


default search action
CyberC 2017: Nanjing, China
- 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2017, Nanjing, China, October 12-14, 2017. IEEE 2017, ISBN 978-1-5386-2209-4

Security, Privacy, and Protection
- Xin Hu, Gang Wang, Hongtao Qin, Runnian Ma:

SIRS Model and Stability Based on Open Cyber Ecosystem. 1-4 - Yingying Huangfu, Liang Zhou, Chenming Yang:

Routing the Cyber-Attack Path with the Bayesian Network Deducing Approach. 5-10 - Li-Xin Li, Yong-Shan Ding, Jia-Yan Wang:

Differential Privacy Data Protection Method Based on Clustering. 11-16 - Jin Han, Rongcai Zhao, Zhen Shan, Fudong Liu, Bingling Zhao, Xi Meng, Hongyan Wang:

Analyzing and Recognizing Android Malware via Semantic-Based Malware Gene. 17-20 - Hao Zeng, Baosheng Wang, Wenping Deng, Xianming Gao:

CENTRA: CENtrally Trusted Routing vAlidation for IGP. 21-24 - Xiangyu Liu, Qiuyang Li, Sonali Chandel:

Social Engineering and Insider Threats. 25-34 - Yajuan Shi, Chunhui Piao, Li-Juan Zheng:

Differential-Privacy-Based Correlation Analysis in Railway Freight Service Applications. 35-39 - Rishabh Dudheria:

Evaluating Features and Effectiveness of Secure QR Code Scanners. 40-49 - Wenyan Liu, Fucai Chen, Hongchao Hu, Guozhen Cheng, Shumin Huo, Hao Liang:

A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture. 50-53 - Jingwen Wang, Jie Yang, Fen Guo, Huaqing Min:

Resist the Database Intrusion Caused by Functional Dependency. 54-57 - Vahid Amin Ghafari

, Honggang Hu:
A New Chosen IV Statistical Attack on Grain-128a Cipher. 58-62
Networking, Protocol, and Performance
- Yuanyi Zhao:

Performance Analysis of Turbo Code and Trellis BICM-ID on PNC over Impulsive Channel. 63-71 - Xiaojun Xiao, Wanming Luo:

An IPv6-based Load Balancing Strategy for Ecological Monitoring Network. 72-79 - Xiaojun Xiao, Wanming Luo:

6LoWPAN Hierarchical Cluster Routing Protocol. 80-83 - Xiang Gao, Guanghui Li

:
Design and Implementation of the Prototype of High-Available Distributed Communication System. 84-88 - Lanhua Xiang, Hongbin Chen:

Energy-Efficient and Fair Power Allocation Approach for NOMA in Ultra-Dense Heterogeneous Networks. 89-94 - Xinyu Wu, Bin Wu, Bai Wang:

P&D Graph Cube: Model and Parallel Materialization for Multidimensional Heterogeneous Network. 95-104 - Hao Zeng, Baosheng Wang, Wenping Deng, Weiqi Zhang:

Measurement and Evaluation for Docker Container Networking. 105-108 - Hao Zeng, Xianming Gao, Baosheng Wang:

POPBrick: A High-Elasticity, Reconfigurable Network Infrastructure to Support POP Applications. 109-112 - Weiwei Zhang, Jiafeng He, Guowang Gao, Lili Ren, Shenxuan Jing:

Time-Domain Greedy Heuristic Approximation Algorithm for Multi-channel Assignment in Wireless Mesh Network. 113-117
Images, Video, Positioning, and Systems
- Masoud Attarifar, Mohammadamin Baniasadi:

JPEG Image Security by Block Size Estimation and Quality Factor Classification. 118-121 - Lian Zhao, Yingzhou Zhang, Xing Wang, Xinghao Chen:

Image Hiding Algorithm Based on Secure Steganography Mechanism. 122-129 - Zhenghua Shu, Guodong Liu, Zhihua Xie:

Real Time Target Tracking Scale Adaptive Based on LBP Operator and Nonlinear Meanshift. 130-133 - Xiaolong Xu, Licheng Lin:

Geomagnetic Fingerprint Maps for Indoor Positioning. 134-141 - Xiaokun Wu, Yongfeng Huang:

SigRA: A New Similarity Computation Method in Recommendation System. 148-154 - Xing Wang, Yingzhou Zhang, Lian Zhao, Xinghao Chen:

Dead Code Detection Method Based on Program Slicing. 155-158
Big Data and Data Analytics
- Yiwei Xu, Yonggen Gu, Duc Minh Quan Do, Hongtianchen Xie, Lunke Qing:

A Faster without Scarifying Accuracy Online Decomposition Approach for Higher-Order Tensors. 159-166 - Yangjun Chen, Yujia Wu:

Searching BWT against Pattern Matching Machine to Find Multiple String Matches. 167-176 - Jinbing Ha, Yunping Yu:

Fault Data Diagnosis of Energy Consumption Equipment for Urban Rail Transit Based on ART2 Model. 177-181 - Taihao Li, Jianshe Zhou, Naren Tuya, Cuifen Du, Zhiqiang Chen, Shupeng Liu:

Recognize Facial Expression Using Active Appearance Model and Neural Network. 182-185 - Feng Liu, Jun Zhang

, Erzhou Zhu:
Test-Suite Reduction Based on K-Medoids Clustering Algorithm. 186-192 - Peng Sun, Lihua Wang, Qianchen Xia:

The Keyword Extraction of Chinese Medical Web Page Based on WF-TF-IDF Algorithm. 193-198 - Po Yang, Xuebin Ma:

Selection Strategy of Nodes with the Greatest Influence on Community Structure. 199-205 - Jinhong Liu, Juan Yang:

Multi-label Classification Using Random Walk with Restart. 206-212 - Jiake Ni, WeiTao Weng, Jiayu Chen, Kai Lei

:
Internet Traffic Analysis Using Community Detection and Apache Spark. 213-219
Cloud Computing and System Implementation
- Qingfeng Du, Yue Tian, Tiandi Xie, Kanglin Yin, Juan Qiu:

A Method of Building Fault Repository for Cloud Infrastructure. 220-228 - Lei Sun, Hang Su, Zhiqiang Zhu, Zuohui Li:

A Novel Attribute Based Keyword Search Scheme for Mobile Cloud Storage. 229-234 - Jianhong Zhang, Hao Xiao:

Public Auditing Scheme of Dynamic Data Sharing Suiting for Cloud-Based EHR System. 235-243 - Amara Naseer

, Zhiqui Huang, Awais Ali:
Cloud Computing Security Threats and Attacks with Their Mitigation Techniques. 244-251 - Zhichao Song, Xiangyu Bai, Haodong Bian:

Implementation of Subject Recommendation and Practice System for Mobile Terminal Users. 252-257 - Qingfeng Du, Huan Li, Kanglin Yin, Juan Qiu:

VM Reliability Modeling and Analysis for IaaS Could. 258-265 - Liang Cao, Yufeng Wang, Qun Jin, Jianhua Ma:

ActiRecognizer: Design and Implementation of a Real-Time Human Activity Recognition System. 266-271
Machine Learning and Analytics
- Xi Meng, Zhen Shan, Fudong Liu, Bingling Zhao, Jin Han, Hongyan Wang, Jing Wang:

MCSMGS: Malware Classification Model Based on Deep Learning. 272-275 - Yingjie Meng, Huiran Liu, Tong Shang, Xiaoyu Teng:

A Zero-Watermarking Scheme for Prose Writings. 276-282 - Xiaolong Xu, Wen Chen:

Implementation and Performance Optimization of Dynamic Random Forest. 283-289 - Lihua Wang, Zijun Zhou:

Congestion Prediction for Urban Areas by Spatiotemporal Data Mining. 290-297 - Xia Liu

, Xia Huang, Lei Chen, Zhao Qiu, Mingrui Chen:
Improving the Forecasting Accuracy of Civil Aviation Passengers Based on Machine Learning Models. 298-304 - Jun Gu, Bin Gao, Yuanpeng Chen, Long Jiang, Zhao Gao

, Xiaole Ma, Yong Ma, Wai Lok Woo
:
Wearable Social Sensing and Its Application in Anxiety Assesment. 305-308 - Juan Qiu, Qingfeng Du, Wei Wang, Kanglin Yin, Changsheng Lin, Chongshu Qian:

Topic Crawler for OpenStack QA Knowledge Base. 309-317 - Dongchen Miao, Fei Lang:

A Recommendation System Based on Text Mining. 318-321 - Sunyan Gu, Fei Lang:

A Chinese Text Corrector Based on Seq2Seq Model. 322-325 - Xiu Yin, Yingzhou Zhang, Xinghao Chen:

A Binary-Classification Method Based on Dictionary Learning and ADMM for Network Intrusion Detection. 326-333
Internet of Things and RFID Sensors
- Wenjing Sun, Song Jin, Ruide Li

, Yangyang Li, Qianru Yang, Ning Cao:
Research on Correlation Models Between QoS and Application Layer QoE in IoT-NDN Environment. 334-337 - Sanju Lokuhitige, Suzana Brown:

Forecasting Maturity of IoT Technologies in Top 5 Countries Using Bibliometrics and Patent Analysis. 338-341 - Junshe Wang, Han Wang, Hongbin Zhang, Ning Cao:

Trust and Attribute-Based Dynamic Access Control Model for Internet of Things. 342-345 - Zhiqing Zhang, Hideya Ochiai, Hiroshi Esaki:

An IoT Application-Layer Protocol Modem: A Case Study on Interfacing IEEE 1888 with AT Commands. 346-349 - Huiyang Sun, Hongjun Li, Yuanyuan Zhang, Wanmin Zhang:

A Study on Smart Monitoring and Management of Track Running Self-Testing System Based on Internet of Things. 350-353 - Jie Wan, Xiang Gu, Liang Chen, Jin Wang

:
Internet of Things for Ambient Assisted Living: Challenges and Future Opportunities. 354-357 - Wenjin Yu, Yixiang Jiang:

Mobile RFID Mutual Authentication Protocol Based on Hash Function. 358-361
Network and Smart Sensor Networks
- Alexander S. Basan

, Elena Basan
, Oleg B. Makarevich
:
A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor Networks. 369-372 - Haitao Zhao, Kaiqiang Gao, Mengkang Zhang, Dapeng Li, Hongbo Zhu:

A Demand-Aware Transmission Optimization Control Scheme Based on Multichannel Coordination. 373-377 - Junyan Ma, Jin Wang, Te Zhang:

A Survey of Recent Achievements for Wireless Sensor Networks Testbeds. 378-381 - Na Dang, Xiangyu Bai, Haodong Bian:

Content Delivery Routing Strategy Based on Energy Constraint in MDTN-CCN Integrated Network. 382-390 - Chunqiang Liu, Haijie Pang, Ning Cao:

Research on Time Synchronization Technology of Wireless Sensor Network. 391-394 - Yufang Huang, Yi Lin, Rongzhen Miao:

An Auxiliary Blind Guide System Based on Multi-sensor Data Fusion. 395-398 - Ning Cao, Yuanyuan Zhang, Yan Li, Bin Xue, Hua Yu, Yingying Wang, Yuyan Shen, Na Li:

Analysis of the Approach to Predict Different Routing Protocols in WSNs. 399-402 - Yi-Wei Deng, Cheng Zhong, Jun Yu, Sujie Shao, Xuesong Qiu:

An Energy-Saving Clustering Strategy of Hybrid Network of Sensors and Mobile CR Nodes. 403-411 - Qi Xie, Qiang Wang, Ning Cao, Shuqing Gao, Guang Liang, Tong Zhang, Yanbing Chen, Yi Zhai, Na Li:

A Survey of Wireless Sensor Technique Applications for Medical Care. 412-415 - Mario E. Rivero-Angeles

, Gerardo Rubino:
Transmission Probability Strategies for Cluster-Based Event-Driven Wireless Sensor Networks. 416-419 - Anwar Ahmed Khan

, Mohammad Shoaib Jamal, Shama Siddiqui
:
Dynamic Duty-Cycle Control for Wireless Sensor Networks Using Artificial Neural Network (ANN). 420-424 - Shama Siddiqui

, Anwar Ahmed Khan
, Sayeed Ghani:
DPR-MAC: Dynamic Polling for Rare Events in Wireless Sensor Networks. 425-428
Wireless Communications
- Zhen Wang, Hai Qin, Yu Gong, Bo Liu:

Implementation and Verification of a High-Throughput Reconfigurable MIMO Detector. 429-432 - ZhanZhen Wei, Feng Wang

, Zhaobin Li:
Loop-Free Forwarding in Hierarchical Location-Based Routing. 433-436 - Shun-Ping Chen, Jens Gebert:

Investigations of 5G Multiple Radio Access Technology Performance and Resource Selection Behavior. 437-444 - Tao Ma:

A Bit Sampled Wake-Up Receiver with Logarithmic Detector Architecture. 445-449 - Weifeng Lu, Weijun Lin, Lijun Yang, Siguang Chen:

A Heuristic D2D Communication Mode Selection Algorithm. 450-453 - Zukui Wang, Liusheng Huang, Wei Yang, Zhiqiang He:

A Classifier Method for Detection of Covert Channels over LTE. 454-460 - Guihua Kang, Kaiyue Xu, Hongbo Kang, Kun-Bei Pan:

The Limited Feedback Precoding Based on the Triplex Codebooks. 461-465 - Laning Ma, Zhonghua Liang, Danli Liu:

Performance of Polarized Channel Coding in TRPC-UWB Communication Systems. 466-470 - Tingting Jia, Caihong Li, Anping He:

Modeling and Verification of Circuit with Stable-Event. 471-475 - Weiwei Zhang, Jiafeng He, Guowang Gao, Lili Ren, Shenxuan Jing:

Multi-channel Allocation Algorithm Based on AODV Protocol in Wireless Mesh Networks. 476-481
SDN and Resource
- Kun Li, Qinghai Ou, Hong Chen, Baoping Zou:

Controller Cluster-Based Interconnecting for Multi-domain SDN Networks. 482-485 - Jianhui Zhang, Tao Hu

, Wei Zhao, Dan Qiao:
DDS: Distributed Decision Strategy Based on Switch Migration towards SDN Control Plane. 486-493 - Gang Zhang, Xiaofeng Qiu, Wei Chang:

Scheduling of Security Resources in Software Defined Security Architecture. 494-503 - Xiaolong Xu, Liuyun Hu:

A Software Defined Security Scheme Based on SDN Environment. 504-512 - Yuhua Xu

, Zhe Sun, Zhixin Sun:
SDN-based Architecture for Big Data Network. 513-516 - Xiaoyong Lin, Pengwei Yin, Yun Xia, Yang Yu, Tingting Qiu, Xiaoming Wang, Lixiang Li:

MPLB: A Load Balance Scheme of Joint Resource Scheduling in Heterogeneous Wireless Network. 517-524

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














