default search action
3. ICCCS 2017: Nanjing, China
- Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino:
Cloud Computing and Security - Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I. Lecture Notes in Computer Science 10602, Springer 2017, ISBN 978-3-319-68504-5
Information Hiding
- Fei Peng, Shuai-ping Wang, Gang Luo, Min Long:
Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling. 3-15 - Huimin Luo, Jiabin Yuan, Wenjing Dai:
A New Universal Quantum Gates and Its Simulation on GPGPU. 16-27 - Yanli Chen, Hongxia Wang, Hanzhou Wu:
Data Hiding-Based Video Error Concealment Method Using Compressed Sensing. 28-38 - Shuang Yu, Jian Li, Jinwei Wang:
A Novel Robust Reversible Watermarking Scheme Based on IWT. 39-48 - Yi Puyang, Zhaoxia Yin, Guorui Feng, Andrew K. Abel:
An Improved Reversible Information Hiding Scheme Based on AMBTC Compressed Images. 49-60 - Yong Liu, Hong-Xia Wang, Han-Zhou Wu, Yi Chen:
An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points. 61-73 - Yingbo Yu, Xin Liao:
Improved CMD Adaptive Image Steganography Method. 74-84 - Zhen Li, Jiabin Yuan:
Quantum Computer Simulation on GPU Cluster Incorporating Data Locality. 85-97 - Jianfeng Lu, Peng Gao, Shanqing Zhang, Li Li, Wenqiang Yuan, Qili Zhou:
Tampering Detection in Oral History Video Using Watermarking. 98-109 - Yafei Yuan, Wei Lu, Bingwen Feng, Jian Weng:
Steganalysis with CNN Using Multi-channels Filtered Residuals. 110-120 - Jianjun Zhang, Yicheng Xie, Lucai Wang, HaiJun Lin:
Coverless Text Information Hiding Method Using the Frequent Words Distance. 121-132 - Chun-Xing Wang, Teng Zhang, Wenbo Wan, Jiande Sun, Jing Li, Meiling Xu:
Improved STDM Watermarking Using Semantic Information-Based JND Model. 133-142 - Shujiang Xu, Lianhai Wang, Guangqi Liu, Xiaohui Han, Dawei Zhao, Lijuan Xu:
The Categories of Quantum Information Hiding Protocol. 143-152 - Conghua Liu, Gang Luo, Zuwei Tian:
Coverless Information Hiding Technology Research Based on News Aggregation. 153-163
Cloud Computing
- Tianmu Li, Leiming Yan:
SIEM Based on Big Data Analysis. 167-175 - Hongjie Zhang, Guansheng Shu, Shasha Liao, Xi Fu, Jing Li:
Workload-Aware VM Consolidation in Cloud Based on Max-Min Ant System. 176-188 - Longchang Zhang, Yanhong Yang, Decai Sun:
Parallel Service Selection Method Based on Adaptive Cloud Model for Mobile Application. 189-200 - Jun-Qing Li, Yuyan Han, Cun-gang Wang:
A Hybrid Artificial Bee Colony Algorithm to Solve Multi-objective Hybrid Flowshop in Cloud Computing Systems. 201-213 - Guoping Du, Wenbin Yao, Dongbin Wang, Xiaole Wen:
A Group-Based Replica Consistency Schema for Cloud Storage. 214-225 - Zhe Zheng, Kun Xie, Shiming He, Jun Deng:
A Multi-objective Optimization Scheduling Method Based on the Improved Differential Evolution Algorithm in Cloud Computing. 226-238 - Muzhou Xiong, Haixin Liu, Deze Zeng:
A Network Calculus Analysis for the Baseband Processing Capacity in Cloud Radio Access Network. 239-250 - Yubing Mao, Zhengyou Xia:
Live Migration Among CloudBased on MOOSE Address. 251-261 - Yuanyuan Zhang, Jinbo Xiong, Mingwei Lin, Lili Wang, Xuan Li:
Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications. 262-274 - Jieren Cheng, Kuanqi Cai, Boyi Liu, Xiangyan Tang:
Design and Test of the Intelligent Rubber Tapping Technology Evaluation Equipment Based on Cloud Model. 275-287 - Kyle Morton, Yanzhen Qu, Marilyn Carroll:
An Affective Computing and Fuzzy Logic Framework to Recognize Affect for Cloud-based E-Learning Environment Using Emoticons. 288-299 - Micheal Ernest Taylor, Jian Shen:
Cloud Management Systems and Virtual Desktop Infrastructure Load Balancing Algorithms - A Survey. 300-309
IoT Applications
- Irfan Dwiguna Sumitra, Rongtao Hou, Sri Supatmi:
Design and Deployment of Wireless Sensor Networks for Flood Detection in Indonesia. 313-325 - Xin Su, Xuchong Liu, Jiuchuan Lin, Yu Tong:
An Android App Recommendation Approach by Merging Network Traffic Cost. 326-338 - Qi Liu, Weixin Bu, Kai Zhang, Xiaodong Liu, Nigel Linge:
A Virtual Grid-Based Routing Protocol for Mobile Sink-Based WSNs. 339-348 - Yating Hou, Feng Xu, Ruilin Ding:
Low-Energy Security-Enhanced Routing Protocol Based on DBSCAN Partition. 349-360 - Xiaodong Liu, Qi Liu:
Power Consuming Activity Recognition in Home Environment. 361-372 - Yating Hou, Feng Xu, Mingming Su, Kaibo Yu:
A Pre-partition Based Uneven Clustering Multi-hop Routing Protocol. 373-384 - Jinxia Dou, Wenbin Yao, Dongbin Wang:
A Credibility Evaluation Method in Opportunistic Networks. 385-397 - Kondwani M. Kamoto, Qi Liu, Xiaodong Liu:
Unsupervised Energy Disaggregation of Home Appliances. 398-409 - Yang Guo, Zheng Xiao, Hui Chen, Ling Huang:
Planar-Based Visual Positioning for a Mobile Robot with Monocular Vision. 410-421 - Zichun Wang, Meng Feng, Tiantian Miao, Wei Jiang, Jian Shen:
Energy Efficient MAC Protocol for Wireless Sensor Networks: A Survey. 422-429 - Jin Wang, Chunwei Ju, Huan Ji, Geumran Youn, Jeong-Uk Kim:
A Particle Swarm Optimization and Mutation Operator Based Node Deployment Strategy for WSNs. 430-437 - Zhi Zhao, Peng Pin, Weiyu Yu:
A Distributed Sparse Signal Reconstruction Algorithm in Wireless Sensor Network. 438-449 - Xiaodong Liu, Qi Liu:
An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. 450-459 - Xiaoxiao Guan, Xiangping Zhai, Jiabin Yuan, Hu Liu:
Energy-Efficient Power Control and Resource Allocation for D2D Communications in Underlaying Cellular Networks. 460-471 - Shih-Yun Huang, Chen-Chi Liao, Yao-Chung Chang, Han-Chieh Chao:
Virtual Machine Placement Based on Metaheuristic for IoT Cloud. 472-482 - Long Cheng, Yuchao Shao, Yan Wang:
A Novel Kalman Filter Based NLOS Localization Method for Wireless Sensor Networks. 483-494 - Xiaoyong Yan, Zhong Yang, Yu Liu, Zhong Su, Huijun Li:
An Improved Localization Algorithm for Anisotropic Sensor Networks. 495-507 - Zhihua Diao, Chunying Diao, Xiaoliang Qian, Yuanyuan Wu:
Further Results on Finite-Time Stability of Switched Static Neural Networks. 508-518 - Yangyang Li, Xiaoju Hou, Licheng Jiao, Yu Xue:
An Improved Artificial Immune Network Based on the Secondary Immune Mechanism for Data Clustering. 519-530 - Haichao Guan, Huakang Li, Guozi Sun:
Analysis of User's Abnormal Behavior Based on Behavior Sequence in Enterprise Network. 531-541 - Yunqi Dou, Chuangui Ma, Yanbin Li, Fushan Wei:
An Efficient Speeding up Algorithm of Frobenius Based Scalar Multiplication on Koblitz Curves for Cloud Computing. 542-551 - Qingling Wang:
Consensus of Multi-agent Systems with State Constraints. 552-560
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.