


default search action
9th ATIS 2018: Nanning, China
- Qingfeng Chen, Jia Wu, Shichao Zhang, Changan Yuan, Lynn Batten, Gang Li:

Applications and Techniques in Information Security - 9th International Conference, ATIS 2018, Nanning, China, November 9-11, 2018, Proceedings. Communications in Computer and Information Science 950, Springer 2018, ISBN 978-981-13-2906-7
Information Security
- Bin Wang, Rongyang Zhao, Guo-Yin Zhang, Jia-Hai Liang:

Optimization of Location Information Hiding Algorithm for Anti Attack. 3-11 - Taoshen Li, Xiong Zhou, Ruwei Wang:

Multi-user Order Preserving Encryption Scheme in Cloud Computing Environments. 12-28 - Xiaohui Cheng, Haodong Tang:

Dynamic Memory Allocation of Embedded Real-Time Operating System Based on TLSF. 29-39 - Krishna Prakasha

, Pratheeksha Gowda, Vasundhara Acharya
, Balachandra Muniyal, Mayank Khandelwal:
Enhanced Authentication and Key Agreement Mechanism Using PKI. 40-51
Information Abuse Prevention
- M. J. Akshay

, N. Ala Mohammed, Amit Vyas, Palayil Baby Shony, Sheldon Kevin Correa:
Information Abuse in Twitter and Online Social Networks: A Survey. 55-66 - Ling Song, Wei Ma, Jin Ye:

Location Privacy Protection for Sink Node in WSN Based on K Anonymous False Packets Injection. 67-78 - Noora Hashim Alallaq, Muhmmad Al-Khiza'ay

, Mohammed Iqbal Dohan, Xin Han:
Sentiment Analysis to Enhance Detection of Latent Astroturfing Groups in Online Social Networks. 79-91 - Nidhinandana Salian:

Visual Attention and Memory Augmented Activity Recognition and Behavioral Prediction. 92-106
Security Implementations
- Yong Huang, Yongsheng Li, Qinggeng Jin

:
Distributed Computing Security Model Based on Type System. 109-117 - Xiaolan Xie, Mengnan Qiu:

Cloud Computing Resource Scheduling Optimization Based on Chaotic Firefly Algorithm Based on the Tent Mapping. 118-128 - Sucharitha Shetty

, B. Dinesh Rao
, Srikanth Prabhu
:
An Optimized Parallel Algorithm for Exact String Matching Using Message Passing Interface. 129-135 - Li Anya:

Research on Algorithms for Planted (l, d) Motif Search. 136-143
Knowledge Discovery
- Long Chen, Zhi Zhong:

Joint Subspace Learning and Sparse Regression for Feature Selection in Kernel Space. 147-158 - Zhi Zhong:

Adaptive Graph Learning for Supervised Low-Rank Spectral Feature Selection. 159-171 - Niharika Gupta, Vipul Mayank, M. Geetha

, Shwetha Rai
, Shyam Karanth
:
A Tree Based Approach for Concept Maps Construction in Adaptive Learning Systems. 172-182
Applications
- Tianshi Liu, Qiong Wu, Wenjuan Zhang, Xinran Cao:

Active Multivariate Matrix Completion. 185-198 - Zheng Wang, Jiang Yu:

Model of Decision Making for Agents Based on Relationship Coefficient. 199-207 - Binayaka Chakraborty, M. Geetha:

Emotion Recognition in a Conversational Context. 208-214 - Diana Olivia

, Ashalatha Nayak
, Mamatha Balachandra
:
Machine Learning Based Electronic Triage for Emergency Department. 215-221

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














