Abstract is missing.
- Quality-Aware Query Based on Relative Source QualityMohan Li, Yanbin Sun, Le Wang, Hui Lu. 3-8 [doi]
- Railway Passenger Volume Forecast Based on Web Search Terms and Adversarial NetsWan Li, Fenling Feng. 9-20 [doi]
- RCS: Hybrid Co-scheduling Optimization in Virtualized SystemZhiqiang Zhu, Jin Wu, Lei Sun, Ruiyu Dou. 21-32 [doi]
- Remove-Duplicate Algorithm Based on Meta Search ResultHongbin Wang, Ming He, Lianke Zhou, Zijin Li, Haomin Zhan, Rang Wang. 33-44 [doi]
- Research into Effects of Shrimp Aquaculture by Extensible Mind MappingFuli Chen, Rui Fan, Bifeng Guo, Fuyu Ma, Weitao He. 45-58 [doi]
- Research of Tool State Recognition Based on CEEMD-WPTRunzhe Tao, Yonghong Zhang, Lihua Wang, Xiaoping Zhao. 59-70 [doi]
- Research on Data Mining Method for Breast Cancer Case DataYanning Cao, Xiaoshu Zhang. 71-78 [doi]
- Research on Flame Generation Method Based on Particle System and Texture MappingFei Gui, Yao-jie Chen, Ya-ting Xue. 79-89 [doi]
- Research on Indirect Location Technology of Ground Target Based on Scene MatchingLin Zhang, Ruili Zhao, Mengxing Huang, Zhonghua Liu, Jieren Cheng, Yu Zhang. 90-104 [doi]
- Research on Key Climatic Factors of Desert Based on Big DataXue Wang, Pingzeng Liu, Xuefei Liu. 105-113 [doi]
- Research on Personalized Recommendation Case Base and Data Source Based on Case-Based ReasoningJieli Sun, Zhiqing Zhu, Yanpiao Zhang, Yanxia Zhao, Yao Zhai. 114-123 [doi]
- Research on Real-Time Monitoring of Human Body Temperature Based on Fiber Bragg Grating Sensing TechnologyBin Ma, Yecheng Sun. 124-133 [doi]
- Revisiting Anonymous Two-Factor Authentication Schemes for Cloud ComputingYaosheng Shen, Ding Wang, Ping Wang 0002. 134-146 [doi]
- Serialization of Lifecycles in ACBP Model as Regular ExpressionsJunbao Zhang, Guohua Liu, Zhao Chen. 147-156 [doi]
- Social Networks Node Mining Algorithm of Based on Greedy SubgraphHongbin Wang, Guisheng Yin, Lianke Zhou, Yupeng Zhang, Zhen Cao. 157-168 [doi]
- Study on Cloud Logistics Distribution Model of Agricultural ProductsJianbiao Huang, Linli Tao. 169-181 [doi]
- Teaching Video Recommendation Based on Student EvaluationJie Zhang, Yongsheng Zhang, Xiaolong Wu, Guoyun Li. 182-190 [doi]
- A Temporal Collaborative Filtering Algorithm Based on Purchase CycleYixuan Chai, Guohua Liu, Zhao Chen, Feng Li, Yue Li, Esther Astaewwa Effah. 191-201 [doi]
- Temporal Evolution Data Model for Heterogeneous Entities: Modeling with Temporal and Evolution InformationDan Yang, Tiezheng Nie, Jing Zhang. 202-211 [doi]
- The Application of Distributed Database on Spectrum Big DataZhenjia Chen, Yonghui Zhang, Xia Guo. 212-222 [doi]
- The Benchmark Performance Testing Method for Cluster Heterogeneous Network Based on STC PlatformJunhua Xi, Kouquan Zheng. 223-231 [doi]
- The Classification of Traditional Chinese Painting Based on CNNQingyu Meng, Huanhuan Zhang, Mingquan Zhou, Shifeng Zhao, Pengbo Zhou. 232-241 [doi]
- The Design and Implementation of a Backup and Disaster Recovery System for vSphere Data Center Based on Swift Cloud StorageYanchao Guo, Linfeng Wei, Jianzhu Lu. 242-253 [doi]
- The Handoff Mechanism Based on Mobile Location PredictionYu-Xiang Wang, Qi Wang, Zhi-feng Zhou. 254-264 [doi]
- The New Progress in the Research of Binary Vulnerability AnalysisTiantian Tan, Baosheng Wang, Zhou Xu, Yong Tang. 265-276 [doi]
- The New Progress in the Research of Binary Vulnerability ExploitsTiantian Tan, Baosheng Wang, Zhou Xu, Yong Tang. 277-286 [doi]
- The Quasi-circular Mapping Visualization Based on Extending and Reordering Dimensions for Visual Clustering AnalysisShan Huang, Ming Li, Hao Chen. 287-299 [doi]
- The Research on Security Audit for Information System Classified ProtectionHui Lu, Xiang Cui, Le Wang, Yu Jiang, Meng Cui. 300-308 [doi]
- Topk Service Composition Algorithm Based on Optimal QoSGen Li, Kejie Wen, Yaxuan Wu, Baili Zhang. 309-321 [doi]
- Towards Multi-task Fair Sharing for Multi-resource Allocation in Cloud ComputingLihua Zhao, Minghui Du, Weibao Lei, Lin Chen, Lei Yang. 322-333 [doi]
- Towards the Cloud Computing from Services to Securities and ChallengesShuyan Yu. 334-343 [doi]
- Traffic Accident Time Series AnalysisChao Zhang, Junmei Wang, Pingzeng Liu, Wanming Ren, Weijie Chen, Yanyan Wang. 344-356 [doi]
- VAT: A Velocity-Aware Trajectory Privacy Preservation Scheme for IoT SearchingYuhang Wang, Hongli Zhang 0001, Shen Su. 357-365 [doi]
- Video Quality Assessment Algorithm Based on Persistence-of-Vision EffectPai Liu, Fenlin Liu, Daofu Gong. 366-376 [doi]
- Workflow Task Scheduling Algorithm Based on IFCM and IACOQin Liu, Tinghuai Ma, Jian Li, Wenhai Shen. 377-388 [doi]
- Research on Intuitionistic Fuzzy Multiple Output Least Squares Support Vector RegressionDingcheng Wang, Yiyi Lu, Beijing Chen, Liming Chen. 389-398 [doi]
- A Blind Signature Scheme with Disclaimer Contract in the Standard ModelLiming Zuo, Mengli Zhang, Tingting Zhang, Kaiyu Hu. 401-412 [doi]
- A CP-ABE Access Control Scheme Based on Proxy Re-encryption in Cloud StorageHaiyong Wang, Yao Peng. 413-425 [doi]
- A Delay Step Based Geolocation Data Verification MethodXiaoming Zhang, Zhanfeng Wang, Xianglin Wei, Zihan Zhuo, Chao Hu. 426-438 [doi]
- A Distributed Security Feature Selection Algorithm Based on K-means in Power Grid SystemJunquan Yang, Song Liu, Wenwei Tao, Chao Hu. 439-449 [doi]
- A Network Illegal Access Detection Method Based on PSO-SVM Algorithm in Power Monitoring SystemYang Su, Wenzhe Zhang, Wenwen Tao, Zhizhong Qiao. 450-459 [doi]
- A New Steganographic Distortion Function with Explicit Considerations of Modification InteractionsHongrun Zhang, Bin Li, Shunquan Tan. 460-471 [doi]
- A Novel Detection Method for Word-Based DGALuhui Yang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Zhaozhi Yan, Yuguang Zou, Wenchao Huang. 472-483 [doi]
- A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data OwnersCheng Guo, Pengxu Tian, Yingmo Jie, Xinyu Tang. 484-495 [doi]
- A Privacy-Preserving Classifier in Statistic Pattern RecognitionQi Wang, Dehua Zhou, Quanlong Guan, Yanling Li, Jimian Yang. 496-507 [doi]
- A Robust Algorithm of Encrypted Face Recognition Based on DWT-DCT and Tent MapTong Xiao, JingBing Li, Jing Liu, Jieren Cheng, Uzair Aslam Bhatti. 508-518 [doi]
- A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud StorageWei Luo, Wenping Ma. 519-530 [doi]
- A Security Protocol for Access to Sensitive Data in Trusted Cloud ServerMengmeng Yao, Dongsheng Zhou, Rui Deng, Mingda Liu. 531-542 [doi]
- A Study on Revenue Distribution of Information Sharing in the C2M Supply ChainChunxia Liu, Youyu Chen, Shu Tong, Wangdong Jiang, Guang Sun. 543-552 [doi]
- A Tag-Based Protection Method for Multi-tenant Data SecurityXin Lu, Lifeng Cao, Xuehui Du, Zhiyan Hu. 553-565 [doi]
- A Web Application Runtime Application Self-protection Scheme against Script Injection AttacksZhongxu Yin, Zhufeng Li, Yan Cao. 566-577 [doi]
- An Architecture of Secure Health Information Storage System Based on Blockchain TechnologyHuirui Han, Mengxing Huang, Yu Zhang, Uzair Aslam Bhatti. 578-588 [doi]
- An Evolutionary Algorithm Based on Multi-view and Prior Information for Community DetectionXiaofeng Ma, Xiaofeng Song, Chao Fan, Xi Wang. 589-600 [doi]
- An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual AssetsPing Lin, Tao Li, XiaoJie Liu, Hui Zhao, Jin Yang, Fangdong Zhu. 601-611 [doi]
- Botnet Detection with Hybrid Analysis on Flow Based and Graph Based Features of Network TrafficYaoyao Shang, Shuangmao Yang, Wei Wang. 612-621 [doi]
- Clustering Algorithm for Privacy Preservation on MapReduceZheng Zhao, Tao Shang, Jianwei Liu, Zhengyu Guan. 622-632 [doi]
- Consistency Guarantee Method of Electronic Record Based on Blockchain in Cloud StorageYongjun Ren, Linhui Kong, Yepeng Liu, Jin Wang 0001. 633-642 [doi]
- Controlled Remote Preparation of an Arbitrary Two-Qubit State via the Brown State Under the Noisy EnvironmentTing Dong, Song-Ya Ma, Pei Zhang. 643-653 [doi]
- DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering AlgorithmRuizhi Zhang, Jieren Cheng, Xiangyan Tang, Qiang Liu 0004, Xiangfeng He. 654-669 [doi]
- DDoS Attacks Detection and Traceback Method Based on Flow Entropy Algorithm and MPLS PrincipleXiaohui Yang, Yue Yu. 670-683 [doi]
- Design and Application of Agricultural Product Traceability Management PlatformBangguo Li, Pingzeng Liu, Xiaotong Wu, Xue Wang, Rui Zhao. 684-693 [doi]
- Design and Implementation of the Product Quality Traceability System for Winter JujubeBangguo Li, Pingzeng Liu, Xiaotong Wu, Jianyong Zhang. 694-705 [doi]
- Design and Implementation of Web System Based on BlockchainTing Xiao, Yongfeng Huang. 706-717 [doi]
- Design and Verification of a Security Policy to Defense DDoS Attack for Cloud RobotBoyi Liu, Xiangyan Tang, Jieren Cheng, Jiquan Chen. 718-730 [doi]
- Detecting Inconsistency and Incompleteness in Access Control PoliciesHongbin Zhang, Pengcheng Ma, Meihua Wang. 731-739 [doi]