


default search action
1. ICCCS 2015: Nanjing, China
- Zhiqiu Huang, Xingming Sun, Junzhou Luo, Jian Wang:

Cloud Computing and Security - First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9483, Springer 2015, ISBN 978-3-319-27050-0
Data Security
- Xuejun Dai, Yuhua Huang, Lu Chen, Tingting Lu, Fei Su:

VH: A Lightweight Block Cipher Based on Dual Pseudo-random Transformation. 3-13 - Mingfu Xue, Jian Wang, Youdong Wang, Aiqun Hu:

Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme. 14-24 - Cheng Qian, Jian Wang:

Secure and Efficient Protocol for Outsourcing Large-Scale Systems of Linear Equations to the Cloud. 25-37 - Ziying Wang, Jian Wang:

A Provably Secure Ciphertext-Policy Hierarchical Attribute-Based Encryption. 38-48 - Zhong Ting, Han Xiao, Yang Yunshuo, Zhu Aixiang:

Privacy-Preserving Multidimensional Range Query on Real-Time Data. 49-61 - Fengli Zhang, Yijing Bai:

ARM-Based Privacy Preserving for Medical Data Publishing. 62-73 - Xing Zhang, Cancan Jin, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu:

Attribute-Based Encryption Without Key Escrow. 74-87 - Shidong Zhu, Liu Jiang, Zhenliu Zhou:

An Efficient Access Control Optimizing Technique Based on Local Agency in Cryptographic Cloud Storage. 88-100 - Zhao-Xia Yin, Huabin Wang, Haifeng Zhao, Bin Luo, Xinpeng Zhang:

Complete Separable Reversible Data Hiding in Encrypted Image. 101-110 - Jiali Wang, Hongshen Liu, Yue Ruan:

Multi-threshold Image Segmentation Through an Improved Quantum-Behaved Particle Swarm Optimization Algorithm. 111-122 - Zhili Zhou, Huiyu Sun, Rohan Harit, Xianyi Chen, Xingming Sun:

Coverless Image Steganography Without Embedding. 123-132 - Xianyi Chen, Huiyu Sun, Yoshito Tobe, Zhili Zhou, Xingming Sun:

Coverless Information Hiding Method Based on the Chinese Mathematical Expression. 133-143
System Security
- Jing Li:

Network Information Security Challenges and Relevant Strategic Thinking as Highlighted by "PRISM". 147-156 - Nannan Shao, Zhiping Zhou, Ziwen Sun:

A Lightweight and Dependable Trust Model for Clustered Wireless Sensor Networks. 157-168 - Zhidan Wang, Jian Wang, Yanfei Zhao:

The Optimization Model of Trust for White-Washing. 169-180 - Shuwei Wang, Baosheng Wang, Yong Tang, Bo Yu:

Malware Clustering Based on SNN Density Using System Calls. 181-191 - Jiayi Gu, Yu Zhou, Weigang Wu, Taolue Chen

:
Analyzing Eventual Leader Election Protocols for Dynamic Systems by Probabilistic Model Checking. 192-205 - Chenhui Xu, Bing Chen, Ping Fu

, Hong-yan Qian:
A Dynamic Resource Allocation Model for Guaranteeing Quality of Service in Software Defined Networking Based Cloud Computing Environment. 206-217 - Jun Xu, Feng Xu, Wenna Chang, Haiguang Lai:

Research and Development of Trust Mechanism in Cloud Computing. 218-229 - Blaz Ivanc, Tomaz Klobucar

:
Analysis of Advanced Cyber Attacks with Quantified ESM. 230-243 - Xueyong Yu, Guohua Jiang:

A Web Security Testing Method Based on Web Application Structure. 244-258 - Miao Li, Qiang Xie, Qiulin Ding:

An Improved Data Cleaning Algorithm Based on SNM. 259-269 - Jie Yang, Zhiqiang Zhu, Lei Sun, Jingci Zhang, Xianwei Zhu:

Enhancing Security of IaaS Cloud with Fraternal Security Cooperation Between Cloud Platform and Virtual Platform. 270-282
Cloud Platform
- Shuihua Wang

, Xingxing Zhou, Guangshuai Zhang, Genlin Ji, Jiquan Yang, Zheng Zhang, Zeyuan Lu, Yudong Zhang
:
Cluster Analysis by Variance Ratio Criterion and Quantum-Behaved PSO. 285-293 - Wenjun Zhang, Fenglin Zhang:

Failure Modes and Effects Analysis Using Multi-factors Comprehensive Weighted Fuzzy TOPSIS. 294-305 - Yao Shen, Ping Lu, Xiaolin Qin, Yuming Qian, Sheng Wang:

Efficient Query Algorithm of Coallocation -Parallel-Hash-Join in the Cloud Data Center. 306-320 - Xiang-Wen Feng, Xuefeng Yan, Xiaolin Hu:

Dynamic Data Driven Particle Filter for Agent-Based Traffic State Estimation. 321-331 - Qingwei Du, Yinmeng Wang:

An Improved Dynamic Spectrum Access Scheme in Cognitive Networks. 332-343 - Jun Wang, Yi Zhuang, Siru Ni:

The Design and Implementation of a Dynamic Verification System of Z. 344-355 - Huanhuan Wang, Qun Yang, Lei Fang, Weihua Lei:

Maximizing Positive Influence in Signed Social Networks. 356-367 - Hanjie Yang, Bing Chen, Ping Fu

:
OpenFlow-Based Load Balancing for Wireless Mesh Network. 368-379 - Jiangyong Shi, Yuexiang Yang, Chengye Li, Xiaolei Wang:

SPEMS: A Stealthy and Practical Execution Monitoring System Based on VMI. 380-389 - Xiongli Rui, Xuehong Cao, Jie Yang:

A Total Power Control Cooperative MAC Protocol for Wireless Sensor Networks. 390-403 - Xue Wang, Jiabin Yuan, Xingfang Zhao:

Parallel Processing of SAR Imaging Algorithms for Large Areas Using Multi-GPU. 404-416 - Qi Liu, Weidong Cai, Jian Shen, Baowei Wang, Zhangjie Fu, Nigel Linge:

An Extreme Learning Approach to Fast Prediction in the Reduce Phase of a Cloud Platform. 417-423
Data Analysis in Cloud
- Dingcheng Wang, Yujia Ni, Beijing Chen, Zhili Cao, Yuhang Tian, Youzhi Zhao:

Wind Speed and Direction Predictions Based on Multidimensional Support Vector Regression with Data-Dependent Kernel. 427-436 - Lei Sun, Zhiyuan Zhao, Feiran Wang, Lei Jin:

Research on Rootkit Detection Model Based on Intelligent Optimization Algorithm in the Virtualization Environment. 437-447 - Xue Peng:

Performance Analysis of (1+1)EA on the Maximum Independent Set Problem. 448-456 - Yueqing Ren, Zhiyi Qu, Xiaodong Liu:

A Robust Iris Segmentation Algorithm Using Active Contours Without Edges and Improved Circular Hough Transform. 457-468 - Zhiping Zhou, Daowen Zhang, Ziwen Sun, Jiefeng Wang:

An Adaptive Hybrid PSO and GSA Algorithm for Association Rules Mining. 469-479 - Jiang Zhu, Dechang Pi, Pan Xiong

, Xuhui Shen:
Sequential Pattern Mining and Matching Method with Its Application on Earthquakes. 480-490 - Shuai Hu, Yan Gu, Hua Jiang:

Teaching Quality Assessment Model Based on Analytic Hierarchy Process and LVQ Neural Network. 491-500 - Qi Zhu, Baisheng Dai, Zizhu Fan, Zheng Zhang

:
Fast Sparse Representation Classification Using Transfer Learning. 501-509 - Yang Luo, Qingni Shen, Cong Li, Kang Chen, Zhonghai Wu:

Probing the Scheduling Algorithms in the Cloud Based on OpenStack. 510-520 - Ying Zhang, Hongyuan Zheng, Qiulin Ding:

Top-k Distance-Based Outlier Detection on Uncertain Data. 521-535 - Haiyan Chen, Jiajia Deng, Bo Sun, Jiandong Wang:

An Airport Noise Prediction Model Based on Selective Ensemble of LOF-FSVR. 536-549 - Xinying Wang, Fangming Gu, Gang Liu, Zhiyu Chen:

Application of Semantic-Based Laplacian Eigenmaps Method in 3D Model Classification and Retrieval. 550-559

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














