


default search action
KSII Transactions on Internet and Information Systems, Volume 13
Volume 13, Number 1, January 2019
- Junliang Chen, Gang Wang, Fuxiang Wang:

A Chinese Restaurant Game for Distributed Cooperative Caching in Small Cell Networks. 0 - Il-Yeup Ahn, Nak-Myoung Sung, Jae-Hyun Lim, Jeongwook Seo, Il Dong Yun:

Development of an oneM2M-compliant IoT Platform for Wearable Data Collection. 1-15 - Song Li, Shuo Li, Yanjing Sun:

Power allocation for full-duplex NOMA relaying based underlay D2D communications. 16-33 - Cao Tho Phan, Duy Duong Pham, Hoang Vu Tran, Trung Viet Tran

, Phat Nguyen Huu
:
Applying the IoT platform and green wave theory to control intelligent traffic lights system for urban areas in Vietnam. 34-51 - Yun Zhong, Peiyang Yao, Lujun Wan, Yeming Xiong:

Optimal Placement of CRNs in Manned/ Unmanned Aerial Vehicle Cooperative Engagement System. 52-68 - Lina Wang, Linlin Li, Rui Qiu:

Edge Computing-based Differential Positioning Method for BeiDou Navigation Satellite System. 69-85 - Ismail Omar Hababeh

, Anton Thabain, Sahel Alouneh
:
An Effective Multivariate Control Framework for Monitoring Cloud Systems Performance. 86-109 - Yunjia Xu, Kaizhi Huang, Xin Hu, Yi Zou, Yajun Chen, Wenyu Jiang:

CoMP Transmission for Safeguarding Dense Heterogeneous Networks with Imperfect CSI. 110-132 - Seung Chul Han, Ki Won Nam:

An Optimal Peer Selection Algorithm for Mesh-based Peer-to-Peer Networks. 133-151 - Li Li, Xiaoxiong Zhong

, Yong Jiang:
IAR-GT: An Incentive Aware Routing based on Game Theory for Selfish Opportunistic Networks. 152-171 - Jie Yang, Ehsan Mostafapour

, Amir Aminfar, Jie Wang, Hao Huang, Afsaneh Akhbari:
Channel Fading Effect Analysis on Diffusion Cooperation Strategies over Adaptive Networks. 172-185 - Yi-Kang Kim, Choong-Ho Cho, Seok-Ho Yoon, Seung-Yeon Kim:

Performance Analysis of S-SFR-based OFDMA Cellular Systems. 186-205 - Shan Lu, Jun Zhang, Xianmin Ma, Changju Kan:

Efficient Kernel Based 3-D Source Localization via Tensor Completion. 206-221 - Pengxiang Li, Yuehong Gao, Zhidu Li

, Dacheng Yang:
Pilot Sequence Assignment for Spatially Correlated Massive MIMO Circumstances. 237-253 - Kamal Al-Sabahi

, Zuping Zhang, Kang Yang:
Latent Semantic Analysis Approach for Document Summarization Based on Word Embeddings. 254-276 - Yuexia Zhang, Hang Chen, Shuang Chen, Jiacheng Jin:

Surface Centroid TOA Location Algorithm for VLC System. 277-290
- Jongmin Lee, Joohyung Lee, Jeongyeon Lim, Maro Kim:

Bandwidth-Efficient Live Virtual Reality Streaming Scheme for Reducing View Adaptation Delay. 291-304 - Benxuan Wang, Jun Kong, Min Jiang, Jianyu Shen, Tianshan Liu, Xiaofeng Gu:

Adaptive Weight Collaborative Complementary Learning for Robust Visual Tracking. 305-326 - Wenqian Dong, Song Xiao:

An Adaptive Weighted Regression and Guided Filter Hybrid Method for Hyperspectral Pansharpening. 327-346 - Rui Hao, Yan Qiang, Xiaolei Liao, Xiaofei Yan, Guo-hua Ji:

An automatic detection method for lung nodules based on multi-scale enhancement filters and 3D shape features. 347-370 - Shuai Li, Xiaoguang Fan, Yuelei Xu, Jinke Huang:

Adaptive V1-MT model for motion perception. 371-384 - Daehyeok Gwon, Haechul Choi:

Relative SATD-based Minimum Risk Bayesian Framework for Fast Intra Decision of HEVC. 385-405
- Muhammad Imran Tariq

:
Agent Based Information Security Framework for Hybrid Cloud Computing. 406-434 - Guoyong Han, Wenying Zhang, Hongluan Zhao:

An Upper Bound of the Longest Impossible Differentials of Several Block Ciphers. 435-451 - Jinhua Liu, Yunbo Rao:

Optimization-based Image Watermarking Algorithm Using a Maximum-Likelihood Decoding Scheme in the Complex Wavelet Domain. 452-472
Volume 13, Number 2, February 2019
- Shikuan Li, Zipeng Li, Xiaohu Ge

, Yonghui Li:
Uplinks Analysis and Optimization of Hybrid Vehicular Networks. 473-493 - Xucheng Zhu, Yuhua Xu, Xin Liu, Yuli Zhang, Youming Sun:

Hypergraph Game Theoretic Solutions for Load Aware Dynamic Access of Ultra-dense Small Cell Networks. 494-513 - Guolin Sun, Hisham Al-Ward

, Gordon Owusu Boateng
, Wei Jiang:
Content-Aware D2D Caching for Reducing Visiting Latency in Virtualized Cellular Networks. 514-535 - Amna Zafar, Ali Hammad Akbar, Beenish Ayesha Akram:

Inter-Process Correlation Model based Hybrid Framework for Fault Diagnosis in Wireless Sensor Networks. 536-564 - Xiaofei Di:

Achievable Rate Region Bounds and Resource Allocation for Wireless Powered Two Way Relay Networks. 565-581 - Yue Zhao, Bo Tian, Zhouguo Chen, Jin Yang, Saifei Li:

A Relay-assisted Secure Handover Mechanism for High-speed Trains. 582-596 - Jian Yang

, Chongchong Zhao, Chao Li, Chunxiao Xing
:
An Efficient Indexing Structure for Multidimensional Categorical Range Aggregation Query. 597-618 - Xiaojian He, Ximeng Chen, Kangzi Li:

A Decentralized and Non-reversible Traceability System for Storing Commodity Data. 619-634 - Hongbing Huang, Junyi Liu, Yi Zhang, Qing Cai, Bowei Zhang, Fengwen Jiang:

Degrees of Freedom of Multi-Cell MIMO Interference Broadcast Channels With Distributed Base Stations. 635-656 - Tingping Zhang, Shangang Fan, Yunyi Li

, Guan Gui, Yimu Ji:
Tucker Modeling based Kronecker Constrained Block Sparse Algorithm. 657-667 - Almetwally M. Mostafa

, Ahmed E. Youssef
, Yazeed Ali Aljarbua:
Bidirectional Chain Replication for Higher Throughput Provision. 668-685 - José Márquez, Ismael Gutiérrez, Sebastián Valle, Melanis Falco:

Packet Output and Input Configuration in a Multicasting Session Using Network Coding. 686-710 - Qian Zeng, Wei Huangfu, Tong Liu:

Power Allocation and Mode Selection in Unmanned Aerial Vehicle Relay Based Wireless Networks. 711-732 - Piyawad Kasabai, Karim Djemame

, Somnuk Puangpronpitag
:
Priority-based Scheduling Policy for OpenFlow Control Plane. 733-750
- Minhaz Uddin Ahmed

, Kim Yeong Hyeon, Kim Jin Woo, Md. Rezaul Bashar, Phill-Kyu Rhee:
Two person Interaction Recognition Based on Effective Hybrid Learning. 751-770 - Jun Kong, Jinhua Sun, Min Jiang, Jian Hou:

A Novel Text Sample Selection Model for Scene Text Detection via Bootstrap Learning. 771-789 - Jae-Yung Lee, Sung-Jun Yoon, Jae-Gon Kim, Jong-Ki Han

:
Weighted DCT-IF for Image up Scaling. 790-809 - Xia Li, Guanming Lu, Jingjie Yan, Haibo Li, Zhengyan Zhang, Ning Sun, Shipeng Xie:

Incomplete Cholesky Decomposition based Kernel Cross Modal Factor Analysis for Audiovisual Continuous Dimensional Emotion Recognition. 810-831 - Lijun Li, Shuling Dai:

Action Recognition with deep network features and dimension reduction. 832-854 - Hancheng Yu, Wenkai Wang, Wenshi Fan:

An Adaptive Iterative Algorithm for Motion Deblurring Based on Salient Intensity Prior. 855-870 - Xianyou Zeng, Long Xu, Shaohai Hu, Ruizhen Zhao, Wanli Feng:

Object Tracking Based on Weighted Local Sub-space Reconstruction Error. 871-891 - Zahid Ali, Unsang Park:

Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor. 892-911 - Wong Pei Voon

, Norwati Mustapha, Lilly Suriani Affendey, Fatimah Khalid
:
Collective Interaction Filtering Approach for Detection of Group in Diverse Crowded Scenes. 912-928 - Muhammad Alhammami

, Samir Marwan Hammami
, Chee-Pun Ooi
, Wooi-Haw Tan
:
Optimised ML-based System Model for Adult-Child Actions Recognition. 929-944 - Weixia Liu, Jinmei Hu, Zuoyong Li, Zuchang Zhang, Zhongli Ma, Daoqiang Zhang:

Tongue Image Segmentation via Thresholding and Gray Projection. 945-961 - Hyungwoo Park

:
Signal Enhancement of a Variable Rate Vocoder with a Hybrid domain SNR Estimator. 962-977
- Shuming Qiu

, Guosheng Xu, Haseeb Ahmad
, Guoai Xu, Xinping Qiu, Hong Xu:
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography. 978-1002 - Jiangshan Chen

, Yupu Hu, Wen Gao, Hong-Liang Li:
Lattice-based Threshold Ring Signature with Message Block Sharing. 1003-1019 - Chih-Wei Shiu

, Yu-Chi Chen
, Wien Hong:
Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy. 1020-1042 - Jining Zhao, Chunxiang Xu, Kefei Chen:

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing. 1043-1063 - Ge Jiao, Xiaojiang Peng, Kaiwen Duan:

Image Encryption with The Cross Diffusion of Two Chaotic Maps. 1064-1079 - Chun-Xing Wang, Meiling Xu, Wenbo Wan, Jian Wang, Lili Meng, Jing Li, Jiande Sun:

Robust Image Watermarking via Perceptual Structural Regularity-based JND Model. 1080-1099 - Mu Han, Yunwen Wang, Shidian Ma, Ailan Wan, Shuai Liu:

Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code. 1100-1123
Volume 13, Number 3, March 2019
- Shenji Luan, Jianrong Bao, Chao Liu, Jie Li, Deqing Zhu:

Power Saving Scheme by Distinguishing Traffic Patterns for Event-Driven IoT Applications. 1123-1140 - Linh Manh Pham

, Truong-Thang Nguyen:
Flexible deployment of component-based distributed applications on the Cloud and beyond. 1141-1163 - Shuaibing Lu, Zhiyi Fang, Jie Wu:

High-revenue Online Provisioning for Virtual Clusters in Multi-tenant Cloud Data Center Network. 1164-1183 - Yonghee Kim

, Youngju Park, Gwangsuk Song:
Interpretive Structural Modeling in the Adoption of IoT Services. 1184-1198 - Qi Zhao, Wei Qiu, Boxue Zhang, Bingqian Wang:

Quickest Spectrum Sensing Approaches for Wideband Cognitive Radio Based On STFT and CS. 1199-1212 - Mohammad Syfullah, Joanne Mun-Yee Lim, Fei Lu Siaw

:
Mobility-Based Clustering Algorithm for Multimedia Broadcasting over IEEE 802.11p-LTE-enabled VANET. 1213-1237 - Zhihong Chen, Hai Lin, Lusheng Wang, Bo Zhao:

Interference-free Clustering Protocol for Large-Scale and Dense Wireless Sensor Networks. 1238-1259 - Dawei Yan, Peng You, Cong Liu, Shaowei Yong, Dongfang Guan:

Constellation Multi-Objective Optimization Design Based on QoS and Network Stability in LEO Satellite Broadband Networks. 1260-1283 - Kyu-Seok Shim, Young-Hoon Goo, Dongcheul Lee, Myung-Sup Kim:

Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet Applications. 1284-1297 - Baolin Sun, Chao Gui, Ying Song, Hua Chen:

Network Coding-based Maximum Lifetime Algorithm for Sliding Window in WSNs. 1298-1310 - Hui Dun

, Fang Ye, Shuhong Jiao:
Power Allocation for Half-duplex Relay-based D2D Communication with QoS guarantee. 1311-1324 - Xiaoge Huang, Dongyu Zhang, Weipeng Dai, She Tang:

Energy-Efficiency of Distributed Antenna Systems Relying on Resource Allocation. 1325-1344 - Liangrui Tang, Yaomu Tan:

Adaptive Queue Management Based On the Change Trend of Queue Size. 1345-1362 - Abbas MoshrefRazavi, Mohd Hairul Nizam Md. Nasir, Norizan Binti Mohd. Yasin, Rodina Ahmad:

Cultural Issues in Offshore Teams: A Categorization based on Existing Studies. 1363-1384 - Jianhua Wang, Yubin Lan

, Shilei Lu, Lianglun Cheng:
An Efficient Complex Event Processing Algorithm based on Multipattern Sharing for Massive Manufacturing Event Streams. 1385-1402
- Zhikai Zong, Aili Han, Qing Gong:

Semi-supervised Cross-media Feature Learning via Efficient L2, q Norm. 1403-1417 - Yiyu Hong, Jongweon Kim:

3D Mesh Model Exterior Salient Part Segmentation Using Prominent Feature Points and Marching Plane. 1418-1433 - Yikun Zhang

, Rui Yao, Qingnan Jiang, Changbin Zhang, Shi Wang:
Video Object Segmentation with Weakly Temporal Information. 1434-1449 - Hao Nan, Min Li, Lvyuan Fan, Minglei Tong:

3D Res-Inception Network Transfer Learning for Multiple Label Crowd Behavior Recognition. 1450-1463 - Xin Wang, Lingling Xu, Chen Ning:

Multi-feature local sparse representation for infrared pedestrian tracking. 1464-1480
- Haotian Wang, Zhi-gang Chen, Jia Wu

, Leilei Wang:
Node Incentive Mechanism in Selfish Opportunistic Network. 1481-1501 - Yang Lu, Jiguo Li:

A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model. 1502-1522 - Liqing Chen, Jiguo Li, Yichen Zhang:

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service. 1523-1545 - An Braeken

:
Pairing Free Certificate Based Signcryption Schemes Using ECQV Implicit Certificates. 1546-1565 - LiPing Liu, Linlin Ci, Wei Liu, Hui Yang:

Identifying SDC-Causing Instructions Based on Random Forests Algorithm. 1566-1582
- Geunseok Yang, Kyeongsic Min, Jung-Won Lee, Byungjeong Lee:

Applying Topic Modeling and Similarity for Predicting Bug Severity in Cross Projects. 1583-1598 - Dae-Young Kim

, Seokhoon Kim
:
Gateway Channel Hopping to Improve Transmission Efficiency in Long-range IoT Networks. 1599-1610 - SeulKi Choi, TaeJin Lee, Jin Kwak

:
A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments. 1611-1625 - Ha Sung Hwnag:

Why Social Comparison on Instagram Matters: Its impact on Depression. 1626-1638 - Sangwon Hwang, Jang-Eui Hong, Young-Kwang Nam:

Towards Effective Entity Extraction of Scientific Documents using Discriminative Linguistic Features. 1639-1658 - Heeyoul Kim:

A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service. 1659-1673 - Tae Uk Chang, Young-Su Ryu, Seulki Song, Ki-Won Kwon, Jong-Ho Paik:

Design and Implementation of Distributed Charge Signal Processing Software for Smart Slow and Quick Electric Vehicle Charge. 1674-1688 - Giseok Choe, Seungbin Lee, Jongho Nang:

CNN-based Visual/Auditory Feature Fusion Method with Frame Selection for Classifying Video Events. 1689-1701 - Kwanghoon Pio Kim

:
An XPDL-Based Workflow Control-Structure and Data-Sequence Analyzer. 1702-1721 - Junhyoung Oh, Tae Ho Kim, Kyung Ho Lee:

Advanced insider threat detection model to apply periodic work atmosphere. 1722-1737
Volume 13, Number 4, April 2019
- Ruihui Mu, Xiaoqin Zeng:

A Review of Deep Learning Research. 1738-1764 - Milad Taleby Ahvanooey

, Qianmu Li, Ming Wu, Shuo Wang:
A Survey of Genetic Programming and Its Applications. 1765-1794 - Guang Han, Jinpeng Su, Chengwei Zhang:

A method based on Multi-Convolution layers Joint and Generative Adversarial Networks for Vehicle Detection. 1795-1811 - Shengwei Lin, Ziqiang Ying, Kan Zheng

:
Design and Implementation of Location and Activity Monitoring System Based on LoRa. 1812-1824 - Sihyung Lee

:
Detection of Political Manipulation through Unsupervised Learning. 1825-1844 - Yuze Su, Xiangru Meng, Zhiyuan Zhao, Zhentao Li:

Cognitive Virtual Network Embedding Algorithm Based on Weighted Relative Entropy. 1845-1865 - Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:

Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices. 1866-1883 - Liqun Zhao, Hongpeng Wang, Xiaoxiong Zhong

:
Interference-Aware Channel Assignment Algorithm in D2D overlaying Cellular Networks. 1884-1903 - Boyang Huang, Zhengmin Kong, Yanjun Fang, Xin Jin:

A Cooperative Jamming Based Joint Transceiver Design for Secure Communications in MIMO Interference Channels. 1904-1921 - Junghwan Kim, Myeong-Cheol Ko, Moon Sun Shin, Jinsoo Kim:

IMT: A Memory-Efficient and Fast Updatable IP Lookup Architecture Using an Indexed Multibit Trie. 1922-1940 - Qian Zeng, Zhongshan Zhang:

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle. 1941-1960 - Guo Li, Feng-Kui Gong, Xiang Chen:

Harmonic-Mean-Based Dual-Antenna Selection with Distributed Concatenated Alamouti Codes in Two-Way Relaying Networks. 1961-1974 - Fan Zhang, Jing Bai, Xiaoyu Li, Changxing Pei, Vincent Havyarimana:

An Ensemble Cascading Extremely Randomized Trees Framework for Short-Term Traffic Flow Prediction. 1975-1988
- Jiaquan Shen

, Ningzhong Liu, Han Sun, Xiaoli Tao, Qiangyi Li
:
Vehicle Detection in Aerial Images Based on Hyper Feature Map in Deep Convolutional Network. 1989-2011 - Li Zhang, Jingdun Jia, Yue Li, Wanlin Gao, Minjuan Wang:

Deep Learning based Rapid Diagnosis System for Identifying Tomato Nutrition Disorders. 2012-2027 - Yangyang Li, Guiling Sun, Zhouzhou Li, Tianyu Geng:

An Efficient Model Based on Smoothed ℓ0 Norm for Sparse Signal Reconstruction. 2028-2041 - Shiguang Liu, Guoguang Hua, Yang Li:

2.5D human pose estimation for shadow puppet animation. 2042-2059 - Joo-Chang Kim, Kyungyong Chung:

Prediction Model of User Physical Activity using Data Characteristics-based Long Short-term Memory Recurrent Neural Networks. 2060-2077 - Feiniu Yuan, Tiantian Tang, Xue Xia, Jinting Shi, Shuying Li:

Dual-Encoded Features from Both Spatial and Curvelet Domains for Image Smoke Recognition. 2078-2093 - Yingping Huang, Chao Ju, Xing Hu, Wenyan Ci:

An Anti-occlusion and Scale Adaptive Kernel Correlation Filter for Visual Object Tracking. 2094-2112 - Sanli Yi, Guifang Zhang, Jianfeng He, Lirong Tong:

Entropic Image Thresholding Segmentation Based on Gabor Histogram. 2113-2128 - Arbia Soula, Salma Ben Said, Riadh Ksantini, Zied Lachiri:

An Adaptive Face Recognition System Based on a Novel Incremental Kernel Nonparametric Discriminant Analysis. 2129-2147 - Eui-Ju Heo, Sung-Jin Ahn, Kang-Sun Choi:

Real-Time Cattle Action Recognition for Estrus Detection. 2148-2161 - Shahid Hussain, Muhammad Rafiq Mufti, Mohammad Khalid Sohail, Humaira Afzal, Ghufran Ahmad

, Arif Ali Khan
:
A Step towards the Improvement in the Performance of Text Classification. 2162-2179
- Tieming Chen

, Qingyu Mao, Mingqi Lv, Hongbing Cheng, Yinglong Li:
DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network. 2180-2197 - Kuan Fan, Mingxi Liu, Wenbo Shi:

Improving efficiency of remote data audit for cloud storage. 2198-2222 - Jianpo Li

, Dong Wang:
The Security DV-Hop Algorithm against Multiple-Wormhole-Node-Link in WSN. 2223-2242
Volume 13, Number 5, May 2019
- Wenrong Gong, Lihua Pang, Jing Wang, Meng Xia:

PSO-based Resource Allocation in Software-Defined Heterogeneous Cellular Networks. 2243-2257 - Guolin Sun, Timothy Dingana, Sebakara Samuel Rene Adolphe, Gordon Owusu Boateng

:
Cross-Talk: D2D Potentiality Based Resource Borrowing Schema for Ultra-Low Latency Transmission in Cellular Network. 2258-2276 - Cunling Bian

, Deliang Wang
, Shi-Yu Liu, Weigang Lu, Jun-Yu Dong:
Adaptive Learning Path Recommendation based on Graph Theory and an Improved Immune Algorithm. 2277-2298 - Yuan Feng, Qinsiwei Yan, Po-Hsuan Tseng

, Ganlin Hao, Nan Wu:
Distributed Target Localization with Inaccurate Collaborative Sensors in Multipath Environments. 2299-2318 - Liying Zhang, Gang Wang, Fuxiang Wang:

A Bankruptcy Game for Optimize Caching Resource Allocation in Small Cell Networks. 2319-2337 - Hussain Saajid, Di Wu, Sheeba Memon, Naadiya Khuda Bux:

ST Reliability and Connectivity of VANETs for Different Mobility Environments. 2338-2356 - Parfait I. Tebe, Guangjun Wen, Jian Li, Yongjun Huang, Affum E. Ampoma, Kwame Oteng Gyasi:

Massive MIMO with Transceiver Hardware Impairments: Performance Analysis and Phase Noise Error Minimization. 2357-2380 - Jianli Zhao

, Zhengbin Fu, Qiuxia Sun, Sheng Fang, Wenmin Wu, Yang Zhang, Wei Wang
:
MFMAP: Learning to Maximize MAP with Matrix Factorization for Implicit Feedback in Recommender System. 2381-2399 - Yuming Song, Xueyun He, Guan Gui, Yan Liang:

Novel Adaptive Distributed Compressed Sensing Algorithm for Estimating Channels in Doubly-Selective Fading OFDM Systems. 2400-2413 - Yang Yang, Yuchen Zhang, Yuehai Wang, Danian Liu:

Design of 3D Laser Radar Based on Laser Triangulation. 2414-2433 - Zhipeng Liu, Lichun Li, Huiqi Li, Chang Liu:

Effective Separation Method for Single-Channel Time-Frequency Overlapped Signals Based on Improved Empirical Wavelet Transform. 2434-2453 - Yankui Zhang, Haiyun Xu, Bin Ba, Rong Zong, Daming Wang, Xiangzhi Li:

Direct Position Determination of Coherently Distributed Sources based on Compressed Sensing with a Moving Nested Array. 2454-2468 - Xingjuan Cai, Youqiang Sun, Zhihua Cui, Wensheng Zhang, Jinjun Chen:

Optimal LEACH Protocol with Improved Bat Algorithm in Wireless Sensor Networks. 2469-2490 - Alice Kyoungran Ma, Takhun Kim, Jongchang Ahn:

A Study on the Media Consumers' Behavior Related to Online Communications: Behavioral Economics Perspective. 2491-2508
- Soungsill Park, Hyoseok Yoon, Se-Ho Park:

Multi-Style License Plate Recognition System using K-Nearest Neighbors. 2509-2528 - Qiaoyue Li, Leida Li

, Zhaolin Lu, Yu Zhou, Hancheng Zhu:
No-reference Sharpness Index for Scanning Electron Microscopy Images Based on Dark Channel Prior. 2529-2543 - Namgi Kim, Byoung-Dai Lee:

Analysis and Improvement of MPEG-DASH-based Internet Live Broadcasting Services in Real-world Environments. 2544-2557 - Heekyung Yang, Kyungha Min:

A Deep Approach for Classifying Artistic Media from Artworks. 2558-2573 - Ali Khalfa, Nourredine Amardjia, Elhadi Kenane, Djamel Chikouche, Abdelouahab Attia

:
Blind Audio Source Separation Based On High Exploration Particle Swarm Optimization. 2574-2587
- Canghong Shi

, Hongxia Wang, Yi Hu, Qing Qian, Hong Zhao:
A Speech Homomorphic Encryption Scheme with Less Data Expansion in Cloud Computing. 2588-2609 - Dongsik Sohn, TaeJin Lee, Jin Kwak:

On-line Shared Platform Evaluation Framework for Advanced Persistent Threats. 2610-2628 - Xinxia Song, Zhigang Chen

:
A General Design Method of Constructing Fully Homomorphic Encryption with Ciphertext Matrix. 2629-2650 - Giang-Truong Nguyen, Van-Quyet Nguyen, Sinh-Ngoc Nguyen, Kyungbaek Kim

:
Traffic Seasonality aware Threshold Adjustment for Effective Source-side DoS Attack Detection. 2651-2673 - Mengli Zhang, Qihui Zhang, Wenfen Liu, Xuexian Hu, Jianghong Wei:

TG-SPSR: A Systematic Targeted Password Attacking Model. 2674-2697 - Arindom Mondal, Kazi Md. Rokibul Alam, G. G. Md. Nawaz Ali, Peter Han Joo Chong

, Yasuhiko Morimoto:
A Multi-Stage Encryption Technique to Enhance the Secrecy of Image. 2698-2717 - Jianhua Wang, Zhiyuan Zhao, Lei Sun, Zhiqiang Zhu:

Secure and Efficient Conjunctive Keyword Search Scheme without Secure Channel. 2718-2731 - Xin Xiao, Ruirui Zhang:

A Danger Theory Inspired Protection Approach for Hierarchical Wireless Sensor Networks. 2732-2753 - Mang Su, Liangchen Wang:

PreBAC: a novel Access Control scheme based Proxy Re-Encryption for cloud computing. 2754-2767 - Hongjian Yin, Leyou Zhang

, Yilei Cui:
Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. 2768-2780
Volume 13, Number 6, June 2019
- Mehmet Tastan:

Internet of Things based Smart Energy Management for Smart Home. 2781-2798 - Hyun-Jin Cha, Taejung Park:

Applying and Evaluating Visualization Design Guidelines for a MOOC Dashboard to Facilitate Self-Regulated Learning Based on Learning Analytics. 2799-2823 - Yao Sun, Lun Meng, Yunkui Song:

AutoScale: Adaptive QoS-Aware Container-based Cloud Applications Scheduling Framework. 2824-2837 - Bin Qiu, Hailin Xiao:

A Non-Stationary Geometry-Based Cooperative Scattering Channel Model for MIMO Vehicle-to-Vehicle Communication Systems. 2838-2858 - Lijing Jiang, Rongfang Song:

Best-Effort Interference Alignment for K Users Quasi-Static MIMO Interference Channels. 2859-2872 - Bing Ning, Aihua Zhang, Wanming Hao, Jianjun Li, Shouyi Yang:

Energy Efficiency Optimization for multiuser OFDM-based Cognitive Heterogeneous networks. 2873-2892 - Yukang Jiang, Aihuang Guo, Jinbai Zou, Bo Ai:

A Neoteric Three-Dimensional Geometry-Based Stochastic Model for Massive MIMO Fading Channels in Subway Tunnels. 2890-2907 - Guang Li, Tianyun Li:

A low-complexity PAPR reduction SLM scheme for STBC MIMO-OFDM systems based on constellation extension. 2908-2924 - Zhili Chen, Chunjiang Zhao, Huarui Wu, Yisheng Miao:

A Water-saving Irrigation Decision-making Model for Greenhouse Tomatoes based on Genetic Optimization T-S Fuzzy Neural Network. 2925-2948 - Junwei Bao, Dazhuan Xu, Hao Luo, Ruidan Zhang:

Design and Optimization for Distributed Compress-and-Forward System based on Multi-Relay Network. 2949-2963 - Jacques Mbous, Tao Jiang, Ming Tang, Songnian Fu, Deming Liu:

Kalman Filtering-based Traffic Prediction for Software Defined Intra-data Center Networks. 2964-2985 - Yihong Lu, Ruizhi Huang, Decai Huang:

Mining Highly Reliable Dense Subgraphs from Uncertain Graphs. 2986-2999 - Yu Song, Wangdong Qi, Wenchi Cheng:

Adaptive Range-Based Collision Avoidance MAC Protocol in Wireless Full-duplex Ad Hoc Networks. 3000-3022 - Alice Kyoungran Ma, Jongchang Ahn:

The Correlation between Online Comments before Broadcasting and Television Content Viewers' Behavior Pattern: The Anchoring Effect Perspective. 3023-3036
- Xiaoying Shi, Yang Wang, Fanshun Lv, Xiaohang Yang, Qiming Fang, Li Zhang:

Multi-scale and Interactive Visual Analysis of Public Bicycle System. 3037-3054 - Tong Wu, Kangfeng Zheng, Chunhua Wu, Xiujuan Wang:

User Identification Using Real Environmental Human Computer Interaction Behavior. 3055-3073 - Hyeon Seok Yang, Jong Min Lee, Woojin Jeong, Seung-Hee Kim, Sun-Joong Kim, Young Shik Moon:

Improved Quality Keyframe Selection Method for HD Video. 3074-3091 - Woojin Jeong, Bok Gyu Han, Hyeon Seok Yang, Young Shik Moon:

Real-Time Visible-Infrared Image Fusion using Multi-Guided Filter. 3092-3107 - Li Cui, Euee S. Jang:

Palette-based Color Attribute Compression for Point Cloud Data. 3108-3120 - Jun Kong, Jian Hou, Min Jiang, Jinhua Sun:

A Novel Image Segmentation Method Based on Improved Intuitionistic Fuzzy C-Means Clustering Algorithm. 3121-3143 - Mahmood Ul Haq

, Aamir Shahzad, Zahid Mahmood
, Ayaz Ali Shah:
Boosting the Face Recognition Performance of Ensemble Based LDA for Pose, Non-uniform Illuminations, and Low-Resolution Images. 3144-3164 - Mengmeng Zhang, Jing Zhang, Zhi Liu, Fuqi Mao, Wen Yue:

Fast Algorithm for 360-degree Videos Based on the Prediction of Cu Depth Range and Fast Mode Decision. 3165-3181 - Yali Nie

, Jaehwan Lee, Sook Yoon, Dong Sun Park
:
A Multi-Stage Convolution Machine with Scaling and Dilation for Human Pose Estimation. 3182-3198
- Mulugeta Kassaw Tefera

, Xiaolong Yang, Qifu Tyler Sun:
A Survey of System Architectures, Privacy Preservation, and Main Research Challenges on Location-Based Services. 3199-3218 - Shahin Fatima

, Shish Ahmad
:
An Exhaustive Review on Security Issues in Cloud Computing. 3219-3237 - Won-Bin Kim, Im-Yeong Lee:

Secure and Efficient Storage of Video Data in a CCTV Environment. 3238-3257 - Aaron Zimba

, Zhaoshun Wang, Hongsong Chen, Mwenge Mulenga:
Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks. 3258-3279 - Xiaojun Zhang, Liming Mu, Jie Zhao, Chunxiang Xu:

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks. 3280-3298 - Chunhua Jin, Guanhua Chen, Jianyang Zhao, Shangbing Gao, Changhui Yu:

Identity-based Deniable Authenticated Encryption for E-voting Systems. 3299-3315 - Geontae Noh, Ik Rae Jeong:

Transitive Signature Schemes for Undirected Graphs from Lattices. 3316-3332
Volume 13, Number 7, July 2019
- Chen Han

, Yingtao Niu:
Multi-regional Anti-jamming Communication Scheme Based on Transfer Learning and Q Learning. 3333-3350 - Shu-Ching Wang, Ya-Jung Lin, Kuo-Qin Yan:

Reaching Byzantine Agreement underlying VANET. 3351-3368 - Muhammad Tahir Abbas, Wang-Cheol Song:

THERA: Two-level Hierarchical Hybrid Road-Aware Routing for Vehicular Networks. 3369-3385 - Navmani T. M, Yogesh P:

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks. 3386-3411 - Xianzhong Tian, Jiacun He, Yuzhe Chen, Yanjun Li:

Joint Optimization of Mobile Charging and Data Gathering for Wireless Rechargeable Sensor Networks. 3412-3432 - Chi Wei, Hua Peng, Junhui Fan:

Single-channel Demodulation Algorithm for Non-cooperative PCMA Signals Based on Neural Network. 3433-3446 - Fan Wang, Suoping Li

, Zufang Dou, Shexiang Hai:
Performance Analysis of a Novel Distributed C-ARQ Scheme for IEEE 802.11 Wireless Networks. 3447-3469 - Ernesto Carrillo, Victor Ramos:

Adaptive Wireless Network Coding for Infrastructure Wireless Mesh Networks. 3470-3493 - Ravuri Daniel

, Kuda Nageswara Rao
:
MCRO-ECP: Mutation Chemical Reaction Optimization based Energy Efficient Clustering Protocol for Wireless Sensor Networks. 3494-3510 - Xiaobin Song, Zehui Wu, Yan Cao, Qiang Wei:

ER-Fuzz:Conditional Code Removed Fuzzing. 3511-3532 - Khaled Saleh Maabreh:

An Enhanced University Registration Model Using Distributed Database Schema. 3533-3549 - Young Soo Kim, Bong Gyou Lee, Kyeongmin Song:

A Practical Measurement Method of the Occupied Bandwidth for 8-VSB DTV Signal Using Modified ACPR. 3550-3565 - Fei Xue, Hengliang Tang, Qinghua Su, Tao Li:

Task Allocation of Intelligent Warehouse Picking System based on Multi-robot Coalition. 3566-3582 - Jing Wang, Shuxia Wang, Tiantian Wang, Xuefei Zhang:

Minimum Bandwidth Regenerating Codes Based on Cyclic VFR Codes. 3583-3598
- Sheeraz Arif

, Jing Wang, Zesong Fei, Fida Hussain
:
Video Representation via Fusion of Static and Motion Features Applied to Human Activity Recognition. 3599-3619 - Xiaole Ma, Shaohai Hu, Dongsheng Yang:

SAR Image De-noising Based on Residual Image Fusion and Sparse Representation. 3620-3637 - Si Jung Kim, Kichol Lee, Yeonjeong Park:

Balancing Fun and Learning through a User Interface: A Case Study of Wii Game. 3638-3653
- Shiqi Luo, Ni Bo, Jiang Ping, Shengwei Tian, Long Yu

, Wang Rui-jin:
Deep Learning in Drebin: Android malware Image Texture Median Filter Analysis and Detection. 3654-3670 - Meigen Huang, Bin Yu:

FuzzyGuard: A DDoS attack prevention extension in software-defined wireless sensor networks. 3671-3689 - Xiaogang Wang, Weiren Shi, Dan Liu:

A Group Key Management Scheme for WSN Based on Lagrange Interpolation Polynomial Characteristic. 3690-3713 - Qiuhua Wang, Xiaoqin Ouyang, Jiacheng Zhan:

A Classification Algorithm Based on Data Clustering and Data Reduction for Intrusion Detection System over Big Data. 3714-3732 - Bin Lian, Gongliang Chen, Jialin Cui, Dake He:

Compact E-Cash with Practical and Complete Tracing. 3733-3755 - Hamad Naeem

, Bing Guo, Farhan Ullah
, Muhammad Rashid Naeem
:
A Cross-Platform Malware Variant Classification based on Image Representation. 3756-3777 - Danish Shehzad

, Tamer Dag
:
LSB Image Steganography Based on Blocks Matrix Determinant Method. 3778-3793 - Abhishek Majumdar

, Arpita Biswas, Krishna Lal Baishnab, Sandeep K. Sood
:
DNA Based Cloud Storage Security Framework Using Fuzzy Decision Making Technique. 3794-3820
Volume 13, Number 8, August 2019
- Guolin Sun, Gordon Owusu Boateng

, Hu Huang, Wei Jiang:
A Reinforcement Learning Framework for Autonomous Cell Activation and Customized Energy-Efficient Resource Allocation in C-RANs. 3821-3841 - Abdul Waheed, Xiaoming Miao, Salma Waheed, Naveed Ahmad

:
The ROLE OF SOCIAL NETWORKING SITES IN EFFECTIVE E-RECRUITMEN; A STUDY OF TELECOM SECTOR IN CONTEXT OF PAKISTAN. 3842-3861 - Xue Lv, Zekun Wang:

An Improved RF Detection Algorithm Using EMD-based WT. 3862-3879 - Sang-Hyun Hyun, Geon Kim, Dongmin Yang:

PD-DESYNC: Practical and Deterministic Desynchronization in Wireless Sensor Networks. 3880-3899 - GeonYeong Heo, Joon Yoo:

Reducing the Flow Completion Time for Multipath TCP. 3900-3916
- Chunming Wu, Meng Wang, Lang Gao

, Weijing Song, Tian Tian, Kim-Kwang Raymond Choo:
Convolutional Neural Network with Expert Knowledge for Hyperspectral Remote Sensing Imagery Classification. 3917-3941 - Zhensong Wei, Huihui Bai, Yao Zhao:

Stage-GAN with Semantic Maps for Large-scale Image Super-resolution. 3942-3961 - Yuhua Ding, Fan Liu, Ting Rui, Zhenmin Tang

:
Patch based Semi-supervised Linear Regression for Face Recognition. 3962-3980 - Md. Abu Layek

, TaeChoong Chung, Eui-Nam Huh:
Remote Distance Measurement from a Single Image by Automatic Detection and Perspective Correction. 3981-4004 - Salam Abdul-Nabi Thajeel

, Ali Shakir Mahmood
, Waleed Rasheed Humood, Ghazali Sulong:
Detection Copy-Move Forgery in Image Via Quaternion Polar Harmonic Transforms. 4005-4025 - Zhijin Liu, Kai Li, Liquan Shen, Ran Ma, Ping An:

Spatio-Temporal Residual Networks for Slide Transition Detection in Lecture Videos. 4026-4040
- Ali M. Allam:

GROUP SECRET KEY GENERATION FOR 5G Networks. 4041-4059 - Tairong Shi, Jie Guan:

Cryptanalysis of the Authentication in ACORN. 4060-4075 - Asma Salem, Ahmad Abdel-Aziz Sharieh, Azzam Sleit

, Riad Jabri:
Enhanced Authentication System Performance Based on Keystroke Dynamics using Classification algorithms. 4076-4092
- Jusik Yun, Yunyeong Goh, Jong-Moon Chung, OkSeok Kim, SangWoo Shin, Jin Choi, Yoora Kim:

MMOG User Participation Based Decentralized Consensus Scheme and Proof of Participation Analysis on the Bryllite Blockchain System. 4093-4107 - Dinh-Lam Pham

, Hyun Ahn, Kwanghoon Pio Kim
:
Discovering Redo-Activities and Performers' Involvements from XES-Formatted Workflow Process Enactment Event Logs. 4108-4122 - KyungDeuk Kim, SuRak Son, YiNa Jeong, ByungKwan Lee:

A Deep Learning Part-diagnosis Platform(DLPP) based on an In-vehicle On-board gateway for an Autonomous Vehicle. 4123-4141 - Nam-Gyu Kim, Noo Ri On, Myoung-Ju Koh, Jong-Suk Ruth Lee, Keun-Tae Cho:

Composite Measures of Supercomputer Technology. 4142-4159 - Hyun-Sik Kim, Yong-Suk Park:

Object Dimension Estimation for Remote Visual Inspection in Borescope Systems. 4160-4173 - DongYeop Kim, Byungjeong Lee, Jung-Won Lee:

Building a Rule-Based Goal-Model from the IEC 62304 Standard for Medical Device Software. 4174-4190 - Nazakat Ali, Sangwon Hwang, Jang-Eui Hong:

Your Opinions Let us Know: Mining Social Network Sites to Evolve Software Product Lines. 4191-4211 - SongYeon Lee, JongHo Paik:

An Asynchronous-Driven Node.js Based Intermediary-free Direct Deal Distribution Platform Converged with Cloud Service. 4212-4226 - Min-Joon Kim

, Sung-Hun Chae, Young-Bo Shim, Dong-Hyun Lee, Myung-Jin Kim, Yeon-Kug Moon, Kon-Woo Kwon:
Design and Implementation of Magnetic Induction based Wireless Underground Communication System Supporting Distance Measurement. 4227-4240 - Cho Hee Lee, Eun Bin Kim, Onseok Lee, Eun Young Kim:

Development of the Korean Handwriting Assessment for Children Using Digital Image Processing. 4241-4254 - Seungjin Hong, Sookyun Kim

, Shinjin Kang:
Game Sprite Generator Using a Multi Discriminator GAN. 4255-4269 - KangYoon Lee:

Reference Model and Architecture of Interactive Cognitive Health Advisor based on Evolutional Cyber-physical Systems. 4270-4284 - Sangheon Lee, Noo-Ri Kim, YoungWha Cho, Jae-Young Choi, Suntae Kim, Jeong-Ah Kim, Jee-Hyong Lee:

Adversarial Detection with Gaussian Process Regression-based Detector. 4285-4299 - Sung-Woo Byun, Seok-Pil Lee:

Stochastic Non-linear Hashing for Near-Duplicate Video Retrieval using Deep Feature applicable to Large-scale Datasets. 4300-4314 - Sungsoo Choi, Seongwoo Yun:

Effects of Job Satisfaction on Quality of Life for 119 Paramedics. 4315-4328
Volume 13, Number 9, September 2019
- Li Liu, Yuanyuan Du, Qi Fan:

A Constrained Multi-objective Computation Offloading Algorithm in the Mobile Cloud Computing Environment. 4329-4348 - Jianmin Li:

Resource management for moldable parallel tasks supporting slot time in the Cloud. 4349-4371 - Kewen Huang, Yimin Liu, Yuanquan Hong, Junsheng Mu:

Complexity based Sensing Strategy for Spectrum Sensing in Cognitive Radio Networks. 4372-4389 - Amrita Ruperee

, Shikha Nema:
Time Shifted Pilot Signal Transmission With Pilot Hopping To Improve The Uplink Performance of Massive MIMO System For Next Generation Network. 4390-4407 - Fazli Subhan

, Shakeel Ahmed, Sajjad Haider, Sajid Saleem, Asfandyar Khan, Salman Ahmed
, Muhammad Numan:
Hybrid Indoor Position Estimation using K-NN and MinMax. 4408-4428 - Armaghan Darbandi, Myung Kyun Kim:

Path Collision-aware Real-time Link Scheduling for TSCH Wireless Networks. 4429-4445 - Yinghua Zhang, Lei Wang, Jian Liu, Yunfeng Peng:

Interference Cancellation Scheme for Three-hop Cooperative Relay Networks. 4446-4462 - Murat Okkalioglu, Cihan Kaleli:

Deriving ratings from a private P2P collaborative scheme. 4463-4483 - Xin Shi

, Dan Wu, Meng Wang, Lianxin Yang, Yan Wu:
MDS Coded Caching for Device-to-Device Content Sharing Against Eavesdropping. 4484-4501 - Yang Zhang, Xiangmo Zhao, Jun Hou, Yisheng An:

IEM-based Tone Injection for Peak-to-Average Power Ratio Reduction of Multi-carrier Modulation. 4502-4517 - Sangwoo Hahm, Hyungwoo Park

:
Drowsiness Driving Prevention System using Bone Conduction Device. 4518-4540 - Yuexia Zhang, Hang Chen, Jiacheng Jin:

An LED SAHP-based Planar Projection PTCDV-hop Location Algorithm. 4541-4554 - Imran Ghani, Angelica Lim, Muhammad Hasnain, Israr Ghani, Muhammad Imran Babar:

Challenges in Distributed Agile Software Development Environment: A Systematic Literature Review. 4555-4571
- Longzhe Han, Taras Maksymyuk

, Xuecai Bao, Jia Zhao, Yan Liu:
Deep Learning based Loss Recovery Mechanism for Video Streaming over Mobile Information-Centric Network. 4572-4586 - Seoung-Jun Oh, Dongkyu Lee:

Maximum A Posteriori Estimation-based Adaptive Search Range Decision for Accelerating HEVC Motion Estimation on GPU. 4587-4605 - Dexiang Yao, Dong-Won Park, Syung-Og An, Soo Kyun Kim

:
Development of Augmented Reality Indoor Navigation System based on Enhanced A* Algorithm. 4606-4623 - Xiaofei Zan, Weibin Liu, Weiwei Xing:

A Framework for Human Motion Segmentation Based on Multiple Information of Motion Data. 4624-4644 - Cunbo Lu, Wengu Chen, Haibo Xu:

Binary Sequence Family for Chaotic Compressed Sensing. 4645-4664 - Fangxin Wang, Jie Liu, Shuwu Zhang, Guixuan Zhang, Yang Zheng, Xiaoqian Li, Wei Liang, Yuejun Li:

Adaptive Attention Annotation Model: Optimizing the Prediction Path through Dependency Fusion. 4665-4683
- Hongtao Yu, Lijun Sun, Fuzhi Zhang:

A Robust Bayesian Probabilistic Matrix Factorization Model for Collaborative Filtering Recommender Systems Based on User Anomaly Rating Behavior Detection. 4684-4705 - Matej Zuzcák

, Tomas Sochor
, Milan Zenka:
Intrusion Detection System for Home Windows based Computers. 4706-4726 - Ya Liu, Liang Cheng, Fengyu Zhao, Chunhua Su, Zhiqiang Liu, Wei Li, Dawu Gu:

New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario. 4727-4741 - Rashad Elhabob

, Yanan Zhao, Iva Sella, Hu Xiong:
Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing. 4742-4770 - Cheng Song, Yadong Zhang, Xinan Gu, Lei Wang, Zhizhong Liu:

A Trajectory Substitution Privacy Protection Scheme in location-based services. 4771-4787 - Nguyen Huy Truong:

A New Digital Image Steganography Approach Based on The Galois Field GF(pm) Using Graph and Automata. 4788-4813 - Leilei Kong, Zhongyuan Han, Haoliang Qi:

The Sequence Labeling Approach for Text Alignment of Plagiarism Detection. 4814-4832
Volume 13, Number 10, October 2019
- Dongkwon Lee, Daewon Kim:

Kakao Deep Reading Index: Consumption Time as a Key Factor in News Curation Algorithm. 4833-4848 - Arslan Rasheed, Peter Han Joo Chong, Ivan Wang Hei Ho

, Xue Jun Li, William Liu:
An Overview of Mobile Edge Computing: Architecture, Technology and Direction. 4849-4864 - Nikhil B. Gaikwad

, Varun Kumar Tiwari, Avinash G. Keskar
, N. C. Shivaprakash:
Heterogeneous Sensor Data Analysis Using Efficient Adaptive Artificial Neural Network on FPGA Based Edge Gateway. 4865-4885 - Muhammad Saleem, Yasir Saleem:

High Quality Network and Device Aware Multimedia Content Delivery for Mobile Cloud. 4886-4907 - Jong-gak Choe, YongJin Kwon:

A User Movement Direction Detecting Method through Data Analysis of BLE Beacons and Its Implementation. 4908-4922 - Yajun Chen, Ming Yi, Zhou Zhong, Keming Ma, Kaizhi Huang, Xinsheng Ji:

Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks. 4923-4939 - Yanru Chen, Bingshu Yan, Liangxiong Wei, Min Guo, Feng Yin, Qian Luo, Wei Wang

, Liangyin Chen:
DSLA: Dynamic Sampling Localization Algorithm Based on Virtual Anchor Node. 4940-4957 - Youngkyung Seo, Seong-Soo Han, You-Boo Jeon, Chang-Sung Jeong:

FAGON: Fake News Detection Model Using Grammatical Transformation on Deep Neural Network. 4958-4970 - Ying Guo, Xiaoyue Kang, Qinghe Han, Jingjing Wang:

A Localization Algorithm for Underwater Wireless Sensor Networks Based on Ranging Correction and Inertial Coordination. 4971-4987 - Chenn-Jung Huang

, Kai-Wen Hu, An-Feng Liu, Liang-Chun Chen, Chih-Ting Chen:
An Emission-Aware Day-Ahead Power Scheduling System for Internet of Energy. 4988-5012 - Pingshan Liu, Yaqing Fan, Xiaoyi Xiong, Yimin Wen, Dianjie Lu:

MOPSO-based Data Scheduling Scheme for P2P Streaming Systems. 5013-5034 - A. Chaminda J. Samarasekera, Hyundong Shin:

Cooperative Nano Communication in the THz Gap Frequency Range using Wireless Power Transfer. 5035-5057 - Jianchao Bian, Shoushan Luo, Wei Li, Yaxing Zha, Yixian Yang:

IR-RBT Codes: A New Scheme of Regenerating Codes for Tolerating Node and Intra-node Failures in Distributed Storage Systems. 5058-5077
- Yujing He, Ishtiaq Ahmad

, Lin Shi, KyungHi Chang:
SVM-based Drone Sound Recognition using the Combination of HLA and WPT Techniques in Practical Noisy Environment. 5078-5094 - Haoting Liu, Beibei Yan, Wei Wang, Xin Li, Zhenhui Guo:

Manhole Cover Detection from Natural Scene Based on Imaging Environment Perception. 5095-5111 - Fanglong Wu, Cuiyin Liu:

A Comprehensive and Practical Image Enhancement Method. 5112-5129 - Bin Wang, Wei Shen, FanSheng Chen, Dan Zeng:

Football match intelligent editing system based on deep learning. 5130-5143 - Peng-Cheng Huang, Chin-Chen Chang, Yung-Hui Li, Yanjun Liu:

Efficient secret sharing scheme with cheater identification based on QR code. 5144-5160 - Menglei Jin, Weibin Liu, Weiwei Xing:

A robust Correlation Filter based tracker with rich representation and a relocation component. 5161-5178 - Xibin Jia, Yujie Xiao, Dawei Yang, Zhenghan Yang, Chen Lu:

Multi-parametric MRIs based assessment of Hepatocellular Carcinoma Differentiation with Multi-scale ResNet. 5179-5196 - Yunbo Rao, Wei Liu:

Region Division for Large-scale Image Retrieval. 5197-5218
- Xuelian Li, Jie Niu, Juntao Gao, Yue Han:

Secure Electronic Ticketing System based on Consortium Blockchain. 5219-5243 - Sujin Cai, Xin Lyu, Duohan Ban:

Spatial Statistic Data Release Based on Differential Privacy. 5244-5259 - Liang Liu, Cheng Huang, Yong Fang

, Zhenxue Wang:
Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium. 5260-5275
Volume 13, Number 11, November 2019
- Huan Wu, Xiangming Wen, Zhaoming Lu, Yao Nie:

3D Markov chain based multi-priority path selection in the heterogeneous Internet of Things. 5276-5298 - Jeonghwan Gwak, Juho Jung, Ryumduck Oh, Manbok Park, Mukhammad Abdu Kayumbek Rakhimov, Junho Ahn:

A Review of Intelligent Self-Driving Vehicle Software Research. 5299-5320 - Jinah Kim, Nammee Moon:

Rating and Comments Mining Using TF-IDF and SO-PMI for Improved Priority Ratings. 5321-5334 - Hameed Al-Mishmish, Barbaros Preveze, Ahmed Alkhayyat

:
Improvement of Underlay Cooperative Cognitive Networks Bandwidth Efficiency under Interference and Power Constraints. 5335-5453 - J. Sebastian Terence

, Geethanjali Purushothaman:
Behavior based Routing Misbehavior Detection in Wireless Sensor Networks. 5354-5469 - Xinji Tian, Qianqian Li, Xingwang Li

, Hui Zhang, Khaled M. Rabie, Charles Casimiro Cavalcante
:
Performance Analysis of Two-Way Relay NOMA Systems with Hardware Impair-ments and Channel Estimation Errors. 5370-5493 - Yu-Kuan Chang, Fang-Biau Ueng, Ye-Shun Shen, Chih-Yuan Liao:

Joint Kalman Channel Estimation and Turbo Equalization for MIMO OFDM Systems over Fast Fading Channels. 5394-5409 - Jian Cao, Shujuan Yu, Jie Yang, Yun Zhang, Shengmei Zhao:

Massive MIMO TWO-Hop Relay Systems Over Rician Fading Channels. 5410-5426 - Cong Hu, Xiao-Jun Wu, Zhenqiu Shu:

Bagging deep convolutional autoencoders trained with a mixture of real data and GAN-generated data. 5427-5445 - Biruk Yirga Nidaw

, Myeong-Hoon Oh, Young Woo Kim:
Appropriate Synchronization Time Allocation for Distributed Heterogeneous Parallel Computing Systems. 5446-5463 - Zhongsheng Qian, Dafei Hong, Chang Zhao, Jie Zhu, Zhanggeng Zhu:

A Strategy for Multi-target Paths Coverage by Improving Individual Information Sharing. 5464-5488 - Lei Zhang, Xiaojun Bi, Yanjiao Wang:

Adaptive Truncation technique for Constrained Multi-Objective Optimization. 5489-5511
- Jongin Choi, Sookyun Kim

, Sunjeong Kim, Shinjin Kang:
Generating a Ball Sport Scene in a Virtual Environment. 5512-5526 - Xiaolin Liang

, Yongling Jiang:
Detection of Breathing Rates in Through-wall UWB Radar Utilizing JTFA. 5527-5545 - Jun He

, Dongliang Li, Bo Sun, Lejun Yu:
Facial Action Unit Detection with Multilayer Fused Multi-Task and Multi-Label Deep Learning Network. 5546-5559
- Huige Li, Fangguo Zhang

, Peiran Luo
, Haibo Tian, Jiejie He:
How to retrieve the encrypted data on the blockchain. 5560-5579 - Yongfang Peng, Shengwei Tian, Long Yu

, Yalong Lv, Ruijin Wang:
MALICIOUS URL RECOGNITION AND DETECTION USING ATTENTION-BASED CNN-LSTM. 5580-5593 - Bin Wu, Le Liu, Zhengge Dai, Xiujuan Wang, Kangfeng Zheng:

Detecting Malicious Social Robots with Generative Adversarial Networks. 5594-5515 - Shufang Wang, Hai Huang:

Secure Outsourced Computation of Multiple Matrix Multiplication Based on Fully Homomorphic Encryption. 5616-5630 - Zengguang Wang, Yu Lu, Xi Li, Wei Nie:

Optimal Network Defense Strategy Selection Based on Markov Bayesian Game. 5631-5652 - Yinghui Zhang, Tiantian Zhang, Rui Guo, Shengmin Xu, Dong Zheng:

Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage. 5653-5672 - Jia Chen, Liang Yue, Jing Chen:

Mitigating Cache Pollution Attack in Information Centric Mobile Internet. 5673-5691 - Zaid Ameen Abduljabbar

, Ayad Ibrahim, Mohammed Abdulridha Hussain, Zaid Alaa Hussien
, Mustafa A. Al Sibahee, Songfeng Lu:
EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud. 5692-5716 - Min Xie, Qiya Zeng:

Related-key Impossible Boomerang Cryptanalysis on LBlock-s. 5717-5730 - Kaiyu Tang, Meng Han, Qinchen Gu, Anni Zhou, Raheem Beyah

, Shouling Ji:
ShareSafe: An Improved Version of SecGraph. 5731-5754 - Gi-Chul Yang:

Development Status and Prospects of Graphical Password Authentication System in Korea. 5755-5772 - Xuan Shen, Jun He:

Improved Impossible Differential Attack on 7-round Reduced ARIA-256. 5773-5784
Volume 13, Number 12, December 2019
- Xingjuan Cai, Shaojin Geng, Penghong Wang, Lei Wang, Qidi Wu:

Fast triangle flip bat algorithm based on curve strategy and rank transformation to improve DV-Hop performance. 5785-5804 - Thejaswini M

, Bong Jun Choi:
Weighted Adaptive Opportunistic Scheduling Framework for Smartphone Sensor Data Collection in IoT. 5805-5825 - Hyewon Lim, Hyoung-Joo Kim:

Tensor-based tag emotion aware recommendation with probabilistic ranking. 5826-5841 - SuRak Son, YiNa Jeong, ByungKwan Lee:

An Optimal Driving Support Strategy(ODSS) for Autonomous Vehicles based on an Genetic Algorithm. 5842-5861 - Tan-Phuoc Huynh, Pham Ngoc Son, Miroslav Voznák:

Exact Outage Probability of Two-Way Decode-and-Forward NOMA Scheme with Opportunistic Relay Selection. 5862-5887 - Zhi Cai, Xu Lan, Xing Su, Kun Lang, Yang Cao:

ValueRank: Keyword Search of Object Summaries Considering Values. 5888-5903 - Fazli Wahid, Lokman Hakim Bin Ismail

, Rozaida Ghazali
, Muhammad Aamir
:
An Efficient Artificial Intelligence Hybrid Approach for Energy Management in Intelligent Buildings. 5904-5927 - Kapila Vyas

, Ajay Khuteta
, Amit K. Chaturvedi
:
Efficient routing in multicast mesh by using forwarding nodes and weighted cost function. 5928-5947 - Haoliang Lan, Wei Ding, YuMei Zhang:

Strengthening Packet Loss Measurement from the Network Intermediate Point. 5948-5971 - Debin Fan, Jaewan Lee:

A Hybrid Mechanism of Particle Swarm Optimization and Differential Evolution Algorithms based on Spark. 5972-5989
- ChangCheng Wu, Hao Zhang, Jiafeng Hua, Sha Hua, Yanyi Zhang, Xiaoming Lu, Yichen Tang:

A Novel Least Square and Image Rotation based Method for Solving the Inclination Problem of License Plate in Its Camera Captured Image. 5990-6008 - Liantao Wang, Dong Deng, Chunlei Chen:

Feature Voting for Object Localization via Density Ratio Estimation. 6009-6027 - Jing Zhou, Tianjiang Wang:

Facial Feature Recognition based on ASNMF Method. 6028-6042 - Linna Zhang, Shiming Chen, Yigang Cen, Yi Cen, Hengyou Wang, Ming Zeng:

Block Sparse Low-rank Matrix Decomposition based Visual Defect Inspection of Rail Track Surfaces. 6043-6062 - Pei Tian, Guozhen Chen, Nianfeng Li:

Study on gesture recognition based on IIDTW algorithm. 6063-6079 - Wenhua Xu, Hao Huang, Jie Zhang, Hao Gu, Jie Yang, Guan Gui:

CNN-based Skip-Gram Method for Improving Classification Accuracy of Chinese Text. 6080-6096 - Md Altab Hossin

, Yinping Mu, Jiaming Fang
, Adasa Nkrumah Kofi Frimpong
:
Influence of picture presence in reviews on online seller product rating: Moderation role approach. 6097-6120
- Murtadha A. Alazzawi, Hongwei Lu, Ali A. Yassin, Kai Chen:

Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks. 6121-6144 - Jun-Ho Hwang, Jin Kwak, Taejin Lee:

Fast k-NN based Malware Analysis in a Massive Malware Environment. 6145-6158 - Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang, Yi-Cheng Chen, Song-Yu Wu:

Data Hiding Using Sequential Hamming + k with m Overlapped Pixels. 6159-6174 - Cheng Song, Xinan Gu, Lei Wang, Zhizhong Liu, Yuan Ping

:
Research on Identity-based Batch Anonymous Authentication Scheme for VANET. 6175-6189 - Deyu Tong, Changqing Zhu, Na Ren, Wenzhong Shi:

High-Capacity and Robust Watermarking Scheme for Small-Scale Vector Data. 6190-6213 - Sohail Abbas, Madjid Merabti, Kashif Kifayat

, Thar Baker
:
Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks. 6214-6242 - Jingxian Zhou, Jianhua Yan:

Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System. 6243-6259 - Wei-Tao Song, Bin Hu, Xiu-Feng Zhao:

One Improved RLWE-based FHE and Fast Private Information Retrieval. 6260-6276

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














