default search action
3. ICCCS 2017: Nanjing, China
- Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino:
Cloud Computing and Security - Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II. Lecture Notes in Computer Science 10603, Springer 2017, ISBN 978-3-319-68541-0
Information Security
- Shaojing Fu, Yunpeng Yu, Ming Xu:
Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud. 3-15 - Ce Yang, Weiming Zhang, Jiachen Ding, Nenghai Yu:
Probability-p Order-Preserving Encryption. 16-28 - Hongchen Wu, Huaxiang Zhang:
DLPDS: Learning Users' Information Sharing Behaviors for Privacy Default Setting in Recommender System. 29-39 - Zhengqian Li, Pinhui Ke, Zhifan Ye:
New Construction of Low-Hit-Zone Frequency Hopping Sequence Sets with Optimal Partial Hamming Correlation. 40-49 - Po-Ching Lin, Yu-Ting Hsu, Ren-Hung Hwang:
Detecting and Preventing DDoS Attacks in SDN-Based Data Center Networks. 50-61 - Miao Du, Yongzhong Li, Qing Lu, Kun Wang:
Bayesian Game Based Pseudo Honeypot Model in Social Networks. 62-71 - Hao Wang, Zhengquan Xu, Lizhi Xiong, Tao Wang:
Conducting Correlated Laplace Mechanism for Differential Privacy. 72-85 - Zhiniang Peng, Shaohua Tang, Linzhi Jiang:
A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security. 86-99 - Mingming Wang, Zhiguo Qu, Mohamed Elhoseny:
Quantum Secret Sharing in Noisy Environment. 100-112 - Yanwei Xu, Lianyong Qi:
SimHash-Based Similar Neighbor Finding for Scalable and Privacy-Preserving Service Recommendation. 113-122 - Qihui Zhang, Xuexian Hu, Jianghong Wei, Wenfen Liu:
Universally Composable Three-Party Password Authenticated Key Exchange. 123-137 - Xiang Lin, Juan Xu, Hu Liu, Xuwei Tang, Maomao Fu:
A High-Capacity Quantum Secret Sharing Protocol Based on Single D-Level Particles. 138-146 - Yi Yin, Yuichiro Tateiwa, Yun Wang, Yoshiaki Katayama, Naohisa Takahashi:
An Inconsistency Detection Method for Security Policy and Firewall Policy Based on CSP Solver. 147-161 - Fan Chen, Hongjie He, Tinghuai Ma, Shu Yan:
Reversible Data Hiding in Encrypted Image Based on Block Classification Scrambling. 162-174 - Yanyu Huang, Chuan Fu, Xuan Chen, Hao Guo, Xiaoyu He, Jin Li, Zheli Liu:
A Mutation Approach of Detecting SQL Injection Vulnerabilities. 175-188 - Fan Wu, Lili Xu:
A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing. 189-200 - Xin Zhang, Fengtong Wen:
An Anonymous User Authentication and Key Distribution Protocol for Heterogenous Wireless Sensor Network. 201-215 - Shufen Niu, Zhenbin Li, Caifen Wang:
Privacy-Preserving Multi-party Aggregate Signcryption for Heterogeneous Systems. 216-229 - Yan Dai, Jie Shao:
An Enhanced Method of Trajectory Privacy Preservation Through Trajectory Reconstruction. 230-243 - Chunhua Jin, Jianyang Zhao:
Efficient and Short Identity-Based Deniable Authenticated Encryption. 244-255 - Gang Du, Chunguang Ma, Zengpeng Li, Ding Wang:
Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme. 256-267 - Rui Guo, Xiong Li, Dong Zheng:
Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud. 268-279 - Li Jiang, Yi Zhuang:
Detect Storage Vulnerability of User-Input Privacy in Android Applications with Static and Dynamic Analysis. 280-291 - Fei Li, Wei Gao, Dongqing Xie, Chunming Tang:
Certificateless Cryptography with KGC Trust Level 3 Revisited. 292-304 - Jing Li, Zhiping Zhou, Ping Wang:
Server-Less Lightweight Authentication Protocol for RFID System. 305-314 - Yong Cheng, Huaizhe Zhou, Jun Ma, Zhiying Wang:
Efficient CP-ABE with Non-monotonic Access Structures. 315-325 - Faliu Yi, Yousun Jeoung, Ruili Geng, Inkyu Moon:
Image Authentication Based on Least Significant Bit Hiding and Double Random Phase Encoding Technique. 326-335 - Jian Tang, Meijuan Jia, Jian Zhang, Meiying Jia:
On-Line Intrusion Detection Model Based on Approximate Linear Dependent Condition with Linear Latent Feature Extraction. 336-345 - Feipeng Lin, Bo Wang, Yabin Li:
Differential Direction Adaptive Based Reversible Information Hiding. 346-356 - Hao Wang, Guangjie Liu, Weiwei Liu, Jiangtao Zhai, Yuewei Dai:
Detection of Jitterbug Covert Channel Based on Partial Entropy Test. 357-368
Multimedia Applications
- Yanjia Zhao, Tianming Pang, Xiaoyun Liang, Zhaohong Li:
Frame-Deletion Detection for Static-Background Video Based on Multi-scale Mutual Information. 371-384 - Yun Zhang, Na Li, Zongju Peng:
Learning Based Fast H.264/AVC to HEVC INTRA Video Transcoding for Cloud Media Computing. 385-395 - Juan Chen, Fei Peng, Min Long:
A Perceptual Encryption Scheme for HEVC Video with Lossless Compression. 396-407 - Bingyu Ji, Ran Li, Chang-an Wu:
Spatial-Temporal Correlation Based Multi-resolution Hybrid Motion Estimation for Frame Rate Up-Conversion. 408-417 - Wenwu Gu, Gaobo Yang, Dengyong Zhang, Ming Xia:
A Robust Seam Carving Forgery Detection Approach by Three-Element Joint Density of Difference Matrix. 418-432 - Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold. 433-440 - Li Zhou, Weiwei Yuan, Kangya He, Chenliang Li, Qiang Li:
Kernel Searching Strategy for Recommender Searching Mechanism. 441-449 - Zhiguo Qu, Zhenwen Cheng, Mingming Wang:
A Robust Quantum Watermark Algorithm Based on Quantum Log-Polar Images. 450-460 - Lingjun Liu, Weiyu Yu, Cui Yang:
Adaptive Hybrid Wavelet Regularization Method for Compressive Imaging. 461-470 - Ping Li, Qiang Chen, Wen Fan, Songtao Yuan:
Registration of OCT Fundus Images with Color Fundus Images Based on Invariant Features. 471-482 - Yang Shi, Nannan Liu, Xingjian Long, Lei Xu:
View-Based 3D Model Retrieval Based on Distance Learning. 483-493 - Jiasong Wu, Shijie Qiu, Rui Zeng, Lotfi Senhadji, Huazhong Shu:
PCANet for Color Image Classification in Various Color Spaces. 494-505 - Xinning Li, Zhiping Zhou, Lele Liu:
A Method of Group Behavior Analysis for Enhanced Affinity Propagation. 506-517 - Bin Yang, Zhenyu Li, Weifeng Hu, Enguo Cao:
A Median Filtering Forensics Approach Based on Machine Learning. 518-527 - Baolin Shang, Jiaju Tan, Xiaobing Hong, Xuemei Guo, Guoli Wang, Gonggui Liu, Shouren Xue:
Spatiotemporal Radio Tomographic Imaging with Bayesian Compressive Sensing for RSS-Based Indoor Target Localization. 528-540 - Ronghua Shang, Weitong Zhang, Licheng Jiao:
Detection in SAR Images Based on Histogram and Improved Elitist Genetic Fuzzy Clustering. 541-553 - Qiang Chen, Pin Wan, Yonghua Wang, Jiangfan Li, Yirui Xiao:
Research on Cognitive Radio Spectrum Sensing Method Based on Information Geometry. 554-564 - Fan Yang, Yi Zhuang, Jun Wang:
Android Malware Detection Using Hybrid Analysis and Machine Learning Technique. 565-575 - Huibing Wang, Mingwei Lin, Jinbo Xiong, Li Lin, Ruliang Xiao:
Workload-Aware Page-Level Flash Translation Layer for NAND Flash-Based Storage Systems. 576-588 - Leiming Yan, Zeyu Chen, Ping Zang:
Biclustering Evolutionary Spatiotemporal Community in Global Trading Network. 589-598
Optimization and Classification
- Xiaohui Wei, Lanxin Li, Xingwang Wang, Yuanyuan Liu:
Cost Optimization for Time-Bounded Request Scheduling in Geo-Distributed Datacenters. 601-610 - Na Li, Jin Han:
The Application of Naive Bayes Classifier in Name Disambiguation. 611-618 - Lei Shi, Xi Fu, Jing Li:
Mobility Prediction-Based Service Scheduling Optimization Algorithm in Cloudlets. 619-630 - Qi Liu, Hao Wu, Xiaodong Liu, Nigel Linge:
Single Appliance Recognition Using Statistical Features Based k-NN Classification. 631-640 - Jia Hao, Binbin Zhang, Kun Yue, Juan Wang, Hao Wu:
Performance Measurement and Configuration Optimization of Virtual Machines Based on the Bayesian Network. 641-652 - Jian Li, Guojing Wu:
Image Recapture Detection Through Residual-Based Local Descriptors and Machine Learning. 653-660 - Yawen Chen, Wenan Tan, Yibo Pan:
A Method Towards Community Detection Based on Estimation of Distribution Algorithm. 661-671 - Yuling Liu, Qi Li, Guojiang Xin:
Sentiment Analysis with Improved Adaboost and Transfer Learning Based on Gaussian Process. 672-683 - Yan Liu, Wentao Zhao, Qiang Liu, Linyuan Yu, Dongxu Wang:
HL-HAR: Hierarchical Learning Based Human Activity Recognition in Wearable Computing. 684-693 - Sheng Xiang, Yigang He, Liuchen Chang, Kehan Wu, Chaolong Zhang:
An Improved Quantum-Inspired Evolutionary Algorithm for Knapsack Problems. 694-708 - Yue-lin Shen, Wenbing Zhang:
Output-Based Sampled Data Control for Linear Systems: A Measurement Error Estimation Approach. 709-716 - Wenjun Wang, Hui Wang, Jia Zhao, Li Lv:
Adaptive Firefly Algorithm with a Modified Attractiveness Strategy. 717-726 - Xuan Xiao, Peng Wang, Jian-Hong Wang:
Newton Method for Interval Predictor Model with Sphere Parameter Set. 727-737 - Gonglin Yuan, Wujie Hu, Zhou Sheng:
A Conjugate Gradient Algorithm with Yuan-Wei-Lu Line Search. 738-746 - Yilong Shi, Hong Lin, Yuqiang Li:
IU-PMF: Probabilistic Matrix Factorization Model Fused with Item Similarity and User Similarity. 747-758 - Tao Li, Ting Wang, Jin Deng, Li Zhang:
New Delay-Dependent Stability for Neutral Systems with Its Application to Partial Circuit Model. 759-771 - Wei Li, Changxin Huang, Kaimin Chen, Songchen Han:
A Quantitative Evaluation Method of Surveillance Coverage of UAVs Swarm. 772-782 - Yijing Ren, Ren Ren:
Chaos Prediction of Fast Fading Channel of Multi-rates Digital Modulation Using Support Vector Machines. 783-790
Short Paper
- Junjie Jin, Wei Zhang:
System Log-Based Android Root State Detection. 793-798 - Dongmin Li, Jing Li, Sai Liu, Chao Wang:
Quantified Attribute Access Control Model for Cloud Storage Platform. 799-804 - Ting Wang, Min Lei, Jingjie Chen, Shiqi Deng, Yu Yang:
Dynamically-Enabled Defense Effectiveness Evaluation in Home Internet Based on Vulnerability Analysis. 805-815 - Fugao Zhang, Zining Cao:
The Formal Transformation of AADL Based on Z-CoIA. 816-822 - Liping Liu, Linlin Ci, Wei Liu:
Masking Signature Data Errors of Software-Based Control Flow Checking Techniques Employing Redundancy Signature. 823-828 - Yibo Pan, Wenan Tan, Yawen Chen:
The Analysis of Key Nodes in Complex Social Networks. 829-836 - Li Li, Lina Li, Shanqing Zhang, Zaorang Yang, Jianfeng Lu, Chin-Chen Chang:
Novel Schemes for Bike-Share Service Authentication Using Aesthetic QR Code and Color Visual Cryptography. 837-842 - Ping Wang, Zhiping Zhou:
An Improved RFID Search Protocol. 843-848 - Ming Zhong, Bo Xu:
A Developmental Evolutionary Algorithm for 0-1 Knapsack Problem. 849-854 - Shangqing Liu, Yanchao Zhao, Bing Chen:
WiSmart : Robust Human Access and Identification for Smart Homes Using WiFi Signals. 855-861 - Can Wu, Yunhai Xiao, Wenjie Liu:
Robust Face Recognition Model with Adaptive Correction Term via Generalized Alternating Direction Method of Multipliers. 862-873
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.