Abstract is missing.
- An Efficient and Secure Range Query Scheme for Encrypted Data in Smart GridXiaoli Zeng, Min Hu, Nuo Yu, Xiaohua Jia. 1-18 [doi]
- Receive Buffer Pre-division Based Flow Control for MPTCPJiangping Han, Kaiping Xue, Hao Yue, Peilin Hong, Nenghai Yu, FengHua Li. 19-31 [doi]
- On Complementary Effect of Blended Behavioral Analysis for Identity Theft Detection in Mobile Social NetworksCheng Wang, Jing Luo, Bo Yang, Changjun Jiang. 32-44 [doi]
- A Hierarchical Framework for Evaluation of Cloud Service QualitiesQi Wang, Mingwei Liu, KaiQu Chen, Yu Zhang, Jing Zheng. 45-54 [doi]
- Facility Location Selection Using Community-Based Single Swap: A Case StudyRixin Xu, Zijian Zhang, Jiamou Liu, Nathan Situ, Jun Ho Jin. 55-69 [doi]
- Message Transmission Scheme Based on the Detection of Interest Community in Mobile Social NetworksYing Cai, Linqing Hou, Yanfang Fan, Ruoyu Chen. 70-83 [doi]
- An Improved Lossless Data Hiding Scheme in JPEG Bitstream by VLC MappingYang Du, Zhaoxia Yin, Xinpeng Zhang. 84-98 [doi]
- Co-saliency Detection Based on Siamese NetworkZhengchao Lei, Weiyan Chai, Sanyuan Zhao, Hongmei Song, Fengxia Li. 99-109 [doi]
- An Efficient Privacy-Preserving Fingerprint-Based Localization Scheme Employing Oblivious TransferMengxuan Sun, Xiaoju Dong, Fan Wu, Guihai Chen. 110-132 [doi]
- An Efficient Sparse Coding-Based Data-Mining Scheme in Smart GridDongshu Wang, Jialing He, Mussadiq Abdul Rahim, Zijian Zhang, Liehuang Zhu. 133-145 [doi]
- Achieving Communication Effectiveness of Web Authentication Protocol with Key UpdateZijian Zhang, Chongxi Shen, Liehuang Zhu, Chen Xu, Salabat Khan Wazir, Chuyi Chen. 146-162 [doi]
- Placement Fraud Detection on Smart Phones: A Joint Crowdsourcing and Data Analyzing Based ApproachBo Wang, Fan Wu, Guihai Chen. 163-179 [doi]
- A Reinforcement Learning Approach of Data Forwarding in Vehicular NetworksPengfei Zhu, Lejian Liao, Xin Li. 180-194 [doi]
- Privacy-Assured Large-Scale Navigation from Encrypted Approximate Shortest Path RecommendationZhenkui Shi. 195-211 [doi]
- An Efficient and Secure Authentication Scheme for In-vehicle Networks in Connected VehicleMengjie Duan, Shunrong Jiang, Liangmin Wang. 212-226 [doi]
- Research of Task Scheduling Mechanism Based on Prediction of Memory UtilizationJuan Fang, Mengxuan Wang, Hao Sun. 227-236 [doi]
- An Effective Method for Community Search in Large Directed Attributed GraphsZezhong Wang, Ye Yuan, Guoren Wang, Hongchao Qin, Yuliang Ma. 237-251 [doi]
- EPAF: An Efficient Pseudonymous-Based Inter-vehicle Authentication Framework for VANETFei Wang, Yifan Du, Yongjun Xu, Tan Cheng, Xiaoli Pan. 252-270 [doi]
- CHAR-HMM: An Improved Continuous Human Activity Recognition Algorithm Based on Hidden Markov ModelChuangui Yang, Zhu Wang, Botao Wang, Shizhuo Deng, Guangxin Liu, Yuru Kang, Huichao Men. 271-282 [doi]
- A Prediction Method Based on Complex Event Processing for Cyber Physical SystemShaofeng Geng, Xiaoxi Guo, Jia Zhang, Yongheng Wang, Renfa Li, Binghua Song. 283-292 [doi]
- A Fast Handover Scheme for SDN Based Vehicular NetworkXing Yin, Liangmin Wang. 293-302 [doi]
- Secret-Sharing Approach for Detecting Compromised Mobile Sink in Unattended Wireless Sensor NetworksXiangyi Chen, Liangmin Wang. 303-317 [doi]
- Understanding Trajectory Data Based on Heterogeneous Information Network Using Visual AnalyticsRui Zhang, Wenjie Ma, Luo Zhong, Peng Xie, Hongbo Jiang. 318-327 [doi]
- Automatic Prediction of Traffic Flow Based on Deep Residual NetworksRui Zhang, Nuofei Li, Siyuan Huang, Peng Xie, Hongbo Jiang. 328-337 [doi]
- Trust Mechanism Based AODV Routing Protocol for Forward Node Authentication in Mobile Ad Hoc NetworkMuhammad Sohail, Liangmin Wang, Bushra Yamin. 338-349 [doi]
- Hybrid Quantum-Behaved Particle Swarm Optimization for Mobile-Edge Computation Offloading in Internet of ThingsShijie Dai, Minghui LiWang, Yang Liu, Zhibin Gao, Lianfen Huang, Xiaojiang Du. 350-364 [doi]
- Enhancing Software Reliability Against Soft Error Using Critical Data ModelLi Wei, Mingwei Xu. 365-376 [doi]
- APDL: A Practical Privacy-Preserving Deep Learning Model for Smart DevicesXinDi Ma, Jianfeng Ma, Sheng Gao, Qingsong Yao. 377-390 [doi]
- Barrier Coverage Lifetime Maximization in a Randomly Deployed Bistatic Radar NetworkJiaoyan Chen, Bang Wang, Wenyu Liu. 391-401 [doi]
- On Secrecy Performance of Multibeam Satellite System with Multiple Eavesdropped UsersYeqiu Xiao, Jia Liu, Jiao Quan, Yulong Shen, Xiaohong Jiang. 402-412 [doi]
- Gesture Recognition System Based on RFIDXuan Wang, Xin Kou, Zifan Wang, Lanqing Wang, Baoying Liu, Feng Chen 0002. 413-425 [doi]
- Understanding Data Partition for Applications on CPU-GPU Integrated ProcessorsJuan Fang, Huanhuan Chen, Junjie Mao. 426-434 [doi]
- Privacy-Preserving and Traceable Data Aggregation in Energy InternetYue Zhang, Zhitao Guan. 435-449 [doi]
- Cloud Computing: Virtual Web Hosting on Infrastructure as a Service (IaaS)Juan Fang, Zeeshan Shaukat, Saqib Ali, Abdul Ahad Zulfiqar. 450-460 [doi]
- Modeling and Evaluation of the Incentive Scheme in "E-photo"Shijie Ni, Zhuorui Yong, Ruipeng Gao. 461-472 [doi]
- Intelligent Environment Monitoring and Control System for Plant GrowthWenjuan Song, Bing Zhou, Shijie Ni. 473-482 [doi]
- TSA: A Two-Phase Scheme Against Amplification DDoS Attack in SDNZheng Liu, Mingwei Xu, Jiahao Cao, Qi Li. 483-496 [doi]
- Simulation Standardization: Current State and Cross-Platform System for Network SimulatorsZohaib Latif, Kashif Sharif, Maria K. Alvi, Fan Li. 497-508 [doi]
- Task Offloading with Execution Cost Minimization in Heterogeneous Mobile Cloud ComputingXing Liu, Songtao Guo, Yuanyuan Yang. 509-522 [doi]