Abstract is missing.
- Efficient (k, n) Secret Sharing Scheme Secure against k - 2 CheatersLei Zhu, Yanxiao Liu, Yichuan Wang, Wenjiang Ji, Xinhong Hei 0001, Quanzhu Yao, Xiaoyan Zhu. 1-4 [doi]
- PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc NetworksTeng Li 0003, Jianfeng Ma, Cong Sun 0001, DaWei Wei, Ning Xi. 5-10 [doi]
- PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid SliceYinghui Zhang, Dong Zheng, Qinglan Zhao, Chengzhe Lai, Fang Ren. 11-16 [doi]
- A Novel Recommendation Model Based on Trust Relations and Item Ratings in Social NetworksHaokai Song, Qingqi Pei, Yang Xiao, Zi Li, Yong Wang. 17-23 [doi]
- Preserving Friendly-Correlations in Uncertain Graphs Using Differential PrivacyJing Hu, Wuchao Shi, Hai Liu, Jun Yan, Yuan Tian, Zhenqiang Wu. 24-29 [doi]
- Physical Layer Authentication and Identification in Wireless Network via the Locations of Surrounding Noise SourcesYongchao Dang, Yin Chen, Huihui Wu, Yulong Shen, Xiaohong Jiang. 30-35 [doi]
- Efficient ONU Migration for Fixed and Mobile Convergence Network in High-Speed Rail AreaRentao Gu, Shizong Zhang, Zidi Yan, Yuefeng Ji. 36-41 [doi]
- Limits of Covert Communication on Two-Hop AWGN ChannelsHuihui Wu, Xuening Liao, Yongchao Dang, Yulong Shen, Xiaohong Jiang. 42-47 [doi]
- Secure Transmission with Limited Feedback in MISOME Wiretap ChannelsJiao Quan, Xiaochen Li, Yeqiu Xiao, Yulong Shen, FengHua Li. 48-53 [doi]
- An Improved Amorphous Algorithm in Wireless Sensor Network Based on Approximate Equilateral Triangle Beacon SelectionShikai Shen, KaiGuo Qian, Bin Yang, Yumei She, Wu Wang, Yujian Wang. 54-60 [doi]
- A Novel Personalized Differential Privacy Mechanism for Trajectory Data PublicationFeng Tian 0004, Shuangyue Zhang, Laifeng Lu, Hai Liu, Xiaolin Gui. 61-68 [doi]
- BF-PDT: A New Name Lookup Mechanism in Content-Centric NetworkingHao Hao, Changqiao Xu, Shujie Yang, Jianfeng Guan, Yang Liu, Lujie Zhong. 69-74 [doi]
- A Novel Scheme for Phase Noise Compensation in CO-OFDM Long-Reach Passive Optical NetworksMohamed Ben Zeglam, Pin-Han Ho, Limei Peng, Shuiping Jie. 75-79 [doi]
- Resource Allocation for Throughput Optimization in Buffer-Limited Mobile Ad Hoc NetworksJia Liu, Yang Xu, Ruo Ando, Hiroki Takakura, Yifei Xu. 80-86 [doi]
- End-to-End Congestion Relief Routing Protocol for Ad Hoc NetworksYang Xu, Jia Liu, Ruo Ando, Norio Shiratori. 87-92 [doi]
- Secure and Efficient V2V Communications for Heterogeneous Vehicle Ad Hoc NetworksYanping Li, Yanjiao Qi, Laifeng Lu. 93-99 [doi]
- Multicast Delivery Delay in General Two-Hop Relay MANETsBin Yang, Zhenqiang Wu, Yulong Shen, Yuanyuan Fan. 100-103 [doi]
- An Empirical Study of Unsolicited Content Injection into a WebsiteJianming Fu, Mengfei Xie, Yingjun Wang, Xufen Mei. 104-111 [doi]
- Hierarchical CSI-fingerprints Classification for Passive Multi-person LocalizationRuncong Ma, Gwo-Jong Yu, Guilin Chen, Shenghui Zhao, Bin Yang. 112-117 [doi]
- A Flexible Frame-Oriented Host-FPGA Communication Framework for Software Defined Wireless NetworkJun Liu, Zhiwei Li, Boyan Ding, Haoyang Wu, Tao Wang. 118-124 [doi]
- Genomic Privacy Preserving Framework for High-Order SNPs Linkage Disequilibrium on Correlated SequencesHai Liu, Zhenqiang Wu, Changgen Peng, Xiujuan Lei. 125-132 [doi]
- Spectral Efficiency, Diversity Gain and Multiplexing Capacity Analysis for Massive MIMO, 5G Communications SystemKhem Narayan Poudel, Shankar Gangaju. 133-137 [doi]
- Development of a Hybrid FSO/RF System during Link MisalignmentKappala Vinod Kiran, Shikha Rathore, Ashok Kumar Turuk, Santos Kumar Das. 138-140 [doi]
- Application Oriented Sensor Database SystemG. S. R. Satyanarayana, Debarka Chakraborty, Santos Kumar Das. 141-146 [doi]
- A Privacy Measurement Method Using Network Structure EntropyWuchao Shi, Jing Hu, Jun Yan, Zhenqiang Wu, Laifeng Lu. 147-151 [doi]
- Reliability Analysis of Molecular Communication Based on Drift DiffusionXinlei Wang, Zhenqiang Wu, Jiawang Chen, Xuanwen Hao, Bo Liu. 152-157 [doi]
- A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon DivergenceShuangyuan Qiao, Yong Zeng, Lingjie Zhou, Zhihong Liu, Jianfeng Ma. 158-163 [doi]
- Delay and Capacity in Three-Dimensional Mobile Ad Hoc Networks with Packet ReplicationWu Wang, Bin Yang, Shikai Shen, Yujian Wang, Gang Fang. 164-169 [doi]
- TSMWD: A High-Speed Malicious Web Page Detection System Based on Two-Step ClassifiersZhengqi Wang, Xiaobing Feng, Yukun Niu, Chi Zhang, Jue Su. 170-175 [doi]
- An Enhanced Soft Combination Algorithm Based on CUSUM for Cooperative Spectrum SensingJingcheng Miao, Xiao-ou Song. 176-179 [doi]
- LTE Network: Coverage and Capacity Planning - 4G Cellular Network Planning around BanepaSujeet Kumar Jha, Rupa Rokaya, Amit Bhagat, Ahmed Raja Khan, Laxman Aryal. 180-185 [doi]
- Wireless Monitoring of Photovoltaics PanelsRahul Kumar Sah, Sushant Ghising, Saurab Dulal, Manish Karn, Suresh Sah. 186-189 [doi]
- Uncertain Graph Method Based on Triadic Closure Improving Privacy Preserving in Social NetworkJun Yan, Lin Zhang, Wuchao Shi, Jing Hu, Zhenqiang Wu. 190-195 [doi]
- An 802.11 MAC Optimization Mechanism Based on Throughput Proportional Fairness in Multi-rate WLANMu Yan, Yatong Wang, Su Wu, Gang Feng 0004, Shuang Qin. 196-202 [doi]
- MSIPS: Multi-tiered Security IPs Architecture for Secure SoC DesignZhao Huang, Quan Wang. 203-208 [doi]
- A Security Routing Protocol for Internet of Things Based on RPLGuojun Ma, Xing Li, Qingqi Pei, Zi Li. 209-213 [doi]
- A Transmission Mechanism of the Backup for Disaster Recovery in DCNsZhan Shi, Chenyue Wang, Qili Wen, Wei Su, Huachun Zhou, Shuai Gao. 214-219 [doi]
- Backup Path Provisioning for Service Protection against Disaster Failures in Telecom NetworksXiaowu Du, Lisheng Ma. 220-224 [doi]
- 2-OptACO: An Improvement of Ant Colony Optimization for UAV Path in Disaster RescueXiang Ji, Qingyi Hua, Chunyu Li, Junsong Tang, Anwen Wang, XiaoJiang Chen, Dingyi Fang. 225-231 [doi]
- Reputation Propagation for Web Service Composition: A Shapley Value ApproachTao Zhang, Yongzhi Wang, Guangxia Li, Jingjing Guo, Qi Li. 232-238 [doi]
- A CCA-secure Verifiable Mix-NetLong-Hai Li, Cheng-Qiang Huang, Shao-Feng Fu. 239-245 [doi]
- Performance Evaluation and Optimization for Android-Based Web ServerYajing Zhao, Jing Wang, Lei Zhang, Jingyu Wang, Qi Qi 0001. 246-251 [doi]
- Joint Resource Scheduling for Mobile Multimedia Services in Hierarchical Cloud NetworksMengjie Liu, Yatong Wang, Jiang Zhou, Gang Feng, Shuang Qin. 252-257 [doi]
- GA-based Load Balancing Algorithm for Distributed Timing TaskYiming Guo, Yulong Wang, Lei Zhang, Jingyu Wang, Qi Qi 0001. 258-262 [doi]
- The Storage of Virtual Machine Disk Image in Cloud Computing: A SurveyYuyan Zhao, Haibao Chen, Shenghui Zhao, Yihong Wang. 263-267 [doi]
- A Novel Approach for Mining Road Information from Low Precision GPS DataSiqie Zhang, Changle Li, Xun Zhou. 268-273 [doi]
- GT-SGD: A Novel Gradient Synchronization Algorithm in Training Distributed Recurrent Neural Network Language ModelsXiaoci Zhang, Naijie Gu, Robail Yasrab, Hong Ye. 274-278 [doi]
- A Low-Storage-TTP and Abuse-Free Contract Signing Protocol Based on the Schnorr SignatureYou Zhai, Guangquan Xu, Yao Zhang. 279-285 [doi]
- Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple CloudsNing Xi, Cong Sun 0001, Di Lu, Yulong Shen. 286-291 [doi]
- D2D Communication for Disaster Recovery in Cellular NetworksHui Gao, Yulong Shen, Bin Yang. 292-295 [doi]
- Big Data Application for Nepalese Government: A Proposed Solution for Labor MigrantPratima Pradhan, Subarna Shakya. 296-302 [doi]
- CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGXYongzhi Wang, Lingtong Liu, Cuicui Su, Jiawen Ma, Lei Wang, Yibo Yang, Yulong Shen, Guangxia Li, Tao Zhang, Xuewen Dong. 303-308 [doi]
- Trust-Aware Data Uploading Based on Device-to-Device CommunicationsXiaolan Liu, Bin Yang, Xiaohong Jiang. 309-313 [doi]
- Techno-Economic Evaluation of CDN Deployments in Metropolitan Area NetworksOmran Ayoub, Francesco Musumeci 0001, Massimo Tornatore, Achille Pattavina. 314-319 [doi]
- A Survey of Multipath Transport Mechanism in Software Defined NetworkKai Gao, Changqiao Xu, Jianfeng Guan, Yang Liu. 320-325 [doi]
- Provoking the Adversary by Dual Detection Techniques: A Game Theoretical FrameworkAhmed Salem, Xuening Liao, Yulong Shen, Xiang Lu. 326-329 [doi]
- Cost Effective Accommodation Planning in a Trip by Using Accommodation Advisor Query (AA-Query) in STPFBishnu Prasad Gautam, Amit Batajoo, Hiroyasu Asami. 330-336 [doi]
- A Survey on Big Data in Financial SectorAnku Jaiswal, Purrushottam Bagale. 337-340 [doi]
- A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud ComputingZiyi Han, Li Yang 0005, Qiang Liu. 341-346 [doi]
- Research on Power Allocation of Network Coding in Vehicle NetworkingJingjing Hu, Yancheng Ji, Junma Li, Danfeng Dong. 347-352 [doi]