Abstract is missing.
- An Efficient DDoS Detection with Bloom Filter in SDNPeng Xiao, Zhiyang Li, Heng Qi, Wenyu Qu, Haisheng Yu. 1-6 [doi]
- PrefRank: Quantification and Aggregation of Subjective User PreferencesAnirban Basu, Shinsaku Kiyomoto, Jaideep Vaidya, Stephen Marsh 0001. 7-13 [doi]
- A Robust Image Hashing with Enhanced Randomness by Using Random Walk on Zigzag BlockingXi Huang, Xiaoguang Liu, Gang Wang, Ming Su. 14-18 [doi]
- Securing Fast Learning! Ridge Regression over Encrypted Big DataShengshan Hu, Qian Wang, Jingjun Wang, Sherman S. M. Chow, Qin Zou. 19-26 [doi]
- TPAHS: A Truthful and Profit Maximizing Double Auction for Heterogeneous SpectrumsTianqi Zhou, Bing Chen, Chunsheng Zhu, Xiangping Zhai. 27-33 [doi]
- Computational Trust Model for Repeated Trust GamesQuang-Vinh Dang, Claudia-Lavinia Ignat. 34-41 [doi]
- Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi CalculusCaimei Wang, Yan Xiong, Wenchao Huang, Huihua Xia, Jianmeng Huang. 42-49 [doi]
- Node Trust Prediction Framework in Mobile Ad Hoc NetworksHui Xia, Guo-Dong Wang, Zhen-Kuan Pan. 50-56 [doi]
- Virtual TPM Dynamic Trust Extension Suitable for Frequent MigrationsFajiang Yu, Lie Chen, Huanguo Zhang. 57-65 [doi]
- Trust Enhancement over Range Search for Encrypted DataXu Yang, Ting Ting Lee, Joseph K. Liu, Xinyi Huang. 66-73 [doi]
- Healthcare Fraud Detection Based on Trustworthiness of DoctorsHaoyi Cui, Qingzhong Li, Hui Li, Zhongmin Yan. 74-81 [doi]
- Integrated Security for Services Hosted in Virtual EnvironmentsDilshan Jayarathna, Vijay Varadharajan, Udaya Kiran Tupakula. 82-89 [doi]
- A Permissioned Blockchain Framework for Supporting Instant Transaction and Dynamic Block SizeXinping Min, Qingzhong Li, Lei Liu, LiZhen Cui. 90-96 [doi]
- Trust Validation of Cloud IaaS: A Customer-centric ApproachSalman Manzoor, Ahmed Taha, Neeraj Suri. 97-104 [doi]
- Distributed Bitcoin Account ManagementXiuwen Zhou, Qianhong Wu, Bo Qin, Xinyi Huang, Jianwei Liu. 105-112 [doi]
- Trusted Boolean Search on Cloud Using Searchable Symmetric EncryptionCong Zuo, James Macindoe, Siyin Yang, Ron Steinfeld, Joseph K. Liu. 113-120 [doi]
- Astroturfing Detection in Social Media: Using Binary n-Gram Analysis for Authorship AttributionJian Peng, Kim-Kwang Raymond Choo, Helen Ashman. 121-128 [doi]
- Dynamic Attribute-Based Access Control in Cloud Storage SystemsZechao Liu, Zoe L. Jiang, Xuan Wang, Siu-Ming Yiu, Chunkai Zhang, Xiaomeng Zhao. 129-137 [doi]
- A Trust and Privacy Preserving Handover Authentication Protocol for Wireless NetworksXu Yang, Yuexin Zhang, Joseph K. Liu, YaLi Zeng. 138-143 [doi]
- Fingerprinting for Web Applications: From Devices to Related GroupsChristine Blakemore, João Redol, Miguel Correia. 144-151 [doi]
- Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote AttestationsWu Luo, Wei Liu, Yang Luo, Anbang Ruan, Qingni Shen, Zhonghai Wu. 152-159 [doi]
- Adaptive Reputation Weights Assignment Scheme for MANETsMuhammad Saleem Khan, Idrees Ahmed, Abid Khan, Majid Iqbal Khan. 160-167 [doi]
- Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical SystemsCarlton Shepherd, Ghada Arfaoui, Iakovos Gurulian, Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram, Damien Sauveron, Emmanuel Conchon. 168-177 [doi]
- An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low DelayThawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan. 178-184 [doi]
- Trust and Risk Semantics and Prediction through Big Data Analytics to Encompass Cloud Services, Cyber-Physical Systems, and Social Media: Issues and ChallengesTharam S. Dillon, Elizabeth Chang. 185-193 [doi]
- Group-Based Memory Deduplication against Covert Channel Attacks in Virtualized EnvironmentsFangxiao Ning, Min Zhu, Ruibang You, Gang Shi, Dan Meng. 194-200 [doi]
- Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment MethodologyKazuhide Fukushima, Youssef Souissi, Seira Hidano, Robert Nguyen, Jean-Luc Danger, Sylvain Guilley, Yuto Nakano, Shinsaku Kiyomoto, Laurent Sauvage. 201-207 [doi]
- DomXssMicro: A Micro Benchmark for Evaluating DOM-Based Cross-Site Scripting DetectionJinkun Pan, Xiaoguang Mao. 208-215 [doi]
- Combinational Logic Binding for FPGA System SecurityJiliang Zhang. 216-223 [doi]
- Efficient Hardware Implementation of Roadrunner for Lightweight ApplicationJuhua Liu, Guoqiang Bai, Xingjun Wu. 224-227 [doi]
- The Power of Prefix Hijackings in the Internet HierarchyYan Yang, Xingang Shi, Xia Yin, Zhiliang Wang. 228-235 [doi]
- Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud EnvironmentsHong Rong, Huimei Wang, Jian Liu, Wei Wu, Ming-xian. 236-243 [doi]
- A Deep Learning Approach to Android Malware Feature Learning and DetectionXin Su, Dafang Zhang, Wenjia Li, Kai Zhao. 244-251 [doi]
- Matching Similar Functions in Different Versions of a MalwareYajuan Xiao, Shoufeng Cao, Zhenzhong Cao, Fengyu Wang, Fengbo Lin, Jiayan Wu, Hancheng Bi. 252-259 [doi]
- Robustness of the Packet Delay ChannelsHua Jin, Changda Wang. 260-267 [doi]
- URL Based Gateway Side Phishing Detection MethodJianyi Zhang, Yang Pan, Zhiqiang Wang, Biao Liu. 268-275 [doi]
- Automatic Model Selection for Anomaly DetectionZiyu Wang, Jiahai Yang, Shize Zhang, Chenxi Li, Hui Zhang. 276-283 [doi]
- ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning via Byte EmbeddingYafei Sang, Shicong Li, Yongzheng Zhang 0002, Tao Xu. 284-291 [doi]
- Identification of Cloned HF RFID Proximity Cards Based on RF FingerprintingGuozhu Zhang, Luning Xia, Shijie Jia, Yafei Ji. 292-300 [doi]
- Automatic Mobile Application Traffic Identification by Convolutional Neural NetworksZhengyang Chen, Bowen Yu, Yu Zhang, Jianzhong Zhang, Jingdong Xu. 301-307 [doi]
- Modelling and Analysis of Network Security - An Algebraic ApproachQian Zhang, Ying Jiang, Peng Wu 0002. 308-315 [doi]
- GSLAC: A General Scalable and Low-Overhead Alert Correlation MethodLi Cheng, Yijie Wang, Xingkong Ma, Yongjun Wang. 316-323 [doi]
- Cache Control Method Mitigating Packet Concentration of Router Caused by Interest Flooding AttackRyoki Shinohara, Takashi Kamimoto, Kazuya Sato, Hiroshi Shigeno. 324-331 [doi]
- A Cloud-Based RFID Authentication Protocol with Insecure Communication ChannelsHannan Xiao, Awatif Ali Alshehri, Bruce Christianson. 332-339 [doi]
- Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical PrismsGustavo Gonzalez Granadillo, Jose Rubio-Hernan, Joaquín García-Alfaro, Hervé Debar. 340-348 [doi]
- New Efficient Certificateless Blind Signature SchemeHaibin Chen, Lei Zhang, Junyuan Xie, Chongjun Wang. 349-353 [doi]
- Model Checking Probabilistic Network Propagation Protection StrategiesZonghao Guo, Ou Wei, Peng Yu, Lansheng Han, Weiming Wu. 354-361 [doi]
- An Efficient and Fine-Grained Access Control Scheme for Multidimensional Data Aggregation in Smart GridZhenhai Cao, Bo Lang, Jinmiao Wang. 362-369 [doi]
- Natural Laws as a Baseline for Network Anomaly DetectionFlorian Gottwalt, Adrian Waller, Weiru Liu. 370-377 [doi]
- Classifying Android Malware with Dynamic Behavior Dependency GraphsZimin Lin, Rui Wang, Xiaoqi Jia, Shengzhi Zhang, Chuankun Wu. 378-385 [doi]
- ForceDROID: Extracting Hidden Information in Android Apps by Forced Execution TechniqueZimin Lin, Rui Wang, Xiaoqi Jia, Jingyu Yang, Daojuan Zhang, Chuankun Wu. 386-393 [doi]
- Code Reuse Attack Mitigation Based on Function Randomization without Symbol TableJianming Fu, Yan Lin, Xu Zhang. 394-401 [doi]
- Energy-Efficient Hardware Implementation of LUKS PBKDF2 with AES on FPGAXiaochao Li, Chunhui Cao, Pengtao Li, Shuli Shen, Yihui Chen, Lin Li. 402-409 [doi]
- Security Analysis and Vulnerability Detection of Gesture-Based Lock in Android ApplicationsYu Wang, Yuqing Zhang, Kai Wang, Jingbo Yan. 410-417 [doi]
- Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious AdversariesXiaochao Wei, Han Jiang, Chuan Zhao, Minghao Zhao, Qiuliang Xu. 418-425 [doi]
- Towards Cross-Border Authorization in European eID FederationsThomas Lenz, Bernd Zwattendorfer. 426-434 [doi]
- A Game-Theoretic Model on Coalitional Attacks in Smart GridXinyu Yang, Xiaofei He, Jie Lin, Wei Yu 0002, Qingyu Yang. 435-442 [doi]
- Extending EMV Tokenised Payments to Offline-EnvironmentsDanushka Jayasinghe, Konstantinos Markantonakis, Iakovos Gurulian, Raja Naeem Akram, Keith Mayes. 443-450 [doi]
- A Cleanroom Monitoring System for Network Computing Service Based on Remote AttestationLei Zhou, Xiaowei Liu, Qin Liu, Guojun Wang. 451-457 [doi]
- Risk Analysis of Exposed Methods to JavaScript in Hybrid AppsLiu Yang, Xingmin Cui, ChangYuan Wang, Shanqing Guo, Xin-Shun Xu. 458-464 [doi]
- SENTRY: A Novel Approach for Mitigating Application Layer DDoS ThreatsHeng Zhang, Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri. 465-472 [doi]
- A Dynamic Game with Adaptive Strategies for IEEE 802.15.4 and IoTJacob Abegunde, Hannan Xiao, Joseph Spring. 473-480 [doi]
- What If Routers Are Malicious? Mitigating Content Poisoning Attack in NDNDanye Wu, Zhiwei Xu, Bo Chen, Yujun Zhang. 481-488 [doi]
- Exploiting Dynamic Scheduling for VM-Based Code ObfuscationKaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, XiaoJiang Chen, Tianzhang Xing, Guixin Ye, Jie Zhang, Zheng Wang. 489-496 [doi]
- Secure Shortest Path Search over Encrypted Graph Supporting Synonym Query in Cloud ComputingHong Zhu, Bin Wu, Meiyi Xie, Zongmin Cui, Zongda Wu. 497-504 [doi]
- Error Decomposition Algorithm for Approximating the k-Error Linear Complexity of Periodic SequencesFangwen Yu, Ming Su, Gang Wang, Mingming Ren. 505-510 [doi]
- SUIDroid: An Efficient Hardening-Resilient Approach to Android App Clone DetectionFang Lyu, Yapin Lin, Junfeng Yang, Junhai Zhou. 511-518 [doi]
- Semantic-Based Privacy Protection of Electronic Health Records for Collaborative ResearchYang Lu, Richard O. Sinnott. 519-526 [doi]
- Taxonomy of Man-in-the-Middle Attacks on HTTPSShaun Stricot-Tarboton, Sivadon Chaisiri, Ryan K. L. Ko. 527-534 [doi]
- From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under UncertaintySivadon Chaisiri, Ryan K. L. Ko. 535-543 [doi]
- An ADS-B Intrusion Detection SystemThabet Kacem, Duminda Wijesekera, Paulo Cesar G. da Costa, Alexandre Barreto. 544-551 [doi]
- An Accurate FDD-Based Approach for Discovering Distributed Firewalls MisconfigurationsAmina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula. 552-559 [doi]
- Android App Malicious Behavior Detection Based on User IntentionJianming Fu, Pengwei Li, Yan Lin, Shuang Ding. 560-567 [doi]
- Threshold Yoking/Grouping Proofs Based on CP-ABE for IoT ApplicationsLyes Touati, Hamed Hellaoui, Yacine Challal. 568-575 [doi]
- Optimal Flow Allocation and Linear Network Coding Design for Multiple Multicasts under the Requirements of Information Theoretical SecurityWeiwei Ding, Jin Wang, Xiumin Wang, Ruimin Zhao, Yanqin Zhu. 576-583 [doi]
- Dual Processing Engine Architecture to Speed Up Optimal Ate Pairing on FPGA PlatformZhongyuan Hao, Wei Guo, Jizeng Wei, Dazhi Sun. 584-589 [doi]
- Data Sharing in Secure Multimedia Wireless Sensor NetworksMuhammad Usman, Mian Ahmad Jan, Xiangjian He, Priyadarsi Nanda. 590-597 [doi]
- SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and OrchestrationMontida Pattaranantakul, Ruan He, Ahmed Meddahi, Zonghua Zhang. 598-605 [doi]
- Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure ElementsRaja Naeem Akram, Pierre-François Bonnefoi, Serge Chaumette, Konstantinos Markantonakis, Damien Sauveron. 606-614 [doi]
- AppBot: A Novel P2P Botnet Architecture Resistant to Graph-Based TrackingTao Yin, Yongzheng Zhang 0002, Jia Li. 615-622 [doi]
- Securely Outsourcing of Bilinear Pairings with Untrusted Servers for Cloud StorageYuchuan Luo, Shaojing Fu, Kai Huang, Dongsheng Wang, Ming Xu. 623-629 [doi]
- Whispers between the Containers: High-Capacity Covert Channel Attacks in DockerYang Luo, Wu Luo, Xiaoning Sun, Qingni Shen, Anbang Ruan, Zhonghai Wu. 630-637 [doi]
- Mobility Management for Enterprises in BYOD DeploymentDaniel Tse, Lu Wang, Yuxi Li. 638-645 [doi]
- New Exploit Methods against Ptmalloc of GLIBCTianyi Xie, Yuanyuan Zhang, Juanru Li, Hui Liu, Dawu Gu. 646-653 [doi]
- S2Net: A Security Framework for Software Defined Intelligent Building NetworksNian Xue, Xin Huang, Jie Zhang. 654-661 [doi]
- SeLance: Secure Load Balancing of Virtual Machines in CloudQian Sun, Qingni Shen, Cong Li, Zhonghai Wu. 662-669 [doi]
- A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange ProtocolXiaoyan Yang, Han Jiang, Qiuliang Xu, Mengbo Hou, Xiaochao Wei, Minghao Zhao, Kim-Kwang Raymond Choo. 670-677 [doi]
- A Study on Detection and Recovery of Speech Signal TamperingJian Li, Wenhuan Lu, Chen Zhang, Jianguo Wei, Xiaochun Cao, Jianwu Dang. 678-682 [doi]
- PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing InfrastructuresZilong Wen, Weiqi Dai, Deqing Zou, Hai Jin. 683-690 [doi]
- Anomadroid: Profiling Android Applications' Behaviors for Identifying Unknown MalappsDan Su, Wei Wang, Xing Wang, Jiqiang Liu. 691-698 [doi]
- Securing Power System State EstimationJiexin Zhang, Xiaoxue Liu, Peidong Zhu. 699-706 [doi]
- A Security-Oriented Workflow Framework for Collaborative EnvironmentsSardar Hussain, Richard O. Sinnott, Ron Poet. 707-714 [doi]
- A Survey on Quantitative Evaluation of Web Service SecurityBo Zhou, Qi Shi, Po Yang. 715-721 [doi]
- Privacy-Preserving Query Log Sharing Based on Prior N-Word AggregationXuying Meng, Zhiwei Xu, Bo Chen, Yujun Zhang. 722-729 [doi]
- Enhancing Location Privacy through User-Defined Grid in Location-Based ServicesShaobo Zhang, Qin Liu, Guojun Wang. 730-736 [doi]
- Security Enhanced Attribute Based Signcryption for Private Data Sharing in CloudXin Pei, Yongjian Wang, Wei Yao, Jiuchuan Lin, Ruxiang Peng. 737-743 [doi]
- WiN: Non-invasive Abnormal Activity Detection Leveraging Fine-Grained WiFi SignalsDali Zhu, Na Pang, Gang Li, Wenjing Rong, Zheming Fan. 744-751 [doi]
- Semantic-Aware Dummy Selection for Location Privacy PreservationShu Chen, Hong Shen. 752-759 [doi]
- Multiple Mix-Zones Deployment for Continuous Location Privacy ProtectionZhikai Xu, Hongli Zhang, Xiang-Zhan Yu. 760-766 [doi]
- Modeling Privacy Aware Information Sharing Systems: A Formal and General ApproachFabio Martinelli, Andrea Saracino, Mina Sheikhalishahi. 767-774 [doi]
- Local Self-Organization with Strong Privacy ProtectionLucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Shlomi Dolev. 775-782 [doi]
- Privacy-Preserving Location-Aware Mobile AdvertisementErald Troja, Spiridon Bakiras. 783-790 [doi]
- Efficient and Privacy-Preserving k-Means Clustering for Big Data MiningZakaria Gheid, Yacine Challal. 791-798 [doi]
- Privacy-Preserving Image Retrieval in IoT-CloudZaid Ameen Abduljabbar, Hai Jin, Ayad Ibrahim, Zaid Alaa Hussien, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou. 799-806 [doi]
- DroidContext: Identifying Malicious Mobile Privacy Leak Using ContextXiaolei Wang, Yuexiang Yang, Chuan Tang, YingZhi Zeng, Jie He. 807-814 [doi]
- Privacy-Preserving Top-k Nearest Keyword Search on Outsourced GraphsYiping Teng, Xiang Cheng, Sen Su, Rong Bi. 815-822 [doi]
- Anonymity-Based Privacy Preserving Network Data PublicationPeng Liu, Yidong Li, Yingpeng Sang, Ji Zhang. 823-828 [doi]
- A Privacy Protection Mechanism for NoSql Database Based on Data ChunksShibin Sun, Yuliang Shi, Shidong Zhang, LiZhen Cui. 829-836 [doi]
- Model for Hiding Data Relationships Based on Chunk-Confusion in Cloud ComputingYu Chen, Yuliang Shi, Li-zhen Cui. 837-844 [doi]
- A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud ComputingXiaoyu Zhu, Qin Liu, Guojun Wang. 845-851 [doi]
- Formal Modeling and Verification of Security Protocols on Cloud Computing Systems Based on UML 2.3Kunding Fang, Xiaohong Li, Jianye Hao, Zhiyong Feng. 852-859 [doi]
- Privacy Preserving Provable Data Possession for Cloud Based Electronic Health Record SystemSanjeet Kumar Nayak, Somanath Tripathy. 860-867 [doi]
- IMPROVE - Identifying Minimal PROfile VEctors for Similarity Based Access ControlGaurav Misra, Jose M. Such, Hamed Balogun. 868-875 [doi]
- Energy-Efficient and Privacy-Preserving Range Query in Participatory SensingJuru Zeng, Yuncheng Wu, Yao Wu, Hong Chen, Cuiping Li, Shan Wang. 876-883 [doi]
- Privacy-Preserving Internet Traffic PublicationLongkun Guo, Hong Shen. 884-891 [doi]
- Preserving Location and Content Privacy for Secure Ranked Queries in Location Based ServicesPei Chen, Yaping Lin, Wei Zhang, Xiaoying Li, Shiwen Zhang. 892-899 [doi]
- Privacy Preserving Computation by Fragmenting Individual Bits and Distributing GatesMark A. Will, Ryan K. L. Ko, Ian H. Witten. 900-908 [doi]
- Association Rules Discovery via Approximate Method from Probabilistic DatabaseLihai Nie, Zhiyang Li, Wenyu Qu. 909-914 [doi]
- Towards an Effective Secret Key Generation Scheme for Imperfect Channel State InformationLongwang Cheng, Wei Li, Dongtang Ma, Li Zhou, Chunsheng Zhu, Jibo Wei. 915-920 [doi]
- Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function ComputationGenqiang Wu, Yeping He, JingZheng Wu, Xianyao Xia. 921-928 [doi]
- How to Automatically Identify the Homology of Different MalwareYanchen Qiao, Xiaochun Yun, Yongzheng Zhang 0002. 929-936 [doi]
- Fast Reused Function Retrieval Method Based on Simhash and Inverted IndexYanchen Qiao, Xiaochun Yun, Yongzheng Zhang 0002. 937-944 [doi]
- Forensic Analysis of Email on Android Volatile MemoryLong Chen, Yue Mao. 945-951 [doi]
- Adaptive Polar Based Filtering Method for Image Copy-Move Forgery DetectionXiu-Li Bi, Chi-Man Pun, Xiaochen Yuan. 952-956 [doi]
- CloudPhylactor: Harnessing Mandatory Access Control for Virtual Machine Introspection in Cloud Data CentersBenjamin Taubmann, Noëlle Rakotondravony, Hans P. Reiser. 957-964 [doi]
- Using Multi-features and Ensemble Learning Method for Imbalanced Malware ClassificationYunan Zhang, Qingjia Huang, Xinjian Ma, Zeming Yang, Jianguo Jiang. 965-973 [doi]
- Log Your Car: The Non-invasive Vehicle ForensicsHafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, Iakovos Gurulian. 974-982 [doi]
- Enhancing Source Camera Identification Based on Multiplicative Denoising FilterQiang Rao, Jianjun Wang, LiMing Zhang. 983-988 [doi]
- Power Traces Clipping and Splicing Enhanced Correlation Collision AnalysisChanghai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai. 989-995 [doi]
- LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR CodeXinwen Zhang, Huakang Li, Yitao Yang, Guozi Sun, Guangxuan Chen. 996-1000 [doi]
- JPEG Compression Forensics against ResizingWei Dong, Jianjun Wang. 1001-1007 [doi]
- Bring Your Own Disclosure: Analysing BYOD Threats to Corporate InformationDenys A. Flores, Farrukh Qazi, Arshad Jhumka. 1008-1015 [doi]
- Double-Key Recovery Based Correlation Power AnalysisXinping Zhou, Degang Sun, Zhu Wang, Changhai Ou, Juan Ai. 1016-1022 [doi]
- An Efficient Approach of Integrating RFID and Vision Techniques in Object Surveillance SystemDali Zhu, Junhuang Chen, Yanfang Zhang, Siye Wang, Huafeng Kong. 1023-1029 [doi]
- A Fingerprint Indexing Algorithm on Encrypted DomainGuoqiang Li 0007, Bian Yang, Christoph Busch. 1030-1037 [doi]
- A Hybrid Monitoring Mechanism in Virtualized EnvironmentsYandong Han, Zhiyu Hao, Lei Cui, Chonghua Wang, Yafei Sang. 1038-1045 [doi]
- Detecting Malicious Behavior and Collusion for Online Rating SystemLiu Cao, Yuqing Sun, Shaoqing Wang, Mingzhu Li. 1046-1053 [doi]
- Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics AnalysisChao Shen, Haodi Xu, Haijun Wang, Xiaohong Guan. 1054-1060 [doi]
- Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in PracticeWeizhi Meng, Xiapu Luo, Wenjuan Li, Yan Li. 1061-1068 [doi]
- DedupeSwift: Object-Oriented Storage System Based on Data DeduplicationJingwei Ma, Gang Wang, Xiaoguang Liu. 1069-1076 [doi]
- BOLAS+: Scalable Lightweight Locality-Aware Scheduling for HadoopShengli Gao, Ruini Xue. 1077-1084 [doi]
- Leveraging Page-Level Compression in MySQL - A Practice at BaiduJingwei Ma, Boxue Yin, Zhi Kong, Yuxiang Ma, Chang Chen, Long Wang, Gang Wang, Xiaoguang Liu. 1085-1092 [doi]
- Improvements to Online Distributed Monitoring SystemsBo Wang, Ying Song, Yuzhong Sun, Jun Liu. 1093-1100 [doi]
- An Improved Multi-path Routing Algorithm for Hybrid LEO-MEO Satellite NetworksYanbo Liu, Wenchao Xu, Feilong Tang, Lei Kuang, Yanqin Yang. 1101-1105 [doi]
- Ephemeral Data Storage for Networks of Hand-Held DevicesJoão A. Silva, Ricardo Monteiro, Hervé Paulino, João M. Lourenço. 1106-1113 [doi]
- An Indoor and Outdoor Seamless Positioning System Based on Android PlatformMinglei Jia, Yanqin Yang, Lei Kuang, Wenchao Xu, Tianxing Chu, Hongzhi Song. 1114-1120 [doi]
- Rule Selector: A Novel Scalable Model for High-Performance Flow RecognitionTong Shen, Dafang Zhang. 1121-1128 [doi]
- WiSal: Ubiquitous WiFi-Based Device-Free Passive Subarea Localization without Intensive Site-SurveyLiangyi Gong, Wu Yang, Chaocan Xiang, Dapeng Man, Miao Yu, Zuwei Yin. 1129-1136 [doi]
- Multi-objective Based Performance Evaluation of Deduplication ApproachesYujuan Tan, Zhichao Yan. 1137-1144 [doi]
- A Tool to Detect Performance Problems of Multi-threaded Programs on NUMA SystemsLiang Zhu, Hai Jin, Xiaofei Liao. 1145-1152 [doi]
- An Optimized Layered Routing Algorithm for GEO/LEO Hybrid Satellite NetworksMeng Jiang, Yanbo Liu, Wenchao Xu, Feilong Tang, Yanqin Yang, Lei Kuang. 1153-1158 [doi]
- Pipelined Online Data Insertion for Erasure Codes in Distributed Storage SystemsXiaoqiang Pei, Yijie Wang, Xingkong Ma, Fangliang Xu. 1159-1166 [doi]
- A Trust-Based Cooperative Spectrum Sensing Scheme against SSDF Attack in CRNsFanZi Zeng, Jie Li, Jisheng Xu, Jing Zhong. 1167-1173 [doi]
- MTPGraph: A Data-Driven Approach to Predict Medical Risk Based on Temporal Profile GraphShuai Zhang, Lei Liu, Hui Li, Zongshui Xiao, LiZhen Cui. 1174-1181 [doi]
- Evaluating and Optimizing Parallel LU-SGS for High-Order CFD Simulations on the Tianhe-2 SupercomputerDali Li, Chuanfu Xu, Ningbo Guo. 1182-1189 [doi]
- SCADIS: A Scalable Accelerator for Data-Intensive String Set Matching on FPGAsShiming Lei, Chao Wang 0003, Haijie Fang, Xi Li, Xuehai Zhou. 1190-1197 [doi]
- Shortest Partial Path First Algorithm for Reconfigurable Processor Array with FaultsJigang Wu, Ningjing Liu, Siew Kei Lam, Guiyuan Jiang. 1198-1203 [doi]
- An Enhanced Node Mapping Algorithm for VNE Problem Based on Path RelevanceQijia Zhang, Fangjin Zhu, Canhui Wang. 1204-1209 [doi]
- Phylogenetic Likelihood Estimation on GPUs Using Vertical Partitioning SchemeCheng Ling, Jing-Yang Gao, Gang Lu. 1210-1217 [doi]
- Adjusting Parameters of k-Ary n-Cube to Achieve Better Cost PerformanceYamin Li, Wanming Chu. 1218-1225 [doi]
- Hamiltonian Cycle and Path Embeddings in 3-Ary n-Cubes Based on K1, 2-Structure FaultsYali Lv, Cheng-Kuan Lin, Jianxi Fan. 1226-1232 [doi]
- Interference-Aware Multi-source TransmissionShiming He, Kun Xie, Kexin Xie, Zhetao Li, Chuan Xu. 1233-1240 [doi]
- A Truthful Greedy Mechanism toward Resource Sharing for Cloudlets in Mobile Cloud ComputingZhiwei Zhou, Junwu Zhu, Yi Jiang, Bin Li. 1241-1247 [doi]
- Penalty Cost Minimization for Multi-tenant Query Deadline Employing Cache Optimization and Log Based DispatchingLida Zou, Qingzhong Li, Hui Li, Shidong Zhang, Yongqing Zheng, Zongshui Xiao. 1248-1255 [doi]
- Virtual Network Deployment in Hybrid Data Center NetworksWei Zhang, Sheng Zhang 0001, Zhuzhong Qian, Kaiyuan Wen, Sanglu Lu. 1256-1263 [doi]
- A Comprehensive Optimization for Performance, Energy Efficiency, and Maintenance in Cloud DatacentersPuheng Zhang, Chuang Lin, Kun Meng, Ying Chen. 1264-1271 [doi]
- Parallelizing Degraded Read for Erasure Coded Cloud Storage Systems Using Collective CommunicationsPeng Li, Xingtong Jin, Rebecca J. Stones, Gang Wang, Zhongwei Li, Xiaoguang Liu, Mingming Ren. 1272-1279 [doi]
- I/O Congestion-Aware Computing Resource Assignment and Scheduling in Virtualized Cloud EnvironmentsYuwei Wang, Min Liu, Bo Gao, Chenchong Qin, Cheng Ma. 1280-1287 [doi]
- Intelligent Forwarding Strategy Based on Online Machine Learning in Named Data NetworkingLirui Gong, Jiawei Wang, Xiang Zhang, Kai Lei. 1288-1294 [doi]
- A Model with Hierarchical Classifiers for Activity Recognition on Mobile DevicesChanghai Wang, Meng Li, Jianzhong Zhang, Yuwei Xu. 1295-1301 [doi]
- Using Dynamic Granularity Strategy to Accelerate Unbalanced Tree SearchLei Guan, Yutong Lu. 1302-1310 [doi]
- Data-Oriented Runtime Scheduling Framework on Multi-GPUsTao Li, Kezhao Zhao, Qiankun Dong, Jiabing Ling, Yulu Yang, Wenjing Ma. 1311-1318 [doi]
- Bicriteria Load Balancing for Online Placement in Heterogeneous Servers with Extreme Upper BoundsSavio S. H. Tse. 1319-1326 [doi]
- Differential Evolution Based Selective Ensemble of Extreme Learning MachineYong Zhang, Bo Liu, Fan Yang. 1327-1333 [doi]
- A Skew-Insensitive Hashing Sync and Construction Scheme for Many-Core CoprocessorsKailai Zhou, Hong Chen, Hui Sun, Cuiping Li. 1334-1341 [doi]
- Power-Bandwidth Aware Cooperative Routing in Multi-radio Multi-channel Wireless NetworkHong Qiao, Dafang Zhang, Kun Xie, Ji Zhang, Shiming He. 1342-1349 [doi]
- Accelerating Big Data Applications on Tiered Storage System with Various Eviction PoliciesPeng Shu, Rong Gu, Qianhao Dong, Chunfeng Yuan, Yihua Huang. 1350-1357 [doi]
- MLC: An Efficient Multi-level Log Compression Method for Cloud Backup SystemsBo Feng, Chentao Wu, Jie Li. 1358-1365 [doi]
- Wi-Wri: Fine-Grained Writing Recognition Using Wi-Fi SignalsXiaoxiao Cao, Bing Chen, Yanchao Zhao. 1366-1373 [doi]
- Evaluating the POWER8 Architecture through Optimizing Stencil-Based AlgorithmsJingheng Xu, Haohuan Fu, Lin Gan, Yu Song, Hongbo Peng, Wen Shi, Guangwen Yang. 1374-1381 [doi]
- SDN-Based Efficient Bandwidth Allocation for Caching Enabled Cognitive Radio NetworksFeng Hu, Bing Chen, Xiaojun Zhu 0001, Hong Shen. 1382-1389 [doi]
- A Topic Approach to Sentence Ordering for Multi-document SummarizationNa Liu, Peng Xiao, Ying Lu, Xiao-jun Tang, Hai-wen Wang, Ming xia Li. 1390-1395 [doi]
- Pattern Aware Cache Management for Efficient Subset Retrieving of Astronomical Image DataJie Wang, Ce Yu, Zhi-hong, Jian Xiao, Chen Li, Jizhou Sun. 1396-1403 [doi]
- Robust Spatio-temporal Tensor Recovery for Internet Traffic DataHuibin Zhou, Dafang Zhang, Kun Xie, Yuxiang Chen. 1404-1411 [doi]
- Improving Energy Efficiency by Phase-Grained Migration for Asymmetric MulticoreYoujun Xu, Xianglan Chen, Zhinan Cheng, Jiachen Song, Yuxiang Zhang. 1412-1419 [doi]
- An Efficient Framework for Incremental Graph ComputationQiang Liu, Xiaoshe Dong, Heng Chen, Zhengdong Zhu, Yinfeng Wang. 1420-1426 [doi]
- NVM-Assisted Non-redundant Logging for Android SystemsYuanchao Xu, Zeyi Hou. 1427-1433 [doi]
- VSP: A Virtual Smartphone Platform to Enhance the Capability of Physical SmartphoneMeng Lai, Jiajun Wang, Tao Song, Ning Liu, Zhengwei Qi, Weijia Zhou. 1434-1441 [doi]
- iMap: A Crowdsensing Based System for Outdoor Radio Signal Strength MapXiaochen Fan, Panlong Yang, Chaocan Xiang, Lei Shi. 1442-1447 [doi]
- A Memory Access Pattern-Based Program Profiling System for Dynamic Parallelism PredictionZijun Han, Guangzhi Qu, Dona Burkard, Kelvin Dobbins. 1448-1454 [doi]
- Workload-Aware Scheduling Across Geo-distributed Data CentersYibo Jin, Yuan Gao, Zhuzhong Qian, Mingyu Zhai, Hui Peng, Sanglu Lu. 1455-1462 [doi]
- FairShare: Dynamic Max-Min Fairness Bandwidth Allocation in DatacentersJianbang Tian, Zhuzhong Qian, Mianxiong Dong, Sanglu Lu. 1463-1470 [doi]
- Minimizing Schedule Length of Energy Consumption Constrained Parallel Applications on Heterogeneous Distributed SystemsXiongren Xiao, Guoqi Xie, Renfa Li, Keqin Li. 1471-1476 [doi]
- Sznajd2: A Community-Aware Opinion Dynamics ModelHouwu Chen, Jiwu Shu. 1477-1484 [doi]
- A Novel Hash-Based File Clustering Scheme for Efficient Distributing, Storing, and Retrieving of Large Scale Health RecordsThanh Dat Dang, Doan B. Hoang, Priyadarsi Nanda. 1485-1491 [doi]
- Codelet Scheduling by Genetic AlgorithmSongwen Pei, Jinkai Wang, Wenyang Cui, Linhua Jiang, Tongsheng Geng, Jean-Luc Gaudiot, Stéphane Zuckerman. 1492-1499 [doi]
- MRDC: Multicast Data Restoration in Fat-Tree Data Center NetworksKunPeng Mao, Songtao Guo, Yuanyuan Yang, Guiyan Liu. 1500-1507 [doi]
- Lowering Down the Cost for Green Cloud Data Centers by Using ESDs and Energy TradingChonglin Gu, Ke Hu, Zhenlong Li, Qiang Yuan, Hejiao Huang, Xiaohua Jia. 1508-1515 [doi]
- Security Aware and Energy-Efficient Virtual Machine Consolidation in Cloud Computing SystemsFarhad Ahamed, Seyed Shahrestani, Bahman Javadi. 1516-1523 [doi]
- Locality Protected Dynamic Cache Allocation Scheme on GPUsYang Zhang, Zuocheng Xing, Li Zhou, Chunsheng Zhu. 1524-1530 [doi]
- Prediction of Consecutive Road Node Congestion Based on Queueing ModelDongyu Zheng, Dailiang Jin, Yuanzhe Hao, Lei Liu, Xinjing Wei. 1531-1536 [doi]
- An Analytical Model of Data Plane Performance Subject to Prioritized ServiceYongjian Ren, Dailiang Jin, Dongyu Zheng, Lei Liu, Xinjing Wei. 1537-1542 [doi]
- A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud MarketYi Wei, Li Pan, Dong Yuan, Shijun Liu, Lei Wu, Xiangxu Meng. 1543-1550 [doi]
- The Design and Implementation of a Lightweight Management Framework for Non-volatile MemoryZheng Zhang, Dan Feng, Jianxi Chen, Ya Yu, Jing Zeng. 1551-1558 [doi]
- Evaluating Performance of Rescheduling Strategies in Cloud SystemHongyan Tang, Ying Li, Tong Jia, Zhonghai Wu. 1559-1566 [doi]
- Joint Selection of Providers and the New Comer for Optimal Repair in Distributed Storage Network with Network CodingChengjin Jia, Jin Wang, Yanqin Zhu, Zhengqing Wen, Juncheng Jia. 1567-1574 [doi]
- Privacy Preservation in Social Network against Public Neighborhood AttacksMinghui Li, Zhaobin Liu, Kang Dong. 1575-1580 [doi]
- Capacity Analysis and Link Scheduling Design in Double-Channel Full-Duplex Wireless NetworksLulu Li, Zhuo Li, Xin Chen. 1581-1588 [doi]
- Community Detection in Complicated Network Based on the Multi-view Weighted Signed PermanenceJuan-Hui Li, Pei-Zhen Li, Chang-Dong Wang, Jian-Huang Lai. 1589-1596 [doi]
- Hierarchical Consistent Hashing for Heterogeneous Object-Based StorageJiang Zhou, Wei Xie, Qiang Gu, Yong Chen. 1597-1604 [doi]
- Rethinking High Performance Computing System Architecture for Scientific Big Data ApplicationsYong Chen, Chao Chen, Yanlong Yin, Xian-He Sun, Rajeev Thakur, William Gropp. 1605-1612 [doi]
- Experimental Study of Disruption-Tolerant Transport Protocol for Mobile Ad-Hoc Networks with Connection DiversityXiaoshan Chang, Zenghua Zhao, Bingxue Diao, Tao Li. 1613-1620 [doi]
- Stacked Product Quantization for Nearest Neighbor Search on Large DatasetsJun Wang, Zhiyang Li, Yegang Du, Wenyu Qu. 1621-1627 [doi]
- Multiple Query-Independent Values Based Asymmetric Ranking for Approximate Nearest Neighbor SearchYuan Cao, Heng Qi, Keqiu Li, Milos Stojmenovic. 1628-1635 [doi]
- Temperature-Aware Register Mapping in GPGPUsEhsan Atoofian. 1636-1643 [doi]
- Online Credit Card Fraud Detection: A Hybrid Framework with Big Data TechnologiesYou Dai, Jin Yan, Xiaoxin Tang, Han Zhao, Minyi Guo. 1644-1651 [doi]
- Social Circles Discovery Based on Structural and Attribute SimilaritiesJuping Wen, QingDan Yuan. 1652-1659 [doi]
- Towards Scalable and Reliable In-Memory Storage System: A Case Study with RedisShanshan Chen, Xiaoxin Tang, Hongwei Wang, Han Zhao, Minyi Guo. 1660-1667 [doi]
- What Is My Next Job: Predicting the Company Size and Position in Career ChangesHongyang Qu, Zhiwen Yu, Zhiyong Yu, Huang Xu, Bin Guo, Xing Xie. 1668-1675 [doi]
- Improving Robustness of a SVR Based Algorithm Trading Model with Carefully Crafted Features and a Diversified PortfolioXiongpai Qin, Bangguo Wang, Ruchuan Lai, Keqin Li. 1676-1683 [doi]
- Subgroup Discovery on Big Data: Exhaustive Methodologies Using Map-ReduceFrancisco Padillo, José María Luna, Sebastián Ventura. 1684-1691 [doi]
- Improved Scheduling Algorithms for Single-Path Multiple Bandwidth Reservation RequestsLiudong Zuo, Mengxia Michelle Zhu. 1692-1699 [doi]
- A Novel Text Feature Weight Calculation Method Applied to Power FieldHaizhou Du, Zhengbo Chen, Qifen Li, Yongwen Yang. 1700-1705 [doi]
- A Novel Image Retrieval Approach with Bag-of-Word Model and Gabor FeatureJunfeng Wu, Yitong Wan, Wenyu Qu, Changqing Ji, Yuanyuan Li, Peng Xiao, Jianwei Sun. 1706-1711 [doi]
- Fall Detection Based on Tilt Angle and Acceleration VariationsWu-Xiang Weng, Shou-Chih Lo. 1712-1717 [doi]
- Taint Reverse Propagation for Analysis of Privacy LeakXinglu He, Kai Lu, Gen Li 0002. 1718-1722 [doi]
- Progress in Command and Control Server Finding Schemes of BotnetXiaojun Guo, Guang Cheng, Yifei Hu, Mian Dai. 1723-1727 [doi]
- URLSight: Profiling Mobile Users via Large-Scale Internet Metadata AnalyticsHui Li, Guoqiao Ye, Xuezheng Liu, Fei Zhao, Di Wu, Xiaola Lin. 1728-1733 [doi]
- Improving JavaScript Malware Classifier's Security against Evasion by Particle Swarm OptimizationZibo Yi, Jun Ma, Lei Luo, Jie Yu, Qingbo Wu. 1734-1740 [doi]
- A Privacy-Preserving Incentive Scheme for Advertisement Dissemination in Vehicular Social NetworksPeipei Xiao, Yufeng Wang, Qun Jin, Jianhua Ma. 1741-1746 [doi]
- SECUPerf: End-to-End Security and Performance Assessment of Cloud ServicesAjay Pantangi, Kaiqi Xiong, Mufaddal Makati. 1747-1752 [doi]
- DroidCollector: A High Performance Framework for High Quality Android Traffic CollectionDong Cao, Shanshan Wang, Qun Li, Zhenxiang Chen, Qiben Yan, Lizhi Peng, Bo Yang. 1753-1758 [doi]
- Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over RingsMohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto. 1759-1764 [doi]
- Enhancing the SVDD Accuracy in Intrusion Detection Systems by Removing External VoidsTayeb Kenaza, Khadidja Bennaceur, Abdennour Labed, Mahdi Aiash. 1765-1770 [doi]
- Security Challenges in Future NDN-Enabled VANETsSalvatore Signorello, Maria Rita Palattella, Luigi Alfredo Grieco. 1771-1775 [doi]
- A Progressive Approach to Design Authentication Protocols for Mobile Heterogeneous NetworksTayeb Kenaza, Mahdi Aiash, Jonathan Loo, Aboubaker Lasebae, Gill Whitney. 1776-1781 [doi]
- Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying SimilaritiesNikolaos Sarantinos, Chafika Benzaid, Omar Arabiat, Ameer Al-Nemrat. 1782-1787 [doi]
- Machine Learning Based Botnet Identification TrafficAhmad Azab, Mamoun Alazab, Mahdi Aiash. 1788-1794 [doi]
- A Mobile Security-Related Behavior Prevention Model Based on Speech Personality TraitsHuan Zhao, Xixiang Zhang. 1803-1810 [doi]
- Topology Prediction Mechanism for Pocket Switched Network Based on Deep Belief NetworkJian Shu, Weijie Lin, Linlan Liu, Xuyan Luo. 1811-1817 [doi]
- Application of Modified BLP Model on Mobile Web Operating SystemDali Zhu, Ying Yang, Hao Jin, Jing Shao, Wei-Miao Feng. 1818-1824 [doi]
- ETSTM: A New Green Software ModelGang Hou, Kuanjiu Zhou, Yanran Wu, Zongzheng Chi, Jie Wang, MingChu Li. 1825-1830 [doi]
- The Method of Generating Web Link Security Testing Scenario Based on UML DiagramShu-Yan Wang, Jia-Ze Sun, Ju Zhang. 1831-1838 [doi]
- On Probabilistic Application ComplianceAntonio La Marra, Fabio Martinelli, Andrea Saracino, Alessandro Aldini. 1848-1855 [doi]
- Research on the Nonintrusive Resource Level Fault Injection Technology for Windows SystemFang Jianyong. 1856-1860 [doi]
- Delta-Generalization: High Accuracy Data Release for Privacy PreservingLiang Wang, Weiping Wang, Jingzi Gu, Dan Meng. 1861-1866 [doi]
- ChainSpot: Mining Service Logs for Cyber Security Threat DetectionJain-Shing Wu, Yuh-Jye Lee, Te-En Wei, Chih-Hung Hsieh, Chia-Min Lai. 1867-1874 [doi]
- On Designing Leakage-Resilient Vibration Based Authentication TechniquesNilesh Chakraborty, S. Vijay Anand, Gurpinder Singh Randhawa, Samrat Mondal. 1875-1881 [doi]
- Botnet Detection Method Analysis on the Effect of Feature ExtractionJianguo Jiang, Biao Qi, Zhixin Shi, Yan Wang, Bin Lv. 1882-1888 [doi]
- Security Enhancements in EMV Protocol for NFC Mobile PaymentNour El Madhoun, Guy Pujolle. 1889-1895 [doi]
- Universal Steganography Detector Based on an Artificial Immune System for JPEG ImagesJosé de Jesús Serrano-Pérez, Moisés Salinas-Rosales, Nareli Cruz-Cortes. 1896-1903 [doi]
- An O2O Service Recommendation Algorithm Based on User Context and Trust ServiceHongfang Han, Ang Gao, Jianji Ren, Yongqiang Ma, Xiao Xue. 1904-1909 [doi]
- Suppressing Selfish Transmissions with Extending NAV Period and Resetting CW of Access Point in Wireless LANTakashi Sasagawa, Satoshi Ohzahata, Toshihiko Kato. 1910-1916 [doi]
- SecPage - A Lightweight Memory Protection ArchitectureKaiyuan Liang, Yanzhao Feng, Jizeng Wei, Wei Guo. 1917-1922 [doi]
- UVisP: User-centric Visualization of Data Provenance with Gestalt PrinciplesJeffery Garae, Ryan K. L. Ko, Sivadon Chaisiri. 1923-1930 [doi]
- An Efficient Influence Maximization Algorithm Considering Both Positive and Negative RelationshipsXu Weng, Zhaobin Liu, Zhiyang Li. 1931-1936 [doi]
- A Multi-keyword Multi-user Searchable Encryption Scheme Based on Cloud StorageHaiping Huang, Jianpeng Du, Hui Wang, Ruchuan Wang. 1937-1943 [doi]
- Secure Mobile Payment Employing Trusted Computing on TrustZone Enabled PlatformsXianyi Zheng, Lulu Yang, Gang Shi, Dan Meng. 1944-1950 [doi]
- A Novel Trustworthy Framework for Cloud Based Rendering ApplicationQian Li, Weiguo Wu, Jianhang Huang, Zeyu Sun, Mingxia Feng. 1951-1956 [doi]
- Resource-centric Dynamic Access Control in CloudMang Su, Anmin Fu, Yan Yu, Guozhen Shi. 1957-1962 [doi]
- Security Secret Information Hiding Based on Hash Function and Invisible ASCII Characters ReplacementFeng Liu, Pengpeng Luo, Zhujuan Ma, Cheng Zhang, Yiwen Zhang, Erzhou Zhu. 1963-1969 [doi]
- Bad Data Injection Attacks Identification in Power System on Fast Decoupled Load FlowZongshuai Hu, Yong Wang, Lipeng Zhang, Rusen Fan. 1970-1975 [doi]
- A Hadoop Based Analysis and Detection Model for IP Spoofing Typed DDoS AttackJian Zhang, Pin Liu, Jianbiao He, Yawei Zhang. 1976-1983 [doi]
- On the Leakage Resilient Cryptography in Game-Theoretic SettingsMohammad Shahriar Rahman, Keita Emura, Shinsaku Kiyomoto. 1984-1989 [doi]
- Authentication by Witness FunctionsJaouhar Fattahi, Mohamed Mejri, Emil Pricop. 1990-1997 [doi]
- The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy LawsCraig Scoon, Ryan K. L. Ko. 1998-2005 [doi]
- The Health Care Fraud Detection Using the Pharmacopoeia Spectrum Tree and Neural Network Analytic Contribution Hierarchy ProcessHao Peng, Mengzhuo You. 2006-2011 [doi]
- Aggregated Signatures for Chaining: A Secure Provenance SchemeIdrees Ahmed, Abid Khan, Muhammad Saleem Khan, Mansoor Ahmed. 2012-2017 [doi]
- Comparison of Five Packet-Sampling-Based Methods for Detecting Elephant FlowsYujie Sun, Weijiang Liu, Zhaobin Liu, Chao Liu. 2018-2023 [doi]
- Ship Automatic Collision Avoidance by Altering Course Based on Ship Dynamic DomainWen Xu, Jiangqiang Hu, Jianchuan Yin, Ke Li. 2024-2030 [doi]
- The Design and Application of an Intelligentialized Monitoring System for Mooring SafetyChangyuan Chen, Ran Dai, Tingting Yang, Zuxin Wu, Quan Li. 2031-2034 [doi]
- Study on the Control of Fractional-Order PID for Underwater Vehicle Attitude AngleJian Zhao, Jianchuan Yin. 2035-2040 [doi]
- Method for Detecting Information Leakage from Computer Display in Electromagnetic RadiationDegang Sun, Jun Shi, Xuejie Ding, Meng Zhang, Wei-qing Huang. 2041-2046 [doi]
- Chunk-Based Resource Allocation with Fairness Consideration for Layered Multicast Streaming in OFDMA SystemsYing Wang, Yang Ju, Tiantian Miao, Rongxi He. 2047-2051 [doi]
- Design and Planning of Heterogeneous Marine Sensor Networks for Marine Intelligent TransportationXin Li, Bin Lin, Ping Guo, Sen Li, Rongxi He. 2052-2057 [doi]
- Optimal Deployment and Dimensioning of Fog Computing Supported Vehicular NetworkPing Guo, Bin Lin, Xin Li, Rongxi He, Sen Li. 2058-2062 [doi]
- Research on Key Technologies and Standard Framework of Secure and Smart ContainerWang Jing, Xianfeng Zhao, Yanjie Deng, Shibo Xu, Jichun Li. 2063-2067 [doi]
- The Application of Ad-Hoc Network in Smart Container Tracking SystemShibo Xu, Qingzhou Li, Peng Ni, Wensheng Cao, Xianfeng Zhao. 2068-2072 [doi]
- A Dynamic Power Management Algorithm for Sporadic Tasks in Real-Time Embedded SystemsChangyi Deng, Ruifeng Guo, Hongliang Wang, Azhen Peng. 2073-2078 [doi]
- A Hierarchic Hybrid Scheduling Algorithm for Static Task with Precedence ConstraintsYuanyuan Xie, Jiang Wu, Fengzhu Liu. 2079-2085 [doi]
- SW-HMM: A Method for Evaluating Confidence of Smartphone-Based Activity RecognitionChanghai Wang, Yuwei Xu, Jianzhong Zhang, Wenping Yu. 2086-2091 [doi]
- An Architecture of Parallel Tiled QRD Algorithm for MIMO-OFDM SystemsCang Liu, Chuan Tang, Zuocheng Xing, Lirui Chen, Yang Zhang, Guitao Fu. 2092-2096 [doi]
- Combinatorial Reverse Auction-Based Service Provision in Social CloudsXueyi Wang, Xingwei Wang, Min Huang, Zun Wang. 2097-2102 [doi]
- pHSA: A Price Schedule for Heterogeneous Spectrum AuctionHaiyan Qin, Yonglong Zhang, Bin Li. 2103-2108 [doi]
- Scheduling Dependent Coflows with Guaranteed Job Completion TimeYang Liu, Wenxin Li, Keqiu Li, Heng Qi, Xiaoyi Tao, Sheng Chen. 2109-2115 [doi]
- Parallel Monte Carlo Method with MapReduce for Option PricingShijia Wang, Liang Zhou, Yuanyuan Li, Junfeng Wu. 2116-2121 [doi]
- A New Model Based on GEP-SWPM for Predicting Heavy Metals SpeciationHongyun Gao, Fujun Liu, Shengjuan Sun, Gaotao Shi. 2122-2126 [doi]
- A Flexible Chip Multiprocessor Simulator Dedicated for Thread Level SpeculationYaobin Wang, Hong An, Zhiqin Liu, Ling Li, Jun Huang. 2127-2132 [doi]
- An Algorithm for Analyzing the City Residents' Activity Information through Mobile Big Data MiningYanbin Guo, Jianzhong Zhang, Yu Zhang. 2133-2138 [doi]
- Performance Modeling and Analysis for Critical Section Contention in Parallel CodesJiangming Jin, Yang Zhang, Shanjiang Tang, Hongfei Fan. 2139-2146 [doi]
- StageFS: A Parallel File System Optimizing Metadata Performance for SSD Based ClustersHuijun Wu, Liming Zhu, Kai Lu, Gen Li 0002, Dongyao Wu. 2147-2152 [doi]
- A Subgraph Preconditioning Algorithm for Large Linear SystemsHuirong Zhang, JianWen Cao. 2153-2159 [doi]
- Fast Task Submission in Software Thread Level Speculation SystemsYemao Xu, Jia-Long Wang, Yan-Hong Liu, Li Shen. 2160-2166 [doi]
- Evaluating Multi-core and Many-Core Architectures through Parallelizing a High-Order WENO SolverLiang Deng, Hanli Bai, Dan Zhao, Fang Wang. 2167-2174 [doi]
- Minimum Control Latency of SDN Controller PlacementLin Han, Zhiyang Li, Weijiang Liu, Ke Dai, Wenyu Qu. 2175-2180 [doi]
- Data Trustworthiness in Wireless Sensor NetworksN. Karthik, Ananthanarayana V. S. 2181-2186 [doi]
- Fall Detection Based on KPCA and 3D KPCAHui Wang, Xiaohe Chen, Xinjian Chen, Peilin Zang, Yunqing Liu, Lirong Wang. 2187-2191 [doi]
- The Survey of Low-Power Sleep Monitoring Algorithm Based on the Wrist Movement SignalWenliang Zhu, Xiaohe Chen, Yan Wang, Lirong Wang. 2192-2196 [doi]
- P Wave Detection and Delineation Based on Distances TransformYan Wang, Lirong Wang, Xiaohe Chen, Wenliang Zhu. 2197-2201 [doi]
- The Analysis of Crosstalk Noise Component in Wearable DeviceJian Guo, Lirong Wang, Wenliang Zhu, Xiaohe Chen. 2202-2205 [doi]
- Towards Application-Aware In-Network Bandwidth Management in Data CentersRenhai Xu, Wenxin Li, Keqiu Li, Heng Qi. 2206-2212 [doi]
- On the Definition of Real-Time: Applications and SystemsArun Kejariwal, Francois Orsini. 2213-2220 [doi]
- A Review on Complex Network Dynamics in Evolutionary AlgorithmLong Sheng, Xiaoyun Guang, Feng Chen, Hui Wang, Kang Gao. 2221-2226 [doi]
- Meta-Model Evolution with Self-Adaptation: An Empirical Development Approach for Distributed Parallel Computing FrameworkRenke Wu, Linpeng Huang, Peng Yu, Kai Shen, Qiuwei Shi, Haojie Zhou. 2227-2234 [doi]
- A Statistical-Feature ML Approach to IP Traffic Classification Based on CUDAZhengyang Chen, Renjie Chen, Yu Zhang, Jianzhong Zhang, Jingdong Xu. 2235-2239 [doi]
- CSBD: A Nonlinear Clustering Method Based on Cluster Shrinking and Border DetectionChao Chen, Kun-Yu Lin, Chang-Dong Wang, Dong Huang. 2240-2245 [doi]
- Surveillance Methods of Running Condition of Chemical Equipments Based on SkylineShiqing Wang, Yuanyuan Li, Zhiyang Li, Junfeng Wu, Fengjuan Chen. 2246-2250 [doi]
- Big Data Analysis on the Relationship between the Organizational Career Management and Knowledge Workers' Work Involved - Take the High-Tech Enterprise as an ExampleXingyuan Huang, Jiandong zhang, Kun Qian. 2251-2256 [doi]
- A Limited-Iteration Bisecting K-Means for Fast Clustering Large DatasetsYu Zhuang, Yu Mao, Xin Chen. 2257-2262 [doi]
- Inverted Voronoi-Based kNN Query Processing with MapReduceChangqing Ji, Baofeng Wang, Shuai Tao, Junfeng Wu, Zumin Wang, Long Tang, Tiange Zu, Gui Zhao. 2263-2268 [doi]
- A Novel Solution of Data Analysis in Modern Sports EducationJiequn Wang, Lei Wang. 2269-2272 [doi]