


default search action
Information Sciences, Volume 527
Volume 527, July 2020
- Roy Cerqueti

, Massimiliano Giacalone
, Raffaele Mattera
:
Skewed non-Gaussian GARCH models for cryptocurrencies volatility modelling. 1-26 - Tiago da Cruz Asmus

, Graçaliz Pereira Dimuro
, Benjamín R. C. Bedregal
, José Antonio Sanz
, Sidnei F. Pereira Jr.
, Humberto Bustince
:
General interval-valued overlap functions and interval-valued overlap indices. 27-50 - Li Guo

, Hao Yu
, Fei Hao
:
Event-triggered control for stochastic networked control systems against Denial-of-Service attacks. 51-69 - Xiangguang Dai

, Xiaojie Su, Wei Zhang, Fangzheng Xue, Huaqing Li
:
Robust Manhattan non-negative matrix factorization for image recovery and representation. 70-87 - Alshahrani Mohammed, Fuxi Zhu, Ahmed Sameh, Soufiana Mekouar

, Sheng Huang:
Efficient algorithms based on centrality measures for identification of top-K influential users in social networks. 88-107 - Jia Duan

, Jiantao Zhou, Yuanman Li:
Privacy-Preserving distributed deep learning based on secret sharing. 108-127 - Sukhendu Bera, Pravash Kumar Giri

, Dipak Kumar Jana
, Kajla Basu
, Manoranjan Maiti:
Fixed charge 4D-TP for a breakable item under hybrid random type-2 uncertain environments. 128-158 - Omar Abdel Wahab

, Robin Cohen, Jamal Bentahar
, Hadi Otrok
, Azzam Mourad
, Gaith Rjoub
:
An endorsement-based trust bootstrapping approach for newcomer cloud services. 159-175 - Changxin Gao

, Yang Chen, Jin-Gang Yu, Nong Sang
:
Pose-guided spatiotemporal alignment for video-based person Re-identification. 176-190 - Qidan Zhu, Yongchao Liu

, Guoxing Wen
:
Adaptive neural network control for time-varying state constrained nonlinear stochastic systems with input saturation. 191-209 - Tong Wu

, Guomin Yang
, Yi Mu
, Rongmao Chen, Shengmin Xu:
Privacy-enhanced remote data integrity checking with updatable timestamp. 210-226 - Hui Wang

, Wenjun Wang, Songyi Xiao, Zhihua Cui, Minyang Xu, Xinyu Zhou:
Improving artificial Bee colony algorithm using a new neighborhood selection mechanism. 227-240 - Bo Li, Xiaodong Du, Meng Chen:

Cross-language question retrieval with multi-layer representation and layer-wise adversary. 241-252 - Lei Mu

, Peng Wang
, Gang Xin:
Quantum-inspired algorithm with fitness landscape approximation in reduced dimensional spaces for numerical function optimization. 253-278 - Wen-Bo Xie

, Yan-Li Lee, Cong Wang, Duan-Bing Chen, Tao Zhou
:
Hierarchical clustering supported by reciprocal nearest neighbors. 279-292
- Jinjun Chen, Laurence T. Yang:

Special Section on Privacy Computing: Principles and Applications. 293 - Pedro Barbosa, Andrey Brito, Hyggo O. Almeida

:
Privacy by Evidence: A Methodology to develop privacy-friendly software applications. 294-310 - Chris Soo-Hyun Eom, Charles Cheolgi Lee, Wookey Lee, Carson K. Leung

:
Effective privacy preserving data publishing by vectorization. 311-328 - Kai Fan

, Qi Luo, Kuan Zhang
, Yintang Yang:
Cloud-based lightweight secure RFID mutual authentication protocol in IoT. 329-340 - Jun Feng

, Laurence T. Yang
, Nicholaus J. Gati, Xia Xie, Benard S. Gavuna:
Privacy-preserving computation in cyber-physical-social systems: A survey of the state-of-the-art and perspectives. 341-355 - Duy-Hien Vu

, The-Dung Luong
, Tu-Bao Ho:
An efficient approach for secure multi-party computation without authenticated channel. 356-368 - Liang Fang, Guozhen Shi, Lianhai Wang, Yongjun Li, Shujiang Xu

, Yunchuan Guo:
Incentive mechanism for cooperative authentication: An evolutionary game approach. 369-381 - Fatty M. Salem

, Ruhul Amin
:
A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. 382-393 - Lei Xu

, Chungen Xu
, Joseph K. Liu, Cong Zuo, Peng Zhang:
Building a dynamic searchable encrypted medical database for multi-client. 394-405 - Shaobo Zhang

, Xinjun Mao, Kim-Kwang Raymond Choo
, Tao Peng, Guojun Wang
:
A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services. 406-419 - Mahawaga Arachchige Pathum Chamikara

, Peter Bertók
, Dongxi Liu, Seyit Ahmet Çamtepe
, Ibrahim Khalil
:
Efficient privacy preservation of big data for accurate data mining. 420-443 - Fenghua Li, Xinyu Wang

, Ben Niu
, Hui Li, Chao Li, Lihua Chen:
Exploiting location-related behaviors without the GPS data on smartphones. 444-459 - Weihao Li

, Chen Li
, Yeli Geng:
APS: Attribute-aware privacy-preserving scheme in location-based services. 460-476 - Wenjuan Tang, Kuan Zhang

, Ju Ren
, Yaoxue Zhang, Xuemin (Sherman) Shen
:
Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcing. 477-492 - Rafik Hamza

, Zheng Yan
, Khan Muhammad
, Paolo Bellavista
, Faiza Titouna:
A privacy-preserving cryptosystem for IoT E-healthcare. 493-510 - Yuxiang Ma, Yulei Wu, Jun Li, Jingguo Ge:

APCN: A scalable architecture for balancing accountability and privacy in large-scale content-based networks. 511-532 - Mang Su

, Bo Zhou, Anmin Fu
, Yan Yu, Gongxuan Zhang:
PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT. 533-547 - Yushu Zhang, Jin Jiang

, Yong Xiang
, Ye Zhu
, Liangtian Wan, Xiyuan Xie:
Cloud-assisted privacy-conscious large-scale Markowitz portfolio. 548-559 - Jiafeng Hua, Guozhen Shi, Hui Zhu

, Fengwei Wang, Ximeng Liu, Hao Li:
CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud. 560-575 - Wanchun Dou, Wenda Tang

, Xiaotong Wu, Lianyong Qi, Xiaolong Xu, Xuyun Zhang, Chunhua Hu:
An insurance theory based optimal cyber-insurance contract against moral hazard. 576-589 - Chao Lin

, Debiao He
, Xinyi Huang, Xiang Xie
, Kim-Kwang Raymond Choo
:
Blockchain-based system for secure outsourcing of bilinear pairings. 590-601 - Guangchun Luo, Ke Yan

, Xu Zheng, Ling Tian, Zhipeng Cai
:
Preserving adjustable path privacy for task acquisition in Mobile Crowdsensing Systems. 602-619

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














