Abstract is missing.
- Digital Continuity Guarantee Based on Data Consistency in Cloud StorageYongjun Ren, Yepeng Liu, Chengshan Qian. 3-11 [doi]
- Dynamic Risk Access Control Model for Cloud PlatformLixia Xie, Ruixin Wei, Yuguang Ning, Hongyu Yang. 12-22 [doi]
- Efficient Multiparty Quantum Secret Sharing Scheme in High-Dimensional SystemMingming Wang, Lu-Ting Tian, Zhiguo Qu. 23-31 [doi]
- EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region ExtensionHonghao Zhou, Tinghuai Ma, Jing Jia, Yuan Tian 0003, Mznah Al-Rodhaan. 32-43 [doi]
- Fast Detection of Heavy Hitters in Software Defined Networking Using an Adaptive and Learning MethodZhiliang Wang, Changping Zhou, Yang Yu, Xingang Shi, Xia Yin, Jiangyuan Yao. 44-55 [doi]
- Focused Crawler Framework Based on Open Search EngineJiawei Liu, Yongfeng Huang. 56-68 [doi]
- Identity Based Privacy Information Sharing with Similarity Test in Cloud EnvironmentFaguo Wu, Wang Yao, Xiao Zhang, Zhiming Zheng 0001, Wenhua Wang. 69-78 [doi]
- Image Encryption and Compression Based on a VAE Generative ModelXintao Duan, Jingjing Liu, En Zhang, Haoxian Song, Kai Jia. 79-89 [doi]
- Improved Two-Factor Authentication Protocol Based on Biometric Feature and Password for Cloud ServiceJian Song, Bo-ru Xu, Guo-chao Zhang, Guangsong Li, Chuangui Ma, Ai-jun Ge. 90-100 [doi]
- Mass Discovery of Android Malware Behavioral Characteristics for Detection ConsiderationXin Su 0004, Weiqi Shi, Jiuchuan Lin, Xin Wang. 101-112 [doi]
- Medical Information Access Control Method Based on Weighted Information EntropyLijuan Zheng, Linhao Zhang, Meng Cui, Jianyou Chen, Shaobo Yang, Zhaoxuan Li. 113-122 [doi]
- Modeling and Analysis of a Hybrid Authentication Protocol for VANETYang Xu, Ziwang Wang, Lei Huang, Xiaoyao Xie. 123-137 [doi]
- Modeling and Data Analysis of the Balise SystemShuai Zhang, Zhiwei Gao, Li Cui. 138-150 [doi]
- Network Attack Prediction Method Based on Threat IntelligenceJunshe Wang, Yuzi Yi, Hongbin Zhang, Ning Cao. 151-160 [doi]
- Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game ModelJianyi Liu, Fangyu Weng, Ru Zhang, Yunbiao Guo. 161-173 [doi]
- Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud StorageYongjun Ren, Lin Zhou, Yepeng Liu, Xiaorui Zhang. 174-183 [doi]
- Privacy-Preserved Prediction for Mobile Application AdoptionChangxu Wang, Jing Chu. 184-194 [doi]
- Privacy-Preserving Credit Scoring on CloudJilin Wang, Yingzi Chen, Xiaoqing Feng. 195-205 [doi]
- QS-Code: A Quasi-Systematic Erasure Code with Partial Security for Cloud StorageChong Wang, Ke Zhou 0001, Ronglei Wei. 206-216 [doi]
- Research and Application of Traceability Model for Agricultural ProductsXiaotong Wu, Pingzeng Liu, Jianrui Ding, Changqing Song, Bangguo Li, Xueru Yu. 217-226 [doi]
- Research on Risk Aversion Enterprise Financial Crisis Warning Based on Support Vector Data DescriptionXiang Yu, Shuang Chen, Yanbo Li, Hui Lu, Le Wang. 227-233 [doi]
- Research on Trust Management Model in Cloud ManufacturingXiaolan Xie, Xiao Zhou, Tianwei Yuan. 234-244 [doi]
- Resource Allocation Based on Reverse Auction Algorithm in Edge Computing EnvironmentXinfeng Zhu, Zhihao Zhang, Yanling Wang, Guohai Wang. 245-252 [doi]
- RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue ModelZhongliang Yang, Pengyu Zhang, Minyu Jiang, Yongfeng Huang, Yu-Jin Zhang. 253-264 [doi]
- Searchable Encryption Scheme Based on CPABE with Attribute Update in a Cloud Medical EnvironmentJingzhang Sun, Chunjie Cao, Hui Li. 265-276 [doi]
- Secure File Storage System Among Distributed Public CloudsXiMing Li, Weizhao Chen, Yubin Guo, Senyang Zhang, Qiong Huang. 277-289 [doi]
- Security Strategy of Campus Network Data Center in Cloud EnvironmentGe Suhui, Wan Quan, Sun Wenhui. 290-297 [doi]
- SLIDE: An Efficient Secure Linguistic Steganography Detection ProtocolLinghao Zhang, Sheng Wang, Wei Gan, Chao Tang, Jie Zhang, Huihui Liang. 298-309 [doi]
- Study on the Development of U.S. Intercontinental Alliance Clean Renewable Energy Based on CA-DEA ModelYazhou Dong, Mengxing Huang, Di Wu, Xijun He, Zhaoqing Wang, Uzair Aslam Bhatti. 310-321 [doi]
- SU-IDS: A Semi-supervised and Unsupervised Framework for Network Intrusion DetectionErxue Min, Jun Long, Qiang Liu 0004, Jianjing Cui, Zhiping Cai, Junbo Ma. 322-334 [doi]
- Using Blockchain for Data Auditing in Cloud StorageChunhua Li, Jiaqi Hu, Ke Zhou, Yuanzhang Wang, Hongyu Deng. 335-345 [doi]
- A Chaotic Searchable Image Encryption Scheme Integrating with Block Truncation CodingMingfang Jiang, Guang Sun. 349-358 [doi]
- A Face Privacy Protection Algorithm Based on Block Scrambling and Deep LearningWei Shen, Zhendong Wu, Jianwu Zhang. 359-369 [doi]
- A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery AttackYunhao Ling, Sha Ma, Qiong Huang, XiMing Li. 370-382 [doi]
- A Hash-Based Public Key CryptosystemQian Yin, Gang Luo. 383-392 [doi]
- A Homomorphic Masking Defense Scheme Based on RSA Cryptography AlgorithmJuanmei Zhang, Zichen Li, Yafei Sun, Boya Liu, Yatao Yang. 393-402 [doi]
- A New Dependency Parsing Tree Generation Algorithm Based on the Semantic Dependency Relationship Between WordsJin Han, Wen Long Xu, Yu Ting Jing. 403-411 [doi]
- A Novel Hierarchical Identity-Based Encryption Scheme from LatticesQing Ye, Mingxing Hu, Wei Gao, Yongli Tang. 412-422 [doi]
- A Novel Hierarchical Identity-Based Fully Homomorphic Encryption Scheme from LatticesMingxing Hu, Qing Ye, Wei Gao, Yongli Tang. 423-434 [doi]
- A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key GenerationHongjian Yin, Leyou Zhang, Yi Mu 0001. 435-446 [doi]
- A Robust Fingerprint Identification Method by Deep Learning with Gabor Filter Multidimensional Feature ExpansionJiajia Yang, Zhendong Wu, Jianwu Zhang. 447-457 [doi]
- A Survey on the New Development of Medical Image Security AlgorithmsYun Tan, Jiaohua Qin, Ling Tan, Hao Tang 0006, Xuyu Xiang. 458-467 [doi]
- Adaptively Chosen Ciphertext Secure Lattice IBE Based Programmable Hash Function in the Standard ModelYongli Tang, Mingming Wang, Zongqu Zhao, Qing Ye. 468-478 [doi]
- An Efficient and Secure Key Agreement Protocol Preserving User Anonymity Under Chebyshev Chaotic MapsHong Lai, Mingxing Luo, Li Tao, Fuyuan Xiao, Cheng Zhan, Xiaofang Hu. 479-489 [doi]
- An Efficient Privacy-Preserving Handover Authentication Scheme for Mobile Wireless NetworkJiaqing Mo, Zhongwang Hu, Yuhua Lin. 490-505 [doi]
- Analysis and Improvement on an Image Encryption Algorithm Based on Bit Level PermutationBin Lu, Fenlin Liu, Ping Xu, Xin Ge. 506-518 [doi]
- Attribute-Based Encryption Scheme Supporting Tree-Access Structure on Ideal LatticesJinxia Yu, Chaochao Yang, Yongli Tang, Xixi Yan. 519-527 [doi]
- Big Data Security Framework Based on EncryptionShaobing Wu, Changmei Wang. 528-540 [doi]
- Controlled Bidirectional Remote Preparation of Single- and Two-Qubit StateYi-Ru Sun, Gang Xu, Xiu-Bo Chen, Yi Xian Yang. 541-553 [doi]
- Efficient Group Signature Scheme Over NTRU LatticeQing Ye, Xiaomeng Yang, Xixi Yan, Zongqu Zhao. 554-562 [doi]
- Error Tolerant ASCA on FPGAChujiao Ma, John A. Chandy. 563-572 [doi]
- Fuzzy Identity-Based Signature from Lattices for Identities in a Large UniverseYanhua Zhang, Yong Gan, Yifeng Yin, Huiwen Jia, Yinghui Meng. 573-584 [doi]
- Improvement of STDM Watermarking Algorithm Based on Watson ModelWenting Jiang, Zhongmiao Kang, Yan Chen. 585-595 [doi]
- Improving Privacy-Preserving CP-ABE with Hidden Access PolicyLeyou Zhang, Yilei Cui, Yi Mu 0001. 596-605 [doi]
- Integral and Impossible Differential Cryptanalysis of RC6Hongguo Zhu, Xin Hai, Jiuchuan Lin. 606-616 [doi]
- Multi-class Imbalanced Learning with One-Versus-One Decomposition: An Empirical StudyYanjun Song, Jing Zhang, Han Yan, Qianmu Li. 617-628 [doi]
- Multiple Schemes for Bike-Share Service Authentication Using QR Code and Visual CryptographyLi Li 0014, Jier Yu, Bing Wang, Qili Zhou, Shanqing Zhang, Jianfeng Lu, Chin-Chen Chang. 629-640 [doi]
- Power Network Vulnerability Detection Based on Improved Adaboost AlgorithmWenwei Tao, Song Liu, Yang Su, Chao Hu. 641-650 [doi]
- Privacy Preserving for Big Data Based on Fuzzy SetJun Wu, Chunzhi Wang. 651-659 [doi]
- Quantum Private Comparison Based on Delegating Quantum ComputationHaibin Wang, Daomeng Pan, Wenjie Liu 0001. 660-669 [doi]
- Reversible Data Hiding in Partially-Encrypted ImagesHaishan Chen, Wien Hong, Jiangqun Ni, Tung-Shou Chen. 670-679 [doi]
- Secure Multiparty Quantum Summation Based on d-Level Single ParticlesXin Tang, Gang Xu, Kun-Chang Li, Xiu-Bo Chen, Yi Xian Yang. 680-690 [doi]
- Survey and Analysis of Cryptographic Techniques for Privacy Protection in Recommender SystemsTaiwo Blessing Ogunseyi, Cheng Yang. 691-706 [doi]
- The CP-ABE with Full Verifiability Outsourced Decryption and White-Box TraceabilityCong Li, Xiaoyuan Yang, Yazhou Liu, Xu an Wang. 707-719 [doi]