
- Biclustering Evolutionary Spatiotemporal Community in Global Trading NetworkLeiming Yan, Zeyu Chen, Ping Zang. 589-598 [doi]
- Cost Optimization for Time-Bounded Request Scheduling in Geo-Distributed DatacentersXiaohui Wei, Lanxin Li, Xingwang Wang, Yuanyuan Liu. 601-610 [doi]
- The Application of Naive Bayes Classifier in Name DisambiguationNa Li, Jin Han. 611-618 [doi]
- Mobility Prediction-Based Service Scheduling Optimization Algorithm in CloudletsLei Shi, Xi Fu, Jing Li. 619-630 [doi]
- Single Appliance Recognition Using Statistical Features Based k-NN ClassificationQi Liu, Hao Wu, Xiaodong Liu, Nigel Linge. 631-640 [doi]
- Performance Measurement and Configuration Optimization of Virtual Machines Based on the Bayesian NetworkJia Hao, Binbin Zhang, Kun Yue, Juan Wang, Hao Wu. 641-652 [doi]
- Image Recapture Detection Through Residual-Based Local Descriptors and Machine LearningJian Li, Guojing Wu. 653-660 [doi]
- A Method Towards Community Detection Based on Estimation of Distribution AlgorithmYawen Chen, WenAn Tan, Yibo Pan. 661-671 [doi]
- Sentiment Analysis with Improved Adaboost and Transfer Learning Based on Gaussian ProcessYuling Liu, Qi Li, Guojiang Xin. 672-683 [doi]
- HL-HAR: Hierarchical Learning Based Human Activity Recognition in Wearable ComputingYan Liu, Wentao Zhao, Qiang Liu, Linyuan Yu, Dongxu Wang. 684-693 [doi]
- An Improved Quantum-Inspired Evolutionary Algorithm for Knapsack ProblemsSheng Xiang, Yigang He, Liuchen Chang, Kehan Wu, Chaolong Zhang. 694-708 [doi]
- Output-Based Sampled Data Control for Linear Systems: A Measurement Error Estimation ApproachYue-lin Shen, Wenbing Zhang. 709-716 [doi]
- Adaptive Firefly Algorithm with a Modified Attractiveness StrategyWenjun Wang, Hui Wang, Jia Zhao, Li Lv. 717-726 [doi]
- Newton Method for Interval Predictor Model with Sphere Parameter SetXuan Xiao, Peng Wang, Jian-Hong Wang. 727-737 [doi]
- A Conjugate Gradient Algorithm with Yuan-Wei-Lu Line SearchGonglin Yuan, Wujie Hu, Zhou Sheng. 738-746 [doi]
- IU-PMF: Probabilistic Matrix Factorization Model Fused with Item Similarity and User SimilarityYilong Shi, Hong Lin, Yuqiang Li. 747-758 [doi]
- New Delay-Dependent Stability for Neutral Systems with Its Application to Partial Circuit ModelTao Li, Ting Wang, Jin Deng, Li Zhang. 759-771 [doi]
- A Quantitative Evaluation Method of Surveillance Coverage of UAVs SwarmWei Li, Changxin Huang, Kaimin Chen, Songchen Han. 772-782 [doi]
- Chaos Prediction of Fast Fading Channel of Multi-rates Digital Modulation Using Support Vector MachinesYijing Ren, Ren Ren. 783-790 [doi]
- System Log-Based Android Root State DetectionJunjie Jin, Wei Zhang. 793-798 [doi]
- Quantified Attribute Access Control Model for Cloud Storage PlatformDongmin Li, Jing Li, Sai Liu, Chao Wang. 799-804 [doi]
- Dynamically-Enabled Defense Effectiveness Evaluation in Home Internet Based on Vulnerability AnalysisTing Wang, Min Lei, Jingjie Chen, Shiqi Deng, Yu Yang. 805-815 [doi]
- The Formal Transformation of AADL Based on Z-CoIAFugao Zhang, Zining Cao. 816-822 [doi]
- Masking Signature Data Errors of Software-Based Control Flow Checking Techniques Employing Redundancy SignatureLiping Liu, Linlin Ci, Wei Liu. 823-828 [doi]
- The Analysis of Key Nodes in Complex Social NetworksYibo Pan, WenAn Tan, Yawen Chen. 829-836 [doi]
- Novel Schemes for Bike-Share Service Authentication Using Aesthetic QR Code and Color Visual CryptographyLi Li, Lina Li, Shanqing Zhang, Zaorang Yang, Jianfeng Lu, Chin-Chen Chang. 837-842 [doi]
- An Improved RFID Search ProtocolPing Wang, Zhiping Zhou. 843-848 [doi]
- A Developmental Evolutionary Algorithm for 0-1 Knapsack ProblemMing Zhong, Bo Xu. 849-854 [doi]
- WiSmart : Robust Human Access and Identification for Smart Homes Using WiFi SignalsShangqing Liu, Yanchao Zhao, Bing Chen. 855-861 [doi]
- Robust Face Recognition Model with Adaptive Correction Term via Generalized Alternating Direction Method of MultipliersCan Wu, Yunhai Xiao, Wen-jie Liu. 862-873 [doi]