


default search action
4th ICCCS 2018: Haikou, China
- Xingming Sun, Zhaoqing Pan, Elisa Bertino:

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II. Lecture Notes in Computer Science 11064, Springer 2018, ISBN 978-3-030-00008-0
Cloud Computing
- Mohan Li, Yanbin Sun, Le Wang, Hui Lu:

Quality-Aware Query Based on Relative Source Quality. 3-8 - Wan Li, Fenling Feng:

Railway Passenger Volume Forecast Based on Web Search Terms and Adversarial Nets. 9-20 - Zhiqiang Zhu, Jin Wu, Lei Sun, Ruiyu Dou:

RCS: Hybrid Co-scheduling Optimization in Virtualized System. 21-32 - Hongbin Wang

, Ming He
, Lianke Zhou
, Zijin Li
, Haomin Zhan
, Rang Wang
:
Remove-Duplicate Algorithm Based on Meta Search Result. 33-44 - Fuli Chen, Rui Fan, Bifeng Guo, Fuyu Ma, Weitao He:

Research into Effects of Shrimp Aquaculture by Extensible Mind Mapping. 45-58 - Runzhe Tao, Yonghong Zhang, Lihua Wang, Xiaoping Zhao:

Research of Tool State Recognition Based on CEEMD-WPT. 59-70 - Yanning Cao, Xiaoshu Zhang:

Research on Data Mining Method for Breast Cancer Case Data. 71-78 - Fei Gui, Yao-jie Chen, Ya-ting Xue:

Research on Flame Generation Method Based on Particle System and Texture Mapping. 79-89 - Lin Zhang, Ruili Zhao, Mengxing Huang, Zhonghua Liu, Jieren Cheng, Yu Zhang:

Research on Indirect Location Technology of Ground Target Based on Scene Matching. 90-104 - Xue Wang, Pingzeng Liu, Xuefei Liu:

Research on Key Climatic Factors of Desert Based on Big Data. 105-113 - Jieli Sun, Zhiqing Zhu, Yanpiao Zhang, Yanxia Zhao, Yao Zhai:

Research on Personalized Recommendation Case Base and Data Source Based on Case-Based Reasoning. 114-123 - Bin Ma, Yecheng Sun:

Research on Real-Time Monitoring of Human Body Temperature Based on Fiber Bragg Grating Sensing Technology. 124-133 - Yaosheng Shen, Ding Wang

, Ping Wang:
Revisiting Anonymous Two-Factor Authentication Schemes for Cloud Computing. 134-146 - Junbao Zhang, Guohua Liu, Zhao Chen:

Serialization of Lifecycles in ACBP Model as Regular Expressions. 147-156 - Hongbin Wang

, Guisheng Yin
, Lianke Zhou
, Yupeng Zhang
, Zhen Cao
:
Social Networks Node Mining Algorithm of Based on Greedy Subgraph. 157-168 - Jianbiao Huang, Linli Tao:

Study on Cloud Logistics Distribution Model of Agricultural Products. 169-181 - Jie Zhang, Yongsheng Zhang, Xiaolong Wu, Guoyun Li:

Teaching Video Recommendation Based on Student Evaluation. 182-190 - Yixuan Chai, Guohua Liu, Zhao Chen, Feng Li, Yue Li, Esther Astaewwa Effah

:
A Temporal Collaborative Filtering Algorithm Based on Purchase Cycle. 191-201 - Dan Yang, Tiezheng Nie, Jing Zhang:

Temporal Evolution Data Model for Heterogeneous Entities: Modeling with Temporal and Evolution Information. 202-211 - Zhenjia Chen, Yonghui Zhang, Xia Guo:

The Application of Distributed Database on Spectrum Big Data. 212-222 - Junhua Xi, Kouquan Zheng:

The Benchmark Performance Testing Method for Cluster Heterogeneous Network Based on STC Platform. 223-231 - Qingyu Meng, Huanhuan Zhang, Mingquan Zhou, Shifeng Zhao, Pengbo Zhou:

The Classification of Traditional Chinese Painting Based on CNN. 232-241 - Yanchao Guo, Linfeng Wei, Jianzhu Lu

:
The Design and Implementation of a Backup and Disaster Recovery System for vSphere Data Center Based on Swift Cloud Storage. 242-253 - Yuxiang Wang, Qi Wang, Zhi-feng Zhou:

The Handoff Mechanism Based on Mobile Location Prediction. 254-264 - Tiantian Tan, Baosheng Wang, Zhou Xu, Yong Tang:

The New Progress in the Research of Binary Vulnerability Analysis. 265-276 - Tiantian Tan, Baosheng Wang, Zhou Xu, Yong Tang:

The New Progress in the Research of Binary Vulnerability Exploits. 277-286 - Shan Huang, Ming Li, Hao Chen:

The Quasi-circular Mapping Visualization Based on Extending and Reordering Dimensions for Visual Clustering Analysis. 287-299 - Hui Lu, Xiang Cui, Le Wang, Yu Jiang, Meng Cui:

The Research on Security Audit for Information System Classified Protection. 300-308 - Gen Li, Kejie Wen, Yaxuan Wu, Baili Zhang:

Topk Service Composition Algorithm Based on Optimal QoS. 309-321 - Lihua Zhao

, Minghui Du, Weibao Lei, Lin Chen, Lei Yang:
Towards Multi-task Fair Sharing for Multi-resource Allocation in Cloud Computing. 322-333 - Shuyan Yu:

Towards the Cloud Computing from Services to Securities and Challenges. 334-343 - Chao Zhang, Junmei Wang, Pingzeng Liu, Wanming Ren, Weijie Chen, Yanyan Wang:

Traffic Accident Time Series Analysis. 344-356 - Yuhang Wang

, Hongli Zhang, Shen Su:
VAT: A Velocity-Aware Trajectory Privacy Preservation Scheme for IoT Searching. 357-365 - Pai Liu, Fenlin Liu, Daofu Gong:

Video Quality Assessment Algorithm Based on Persistence-of-Vision Effect. 366-376 - Qin Liu, Tinghuai Ma, Jian Li, Wenhai Shen:

Workflow Task Scheduling Algorithm Based on IFCM and IACO. 377-388 - Dingcheng Wang, Yiyi Lu, Beijing Chen, Liming Chen:

Research on Intuitionistic Fuzzy Multiple Output Least Squares Support Vector Regression. 389-398
Cloud Security
- Liming Zuo, Mengli Zhang, Tingting Zhang, Kaiyu Hu:

A Blind Signature Scheme with Disclaimer Contract in the Standard Model. 401-412 - Haiyong Wang, Yao Peng:

A CP-ABE Access Control Scheme Based on Proxy Re-encryption in Cloud Storage. 413-425 - Xiaoming Zhang, Zhanfeng Wang, Xianglin Wei, Zihan Zhuo, Chao Hu:

A Delay Step Based Geolocation Data Verification Method. 426-438 - Junquan Yang, Song Liu, Wenwei Tao, Chao Hu:

A Distributed Security Feature Selection Algorithm Based on K-means in Power Grid System. 439-449 - Yang Su, Wenzhe Zhang, Wenwei Tao, Zhizhong Qiao:

A Network Illegal Access Detection Method Based on PSO-SVM Algorithm in Power Monitoring System. 450-459 - Hongrun Zhang, Bin Li, Shunquan Tan:

A New Steganographic Distortion Function with Explicit Considerations of Modification Interactions. 460-471 - Luhui Yang

, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Zhaozhi Yan, Yuguang Zou, Wenchao Huang:
A Novel Detection Method for Word-Based DGA. 472-483 - Cheng Guo, Pengxu Tian, Yingmo Jie, Xinyu Tang:

A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners. 484-495 - Qi Wang, Dehua Zhou, Quanlong Guan

, Yanling Li, Jimian Yang:
A Privacy-Preserving Classifier in Statistic Pattern Recognition. 496-507 - Tong Xiao, Jingbing Li, Jing Liu

, Jieren Cheng, Uzair Aslam Bhatti:
A Robust Algorithm of Encrypted Face Recognition Based on DWT-DCT and Tent Map. 508-518 - Wei Luo, Wenping Ma:

A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage. 519-530 - Mengmeng Yao, Dongsheng Zhou, Rui Deng

, Mingda Liu
:
A Security Protocol for Access to Sensitive Data in Trusted Cloud Server. 531-542 - Chunxia Liu, Youyu Chen, Shu Tong, Wangdong Jiang, Guang Sun:

A Study on Revenue Distribution of Information Sharing in the C2M Supply Chain. 543-552 - Xin Lu, Lifeng Cao, Xuehui Du, Zhiyan Hu:

A Tag-Based Protection Method for Multi-tenant Data Security. 553-565 - Zhongxu Yin

, Zhufeng Li, Yan Cao:
A Web Application Runtime Application Self-protection Scheme against Script Injection Attacks. 566-577 - Huirui Han, Mengxing Huang, Yu Zhang, Uzair Aslam Bhatti:

An Architecture of Secure Health Information Storage System Based on Blockchain Technology. 578-588 - Xiaofeng Ma, Xiaofeng Song, Chao Fan, Xi Wang:

An Evolutionary Algorithm Based on Multi-view and Prior Information for Community Detection. 589-600 - Ping Lin, Tao Li, Xiaojie Liu, Hui Zhao, Jin Yang, Fangdong Zhu:

An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets. 601-611 - Yaoyao Shang, Shuangmao Yang, Wei Wang:

Botnet Detection with Hybrid Analysis on Flow Based and Graph Based Features of Network Traffic. 612-621 - Zheng Zhao, Tao Shang, Jianwei Liu, Zhengyu Guan:

Clustering Algorithm for Privacy Preservation on MapReduce. 622-632 - Yongjun Ren, Linhui Kong, Yepeng Liu, Jin Wang

:
Consistency Guarantee Method of Electronic Record Based on Blockchain in Cloud Storage. 633-642 - Ting Dong, Song-Ya Ma, Pei Zhang:

Controlled Remote Preparation of an Arbitrary Two-Qubit State via the Brown State Under the Noisy Environment. 643-653 - Ruizhi Zhang, Jieren Cheng, Xiangyan Tang, Qiang Liu, Xiangfeng He:

DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm. 654-669 - Xiaohui Yang, Yue Yu:

DDoS Attacks Detection and Traceback Method Based on Flow Entropy Algorithm and MPLS Principle. 670-683 - Bangguo Li, Pingzeng Liu, Xiaotong Wu, Xue Wang, Rui Zhao:

Design and Application of Agricultural Product Traceability Management Platform. 684-693 - Bangguo Li, Pingzeng Liu, Xiaotong Wu, Jianyong Zhang:

Design and Implementation of the Product Quality Traceability System for Winter Jujube. 694-705 - Ting Xiao, Yongfeng Huang

:
Design and Implementation of Web System Based on Blockchain. 706-717 - Boyi Liu, Xiangyan Tang, Jieren Cheng, Jiquan Chen:

Design and Verification of a Security Policy to Defense DDoS Attack for Cloud Robot. 718-730 - Hongbin Zhang, Pengcheng Ma, Meihua Wang:

Detecting Inconsistency and Incompleteness in Access Control Policies. 731-739

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














