


default search action
TrustCom/BigDataSE/ISPA 2016: Tianjin, China
- 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016. IEEE 2016, ISBN 978-1-5090-3205-1

TrustCom 2016: The 15th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications
TrustCom Trust Track
- Peng Xiao, Zhiyang Li, Heng Qi, Wenyu Qu, Haisheng Yu

:
An Efficient DDoS Detection with Bloom Filter in SDN. 1-6 - Anirban Basu, Shinsaku Kiyomoto, Jaideep Vaidya, Stephen Marsh:

PrefRank: Quantification and Aggregation of Subjective User Preferences. 7-13 - Xi Huang, Xiaoguang Liu, Gang Wang, Ming Su:

A Robust Image Hashing with Enhanced Randomness by Using Random Walk on Zigzag Blocking. 14-18 - Shengshan Hu

, Qian Wang
, Jingjun Wang, Sherman S. M. Chow
, Qin Zou
:
Securing Fast Learning! Ridge Regression over Encrypted Big Data. 19-26 - Tianqi Zhou, Bing Chen, Chunsheng Zhu, Xiangping Zhai

:
TPAHS: A Truthful and Profit Maximizing Double Auction for Heterogeneous Spectrums. 27-33 - Quang-Vinh Dang

, Claudia-Lavinia Ignat:
Computational Trust Model for Repeated Trust Games. 34-41 - Caimei Wang, Yan Xiong, Wenchao Huang, Huihua Xia, Jianmeng Huang:

Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus. 42-49 - Hui Xia, Guodong Wang, Zhenkuan Pan:

Node Trust Prediction Framework in Mobile Ad Hoc Networks. 50-56 - Fajiang Yu, Lie Chen, Huanguo Zhang:

Virtual TPM Dynamic Trust Extension Suitable for Frequent Migrations. 57-65 - Xu Yang, Ting-Ting Lee, Joseph K. Liu, Xinyi Huang:

Trust Enhancement over Range Search for Encrypted Data. 66-73 - Haoyi Cui, Qingzhong Li, Hui Li, Zhongmin Yan:

Healthcare Fraud Detection Based on Trustworthiness of Doctors. 74-81 - Dilshan Jayarathna, Vijay Varadharajan

, Udaya Kiran Tupakula
:
Integrated Security for Services Hosted in Virtual Environments. 82-89 - Xinping Min, Qingzhong Li, Lei Liu, Lizhen Cui:

A Permissioned Blockchain Framework for Supporting Instant Transaction and Dynamic Block Size. 90-96 - Salman Manzoor, Ahmed Taha, Neeraj Suri

:
Trust Validation of Cloud IaaS: A Customer-centric Approach. 97-104 - Xiuwen Zhou, Qianhong Wu, Bo Qin, Xinyi Huang, Jianwei Liu

:
Distributed Bitcoin Account Management. 105-112 - Cong Zuo, James Macindoe, Siyin Yang, Ron Steinfeld, Joseph K. Liu:

Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption. 113-120 - Jian Peng, Kim-Kwang Raymond Choo

, Helen Ashman
:
Astroturfing Detection in Social Media: Using Binary n-Gram Analysis for Authorship Attribution. 121-128 - Zechao Liu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Chunkai Zhang, Xiaomeng Zhao:

Dynamic Attribute-Based Access Control in Cloud Storage Systems. 129-137 - Xu Yang, Yuexin Zhang, Joseph K. Liu, YaLi Zeng:

A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks. 138-143 - Christine Blakemore, João Redol, Miguel Correia:

Fingerprinting for Web Applications: From Devices to Related Groups. 144-151 - Wu Luo, Wei Liu, Yang Luo, Anbang Ruan, Qingni Shen, Zhonghai Wu:

Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations. 152-159 - Muhammad Saleem Khan, Idrees Ahmed

, Abid Khan
, Majid Iqbal Khan:
Adaptive Reputation Weights Assignment Scheme for MANETs. 160-167 - Carlton Shepherd, Ghada Arfaoui

, Iakovos Gurulian, Robert P. Lee, Konstantinos Markantonakis
, Raja Naeem Akram
, Damien Sauveron, Emmanuel Conchon:
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems. 168-177 - Thawatchai Chomsiri

, Xiangjian He
, Priyadarsi Nanda, Zhiyuan Tan
:
An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. 178-184 - Tharam S. Dillon, Elizabeth Chang

:
Trust and Risk Semantics and Prediction through Big Data Analytics to Encompass Cloud Services, Cyber-Physical Systems, and Social Media: Issues and Challenges. 185-193
TrustCom Security Track
- Fangxiao Ning, Min Zhu, Ruibang You, Gang Shi, Dan Meng:

Group-Based Memory Deduplication against Covert Channel Attacks in Virtualized Environments. 194-200 - Kazuhide Fukushima

, Youssef Souissi, Seira Hidano, Robert Nguyen, Jean-Luc Danger, Sylvain Guilley, Yuto Nakano, Shinsaku Kiyomoto, Laurent Sauvage:
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology. 201-207 - Jinkun Pan, Xiaoguang Mao

:
DomXssMicro: A Micro Benchmark for Evaluating DOM-Based Cross-Site Scripting Detection. 208-215 - Jiliang Zhang:

Combinational Logic Binding for FPGA System Security. 216-223 - Juhua Liu, Guoqiang Bai, Xingjun Wu:

Efficient Hardware Implementation of Roadrunner for Lightweight Application. 224-227 - Yan Yang, Xingang Shi, Xia Yin, Zhiliang Wang:

The Power of Prefix Hijackings in the Internet Hierarchy. 228-235 - Hong Rong, Huimei Wang, Jian Liu, Wei Wu, Ming Xian:

Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments. 236-243 - Xin Su, Dafang Zhang, Wenjia Li, Kai Zhao:

A Deep Learning Approach to Android Malware Feature Learning and Detection. 244-251 - Yajuan Xiao, Shoufeng Cao, Zhenzhong Cao, Fengyu Wang, Fengbo Lin, Jiayan Wu, Hancheng Bi:

Matching Similar Functions in Different Versions of a Malware. 252-259 - Hua Jin, Changda Wang:

Robustness of the Packet Delay Channels. 260-267 - Jianyi Zhang, Yang Pan, Zhiqiang Wang, Biao Liu:

URL Based Gateway Side Phishing Detection Method. 268-275 - Ziyu Wang, Jiahai Yang, Shize Zhang, Chenxi Li, Hui Zhang:

Automatic Model Selection for Anomaly Detection. 276-283 - Yafei Sang, Shicong Li, Yongzheng Zhang, Tao Xu:

ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning via Byte Embedding. 284-291 - Guozhu Zhang, Luning Xia, Shijie Jia, Yafei Ji:

Identification of Cloned HF RFID Proximity Cards Based on RF Fingerprinting. 292-300 - Zhengyang Chen, Bowen Yu, Yu Zhang

, Jianzhong Zhang, Jingdong Xu:
Automatic Mobile Application Traffic Identification by Convolutional Neural Networks. 301-307 - Qian Zhang, Ying Jiang, Peng Wu:

Modelling and Analysis of Network Security - An Algebraic Approach. 308-315 - Li Cheng, Yijie Wang, Xingkong Ma, Yongjun Wang:

GSLAC: A General Scalable and Low-Overhead Alert Correlation Method. 316-323 - Ryoki Shinohara, Takashi Kamimoto, Kazuya Sato, Hiroshi Shigeno:

Cache Control Method Mitigating Packet Concentration of Router Caused by Interest Flooding Attack. 324-331 - Hannan Xiao

, Awatif Ali Alshehri, Bruce Christianson
:
A Cloud-Based RFID Authentication Protocol with Insecure Communication Channels. 332-339 - Gustavo Gonzalez Granadillo, Jose Rubio-Hernan

, Joaquín García-Alfaro
, Hervé Debar
:
Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms. 340-348 - Haibin Chen, Lei Zhang, Junyuan Xie, Chongjun Wang:

New Efficient Certificateless Blind Signature Scheme. 349-353 - Zonghao Guo, Ou Wei, Peng Yu, Lansheng Han, Weiming Wu:

Model Checking Probabilistic Network Propagation Protection Strategies. 354-361 - Zhenhai Cao, Bo Lang, Jinmiao Wang

:
An Efficient and Fine-Grained Access Control Scheme for Multidimensional Data Aggregation in Smart Grid. 362-369 - Florian Gottwalt, Adrian Waller, Weiru Liu:

Natural Laws as a Baseline for Network Anomaly Detection. 370-377 - Zimin Lin, Rui Wang

, Xiaoqi Jia, Shengzhi Zhang, Chuankun Wu:
Classifying Android Malware with Dynamic Behavior Dependency Graphs. 378-385 - Zimin Lin, Rui Wang

, Xiaoqi Jia, Jingyu Yang, Daojuan Zhang, Chuankun Wu:
ForceDROID: Extracting Hidden Information in Android Apps by Forced Execution Technique. 386-393 - Jianming Fu, Yan Lin, Xu Zhang:

Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table. 394-401 - Xiaochao Li

, Chunhui Cao, Pengtao Li, Shuli Shen, Yihui Chen, Lin Li:
Energy-Efficient Hardware Implementation of LUKS PBKDF2 with AES on FPGA. 402-409 - Yu Wang, Yuqing Zhang, Kai Wang, Jingbo Yan:

Security Analysis and Vulnerability Detection of Gesture-Based Lock in Android Applications. 410-417 - Xiaochao Wei, Han Jiang, Chuan Zhao, Minghao Zhao, Qiuliang Xu:

Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries. 418-425 - Thomas Lenz, Bernd Zwattendorfer:

Towards Cross-Border Authorization in European eID Federations. 426-434 - Xinyu Yang, Xiaofei He, Jie Lin, Wei Yu

, Qingyu Yang:
A Game-Theoretic Model on Coalitional Attacks in Smart Grid. 435-442 - Danushka Jayasinghe, Konstantinos Markantonakis

, Iakovos Gurulian, Raja Naeem Akram
, Keith Mayes:
Extending EMV Tokenised Payments to Offline-Environments. 443-450 - Lei Zhou, Xiaowei Liu, Qin Liu, Guojun Wang:

A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation. 451-457 - Liu Yang, Xingmin Cui, Changyuan Wang, Shanqing Guo, Xin-Shun Xu:

Risk Analysis of Exposed Methods to JavaScript in Hybrid Apps. 458-464 - Heng Zhang, Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri

:
SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats. 465-472 - Jacob Abegunde, Hannan Xiao

, Joseph Spring
:
A Dynamic Game with Adaptive Strategies for IEEE 802.15.4 and IoT. 473-480 - Danye Wu, Zhiwei Xu, Bo Chen, Yujun Zhang:

What If Routers Are Malicious? Mitigating Content Poisoning Attack in NDN. 481-488 - Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Tianzhang Xing, Guixin Ye, Jie Zhang, Zheng Wang

:
Exploiting Dynamic Scheduling for VM-Based Code Obfuscation. 489-496 - Hong Zhu, Bin Wu, Meiyi Xie, Zongmin Cui, Zongda Wu:

Secure Shortest Path Search over Encrypted Graph Supporting Synonym Query in Cloud Computing. 497-504 - Fangwen Yu, Ming Su, Gang Wang, Mingming Ren:

Error Decomposition Algorithm for Approximating the k-Error Linear Complexity of Periodic Sequences. 505-510 - Fang Lyu, Yapin Lin, Junfeng Yang, Junhai Zhou:

SUIDroid: An Efficient Hardening-Resilient Approach to Android App Clone Detection. 511-518 - Yang Lu

, Richard O. Sinnott
:
Semantic-Based Privacy Protection of Electronic Health Records for Collaborative Research. 519-526 - Shaun Stricot-Tarboton, Sivadon Chaisiri, Ryan K. L. Ko

:
Taxonomy of Man-in-the-Middle Attacks on HTTPS. 527-534 - Sivadon Chaisiri, Ryan K. L. Ko

:
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty. 535-543 - Thabet Kacem

, Duminda Wijesekera, Paulo Cesar G. da Costa
, Alexandre Barreto:
An ADS-B Intrusion Detection System. 544-551 - Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula

:
An Accurate FDD-Based Approach for Discovering Distributed Firewalls Misconfigurations. 552-559 - Jianming Fu, Pengwei Li, Yan Lin, Shuang Ding:

Android App Malicious Behavior Detection Based on User Intention. 560-567 - Lyes Touati, Hamed Hellaoui

, Yacine Challal
:
Threshold Yoking/Grouping Proofs Based on CP-ABE for IoT Applications. 568-575 - Weiwei Ding, Jin Wang, Xiumin Wang, Ruimin Zhao, Yanqin Zhu:

Optimal Flow Allocation and Linear Network Coding Design for Multiple Multicasts under the Requirements of Information Theoretical Security. 576-583 - Zhongyuan Hao, Wei Guo, Jizeng Wei, Dazhi Sun:

Dual Processing Engine Architecture to Speed Up Optimal Ate Pairing on FPGA Platform. 584-589 - Muhammad Usman

, Mian Ahmad Jan
, Xiangjian He
, Priyadarsi Nanda:
Data Sharing in Secure Multimedia Wireless Sensor Networks. 590-597 - Montida Pattaranantakul, Ruan He, Ahmed Meddahi, Zonghua Zhang:

SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration. 598-605 - Raja Naeem Akram

, Pierre-François Bonnefoi, Serge Chaumette, Konstantinos Markantonakis
, Damien Sauveron:
Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements. 606-614 - Tao Yin, Yongzheng Zhang, Jia Li:

AppBot: A Novel P2P Botnet Architecture Resistant to Graph-Based Tracking. 615-622 - Yuchuan Luo, Shaojing Fu, Kai Huang, Dongsheng Wang, Ming Xu:

Securely Outsourcing of Bilinear Pairings with Untrusted Servers for Cloud Storage. 623-629 - Yang Luo, Wu Luo, Xiaoning Sun, Qingni Shen, Anbang Ruan, Zhonghai Wu:

Whispers between the Containers: High-Capacity Covert Channel Attacks in Docker. 630-637 - Daniel Tse, Lu Wang, Yuxi Li:

Mobility Management for Enterprises in BYOD Deployment. 638-645 - Tianyi Xie, Yuanyuan Zhang, Juanru Li, Hui Liu, Dawu Gu:

New Exploit Methods against Ptmalloc of GLIBC. 646-653 - Nian Xue, Xin Huang, Jie Zhang:

S2Net: A Security Framework for Software Defined Intelligent Building Networks. 654-661 - Qian Sun, Qingni Shen, Cong Li, Zhonghai Wu:

SeLance: Secure Load Balancing of Virtual Machines in Cloud. 662-669 - Xiaoyan Yang, Han Jiang, Qiuliang Xu, Mengbo Hou, Xiaochao Wei, Minghao Zhao, Kim-Kwang Raymond Choo

:
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol. 670-677 - Jian Li, Wenhuan Lu, Chen Zhang, Jianguo Wei, Xiaochun Cao, Jianwu Dang:

A Study on Detection and Recovery of Speech Signal Tampering. 678-682 - Zilong Wen, Weiqi Dai, Deqing Zou, Hai Jin:

PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing Infrastructures. 683-690 - Dan Su, Wei Wang, Xing Wang, Jiqiang Liu:

Anomadroid: Profiling Android Applications' Behaviors for Identifying Unknown Malapps. 691-698 - Jiexin Zhang, Xiaoxue Liu, Peidong Zhu:

Securing Power System State Estimation. 699-706 - Sardar Hussain, Richard O. Sinnott

, Ron Poet:
A Security-Oriented Workflow Framework for Collaborative Environments. 707-714 - Bo Zhou, Qi Shi

, Po Yang:
A Survey on Quantitative Evaluation of Web Service Security. 715-721
TrustCom Privacy Track
- Xuying Meng, Zhiwei Xu, Bo Chen, Yujun Zhang:

Privacy-Preserving Query Log Sharing Based on Prior N-Word Aggregation. 722-729 - Shaobo Zhang

, Qin Liu, Guojun Wang:
Enhancing Location Privacy through User-Defined Grid in Location-Based Services. 730-736 - Xin Pei, Yongjian Wang, Wei Yao, Jiuchuan Lin, Ruxiang Peng:

Security Enhanced Attribute Based Signcryption for Private Data Sharing in Cloud. 737-743 - Dali Zhu, Na Pang, Gang Li

, Wenjing Rong, Zheming Fan:
WiN: Non-invasive Abnormal Activity Detection Leveraging Fine-Grained WiFi Signals. 744-751 - Shu Chen, Hong Shen:

Semantic-Aware Dummy Selection for Location Privacy Preservation. 752-759 - Zhikai Xu, Hongli Zhang, Xiang-Zhan Yu:

Multiple Mix-Zones Deployment for Continuous Location Privacy Protection. 760-766 - Fabio Martinelli, Andrea Saracino

, Mina Sheikhalishahi:
Modeling Privacy Aware Information Sharing Systems: A Formal and General Approach. 767-774 - Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Shlomi Dolev

:
Local Self-Organization with Strong Privacy Protection. 775-782 - Erald Troja, Spiridon Bakiras

:
Privacy-Preserving Location-Aware Mobile Advertisement. 783-790 - Zakaria Gheid

, Yacine Challal
:
Efficient and Privacy-Preserving k-Means Clustering for Big Data Mining. 791-798 - Zaid Ameen Abduljabbar

, Hai Jin, Ayad Ibrahim, Zaid Alaa Hussien
, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Privacy-Preserving Image Retrieval in IoT-Cloud. 799-806 - Xiaolei Wang, Yuexiang Yang, Chuan Tang, Yingzhi Zeng, Jie He:

DroidContext: Identifying Malicious Mobile Privacy Leak Using Context. 807-814 - Yiping Teng, Xiang Cheng, Sen Su, Rong Bi:

Privacy-Preserving Top-k Nearest Keyword Search on Outsourced Graphs. 815-822 - Peng Liu, Yidong Li

, Yingpeng Sang, Ji Zhang:
Anonymity-Based Privacy Preserving Network Data Publication. 823-828 - Shibin Sun, Yuliang Shi, Shidong Zhang, Lizhen Cui:

A Privacy Protection Mechanism for NoSql Database Based on Data Chunks. 829-836 - Yu Chen, Yuliang Shi, Li-zhen Cui:

Model for Hiding Data Relationships Based on Chunk-Confusion in Cloud Computing. 837-844 - Xiaoyu Zhu, Qin Liu, Guojun Wang:

A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing. 845-851 - Kunding Fang, Xiaohong Li, Jianye Hao, Zhiyong Feng:

Formal Modeling and Verification of Security Protocols on Cloud Computing Systems Based on UML 2.3. 852-859 - Sanjeet Kumar Nayak

, Somanath Tripathy
:
Privacy Preserving Provable Data Possession for Cloud Based Electronic Health Record System. 860-867 - Gaurav Misra, Jose M. Such, Hamed Balogun

:
IMPROVE - Identifying Minimal PROfile VEctors for Similarity Based Access Control. 868-875 - Juru Zeng, Yuncheng Wu, Yao Wu, Hong Chen, Cuiping Li, Shan Wang:

Energy-Efficient and Privacy-Preserving Range Query in Participatory Sensing. 876-883 - Longkun Guo, Hong Shen:

Privacy-Preserving Internet Traffic Publication. 884-891 - Pei Chen, Yaping Lin, Wei Zhang, Xiaoying Li, Shiwen Zhang:

Preserving Location and Content Privacy for Secure Ranked Queries in Location Based Services. 892-899 - Mark A. Will, Ryan K. L. Ko

, Ian H. Witten:
Privacy Preserving Computation by Fragmenting Individual Bits and Distributing Gates. 900-908 - Lihai Nie, Zhiyang Li, Wenyu Qu:

Association Rules Discovery via Approximate Method from Probabilistic Database. 909-914 - Longwang Cheng, Wei Li, Dongtang Ma, Li Zhou, Chunsheng Zhu, Jibo Wei:

Towards an Effective Secret Key Generation Scheme for Imperfect Channel State Information. 915-920 - Genqiang Wu, Yeping He, JingZheng Wu, Xianyao Xia:

Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function Computation. 921-928
TrustCom Forensics Track
- Yanchen Qiao

, Xiaochun Yun, Yongzheng Zhang:
How to Automatically Identify the Homology of Different Malware. 929-936 - Yanchen Qiao

, Xiaochun Yun, Yongzheng Zhang:
Fast Reused Function Retrieval Method Based on Simhash and Inverted Index. 937-944 - Long Chen, Yue Mao:

Forensic Analysis of Email on Android Volatile Memory. 945-951 - Xiu-Li Bi, Chi-Man Pun

, Xiaochen Yuan
:
Adaptive Polar Based Filtering Method for Image Copy-Move Forgery Detection. 952-956 - Benjamin Taubmann, Noëlle Rakotondravony, Hans P. Reiser

:
CloudPhylactor: Harnessing Mandatory Access Control for Virtual Machine Introspection in Cloud Data Centers. 957-964 - Yunan Zhang, Qingjia Huang, Xinjian Ma, Zeming Yang, Jianguo Jiang:

Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification. 965-973 - Hafizah Mansor

, Konstantinos Markantonakis
, Raja Naeem Akram
, Keith Mayes, Iakovos Gurulian:
Log Your Car: The Non-invasive Vehicle Forensics. 974-982 - Qiang Rao, Jianjun Wang, Liming Zhang:

Enhancing Source Camera Identification Based on Multiplicative Denoising Filter. 983-988 - Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai:

Power Traces Clipping and Splicing Enhanced Correlation Collision Analysis. 989-995 - Xinwen Zhang, Huakang Li, Yitao Yang, Guozi Sun, Guangxuan Chen:

LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code. 996-1000 - Wei Dong, Jianjun Wang:

JPEG Compression Forensics against Resizing. 1001-1007 - Denys A. Flores

, Farrukh Qazi, Arshad Jhumka:
Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information. 1008-1015 - Xinping Zhou, Degang Sun, Zhu Wang, Changhai Ou, Juan Ai:

Double-Key Recovery Based Correlation Power Analysis. 1016-1022 - Dali Zhu, Junhuang Chen, Yanfang Zhang, Siye Wang

, Huafeng Kong:
An Efficient Approach of Integrating RFID and Vision Techniques in Object Surveillance System. 1023-1029 - Guoqiang Li, Bian Yang, Christoph Busch

:
A Fingerprint Indexing Algorithm on Encrypted Domain. 1030-1037 - Yandong Han, Zhiyu Hao, Lei Cui, Chonghua Wang, Yafei Sang:

A Hybrid Monitoring Mechanism in Virtualized Environments. 1038-1045 - Liu Cao, Yuqing Sun

, Shaoqing Wang, Mingzhu Li:
Detecting Malicious Behavior and Collusion for Online Rating System. 1046-1053 - Chao Shen

, Haodi Xu, Haijun Wang, Xiaohong Guan:
Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis. 1054-1060 - Weizhi Meng, Xiapu Luo

, Wenjuan Li
, Yan Li:
Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice. 1061-1068
ISPA 2016: The 14th IEEE International Symposium on Parallel and Distributed Processing with Applications
- Jingwei Ma, Gang Wang, Xiaoguang Liu:

DedupeSwift: Object-Oriented Storage System Based on Data Deduplication. 1069-1076 - Shengli Gao, Ruini Xue:

BOLAS+: Scalable Lightweight Locality-Aware Scheduling for Hadoop. 1077-1084 - Jingwei Ma, Boxue Yin, Zhi Kong, Yuxiang Ma, Chang Chen, Long Wang, Gang Wang, Xiaoguang Liu:

Leveraging Page-Level Compression in MySQL - A Practice at Baidu. 1085-1092 - Bo Wang

, Ying Song, Yuzhong Sun, Jun Liu:
Improvements to Online Distributed Monitoring Systems. 1093-1100 - Yanbo Liu, Wenchao Xu, Feilong Tang, Lei Kuang, Yanqin Yang:

An Improved Multi-path Routing Algorithm for Hybrid LEO-MEO Satellite Networks. 1101-1105 - João A. Silva

, Ricardo Monteiro, Hervé Paulino
, João M. Lourenço
:
Ephemeral Data Storage for Networks of Hand-Held Devices. 1106-1113 - Minglei Jia, Yanqin Yang, Lei Kuang, Wenchao Xu, Tianxing Chu, Hongzhi Song:

An Indoor and Outdoor Seamless Positioning System Based on Android Platform. 1114-1120 - Tong Shen, Dafang Zhang:

Rule Selector: A Novel Scalable Model for High-Performance Flow Recognition. 1121-1128 - Liangyi Gong, Wu Yang, Chaocan Xiang, Dapeng Man, Miao Yu, Zuwei Yin:

WiSal: Ubiquitous WiFi-Based Device-Free Passive Subarea Localization without Intensive Site-Survey. 1129-1136 - Yujuan Tan, Zhichao Yan:

Multi-objective Based Performance Evaluation of Deduplication Approaches. 1137-1144 - Liang Zhu, Hai Jin, Xiaofei Liao:

A Tool to Detect Performance Problems of Multi-threaded Programs on NUMA Systems. 1145-1152 - Meng Jiang, Yanbo Liu, Wenchao Xu, Feilong Tang, Yanqin Yang, Lei Kuang:

An Optimized Layered Routing Algorithm for GEO/LEO Hybrid Satellite Networks. 1153-1158 - Xiaoqiang Pei, Yijie Wang, Xingkong Ma, Fangliang Xu:

Pipelined Online Data Insertion for Erasure Codes in Distributed Storage Systems. 1159-1166 - Fanzi Zeng, Jie Li

, Jisheng Xu
, Jing Zhong:
A Trust-Based Cooperative Spectrum Sensing Scheme against SSDF Attack in CRNs. 1167-1173 - Shuai Zhang, Lei Liu, Hui Li, Zongshui Xiao, Lizhen Cui:

MTPGraph: A Data-Driven Approach to Predict Medical Risk Based on Temporal Profile Graph. 1174-1181 - Dali Li, Chuanfu Xu, Ningbo Guo:

Evaluating and Optimizing Parallel LU-SGS for High-Order CFD Simulations on the Tianhe-2 Supercomputer. 1182-1189 - Shiming Lei, Chao Wang, Haijie Fang, Xi Li, Xuehai Zhou:

SCADIS: A Scalable Accelerator for Data-Intensive String Set Matching on FPGAs. 1190-1197 - Jigang Wu, Ningjing Liu, Siew Kei Lam, Guiyuan Jiang:

Shortest Partial Path First Algorithm for Reconfigurable Processor Array with Faults. 1198-1203 - Qijia Zhang, Fangjin Zhu, Canhui Wang:

An Enhanced Node Mapping Algorithm for VNE Problem Based on Path Relevance. 1204-1209 - Cheng Ling, Jing-Yang Gao, Gang Lu:

Phylogenetic Likelihood Estimation on GPUs Using Vertical Partitioning Scheme. 1210-1217 - Yamin Li, Wanming Chu:

Adjusting Parameters of k-Ary n-Cube to Achieve Better Cost Performance. 1218-1225 - Yali Lv, Cheng-Kuan Lin, Jianxi Fan:

Hamiltonian Cycle and Path Embeddings in 3-Ary n-Cubes Based on K1, 2-Structure Faults. 1226-1232 - Shiming He, Kun Xie, Kexin Xie, Zhetao Li, Chuan Xu:

Interference-Aware Multi-source Transmission. 1233-1240 - Zhiwei Zhou, Junwu Zhu, Yi Jiang, Bin Li:

A Truthful Greedy Mechanism toward Resource Sharing for Cloudlets in Mobile Cloud Computing. 1241-1247 - Lida Zou, Qingzhong Li, Hui Li, Shidong Zhang, Yongqing Zheng, Zongshui Xiao:

Penalty Cost Minimization for Multi-tenant Query Deadline Employing Cache Optimization and Log Based Dispatching. 1248-1255 - Wei Zhang, Sheng Zhang, Zhuzhong Qian, Kaiyuan Wen, Sanglu Lu:

Virtual Network Deployment in Hybrid Data Center Networks. 1256-1263 - Puheng Zhang, Chuang Lin, Kun Meng, Ying Chen:

A Comprehensive Optimization for Performance, Energy Efficiency, and Maintenance in Cloud Datacenters. 1264-1271 - Peng Li, Xingtong Jin, Rebecca J. Stones, Gang Wang, Zhongwei Li, Xiaoguang Liu, Mingming Ren:

Parallelizing Degraded Read for Erasure Coded Cloud Storage Systems Using Collective Communications. 1272-1279 - Yuwei Wang, Min Liu, Bo Gao, Chenchong Qin, Cheng Ma:

I/O Congestion-Aware Computing Resource Assignment and Scheduling in Virtualized Cloud Environments. 1280-1287 - Lirui Gong, Jiawei Wang, Xiang Zhang, Kai Lei

:
Intelligent Forwarding Strategy Based on Online Machine Learning in Named Data Networking. 1288-1294 - Changhai Wang, Meng Li, Jianzhong Zhang, Yuwei Xu:

A Model with Hierarchical Classifiers for Activity Recognition on Mobile Devices. 1295-1301 - Lei Guan, Yutong Lu:

Using Dynamic Granularity Strategy to Accelerate Unbalanced Tree Search. 1302-1310 - Tao Li, Kezhao Zhao, Qiankun Dong, Jiabing Ling, Yulu Yang, Wenjing Ma:

Data-Oriented Runtime Scheduling Framework on Multi-GPUs. 1311-1318 - Savio S. H. Tse:

Bicriteria Load Balancing for Online Placement in Heterogeneous Servers with Extreme Upper Bounds. 1319-1326 - Yong Zhang, Bo Liu, Fan Yang:

Differential Evolution Based Selective Ensemble of Extreme Learning Machine. 1327-1333 - Kailai Zhou, Hong Chen, Hui Sun, Cuiping Li:

A Skew-Insensitive Hashing Sync and Construction Scheme for Many-Core Coprocessors. 1334-1341 - Hong Qiao, Dafang Zhang, Kun Xie, Ji Zhang, Shiming He:

Power-Bandwidth Aware Cooperative Routing in Multi-radio Multi-channel Wireless Network. 1342-1349 - Peng Shu, Rong Gu, Qianhao Dong, Chunfeng Yuan, Yihua Huang:

Accelerating Big Data Applications on Tiered Storage System with Various Eviction Policies. 1350-1357 - Bo Feng, Chentao Wu, Jie Li

:
MLC: An Efficient Multi-level Log Compression Method for Cloud Backup Systems. 1358-1365 - Xiaoxiao Cao, Bing Chen, Yanchao Zhao:

Wi-Wri: Fine-Grained Writing Recognition Using Wi-Fi Signals. 1366-1373 - Jingheng Xu, Haohuan Fu, Lin Gan, Yu Song, Hongbo Peng, Wen Shi, Guangwen Yang:

Evaluating the POWER8 Architecture through Optimizing Stencil-Based Algorithms. 1374-1381 - Feng Hu, Bing Chen, Xiaojun Zhu, Hong Shen:

SDN-Based Efficient Bandwidth Allocation for Caching Enabled Cognitive Radio Networks. 1382-1389 - Na Liu, Peng Xiao, Ying Lu, Xiao-Jun Tang, Hai-Wen Wang, Ming-Xia Li:

A Topic Approach to Sentence Ordering for Multi-document Summarization. 1390-1395 - Jie Wang, Ce Yu, Zhi Hong, Jian Xiao, Chen Li, Jizhou Sun:

Pattern Aware Cache Management for Efficient Subset Retrieving of Astronomical Image Data. 1396-1403 - Huibin Zhou, Dafang Zhang, Kun Xie, Yuxiang Chen:

Robust Spatio-temporal Tensor Recovery for Internet Traffic Data. 1404-1411 - Youjun Xu, Xianglan Chen, Zhinan Cheng, Jiachen Song, Yuxiang Zhang:

Improving Energy Efficiency by Phase-Grained Migration for Asymmetric Multicore. 1412-1419 - Qiang Liu, Xiaoshe Dong

, Heng Chen, Zhengdong Zhu, Yinfeng Wang:
An Efficient Framework for Incremental Graph Computation. 1420-1426 - Yuanchao Xu, Zeyi Hou:

NVM-Assisted Non-redundant Logging for Android Systems. 1427-1433 - Meng Lai, Jiajun Wang, Tao Song, Ning Liu, Zhengwei Qi, Weijia Zhou:

VSP: A Virtual Smartphone Platform to Enhance the Capability of Physical Smartphone. 1434-1441 - Xiaochen Fan, Panlong Yang, Chaocan Xiang, Lei Shi:

iMap: A Crowdsensing Based System for Outdoor Radio Signal Strength Map. 1442-1447 - Zijun Han, Guangzhi Qu, Dona Burkard, Kelvin Dobbins:

A Memory Access Pattern-Based Program Profiling System for Dynamic Parallelism Prediction. 1448-1454 - Yibo Jin, Yuan Gao, Zhuzhong Qian, Mingyu Zhai, Hui Peng, Sanglu Lu:

Workload-Aware Scheduling Across Geo-distributed Data Centers. 1455-1462 - Jianbang Tian, Zhuzhong Qian, Mianxiong Dong, Sanglu Lu:

FairShare: Dynamic Max-Min Fairness Bandwidth Allocation in Datacenters. 1463-1470 - Xiongren Xiao

, Guoqi Xie, Renfa Li, Keqin Li:
Minimizing Schedule Length of Energy Consumption Constrained Parallel Applications on Heterogeneous Distributed Systems. 1471-1476 - Houwu Chen, Jiwu Shu:

Sznajd2: A Community-Aware Opinion Dynamics Model. 1477-1484 - Thanh Dat Dang, Doan B. Hoang, Priyadarsi Nanda:

A Novel Hash-Based File Clustering Scheme for Efficient Distributing, Storing, and Retrieving of Large Scale Health Records. 1485-1491 - Songwen Pei, Jinkai Wang, Wenyang Cui, Linhua Jiang, Tongsheng Geng, Jean-Luc Gaudiot, Stéphane Zuckerman:

Codelet Scheduling by Genetic Algorithm. 1492-1499 - KunPeng Mao, Songtao Guo, Yuanyuan Yang

, Guiyan Liu:
MRDC: Multicast Data Restoration in Fat-Tree Data Center Networks. 1500-1507 - Chonglin Gu, Ke Hu, Zhenlong Li, Qiang Yuan, Hejiao Huang, Xiaohua Jia:

Lowering Down the Cost for Green Cloud Data Centers by Using ESDs and Energy Trading. 1508-1515 - Farhad Ahamed

, Seyed A. Shahrestani
, Bahman Javadi:
Security Aware and Energy-Efficient Virtual Machine Consolidation in Cloud Computing Systems. 1516-1523 - Yang Zhang, Zuocheng Xing, Li Zhou, Chunsheng Zhu:

Locality Protected Dynamic Cache Allocation Scheme on GPUs. 1524-1530 - Dongyu Zheng, Dailiang Jin, Yuanzhe Hao, Lei Liu, Xinjing Wei:

Prediction of Consecutive Road Node Congestion Based on Queueing Model. 1531-1536 - Yongjian Ren, Dailiang Jin, Dongyu Zheng, Lei Liu, Xinjing Wei:

An Analytical Model of Data Plane Performance Subject to Prioritized Service. 1537-1542 - Yi Wei, Li Pan, Dong Yuan

, Shijun Liu, Lei Wu, Xiangxu Meng:
A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market. 1543-1550 - Zheng Zhang, Dan Feng, Jianxi Chen, Ya Yu, Jing Zeng

:
The Design and Implementation of a Lightweight Management Framework for Non-volatile Memory. 1551-1558 - Hongyan Tang, Ying Li, Tong Jia, Zhonghai Wu:

Evaluating Performance of Rescheduling Strategies in Cloud System. 1559-1566 - Chengjin Jia, Jin Wang, Yanqin Zhu, Zhengqing Wen, Juncheng Jia:

Joint Selection of Providers and the New Comer for Optimal Repair in Distributed Storage Network with Network Coding. 1567-1574 - Minghui Li, Zhaobin Liu, Kang Dong:

Privacy Preservation in Social Network against Public Neighborhood Attacks. 1575-1580 - Lulu Li, Zhuo Li, Xin Chen:

Capacity Analysis and Link Scheduling Design in Double-Channel Full-Duplex Wireless Networks. 1581-1588 - Juan-Hui Li, Pei-Zhen Li, Chang-Dong Wang, Jian-Huang Lai:

Community Detection in Complicated Network Based on the Multi-view Weighted Signed Permanence. 1589-1596 - Jiang Zhou, Wei Xie, Qiang Gu, Yong Chen

:
Hierarchical Consistent Hashing for Heterogeneous Object-Based Storage. 1597-1604 - Yong Chen

, Chao Chen, Yanlong Yin, Xian-He Sun, Rajeev Thakur
, William Gropp
:
Rethinking High Performance Computing System Architecture for Scientific Big Data Applications. 1605-1612 - Xiaoshan Chang, Zenghua Zhao, Bingxue Diao, Tao Li:

Experimental Study of Disruption-Tolerant Transport Protocol for Mobile Ad-Hoc Networks with Connection Diversity. 1613-1620 - Jun Wang, Zhiyang Li, Yegang Du, Wenyu Qu:

Stacked Product Quantization for Nearest Neighbor Search on Large Datasets. 1621-1627 - Yuan Cao, Heng Qi, Keqiu Li, Milos Stojmenovic:

Multiple Query-Independent Values Based Asymmetric Ranking for Approximate Nearest Neighbor Search. 1628-1635 - Ehsan Atoofian:

Temperature-Aware Register Mapping in GPGPUs. 1636-1643
BigDataSE 2016: The 10th IEEE International Conference on Big Data Science and Engineering
- You Dai, Jin Yan, Xiaoxin Tang, Han Zhao, Minyi Guo:

Online Credit Card Fraud Detection: A Hybrid Framework with Big Data Technologies. 1644-1651 - Juping Wen, QingDan Yuan:

Social Circles Discovery Based on Structural and Attribute Similarities. 1652-1659 - Shanshan Chen, Xiaoxin Tang, Hongwei Wang, Han Zhao, Minyi Guo:

Towards Scalable and Reliable In-Memory Storage System: A Case Study with Redis. 1660-1667 - Hongyang Qu, Zhiwen Yu

, Zhiyong Yu
, Huang Xu, Bin Guo
, Xing Xie
:
What Is My Next Job: Predicting the Company Size and Position in Career Changes. 1668-1675 - Xiongpai Qin, Bangguo Wang, Ruchuan Lai, Keqin Li:

Improving Robustness of a SVR Based Algorithm Trading Model with Carefully Crafted Features and a Diversified Portfolio. 1676-1683 - Francisco Padillo, José María Luna

, Sebastián Ventura:
Subgroup Discovery on Big Data: Exhaustive Methodologies Using Map-Reduce. 1684-1691 - Liudong Zuo

, Mengxia Michelle Zhu:
Improved Scheduling Algorithms for Single-Path Multiple Bandwidth Reservation Requests. 1692-1699 - Haizhou Du, Zhengbo Chen, Qifen Li, Yongwen Yang:

A Novel Text Feature Weight Calculation Method Applied to Power Field. 1700-1705 - Junfeng Wu, Yitong Wan, Wenyu Qu, Changqing Ji, Yuanyuan Li, Peng Xiao, Jianwei Sun:

A Novel Image Retrieval Approach with Bag-of-Word Model and Gabor Feature. 1706-1711
UbiSafe 2016: The 8th IEEE International Symposium on UbiSafe Computing
- Wu-Xiang Weng, Shou-Chih Lo:

Fall Detection Based on Tilt Angle and Acceleration Variations. 1712-1717 - Xinglu He, Kai Lu, Gen Li:

Taint Reverse Propagation for Analysis of Privacy Leak. 1718-1722 - Xiaojun Guo, Guang Cheng, Yifei Hu, Mian Dai:

Progress in Command and Control Server Finding Schemes of Botnet. 1723-1727 - Hui Li, Guoqiao Ye, Xuezheng Liu, Fei Zhao, Di Wu, Xiaola Lin:

URLSight: Profiling Mobile Users via Large-Scale Internet Metadata Analytics. 1728-1733 - Zibo Yi

, Jun Ma
, Lei Luo, Jie Yu, Qingbo Wu:
Improving JavaScript Malware Classifier's Security against Evasion by Particle Swarm Optimization. 1734-1740 - Peipei Xiao, Yufeng Wang, Qun Jin, Jianhua Ma:

A Privacy-Preserving Incentive Scheme for Advertisement Dissemination in Vehicular Social Networks. 1741-1746 - Ajay Pantangi, Kaiqi Xiong, Mufaddal Makati:

SECUPerf: End-to-End Security and Performance Assessment of Cloud Services. 1747-1752 - Dong Cao, Shanshan Wang, Qun Li, Zhenxiang Chen, Qiben Yan

, Lizhi Peng, Bo Yang:
DroidCollector: A High Performance Framework for High Quality Android Traffic Collection. 1753-1758 - Mohammad Shahriar Rahman

, Anirban Basu, Shinsaku Kiyomoto:
Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings. 1759-1764
EFINS 2016: The 3rd International Workshop on the Emerging Future Internet and Network Security
- Tayeb Kenaza, Khadidja Bennaceur, Abdenour Labed, Mahdi Aiash:

Enhancing the SVDD Accuracy in Intrusion Detection Systems by Removing External Voids. 1765-1770 - Salvatore Signorello

, Maria Rita Palattella
, Luigi Alfredo Grieco:
Security Challenges in Future NDN-Enabled VANETs. 1771-1775 - Tayeb Kenaza, Mahdi Aiash, Jonathan Loo

, Aboubaker Lasebae, Gill Whitney:
A Progressive Approach to Design Authentication Protocols for Mobile Heterogeneous Networks. 1776-1781 - Nikolaos Sarantinos, Chafika Benzaid

, Omar Arabiat, Ameer Al-Nemrat:
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities. 1782-1787 - Ahmad Azab

, Mamoun Alazab
, Mahdi Aiash:
Machine Learning Based Botnet Identification Traffic. 1788-1794
TrustWSN 2016: The 2nd IEEE International Workshop on Trust and Security in Wireless Sensor Networks
- Huan Zhao, Xixiang Zhang:

A Mobile Security-Related Behavior Prevention Model Based on Speech Personality Traits. 1803-1810 - Jian Shu, Weijie Lin, Linlan Liu, Xuyan Luo:

Topology Prediction Mechanism for Pocket Switched Network Based on Deep Belief Network. 1811-1817
TrustSoft 2016: The 2nd IEEE International Workshop on Trustworthy Software Systems
- Dali Zhu, Ying Yang, Hao Jin, Jing Shao, Weimiao Feng:

Application of Modified BLP Model on Mobile Web Operating System. 1818-1824 - Gang Hou, Kuanjiu Zhou, Yanran Wu, Zongzheng Chi, Jie Wang, Mingchu Li:

ETSTM: A New Green Software Model. 1825-1830 - Shu-Yan Wang, Jia-Ze Sun, Ju Zhang:

The Method of Generating Web Link Security Testing Scenario Based on UML Diagram. 1831-1838 - Antonio La Marra, Fabio Martinelli, Andrea Saracino

, Alessandro Aldini
:
On Probabilistic Application Compliance. 1848-1855 - Fang Jianyong:

Research on the Nonintrusive Resource Level Fault Injection Technology for Windows System. 1856-1860
LSNS 2016: The 5th International Workshop on Large-Scale Network Security
- Liang Wang, Weiping Wang

, Jingzi Gu, Dan Meng:
Delta-Generalization: High Accuracy Data Release for Privacy Preserving. 1861-1866 - Jain-Shing Wu, Yuh-Jye Lee

, Te-En Wei, Chih-Hung Hsieh, Chia-Min Lai:
ChainSpot: Mining Service Logs for Cyber Security Threat Detection. 1867-1874 - Nilesh Chakraborty, S. Vijay Anand, Gurpinder Singh Randhawa, Samrat Mondal

:
On Designing Leakage-Resilient Vibration Based Authentication Techniques. 1875-1881 - Jianguo Jiang, Biao Qi, Zhixin Shi, Yan Wang, Bin Lv:

Botnet Detection Method Analysis on the Effect of Feature Extraction. 1882-1888 - Nour El Madhoun, Guy Pujolle:

Security Enhancements in EMV Protocol for NFC Mobile Payment. 1889-1895 - José de Jesús Serrano-Pérez

, Moisés Salinas-Rosales
, Nareli Cruz Cortés:
Universal Steganography Detector Based on an Artificial Immune System for JPEG Images. 1896-1903 - Hongfang Han, Ang Gao, Jianji Ren, Yongqiang Ma, Xiao Xue:

An O2O Service Recommendation Algorithm Based on User Context and Trust Service. 1904-1909 - Takashi Sasagawa, Satoshi Ohzahata, Toshihiko Kato:

Suppressing Selfish Transmissions with Extending NAV Period and Resetting CW of Access Point in Wireless LAN. 1910-1916 - Kaiyuan Liang, Yanzhao Feng, Jizeng Wei, Wei Guo:

SecPage - A Lightweight Memory Protection Architecture. 1917-1922 - Jeffery Garae, Ryan K. L. Ko

, Sivadon Chaisiri:
UVisP: User-centric Visualization of Data Provenance with Gestalt Principles. 1923-1930 - Xu Weng, Zhaobin Liu, Zhiyang Li:

An Efficient Influence Maximization Algorithm Considering Both Positive and Negative Relationships. 1931-1936
TSCloud 2016: The 6th IEEE International Symposium on Trust and Security in Cloud Computing
- Haiping Huang, Jianpeng Du, Hui Wang, Ruchuan Wang:

A Multi-keyword Multi-user Searchable Encryption Scheme Based on Cloud Storage. 1937-1943 - Xianyi Zheng, Lulu Yang, Gang Shi, Dan Meng:

Secure Mobile Payment Employing Trusted Computing on TrustZone Enabled Platforms. 1944-1950 - Qian Li, Weiguo Wu, Jianhang Huang, Zeyu Sun, Mingxia Feng:

A Novel Trustworthy Framework for Cloud Based Rendering Application. 1951-1956 - Mang Su, Anmin Fu

, Yan Yu, Guozhen Shi:
Resource-centric Dynamic Access Control in Cloud. 1957-1962
SPAPT 2016: The 1st International Workshop on Security and Privacy in Advanced Persistent Threat
- Feng Liu, Pengpeng Luo, Zhujuan Ma, Cheng Zhang, Yiwen Zhang, Erzhou Zhu:

Security Secret Information Hiding Based on Hash Function and Invisible ASCII Characters Replacement. 1963-1969 - Zongshuai Hu, Yong Wang, Lipeng Zhang, Rusen Fan:

Bad Data Injection Attacks Identification in Power System on Fast Decoupled Load Flow. 1970-1975 - Jian Zhang, Pin Liu, Jianbiao He, Yawei Zhang:

A Hadoop Based Analysis and Detection Model for IP Spoofing Typed DDoS Attack. 1976-1983 - Mohammad Shahriar Rahman

, Keita Emura
, Shinsaku Kiyomoto:
On the Leakage Resilient Cryptography in Game-Theoretic Settings. 1984-1989 - Jaouhar Fattahi, Mohamed Mejri, Emil Pricop

:
Authentication by Witness Functions. 1990-1997 - Craig Scoon, Ryan K. L. Ko

:
The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws. 1998-2005 - Hao Peng, Mengzhuo You:

The Health Care Fraud Detection Using the Pharmacopoeia Spectrum Tree and Neural Network Analytic Contribution Hierarchy Process. 2006-2011 - Idrees Ahmed

, Abid Khan
, Muhammad Saleem Khan, Mansoor Ahmed
:
Aggregated Signatures for Chaining: A Secure Provenance Scheme. 2012-2017 - Yujie Sun, Weijiang Liu, Zhaobin Liu, Chao Liu:

Comparison of Five Packet-Sampling-Based Methods for Detecting Elephant Flows. 2018-2023
3C in ITS 2016: Computing, Communication, and Control Technologies in Intelligent Transportation Systems
- Wen Xu, Jiangqiang Hu, Jianchuan Yin

, Ke Li:
Ship Automatic Collision Avoidance by Altering Course Based on Ship Dynamic Domain. 2024-2030 - Changyuan Chen, Ran Dai, Tingting Yang, Zuxin Wu, Quan Li:

The Design and Application of an Intelligentialized Monitoring System for Mooring Safety. 2031-2034 - Jian Zhao, Jianchuan Yin:

Study on the Control of Fractional-Order PID for Underwater Vehicle Attitude Angle. 2035-2040 - Degang Sun, Jun Shi, Xuejie Ding, Meng Zhang, Wei-qing Huang:

Method for Detecting Information Leakage from Computer Display in Electromagnetic Radiation. 2041-2046 - Ying Wang, Yang Ju, Tiantian Miao, Rongxi He

:
Chunk-Based Resource Allocation with Fairness Consideration for Layered Multicast Streaming in OFDMA Systems. 2047-2051 - Xin Li, Bin Lin, Ping Guo, Sen Li, Rongxi He

:
Design and Planning of Heterogeneous Marine Sensor Networks for Marine Intelligent Transportation. 2052-2057 - Ping Guo, Bin Lin, Xin Li, Rongxi He

, Sen Li:
Optimal Deployment and Dimensioning of Fog Computing Supported Vehicular Network. 2058-2062 - Jing Wang, Xianfeng Zhao, Yanjie Deng, Shibo Xu, Jichun Li:

Research on Key Technologies and Standard Framework of Secure and Smart Container. 2063-2067 - Shibo Xu, Qingzhou Li, Peng Ni, Wensheng Cao, Xianfeng Zhao:

The Application of Ad-Hoc Network in Smart Container Tracking System. 2068-2072
FFCN 2016: The 4th International Symposium on Frontier of Future Communication Networks
- Changyi Deng, Ruifeng Guo

, Hongliang Wang, Azhen Peng:
A Dynamic Power Management Algorithm for Sporadic Tasks in Real-Time Embedded Systems. 2073-2078 - Yuanyuan Xie, Jiang Wu, Fengzhu Liu:

A Hierarchic Hybrid Scheduling Algorithm for Static Task with Precedence Constraints. 2079-2085 - Changhai Wang, Yuwei Xu, Jianzhong Zhang, Wenping Yu:

SW-HMM: A Method for Evaluating Confidence of Smartphone-Based Activity Recognition. 2086-2091 - Cang Liu, Chuan Tang, Zuocheng Xing, Lirui Chen, Yang Zhang, Guitao Fu:

An Architecture of Parallel Tiled QRD Algorithm for MIMO-OFDM Systems. 2092-2096 - Xueyi Wang, Xingwei Wang, Min Huang, Zun Wang:

Combinatorial Reverse Auction-Based Service Provision in Social Clouds. 2097-2102 - Haiyan Qin, Yonglong Zhang, Bin Li:

pHSA: A Price Schedule for Heterogeneous Spectrum Auction. 2103-2108 - Yang Liu, Wenxin Li, Keqiu Li, Heng Qi, Xiaoyi Tao, Sheng Chen:

Scheduling Dependent Coflows with Guaranteed Job Completion Time. 2109-2115 - Shijia Wang, Liang Zhou, Yuanyuan Li, Junfeng Wu:

Parallel Monte Carlo Method with MapReduce for Option Pricing. 2116-2121
ETCS 2016: The 2016 International Workshop on Emerging Topics in Computer Science
- Hongyun Gao, Fujun Liu, Shengjuan Sun, Gaotao Shi:

A New Model Based on GEP-SWPM for Predicting Heavy Metals Speciation. 2122-2126 - Yaobin Wang, Hong An, Zhiqin Liu, Ling Li, Jun Huang

:
A Flexible Chip Multiprocessor Simulator Dedicated for Thread Level Speculation. 2127-2132 - Yanbin Guo, Jianzhong Zhang, Yu Zhang

:
An Algorithm for Analyzing the City Residents' Activity Information through Mobile Big Data Mining. 2133-2138 - Jiangming Jin, Yang Zhang, Shanjiang Tang, Hongfei Fan:

Performance Modeling and Analysis for Critical Section Contention in Parallel Codes. 2139-2146 - Huijun Wu, Liming Zhu

, Kai Lu, Gen Li, Dongyao Wu:
StageFS: A Parallel File System Optimizing Metadata Performance for SSD Based Clusters. 2147-2152 - Huirong Zhang, Jianwen Cao:

A Subgraph Preconditioning Algorithm for Large Linear Systems. 2153-2159 - Yemao Xu, Jialong Wang, Yanhong Liu, Li Shen:

Fast Task Submission in Software Thread Level Speculation Systems. 2160-2166 - Liang Deng, Hanli Bai, Dan Zhao, Fang Wang:

Evaluating Multi-core and Many-Core Architectures through Parallelizing a High-Order WENO Solver. 2167-2174 - Lin Han, Zhiyang Li, Weijiang Liu, Ke Dai, Wenyu Qu:

Minimum Control Latency of SDN Controller Placement. 2175-2180 - N. Karthik

, Ananthanarayana V. S.:
Data Trustworthiness in Wireless Sensor Networks. 2181-2186
AEIT 2016: The 2016 International Workshop on Assistive Engineering and Information Technologies
- Hui Wang, Xiaohe Chen, Xinjian Chen

, Peilin Zang, Yunqing Liu, Lirong Wang:
Fall Detection Based on KPCA and 3D KPCA. 2187-2191 - Wenliang Zhu, Xiaohe Chen, Yan Wang, Lirong Wang:

The Survey of Low-Power Sleep Monitoring Algorithm Based on the Wrist Movement Signal. 2192-2196 - Yan Wang, Lirong Wang, Xiaohe Chen, Wenliang Zhu:

P Wave Detection and Delineation Based on Distances Transform. 2197-2201 - Jian Guo, Lirong Wang, Wenliang Zhu, Xiaohe Chen:

The Analysis of Crosstalk Noise Component in Wearable Device. 2202-2205 - Renhai Xu, Wenxin Li, Keqiu Li, Heng Qi:

Towards Application-Aware In-Network Bandwidth Management in Data Centers. 2206-2212
NCDM 2016: The 2016 International Workshop on Network Computing and Data Management
- Arun Kejariwal, Francois Orsini:

On the Definition of Real-Time: Applications and Systems. 2213-2220 - Long Sheng, Xiaoyun Guang, Feng Chen, Hui Wang, Kang Gao:

A Review on Complex Network Dynamics in Evolutionary Algorithm. 2221-2226 - Renke Wu, Linpeng Huang, Peng Yu, Kai Shen, Qiuwei Shi, Haojie Zhou:

Meta-Model Evolution with Self-Adaptation: An Empirical Development Approach for Distributed Parallel Computing Framework. 2227-2234 - Zhengyang Chen, Renjie Chen, Yu Zhang

, Jianzhong Zhang, Jingdong Xu:
A Statistical-Feature ML Approach to IP Traffic Classification Based on CUDA. 2235-2239 - Chao Chen, Kun-Yu Lin, Chang-Dong Wang, Dong Huang

:
CSBD: A Nonlinear Clustering Method Based on Cluster Shrinking and Border Detection. 2240-2245 - Shiqing Wang, Yuanyuan Li, Zhiyang Li, Junfeng Wu, Fengjuan Chen:

Surveillance Methods of Running Condition of Chemical Equipments Based on Skyline. 2246-2250 - Xingyuan Huang, Jiandong Zhang, Kun Qian:

Big Data Analysis on the Relationship between the Organizational Career Management and Knowledge Workers' Work Involved - Take the High-Tech Enterprise as an Example. 2251-2256 - Yu Zhuang, Yu Mao, Xin Chen:

A Limited-Iteration Bisecting K-Means for Fast Clustering Large Datasets. 2257-2262 - Changqing Ji, Baofeng Wang, Shuai Tao, Junfeng Wu, Zumin Wang, Long Tang, Tiange Zu, Gui Zhao:

Inverted Voronoi-Based kNN Query Processing with MapReduce. 2263-2268 - Jiequn Wang, Lei Wang:

A Novel Solution of Data Analysis in Modern Sports Education. 2269-2272

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














