Search dblp for Publications

export results for "toc:db/conf/icccsec/icccsec2018-4.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icccsec/0006GQGY18,
  author       = {Yang Yang and
                  Xiang yang Gong and
                  Xuesong Qiu and
                  Zhipeng Gao and
                  Haitao Yu},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Mixed Mobile Charging Strategy in Rechargeable Wireless Sensor Networks},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {608--621},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_53},
  doi          = {10.1007/978-3-030-00015-8\_53},
  timestamp    = {Sat, 17 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/0006GQGY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/BianXW18,
  author       = {Rongzhen Bian and
                  Mingfu Xue and
                  Jian Wang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Novel Golden Models-Free Hardware Trojan Detection Technique Using
                  Unsupervised Clustering Analysis},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {634--646},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_55},
  doi          = {10.1007/978-3-030-00015-8\_55},
  timestamp    = {Thu, 17 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/BianXW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/CaoZAYT18,
  author       = {Fang Cao and
                  Yalei Zhang and
                  Bowen An and
                  Heng Yao and
                  Zhenjun Tang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {An Improved Reversible Data Hiding Scheme with Large Payload Based
                  on Image Local-Complexity},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {231--241},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_20},
  doi          = {10.1007/978-3-030-00015-8\_20},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/CaoZAYT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ChenJXGPC18,
  author       = {Jinlong Chen and
                  Mengke Jiang and
                  Kun Xie and
                  Zhen Guo and
                  Hang Pan and
                  Xianjun Chen},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Method for Energy Consumption Audit and Intelligent Decision of
                  Green Buildings},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {598--607},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_52},
  doi          = {10.1007/978-3-030-00015-8\_52},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ChenJXGPC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ChenLLL18,
  author       = {Xi Chen and
                  Yun Liu and
                  Yong Li and
                  Changlu Lin},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Threshold Proxy Re-encryption and Its Application in Blockchain},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {16--25},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_2},
  doi          = {10.1007/978-3-030-00015-8\_2},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ChenLLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ChenWWCL18,
  author       = {Yi Chen and
                  Hongxia Wang and
                  Hanzhou Wu and
                  Yanli Chen and
                  Yong Liu},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Data Hiding Scheme with High Quality for {H.264/AVC} Video Streams},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {99--110},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_9},
  doi          = {10.1007/978-3-030-00015-8\_9},
  timestamp    = {Fri, 21 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ChenWWCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ChengH18,
  author       = {Sijin Cheng and
                  Fangjun Huang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Reversible Data Hiding in {JPEG} Images Based on Two-Dimensional Histogram
                  Modification},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {392--403},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_34},
  doi          = {10.1007/978-3-030-00015-8\_34},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ChengH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/CuiCZLC18,
  author       = {Jianming Cui and
                  Chen Chen and
                  Xiaojun Zhang and
                  Yihui Liu and
                  Ning Cao},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Three-Factor Remote Authentication Scheme for Multi-server Environment},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {694--705},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_60},
  doi          = {10.1007/978-3-030-00015-8\_60},
  timestamp    = {Fri, 14 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/CuiCZLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/CuiSZLC18,
  author       = {Jianming Cui and
                  Rongquan Sui and
                  Xiaojun Zhang and
                  Hengzhong Li and
                  Ning Cao},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Biometrics-Based Remote User Authentication Scheme Using Smart Cards},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {531--542},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_46},
  doi          = {10.1007/978-3-030-00015-8\_46},
  timestamp    = {Fri, 14 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/CuiSZLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/FuLCZG18,
  author       = {Guangxin Fu and
                  Qingbao Li and
                  Zhifeng Chen and
                  Guangyu Zeng and
                  Juanjuan Gu},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Network Storage Covert Channel Detection Based on Data Joint Analysis},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {346--357},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_30},
  doi          = {10.1007/978-3-030-00015-8\_30},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/FuLCZG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/GaoW18,
  author       = {Quansheng Gao and
                  Kaixi Wang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Layered Steganography Model Based on User Interactions},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {123--134},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_11},
  doi          = {10.1007/978-3-030-00015-8\_11},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/GaoW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/HeJSX18,
  author       = {Xiaoli He and
                  Hong Jiang and
                  Yu Song and
                  He Xiao},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Optimal Resource Allocation for Underlay Cognitive Radio Networks},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {358--371},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_31},
  doi          = {10.1007/978-3-030-00015-8\_31},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/HeJSX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/HuCNS18,
  author       = {Xianglei Hu and
                  Haishan Chen and
                  Jiangqun Ni and
                  Wenkang Su},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Novel Steganography Scheme Based on Asymmetric Embedding Model},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {183--194},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_16},
  doi          = {10.1007/978-3-030-00015-8\_16},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/HuCNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/HuZZY18,
  author       = {Huanhuan Hu and
                  Xin Zuo and
                  Weiming Zhang and
                  Nenghai Yu},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Covert Communication by Exploring Statistical and Linguistical Distortion
                  in Text},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {288--301},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_25},
  doi          = {10.1007/978-3-030-00015-8\_25},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/HuZZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/JiangCCG18,
  author       = {Jielin Jiang and
                  Yan Cui and
                  Yadang Chen and
                  Guangwei Gao},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Novel Nonlocal Low Rank Technique for Fabric Defect Detection},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {173--182},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_15},
  doi          = {10.1007/978-3-030-00015-8\_15},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/JiangCCG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/JiangCJF18,
  author       = {Jielin Jiang and
                  Yan Cui and
                  Zilong Jin and
                  Chunnian Fan},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Fast Three-Phase Fabric Defect Detection},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {302--312},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_26},
  doi          = {10.1007/978-3-030-00015-8\_26},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/JiangCJF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/KangJC18,
  author       = {Zhongmiao Kang and
                  Wenting Jiang and
                  Yan Chen},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Lightweight Graph-Based Model for Inter-networking Access Control},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {589--597},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_51},
  doi          = {10.1007/978-3-030-00015-8\_51},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/KangJC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/KongZWGG18,
  author       = {Yazhou Kong and
                  Liancheng Zhang and
                  Zhenxing Wang and
                  Yi Guo and
                  Wen Guo},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Covert Communication Model Based on IPv6 Multicast},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {85--98},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_8},
  doi          = {10.1007/978-3-030-00015-8\_8},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/KongZWGG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiLL18,
  author       = {Hui{-}Ran Li and
                  Mingxing Luo and
                  Hong Lai},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Unified Quantum No-Go Theorems of Pure States},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {38--47},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_4},
  doi          = {10.1007/978-3-030-00015-8\_4},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiLQXZC18,
  author       = {Li Li and
                  Xin Li and
                  Tong Qiao and
                  Xiaoyu Xu and
                  Shanqing Zhang and
                  Chin{-}Chen Chang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Novel Framework of Robust Video Watermarking Based on Statistical
                  Model},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {160--172},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_14},
  doi          = {10.1007/978-3-030-00015-8\_14},
  timestamp    = {Wed, 17 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiLQXZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiSDC18,
  author       = {Donghui Li and
                  Cong Shen and
                  Xiaopeng Dai and
                  Haiwen Chen},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Kind of Agricultural Content Networking Information Fusion Method
                  Based on Ontology},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {576--588},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_50},
  doi          = {10.1007/978-3-030-00015-8\_50},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiSDC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiW18,
  author       = {Yue Li and
                  Hong{-}Xia Wang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Robust {H.264/AVC} Video Watermarking Without Intra Distortion Drift},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {416--427},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_36},
  doi          = {10.1007/978-3-030-00015-8\_36},
  timestamp    = {Tue, 31 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiWZWG18,
  author       = {Shilin Li and
                  Jing Wu and
                  Taoyun Zhou and
                  Dengzhun Wang and
                  Zhuolin Gao},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {The Phase and Amplitude Errors Frequency Dependence in L-Band Aperture
                  Synthesis Radiometer Using External Noise Sources},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {506--517},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_44},
  doi          = {10.1007/978-3-030-00015-8\_44},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiWZWG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiYJLNL18,
  author       = {Shiyu Li and
                  Dengpan Ye and
                  Shunzhi Jiang and
                  Changrui Liu and
                  Xiaoguang Niu and
                  Xiangyang Luo},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Attack on Deep Steganalysis Neural Networks},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {265--276},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_23},
  doi          = {10.1007/978-3-030-00015-8\_23},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiYJLNL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiZN018,
  author       = {Dong Li and
                  Yingnan Zhang and
                  Ke Niu and
                  Xiaoyuan Yang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Reversible Data Hiding for Video},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {382--391},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_33},
  doi          = {10.1007/978-3-030-00015-8\_33},
  timestamp    = {Mon, 18 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiZN018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiZZCP18,
  author       = {Zhiqiang Li and
                  Gaoman Zhang and
                  Wei Zhang and
                  Hanwu Chen and
                  Marek A. Perkowski},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Synthesis of Quantum Barrel Shifters},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {450--462},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_39},
  doi          = {10.1007/978-3-030-00015-8\_39},
  timestamp    = {Fri, 14 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiZZCP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiangZY18,
  author       = {Yiyuan Liang and
                  Wei Zhang and
                  Kehua Yang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Attention-Based Chinese Word Embedding},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {277--287},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_24},
  doi          = {10.1007/978-3-030-00015-8\_24},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiangZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiaoSXL18,
  author       = {Niandong Liao and
                  Caixia Sun and
                  Lingyun Xiang and
                  Feng Li},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Multiple Watermarking Scheme for Content Authentication of {OOXML}
                  Format Documents},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {147--159},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_13},
  doi          = {10.1007/978-3-030-00015-8\_13},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiaoSXL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiuLCZCL18,
  author       = {Jialing Liu and
                  Jingbing Li and
                  Jing Chen and
                  Xiangxi Zou and
                  Jieren Cheng and
                  Jing Liu},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Medical Image Watermarking Based on {SIFT-DCT} Perceptual Hashing},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {334--345},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_29},
  doi          = {10.1007/978-3-030-00015-8\_29},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiuLCZCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiuLZW18,
  author       = {Xiaodong Liu and
                  Qi Liu and
                  Yanyun Zou and
                  Guizhi Wang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Self-organizing LSTM-Based Approach to {PM2.5} Forecast},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {683--693},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_59},
  doi          = {10.1007/978-3-030-00015-8\_59},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiuLZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiuSLSW18,
  author       = {Mingda Liu and
                  Jing Shang and
                  Peng Liu and
                  Yijuan Shi and
                  Mian Wang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {VideoChain: Trusted Video Surveillance Based on Blockchain for Campus},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {48--58},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_5},
  doi          = {10.1007/978-3-030-00015-8\_5},
  timestamp    = {Tue, 16 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiuSLSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiuZMYDZ18,
  author       = {Shiqin Liu and
                  Minjun Zhao and
                  Jixin Ma and
                  Jiangyuan Yao and
                  Yucong Duan and
                  Xiaoyi Zhou},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Novel Watermarking Technology Based on Posterior Probability {SVM}
                  and Improved {GA}},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {195--207},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_17},
  doi          = {10.1007/978-3-030-00015-8\_17},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiuZMYDZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LongL18,
  author       = {Yi Long and
                  Yuling Liu},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Text Coverless Information Hiding Based on Word2vec},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {463--472},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_40},
  doi          = {10.1007/978-3-030-00015-8\_40},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LongL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/MaWLS18,
  author       = {Bin Ma and
                  Xiaoyu Wang and
                  Bing Li and
                  Yunqing Shi},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Multiple Linear Regression Based High-Performance Error Prediction
                  Method for Reversible Data Hiding},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {135--146},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_12},
  doi          = {10.1007/978-3-030-00015-8\_12},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/MaWLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ManzoorHC18,
  author       = {Sohaib Manzoor and
                  Xiaojun Hei and
                  Wenqing Cheng},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Multi-controller Load Balancing Strategy for Software Defined WiFi
                  Networks},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {622--633},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_54},
  doi          = {10.1007/978-3-030-00015-8\_54},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ManzoorHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/MengFCZ18,
  author       = {Yitong Meng and
                  Jinlong Fei and
                  Yan Chen and
                  Yuefei Zhu},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Domain Name Model of Anonymous Network Hidden Service},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {111--122},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_10},
  doi          = {10.1007/978-3-030-00015-8\_10},
  timestamp    = {Thu, 26 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/MengFCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/PuyangQYZ18,
  author       = {Yi Puyang and
                  Zhenxing Qian and
                  Zhaoxia Yin and
                  Xinpeng Zhang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Style Transferring Based Data Hiding for Color Images},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {440--449},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_38},
  doi          = {10.1007/978-3-030-00015-8\_38},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/PuyangQYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/PuyangYZ18,
  author       = {Yi Puyang and
                  Zhaoxia Yin and
                  Xinpeng Zhang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Reversible Data Embedding and Scrambling Method Based on {JPEG} Images},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {372--381},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_32},
  doi          = {10.1007/978-3-030-00015-8\_32},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/PuyangYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/QianPLZ18,
  author       = {Zhenxing Qian and
                  Lin Pan and
                  Sheng Li and
                  Xinpeng Zhang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Steganography by Constructing Marbling Texture},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {428--439},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_37},
  doi          = {10.1007/978-3-030-00015-8\_37},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/QianPLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ShiZYLZLD18,
  author       = {Jin Shi and
                  Li Zhang and
                  Shuijun Yin and
                  Weiwei Liu and
                  Jiangtao Zhai and
                  Guangjie Liu and
                  Yuewei Dai},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Comprehensive Analysis of Interval Based Network Flow Watermarking},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {72--84},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_7},
  doi          = {10.1007/978-3-030-00015-8\_7},
  timestamp    = {Fri, 14 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ShiZYLZLD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/SunXSTY18,
  author       = {Yifeng Sun and
                  Xiaoyu Xu and
                  Haitao Song and
                  Guangming Tang and
                  Shunxiang Yang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Improving Testing Accuracy of Convolutional Neural Network for Steganalysis
                  Using Segmented Subimages},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {313--323},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_27},
  doi          = {10.1007/978-3-030-00015-8\_27},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/SunXSTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/TangZC18,
  author       = {Langping Tang and
                  Yuren Zhou and
                  Zefeng Chen},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Dominance-Based Constrained Optimization Evolutionary Algorithm
                  for the 4-th Tensor Power Problem of Matrix Multiplication},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {563--575},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_49},
  doi          = {10.1007/978-3-030-00015-8\_49},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/TangZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangJWX18,
  author       = {Xiaoliang Wang and
                  Jianming Jiang and
                  Baowei Wang and
                  Zhihua Xia},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A {VANET} Anonymous Authentication Mechanism for Multi-level Application
                  Scenarios},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {706--717},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_61},
  doi          = {10.1007/978-3-030-00015-8\_61},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/WangJWX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangSXP18,
  author       = {Xiang Wang and
                  Tianze Shu and
                  Min Xie and
                  Qingqi Pei},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Adaptive Robust Reversible Watermarking Scheme},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {221--230},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_19},
  doi          = {10.1007/978-3-030-00015-8\_19},
  timestamp    = {Wed, 27 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/WangSXP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangWBX18,
  author       = {Andy Wang and
                  Chen Wang and
                  Meng Bi and
                  Jian Xu},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Review of Privacy-Preserving Machine Learning Classification},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {671--682},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_58},
  doi          = {10.1007/978-3-030-00015-8\_58},
  timestamp    = {Fri, 24 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/WangWBX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangWZZS18,
  author       = {Jun Wang and
                  Wenbo Wan and
                  Mingsheng Zhang and
                  Liming Zou and
                  Jiande Sun},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Blind Quantization Watermarking Scheme for Screen Content Image},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {61--71},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_6},
  doi          = {10.1007/978-3-030-00015-8\_6},
  timestamp    = {Thu, 22 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/WangWZZS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangYCL18,
  author       = {Zhe Wang and
                  Weidong Yi and
                  Yongrui Chen and
                  Ming Li},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Novel Photovoltaic Cell Simulator for Green Internet of Things},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {659--670},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_57},
  doi          = {10.1007/978-3-030-00015-8\_57},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/WangYCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WuWDCWW18,
  author       = {Hanzhou Wu and
                  Wei Wang and
                  Jing Dong and
                  Yanli Chen and
                  Hongxia Wang and
                  Songyang Wu},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Reversible Embedding to Covers Full of Boundaries},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {404--415},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_35},
  doi          = {10.1007/978-3-030-00015-8\_35},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/WuWDCWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WuWHCYL18,
  author       = {Ruowu Wu and
                  Sen Wang and
                  Hui Han and
                  Xiang Chen and
                  Xuhong Yin and
                  Yun Lin},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {The Assessment Research of Communication Jamming Effect Based on Grey
                  Relational Analysis},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {496--505},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_43},
  doi          = {10.1007/978-3-030-00015-8\_43},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/WuWHCYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/XieNYWZ18,
  author       = {Liangbo Xie and
                  Wei Nie and
                  Xiaolong Yang and
                  Yong Wang and
                  Mu Zhou},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A {BLF} Generation Scheme with Clock Variance-Tolerance for Baseband
                  Processor of {EPC} Gen2 {UHF} {RFID} Tag},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {543--552},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_47},
  doi          = {10.1007/978-3-030-00015-8\_47},
  timestamp    = {Thu, 07 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/XieNYWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/XieYLWZ18,
  author       = {Wen{-}chao Xie and
                  Yi{-}yuan Yang and
                  Zhaohong Li and
                  Jin{-}wei Wang and
                  Min Zhang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {An Information Hiding Algorithm for {HEVC} Videos Based on {PU} Partitioning
                  Modes},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {252--264},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_22},
  doi          = {10.1007/978-3-030-00015-8\_22},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/XieYLWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/XinQD18,
  author       = {Guojiang Xin and
                  Xitong Qi and
                  Changsong Ding},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {An Improved Tamper Detection and Location Scheme for {DOCX} Format
                  Documents},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {242--251},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_21},
  doi          = {10.1007/978-3-030-00015-8\_21},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/XinQD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/YangLYJ18,
  author       = {Kun Yang and
                  Mingzhe Liu and
                  Yaming Yang and
                  Xin Jiang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Design of Mobile Phone Privacy Protection Based on Block Chain},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {553--562},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_48},
  doi          = {10.1007/978-3-030-00015-8\_48},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/YangLYJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/YangZLLQ18,
  author       = {Xu Yang and
                  Yongbin Zhao and
                  Ranran Li and
                  Fengfeng Li and
                  Xiaolin Qi},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Tracing System of Meat Supply Based on {RFID} and Two-Dimensional
                  Code Technology},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {518--527},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_45},
  doi          = {10.1007/978-3-030-00015-8\_45},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/YangZLLQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhangQWWW18,
  author       = {Xiaoming Zhang and
                  Qian Qiang and
                  Weisheng Wang and
                  Zhanfeng Wang and
                  Xianglin Wei},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {{IPFRA:} An Online Protocol Reverse Analysis Mechanism},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {324--333},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_28},
  doi          = {10.1007/978-3-030-00015-8\_28},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhangQWWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhangXSWL18,
  author       = {Jianjun Zhang and
                  Yicheng Xie and
                  Jun Shen and
                  Lucai Wang and
                  HaiJun Lin},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Text Information Hiding Method Using the Custom Components},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {473--484},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_41},
  doi          = {10.1007/978-3-030-00015-8\_41},
  timestamp    = {Tue, 25 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhangXSWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhaoDW18,
  author       = {Liping Zhao and
                  Xiaoni Du and
                  Chenhuang Wu},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Trace Representation of the Sequences Derived from Polynomial Quotient},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {26--37},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_3},
  doi          = {10.1007/978-3-030-00015-8\_3},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhaoDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhaoLCYZ18,
  author       = {Minjun Zhao and
                  Shiqin Liu and
                  Chunjie Cao and
                  Jiangyuan Yao and
                  Xiaoyi Zhou},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Secure Blind Watermarking Scheme Based on Dual Frequency Domains
                  and Ergodic Matrix},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {208--220},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_18},
  doi          = {10.1007/978-3-030-00015-8\_18},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhaoLCYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhaoZL18,
  author       = {Zhicheng Zhao and
                  Yaqun Zhao and
                  Fengmei Liu},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {The Research of Cryptosystem Recognition Based on Randomness Test's
                  Return Value},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_1},
  doi          = {10.1007/978-3-030-00015-8\_1},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhaoZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhouYT18,
  author       = {Ye Zhou and
                  Jiabin Yuan and
                  Xuwei Tang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A Novel Part-Based Model for Fine-Grained Vehicle Recognition},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {647--658},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_56},
  doi          = {10.1007/978-3-030-00015-8\_56},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhouYT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZuoHZY18,
  author       = {Xin Zuo and
                  Huanhuan Hu and
                  Weiming Zhang and
                  Nenghai Yu},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Text Semantic Steganalysis Based on Word Embedding},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {485--495},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_42},
  doi          = {10.1007/978-3-030-00015-8\_42},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZuoHZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2018-4,
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8},
  doi          = {10.1007/978-3-030-00015-8},
  isbn         = {978-3-030-00014-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2018-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics