default search action
Information Sciences, Volume 527
Volume 527, July 2020
- Roy Cerqueti, Massimiliano Giacalone, Raffaele Mattera:
Skewed non-Gaussian GARCH models for cryptocurrencies volatility modelling. 1-26 - Tiago da Cruz Asmus, Graçaliz Pereira Dimuro, Benjamín R. C. Bedregal, José Antonio Sanz, Sidnei F. Pereira Jr., Humberto Bustince:
General interval-valued overlap functions and interval-valued overlap indices. 27-50 - Li Guo, Hao Yu, Fei Hao:
Event-triggered control for stochastic networked control systems against Denial-of-Service attacks. 51-69 - Xiangguang Dai, Xiaojie Su, Wei Zhang, Fangzheng Xue, Huaqing Li:
Robust Manhattan non-negative matrix factorization for image recovery and representation. 70-87 - Alshahrani Mohammed, Fuxi Zhu, Ahmed Sameh, Soufiana Mekouar, Sheng Huang:
Efficient algorithms based on centrality measures for identification of top-K influential users in social networks. 88-107 - Jia Duan, Jiantao Zhou, Yuanman Li:
Privacy-Preserving distributed deep learning based on secret sharing. 108-127 - Sukhendu Bera, Pravash Kumar Giri, Dipak Kumar Jana, Kajla Basu, Manoranjan Maiti:
Fixed charge 4D-TP for a breakable item under hybrid random type-2 uncertain environments. 128-158 - Omar Abdel Wahab, Robin Cohen, Jamal Bentahar, Hadi Otrok, Azzam Mourad, Gaith Rjoub:
An endorsement-based trust bootstrapping approach for newcomer cloud services. 159-175 - Changxin Gao, Yang Chen, Jin-Gang Yu, Nong Sang:
Pose-guided spatiotemporal alignment for video-based person Re-identification. 176-190 - Qidan Zhu, Yongchao Liu, Guoxing Wen:
Adaptive neural network control for time-varying state constrained nonlinear stochastic systems with input saturation. 191-209 - Tong Wu, Guomin Yang, Yi Mu, Rongmao Chen, Shengmin Xu:
Privacy-enhanced remote data integrity checking with updatable timestamp. 210-226 - Hui Wang, Wenjun Wang, Songyi Xiao, Zhihua Cui, Minyang Xu, Xinyu Zhou:
Improving artificial Bee colony algorithm using a new neighborhood selection mechanism. 227-240 - Bo Li, Xiaodong Du, Meng Chen:
Cross-language question retrieval with multi-layer representation and layer-wise adversary. 241-252 - Lei Mu, Peng Wang, Gang Xin:
Quantum-inspired algorithm with fitness landscape approximation in reduced dimensional spaces for numerical function optimization. 253-278 - Wen-Bo Xie, Yan-Li Lee, Cong Wang, Duan-Bing Chen, Tao Zhou:
Hierarchical clustering supported by reciprocal nearest neighbors. 279-292
- Jinjun Chen, Laurence T. Yang:
Special Section on Privacy Computing: Principles and Applications. 293 - Pedro Barbosa, Andrey Brito, Hyggo O. Almeida:
Privacy by Evidence: A Methodology to develop privacy-friendly software applications. 294-310 - Chris Soo-Hyun Eom, Charles Cheolgi Lee, Wookey Lee, Carson K. Leung:
Effective privacy preserving data publishing by vectorization. 311-328 - Kai Fan, Qi Luo, Kuan Zhang, Yintang Yang:
Cloud-based lightweight secure RFID mutual authentication protocol in IoT. 329-340 - Jun Feng, Laurence T. Yang, Nicholaus J. Gati, Xia Xie, Benard S. Gavuna:
Privacy-preserving computation in cyber-physical-social systems: A survey of the state-of-the-art and perspectives. 341-355 - Duy-Hien Vu, The-Dung Luong, Tu-Bao Ho:
An efficient approach for secure multi-party computation without authenticated channel. 356-368 - Liang Fang, Guozhen Shi, Lianhai Wang, Yongjun Li, Shujiang Xu, Yunchuan Guo:
Incentive mechanism for cooperative authentication: An evolutionary game approach. 369-381 - Fatty M. Salem, Ruhul Amin:
A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. 382-393 - Lei Xu, Chungen Xu, Joseph K. Liu, Cong Zuo, Peng Zhang:
Building a dynamic searchable encrypted medical database for multi-client. 394-405 - Shaobo Zhang, Xinjun Mao, Kim-Kwang Raymond Choo, Tao Peng, Guojun Wang:
A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services. 406-419 - Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Ahmet Çamtepe, Ibrahim Khalil:
Efficient privacy preservation of big data for accurate data mining. 420-443 - Fenghua Li, Xinyu Wang, Ben Niu, Hui Li, Chao Li, Lihua Chen:
Exploiting location-related behaviors without the GPS data on smartphones. 444-459 - Weihao Li, Chen Li, Yeli Geng:
APS: Attribute-aware privacy-preserving scheme in location-based services. 460-476 - Wenjuan Tang, Kuan Zhang, Ju Ren, Yaoxue Zhang, Xuemin (Sherman) Shen:
Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcing. 477-492 - Rafik Hamza, Zheng Yan, Khan Muhammad, Paolo Bellavista, Faiza Titouna:
A privacy-preserving cryptosystem for IoT E-healthcare. 493-510 - Yuxiang Ma, Yulei Wu, Jun Li, Jingguo Ge:
APCN: A scalable architecture for balancing accountability and privacy in large-scale content-based networks. 511-532 - Mang Su, Bo Zhou, Anmin Fu, Yan Yu, Gongxuan Zhang:
PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT. 533-547 - Yushu Zhang, Jin Jiang, Yong Xiang, Ye Zhu, Liangtian Wan, Xiyuan Xie:
Cloud-assisted privacy-conscious large-scale Markowitz portfolio. 548-559 - Jiafeng Hua, Guozhen Shi, Hui Zhu, Fengwei Wang, Ximeng Liu, Hao Li:
CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud. 560-575 - Wanchun Dou, Wenda Tang, Xiaotong Wu, Lianyong Qi, Xiaolong Xu, Xuyun Zhang, Chunhua Hu:
An insurance theory based optimal cyber-insurance contract against moral hazard. 576-589 - Chao Lin, Debiao He, Xinyi Huang, Xiang Xie, Kim-Kwang Raymond Choo:
Blockchain-based system for secure outsourcing of bilinear pairings. 590-601 - Guangchun Luo, Ke Yan, Xu Zheng, Ling Tian, Zhipeng Cai:
Preserving adjustable path privacy for task acquisition in Mobile Crowdsensing Systems. 602-619
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.