


default search action
CyberC 2016: Chengdu, China
- Bin Xie, Xiaolong Xu: 
 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2016, Chengdu, China, October 13-15, 2016. IEEE 2016, ISBN 978-1-5090-5154-0
Session 1: Security, Privacy, and Protection
- Yujia Zhang, Jianmin Pang: 
 A New Compile-Time Obfuscation Scheme for Software Protection. 1-5
- Xiaolong Xu, Guangpei Liu, Jie Zhu: 
 Cloud Data Security and Integrity Protection Model Based on Distributed Virtual Machine Agents. 6-13
- Jing Liu, Yuan Wang, Yongjun Wang: 
 Inferring Phylogenetic Networks of Malware Families from API Sequences. 14-17
- Xiaolong Xu, Fuqiang Wan, Yanfei Sun: 
 Privacy Protection of Data Attributes in Cloud Environment. 18-26
- Min Huang, Kai Bu, Hanlin Wang, Kaiwen Zhu: 
 Reviving Android Malware with DroidRide: And How Not To. 27-34
- Xinling Kong, Yonghong Chen, Hui Tian  , Tian Wang, Yiqiao Cai, Xin Chen: , Tian Wang, Yiqiao Cai, Xin Chen:
 A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering. 42-45
- Shuangmao Yang, Ji Wang, Jing Zhang, Hao Li: 
 Cyber Threat Detection and Application Analysis. 46-49
Session 2: Access Control, Authentication, Key, Privacy, and Security
- Shuai Chen, Bing Li: 
 A Dynamic Reseeding DRBG Based on SRAM PUFs. 50-53
- Yingjun Zhang, Kai Chen, Yuling Liu, Yifeng Lian: 
 A Lattice-Based Access Control Model for Social Networks. 54-61
- Jinjiang Yang, Dongming Zhang, Yu Gong, Bo Liu: 
 A Novel Design of Pipeline MDC-FFT Processor Based on Various Memory Access Mechanism. 62-65
- Hui Qi, Xiong Luo, Xiaoqiang Di, Jinqing Li, Huamin Yang, Zhengang Jiang: 
 Access Control Model Based on Role and Attribute and Its Implementation. 66-71
- Weifeng Lu, Siguang Chen: 
 A LEAP PLUS Key Management Scheme with Sliding Time Interval. 72-75
- Daojun Han, Ling Gong, Fen Qin: 
 A Dynamic Access Control Policy Based on Hierarchical Description. 76-80
- Haitao Yang, Jian Zhang: 
 Network Boundary and Protection. 81-85
- Zhijun Wu, Jun Jiang, Meng Yue: 
 A Particle Filter-Based Approach for Effectively Detecting Low-Rate Denial of Service Attacks. 86-90
Session 3: Algorithm, Mobile Services, Distributed Systems, and Scalability
- Qibing Qin, Long Tan: 
 An Effective Hybrid Algorithm for Fast Mining Frequent Itemsets. 91-95
- Yirong Wang, Wenwei Chen, Runze Wu, Zili Liu: 
 FIM Algorithm for Multi-Source Heterogeneous Information in Power Grid Intelligent Dispatching. 96-99
- Hyeunjee Kim, Hoonha Choi, Youngwoo Kim, Jaechun No: 
 MS2: NAND-Flash SSD-Based Multi-Layered Storage Management System. 100-104
- Shulong Wang, Yibin Hou, Fang Gao, Songsong Ma: 
 Ontology-Based Resource Description Model for Internet of Things. 105-108
- Fengcai Qiao, Kedi Chen: 
 Predicting Protest Events with Hidden Markov Models. 109-114
- Tuo Shi, Xinlei Wei, Xufen Shao: 
 Mass Incidents Prediction Based on ID3-SMOTE Algorithm. 115-118
- Xiaolei Yang, Xuejun Zhao, Xiujiu Yuan: 
 Distributed Air Traffic Flow Management at Terminal Control Area. 119-122
- Ying Pan, Guan-Yu Li, Zhong-Jun Lu: 
 Community Division-Based SWoT Ontology Directory Service. 123-127
- Zhong-Jun Lu, Guan-Yu Li, Ying Pan: 
 A Method of Meta-Context Ontology Modeling and Uncertainty Reasoning in SWoT. 128-135
- Yong-An Wang, Bin Zhu, Guan-Yu Li: 
 Gateway-Based Semantic Collaboration Method in SWoT. 136-141
Session 4: Protocols, Analysis, Social Networks, and Theory
- Fang Gao, Zhangqin Huang, Shulong Wang, Xinrong Ji: 
 A Scalable Object Detection Framework Based on Embedded Manycore Cluster. 142-145
- Peng Zhang, Sandeep Neema  , Ted Bapty: , Ted Bapty:
 A Study of Collaborative Efforts and Proposed Visualizations in Domain-Specific Modeling Environment. 146-152
- Leilei Chang, Xiaowei Ma, Liuying Wang, Xiaodong Ling: 
 Comparative Analysis on the Conjunctive and Disjunctive Assumptions for the Belief Rule Base. 153-156
- Xinlei Wei, Jinyao Yan, Zheng Chen, Tuo Shi: 
 Analysis of Crime Rate Distribution Based on TPML-WMA. 157-160
- Juan Shi, Gang Chen, Kin Keung Lai: 
 Factors Dominating Individuals' Retweeting Decisions. 161-168
- Yinglong Diao, Ke-yan Liu  , Lijuan Hu, Dongli Jia, Weijie Dong: , Lijuan Hu, Dongli Jia, Weijie Dong:
 Classification of Massive User Load Characteristics in Distribution Network Based on Agglomerative Hierarchical Algorithm. 169-172
- Cangzhou Yuan, Shenhong Wei, Yutong Wang, Yue You, ShangGuan ZiLiang: 
 Android Applications Categorization Using Bayesian Classification. 173-176
- Honglei Niu, Zhiyong Liu: 
 Spatial Panel Data Analysis on the Effect of Urbanization on Energy Consumption in China. 177-180
- Liu Xia, Yang Jie, Chen Lei, Chen Ming-Rui: 
 Prediction for Air Route Passenger Flow Based on a Grey Prediction Model. 185-190
- Tao Ma, Chunlai Ma, Juan Chen: 
 Study of Personal Location-Based State Distribution Inference. 191-197
Session 5: Big Data and Machine Learning
- Xiaoli Lin, Wei Huangfu, Fei Wang, Liyuan Liu  , Keping Long: , Keping Long:
 A Breast Cancer Risk Classification Model Based on the Features Selected by Novel F-Score Index for the Imbalanced Multi-Feature Dataset. 198-203
- Kaixia Shao, Xiaofeng Zhou: 
 An Improved Classification Algorithm Based on Exposure Pattern. 204-207
- Amal Babour, Javed I. Khan, Fatema Nafa  : :
 Deepening Prose Comprehension by Incremental Free Text Conceptual Graph Mining and Knowledge. 208-215
- Jingyu Sun, Xiaomei Zhang, Quan Liu, Liang Ju, Zhengying Li: 
 Entity Hierarchy Construction for Repair Request Records. 216-219
- Yifan Jia, Li Qu: 
 Improve the Performance of Link Prediction Methods in Citation Network by Using H-Index. 220-223
- Fatema Nafa  , Javed I. Khan, Salem Othman, Amal Babour: , Javed I. Khan, Salem Othman, Amal Babour:
 Discovering Bloom Taxonomic Relationships between Knowledge Units Using Semantic Graph Triangularity Mining. 224-233
- Xing Li, Guolin Li, Rick Fishbune: 
 A Novel Missing-Rate-Oriented Selective Algorithm for Handling Missing Data by Minimizing Imputation. 234-237
- Wengang Chen, Ruijie Wang, Run-ze Wu, Liangrui Tang, Junli Fan: 
 Multi-Source and Heterogeneous Data Integration Model for Big Data Analytics in Power DCS. 238-242
Session 6: Big Data and Cloud Computing
- Yiming Tong, Zeyu Zheng, Dianzheng Fu, Yang Fu, Shuai Li: 
 A Cloud Computing Platform for Data Analysis Based on R Cluster. 243-248
- Shuo Lei, Zexi Li, Binglin Wu, Haiquan Wang: 
 Research on Multi-Objective Bus Route Planning Model Based on Taxi GPS Data. 249-255
- Cheng Xu, Zhang Yu-Shi: 
 Research Service Discovery Mechanism Based on Route Optimization of Big Data Service. 256-261
- Yue Zhou, Jinyao Yan: 
 A Logistic Regression Based Approach for Software Test Management. 268-271
- Guidong Sun  , Xin Guan: , Xin Guan:
 Research on Hybrid Multi-Attribute Decision-Making. 272-277
- Chen Guo, Yong Chai, Cong Wang: 
 Multi-Source Heterogeneous Data Recognition Based on Linguistic Labels. 278-285
- Xianwen He, Gaoming Huang, Gaoqi Dou, Jun Gao: 
 Semi-Blind Channel Estimation and Symbol Detection Using Combined Superimposed Training. 286-289
- Wei Yang, Jinzhong Li: 
 An Electronic Seal System Based on Cloud Computing. 290-293
- Shengxin Zhu  , Tongxiang Gu, Xiaowen Xu, Zeyao Mo: , Tongxiang Gu, Xiaowen Xu, Zeyao Mo:
 Information Splitting for Big Data Analytics. 294-302
Session 7: Resource, Monitoring, Control, and Performance
- Liang Xu, Yuming Mao, Supeng Leng, Guanhua Qiao, Quanxin Zhao: 
 A Cluster-Based Resource Allocation Strategy with Energy Harvesting in Dense Small-Cell Networks. 303-310
- Qingbin Nie, Pinghua Li: 
 An Improved Ant Colony Optimization Algorithm for Improving Cloud Resource Utilization. 311-314
- Peng Tang, Anping Song, Zhixiang Liu, Wu Zhang: 
 An Implementation and Optimization of Lattice Boltzmann Method Based on the Multi-Node CPU+MIC Heterogeneous Architecture. 315-320
- Minhui Lv, Wei Xiong: 
 Cache-Aware Spatial Indices on Chip Multi-Processors: Limitations and Opportunities. 321-327
- Zhihua Gan, Mingquan Zhang, Zhimin Gu, Jizan Zhang: 
 Minimizing Energy Consumption for Embedded Multicore Systems Using Cache Configuration and Task Mapping. 328-334
- Chnhui Yuan, Hongli Zhao: 
 Implementing VoIP Voice Communication System Based on Soft-Switch Technology. 335-340
- Lijuan Hu, Ke-yan Liu  , Yinglong Diao, Xiaoli Meng, Wanxing Sheng , Yinglong Diao, Xiaoli Meng, Wanxing Sheng : :
 Operational Reliability Evaluation Method Based on Big Data Technology. 341-344
- Luo Yong, Gao Jun: 
 A Complex Shortwave Transmitting Equipment Monitoring System Based on Completeness. 345-349
- Xianlian Zhang, Minhui Wang: 
 Real-Time Vehicle Wireless Remote Positioning and Monitoring System Based on GPRS Network and Beidou. 350-354
- Huayu Zhou, Zhihua Li: 
 An Intelligent Parking Management System Based on RS485 and RFID. 355-359
- Yongbin Liu, Xuewei Piao, Chaojun Hou, Kai Lei  : :
 A CUBIC-Based Explicit Congestion Control Mechanism in Named Data Networking. 360-363
Session 8: Smart Sensor Networks
- Chao Fan, Junxuan Huang  , Dan Yang , Dan Yang , Zhihai Rong: , Zhihai Rong:
 Modeling POI Transition Network of Human Mobility. 364-367
- Xinzhi Xu, Guochun Li, Qiaomu Wang, Zhou Yuan, Mingbao Fan: 
 A Quasi-Dynamic Video Conference Resource Backup Strategy Based on Cloud. 368-371
- Zelang Wang, Guochu Shou, Yihong Hu, Zhigang Guo: 
 Research and Implementation of Resource Scheduling Mechanisms Based on Software Defined Security. 372-376
- Zhou Yuan, Guochun Li, Qiaomu Wang, Xinzhi Xu, Tao Wen: 
 Research and Implementation of Hierarchical Control of Large Scale Video Conference Based on Conference Management System. 377-381
- Kai-Yin Fok, Chi-Tsun Cheng  , Chi K. Tse , Chi K. Tse , Nuwan Ganganath , Nuwan Ganganath : :
 A Relaxation Scheme for TSP-Based 3D Printing Path Optimizer. 382-385
- Nuwan Ganganath  , Chi-Tsun Cheng , Chi-Tsun Cheng , Chi K. Tse , Chi K. Tse : :
 Rapidly Replanning A. 386-389
- Qinyin Chen, Yanting Hu, Zhe Chen  : :
 Node Localization Algorithm of Wireless Sensor Networks for Large Electrical Equipment Monitoring Application. 390-397
- Jing V. Wang, Chi-Tsun Cheng  , Chi K. Tse , Chi K. Tse : :
 Effects of Correlation-Based VM Allocation Criteria to Cloud Data Centers. 398-401
- Yue Zhang, Xiangyu Bai, Na Dang, Junli She, Zhichao Song: 
 Congestion Control Balancing Mechanism Based on Energy-Constraint in Mobile Delay Tolerant Network. 402-408
- Alexander S. Basan  , Elena Basan , Elena Basan , Oleg B. Makarevich , Oleg B. Makarevich : :
 Methodology of Countering Attacks for Wireless Sensor Networks Based on Trust. 409-412
- Aiguo Li, Yongwei Li: 
 Portable RFID Location System in Security Field. 413-417
- Xingguo Li, Junfeng Wang, Linlin Bei: 
 LEACH Protocol and Its Improved Algorithm in Wireless Sensor Network. 418-422
Session 9: Networks, Wireless Communications, and Mobile Computing
- Guihua Kang, Hongbo Kang: 
 A New Quasi Periodic Triggering Mechanism of Handover under a High Speed Mobile Environment. 423-428
- Xiaokai Zhang, Gang Wu, Bangning Zhang, Daoxing Guo, Kefeng Guo  : :
 Blind Recognition of RS Codes Based on Galois Field Fourier Transform. 429-433
- Bo Jiao  , Xuejun Yuan, Fei Huang, Xun-Long Pang, Yican Jin, Zhe Han: , Xuejun Yuan, Fei Huang, Xun-Long Pang, Yican Jin, Zhe Han:
 Performance of Two Normalized Laplacian Spectral Features on Sampling Algorithms. 434-437
- Bin Yang, Xinyu Li: 
 Secure Transmission of Amplify-and-Forward Relay System with Hybrid Sending Signals. 438-445
- Jian-Min Liu, Yu Xiang, Jian-Bin Liu: 
 Analysis of the Propagation Characteristics of Generalized Ridge Waveguides Using 2-D Finite Difference Frequency Domain Method with Sub-Regions Division. 446-449
- Xiongfei Geng: 
 Ship Scheduling in Inland Waterway Networks Based on Cellular Automata Graph. 450-453
- Yongbin Wang, Lihua Li, Renshen Li, Tianhui Fu: 
 An Improvement Method of Frequency Offset Estimation Performance in Communication System Carrier Synchronization. 454-458
- Dongli Jia: 
 Study on Evaluation of Voltage Sag Exposed Areas in Large Scale Complex Distribution Network. 459-464
- Min Yin, Lei Jiang, Ye Shen, Jing Feng: 
 Joint Behavior Detection in Wireless Sensing Networks. 465-470
- Ren Duan, Dingyi Fang, Chengui Zhao: 
 A QoS Opportunistic Routing Based on Directional Transmission for Wireless Sensor Networks. 471-480
Session 10: SDN/NFV and Cognitive Networks
- Bang Zhang, Xingwei Wang, Lianbo Ma, Min Huang: 
 Optimal Controller Placement Problem in Internet-Oriented Software Defined Network. 481-488
- Chunfeng Wang, Xiaosong Yu: 
 Application of Virtualization and Software Defined Network in Satellite Network. 489-493
- Jianglong Wang, Guochu Shou, Yihong Hu, Zhigang Guo: 
 A Multi-Domain SDN Scalability Architecture Implementation Based on the Coordinate Controller. 494-499
- Kean Yu, Cong Yu, Tingting Wang, Jiang Fan, Yan Li: 
 Application of Software-Defined Network with Software-Based Architecture in Enterprise Data Center. 500-505
- Hui Ren, Xiaoming Li, Junjie Geng, Jinyao Yan: 
 A SDN-Based Dynamic Traffic Scheduling Algorithm. 514-518

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














