default search action
ICA3PP 2018: Guangzhou, China
- Jaideep Vaidya, Jin Li:
Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part IV. Lecture Notes in Computer Science 11337, Springer 2018, ISBN 978-3-030-05062-7
Internet of Things and Cloud Computing
- Yujie Huang, Quan Zhang, Yujie Cai, Ming-e Jing, Yibo Fan, Xiaoyang Zeng:
Dynamic Task Scheduler for Real Time Requirement in Cloud Computing System. 3-11 - Longchuan Yan, Wantao Liu, Yin Liu, Songlin Hu:
CGAN Based Cloud Computing Server Power Curve Generating. 12-20 - Pei-ming Guo, Jianping Wu:
One-Sided Communication in Coarray Fortran: Performance Tests on TH-1A. 21-33 - Rui Xu, Hui Li, Huayu Zhang:
Reliable Content Delivery in Lossy Named Data Networks Based on Network Coding. 34-46 - Lanlan Dong, Guanjun Liu, Dongming Xiang:
Verifying CTL with Unfoldings of Petri Nets. 47-61 - Swati Jain, Priyanka Sharma, Jaina Bhoiwala, Sarthak Gupta, Pramit Dutta, Krishan Kumar Gotewal, Naveen Rastogi, Daniel Raju:
Deep Q-Learning for Navigation of Robotic Arm for Tokamak Inspection. 62-71 - Bin He, Jin Wang, Jingya Zhou, Kejie Lu, Lingzhi Li, Shukui Zhang:
The Design and Implementation of Random Linear Network Coding Based Distributed Storage System in Dynamic Networks. 72-82
Security and Privacy in Computing
- Siyi Lv, Yanyu Huang, Bo Li, Yu Wei, Zheli Liu, Joseph K. Liu, Dong Hoon Lee:
Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique. 85-97 - Zhe Chen, Chunfu Jia, Tongtong Lv, Tong Li:
Harden Tamper-Proofing to Combat MATE Attack. 98-108 - Anran Liu, Zhenxiang Chen, Shanshan Wang, Lizhi Peng, Chuan Zhao, Yuliang Shi:
A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic. 109-120 - Yu Zhang, Jiankang Chen:
A Scalable Pthreads-Compatible Thread Model for VM-Intensive Programs. 121-137 - Yueyue Zhou, Tao Xiang, Xiaoguo Li:
Efficient and Privacy-Preserving Query on Outsourced Spherical Data. 138-152 - Jiayu Tan, Jian Wang:
Detecting Advanced Persistent Threats Based on Entropy and Support Vector Machine. 153-165 - Qun Li, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Kun Ma, Yuliang Shi, Lizhen Cui:
MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion. 166-177 - Wei Shao, Hang Li, Mengqi Chen, Chunfu Jia, Chunbo Liu, Zhi Wang:
Identifying Bitcoin Users Using Deep Neural Network. 178-192 - Jing Lei, Qingqi Pei, Xuefeng Liu, Wenhai Sun:
A Practical Privacy-Preserving Face Authentication Scheme with Revocability and Reusability. 193-203 - Zhili Chen, Xianyue Bao, Zuobin Ying, Ximeng Liu, Hong Zhong:
Differentially Private Location Protection with Continuous Time Stamps for VANETs. 204-219 - Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li:
Fine-Grained Attribute-Based Encryption Scheme Supporting Equality Test. 220-233 - Chundong Wang, Likun Zhu, Liangyi Gong, Zheli Liu, Xiu-liang Mo, Wenjun Yang, Min Li, Zhaoyang Li:
Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer. 234-248 - Wencong Han, Quanxin Zhang, Chongzhi Gao, Jingjing Hu, Fang Yan:
Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware. 249-259 - Jiajia Sun, Jinbao Gao, Yu-an Tan, Yu Zhang, Xiao Yu:
A Java Code Protection Scheme via Dynamic Recovering Runtime Instructions. 260-269 - Qiang Wang, Fucai Zhou, Su Peng, Zifeng Xu:
Verifiable Outsourced Computation with Full Delegation. 270-287 - Rang Zhou, Xiaosong Zhang, Xiaofen Wang, Guowu Yang, Wanpeng Li:
Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data. 288-302 - Mehdi Gheisari, Guojun Wang, Shuhong Chen, Hamidreza Ghorbani:
IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking. 303-312 - Zhendong Wu, Yihang Xia:
User Password Intelligence Enhancement by Dynamic Generation Based on Markov Model. 313-325 - Haojun Ai, Weiyi Huang, Yuhong Yang, Liang Liao:
The BLE Fingerprint Map Fast Construction Method for Indoor Localization. 326-340 - Ximing He, Sheng Ma, Wenjie Liu, Sijiang Fan, Libo Huang, Zhiying Wang, Zhanyong Zhou:
VISU: A Simple and Efficient Cache Coherence Protocol Based on Self-updating. 341-357 - Ao Yin, Chunkai Zhang, Zoe Lin Jiang, Yulin Wu, Xing Zhang, Keli Zhang, Xuan Wang:
PPLDEM: A Fast Anomaly Detection Algorithm with Privacy Preserving. 358-373 - Yulin Wu, Xuan Wang, Zoe Lin Jiang, Xuan Li, Jin Li, Siu-Ming Yiu, Zechao Liu, Hainan Zhao, Chunkai Zhang:
Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection. 374-388 - Chuxin Wu, Peng Zhang, Hongwei Liu, Zehong Chen, Zoe Lin Jiang:
An Efficient Multi-keyword Searchable Encryption Supporting Multi-user Access Control. 389-398 - Xu Li, Guojun Wang, Saqib Ali, QiLin He:
Android Malware Detection Using Category-Based Permission Vectors. 399-414 - Wenli Sun, Zoe Lin Jiang, Jun Zhang, Siu-Ming Yiu, Yulin Wu, Hainan Zhao, Xuan Wang, Peng Zhang:
Outsourced Privacy Preserving SVM with Multiple Keys. 415-430 - Yujia Hu, Hang Shen, Guangwei Bai, Tianjing Wang:
Privacy-Preserving Task Allocation for Edge Computing Enhanced Mobile Crowdsensing. 431-446 - Zoe Lin Jiang, Ning Guo, Yabin Jin, Jiazhuo Lv, Yulin Wu, Yating Yu, Xuan Wang, Siu-Ming Yiu, Junbin Fang:
Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing. 447-460 - Miaomiao Tian, Shibei Ye, Hong Zhong, Lingyan Wang, Fei Chen, Jie Cui:
Identity-Based Proofs of Storage with Enhanced Privacy. 461-480 - David Madsen, Wenjuan Li, Weizhi Meng, Yu Wang:
Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA. 481-494 - Mengdi Liu, Guangquan Xu, Jun Zhang, Rajan Shankaran, Gang Luo, Xi Zheng, Zonghua Zhang:
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems. 495-510 - Dulin, Zhiwei Zhang, Shichong Tan, Jianfeng Wang, Xiaoling Tao:
An Associated Deletion Scheme for Multi-copy in Cloud Storage. 511-526 - Jiaqing Dong, Kai Wang, Yongqiang Lyu, Libo Jiao, Hao Yin:
InterestFence: Countering Interest Flooding Attacks by Using Hash-Based Security Labels. 527-537 - Yingjie Gu, Xiaolin Gui, Pan Xu, Ruowei Gui, Yingliang Zhao, Wenjie Liu:
A Secure and Targeted Mobile Coupon Delivery Scheme Using Blockchain. 538-548 - Jianwei Liu, Jianhua Fan:
Access Delay Analysis in String Multi-hop Wireless Network Under Jamming Attack. 549-559 - Qingfeng Du, Tiandi Xie, Yu He:
Anomaly Detection and Diagnosis for Container-Based Microservices with Performance Monitoring. 560-572 - Wentao Tan, Hong Wang, Lutong Wang, Xiaomei Yu:
Integrated Prediction Method for Mental Illness with Multimodal Sleep Function Indicators. 573-580 - Yinghui Zhang, Jiangfan Zhao, Dong Zheng, Kaixin Deng, Fangyuan Ren, Xiaokun Zheng:
Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing. 581-590 - Nanxi Chen, Xiaobo Xu, Xuzhi Miao:
A Reputation Model for Third-Party Service Providers in Fog as a Service. 591-599 - Yanhua Zhang, Yong Gan, Yifeng Yin, Huiwen Jia:
Attribute-Based VLR Group Signature Scheme from Lattices. 600-610 - Jinlong Wang, Jing Liu, Lijuan Zheng:
Construction of VMI Mode Supply Chain Management System Based on Block Chain. 611-616 - Tianyu Wang, Zhiyong Zhang, Mengying Zhao, Ke Liu, Zhiping Jia, Jianping Yang, Yang Wu:
H2-RAID: A Novel Hybrid RAID Architecture Towards High Reliability. 617-627 - Binod Kumar Adhikari, Wanli Zuo, Ramesh Maharjan, Lin Guo:
Sensitive Data Detection Using NN and KNN from Big Data. 628-642 - Jiahao Liang, Lin You:
Secure Biometric Authentication Scheme Based on Chaotic Map. 643-653
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.