


default search action
3. ICCCS 2017: Nanjing, China
- Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino:

Cloud Computing and Security - Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II. Lecture Notes in Computer Science 10603, Springer 2017, ISBN 978-3-319-68541-0
Information Security
- Shaojing Fu, Yunpeng Yu, Ming Xu:

Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud. 3-15 - Ce Yang, Weiming Zhang, Jiachen Ding, Nenghai Yu:

Probability-p Order-Preserving Encryption. 16-28 - Hongchen Wu, Huaxiang Zhang:

DLPDS: Learning Users' Information Sharing Behaviors for Privacy Default Setting in Recommender System. 29-39 - Zhengqian Li, Pinhui Ke, Zhifan Ye:

New Construction of Low-Hit-Zone Frequency Hopping Sequence Sets with Optimal Partial Hamming Correlation. 40-49 - Po-Ching Lin, Yu-Ting Hsu, Ren-Hung Hwang

:
Detecting and Preventing DDoS Attacks in SDN-Based Data Center Networks. 50-61 - Miao Du, Yongzhong Li, Qing Lu, Kun Wang:

Bayesian Game Based Pseudo Honeypot Model in Social Networks. 62-71 - Hao Wang, Zhengquan Xu, Lizhi Xiong, Tao Wang:

Conducting Correlated Laplace Mechanism for Differential Privacy. 72-85 - Zhiniang Peng, Shaohua Tang, Linzhi Jiang:

A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security. 86-99 - Mingming Wang, Zhiguo Qu, Mohamed Elhoseny

:
Quantum Secret Sharing in Noisy Environment. 100-112 - Yanwei Xu, Lianyong Qi:

SimHash-Based Similar Neighbor Finding for Scalable and Privacy-Preserving Service Recommendation. 113-122 - Qihui Zhang, Xuexian Hu, Jianghong Wei

, Wenfen Liu:
Universally Composable Three-Party Password Authenticated Key Exchange. 123-137 - Xiang Lin, Juan Xu, Hu Liu, Xuwei Tang, Maomao Fu:

A High-Capacity Quantum Secret Sharing Protocol Based on Single D-Level Particles. 138-146 - Yi Yin, Yuichiro Tateiwa, Yun Wang, Yoshiaki Katayama, Naohisa Takahashi:

An Inconsistency Detection Method for Security Policy and Firewall Policy Based on CSP Solver. 147-161 - Fan Chen, Hongjie He, Tinghuai Ma, Shu Yan:

Reversible Data Hiding in Encrypted Image Based on Block Classification Scrambling. 162-174 - Yanyu Huang

, Chuan Fu, Xuan Chen, Hao Guo, Xiaoyu He, Jin Li, Zheli Liu:
A Mutation Approach of Detecting SQL Injection Vulnerabilities. 175-188 - Fan Wu

, Lili Xu:
A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing. 189-200 - Xin Zhang, Fengtong Wen:

An Anonymous User Authentication and Key Distribution Protocol for Heterogenous Wireless Sensor Network. 201-215 - Shufen Niu, Zhenbin Li, Caifen Wang:

Privacy-Preserving Multi-party Aggregate Signcryption for Heterogeneous Systems. 216-229 - Yan Dai, Jie Shao:

An Enhanced Method of Trajectory Privacy Preservation Through Trajectory Reconstruction. 230-243 - Chunhua Jin, Jianyang Zhao:

Efficient and Short Identity-Based Deniable Authenticated Encryption. 244-255 - Gang Du, Chunguang Ma, Zengpeng Li, Ding Wang

:
Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme. 256-267 - Rui Guo, Xiong Li

, Dong Zheng:
Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud. 268-279 - Li Jiang, Yi Zhuang:

Detect Storage Vulnerability of User-Input Privacy in Android Applications with Static and Dynamic Analysis. 280-291 - Fei Li, Wei Gao, Dongqing Xie, Chunming Tang:

Certificateless Cryptography with KGC Trust Level 3 Revisited. 292-304 - Jing Li, Zhiping Zhou, Ping Wang:

Server-Less Lightweight Authentication Protocol for RFID System. 305-314 - Yong Cheng, Huaizhe Zhou, Jun Ma, Zhiying Wang:

Efficient CP-ABE with Non-monotonic Access Structures. 315-325 - Faliu Yi, Yousun Jeoung, Ruili Geng, Inkyu Moon:

Image Authentication Based on Least Significant Bit Hiding and Double Random Phase Encoding Technique. 326-335 - Jian Tang, Meijuan Jia, Jian Zhang, Meiying Jia:

On-Line Intrusion Detection Model Based on Approximate Linear Dependent Condition with Linear Latent Feature Extraction. 336-345 - Feipeng Lin, Bo Wang, Yabin Li:

Differential Direction Adaptive Based Reversible Information Hiding. 346-356 - Hao Wang, Guangjie Liu, Weiwei Liu

, Jiangtao Zhai, Yuewei Dai:
Detection of Jitterbug Covert Channel Based on Partial Entropy Test. 357-368
Multimedia Applications
- Yanjia Zhao, Tianming Pang, Xiaoyun Liang, Zhaohong Li:

Frame-Deletion Detection for Static-Background Video Based on Multi-scale Mutual Information. 371-384 - Yun Zhang

, Na Li, Zongju Peng:
Learning Based Fast H.264/AVC to HEVC INTRA Video Transcoding for Cloud Media Computing. 385-395 - Juan Chen, Fei Peng

, Min Long:
A Perceptual Encryption Scheme for HEVC Video with Lossless Compression. 396-407 - Bingyu Ji, Ran Li, Chang-an Wu:

Spatial-Temporal Correlation Based Multi-resolution Hybrid Motion Estimation for Frame Rate Up-Conversion. 408-417 - Wenwu Gu, Gaobo Yang, Dengyong Zhang, Ming Xia:

A Robust Seam Carving Forgery Detection Approach by Three-Element Joint Density of Difference Matrix. 418-432 - Xuehu Yan

, Yuliang Lu
, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold. 433-440 - Li Zhou, Weiwei Yuan, Kangya He, Chenliang Li, Qiang Li:

Kernel Searching Strategy for Recommender Searching Mechanism. 441-449 - Zhiguo Qu, Zhenwen Cheng, Mingming Wang:

A Robust Quantum Watermark Algorithm Based on Quantum Log-Polar Images. 450-460 - Lingjun Liu, Weiyu Yu, Cui Yang:

Adaptive Hybrid Wavelet Regularization Method for Compressive Imaging. 461-470 - Ping Li, Qiang Chen, Wen Fan, Songtao Yuan:

Registration of OCT Fundus Images with Color Fundus Images Based on Invariant Features. 471-482 - Yang Shi, Nannan Liu, Xingjian Long, Lei Xu:

View-Based 3D Model Retrieval Based on Distance Learning. 483-493 - Jiasong Wu, Shijie Qiu, Rui Zeng, Lotfi Senhadji

, Huazhong Shu:
PCANet for Color Image Classification in Various Color Spaces. 494-505 - Xinning Li, Zhiping Zhou, Lele Liu:

A Method of Group Behavior Analysis for Enhanced Affinity Propagation. 506-517 - Bin Yang

, Zhenyu Li
, Weifeng Hu
, Enguo Cao:
A Median Filtering Forensics Approach Based on Machine Learning. 518-527 - Baolin Shang, Jiaju Tan, Xiaobing Hong, Xuemei Guo, Guoli Wang, Gonggui Liu, Shouren Xue:

Spatiotemporal Radio Tomographic Imaging with Bayesian Compressive Sensing for RSS-Based Indoor Target Localization. 528-540 - Ronghua Shang, Weitong Zhang, Licheng Jiao

:
Detection in SAR Images Based on Histogram and Improved Elitist Genetic Fuzzy Clustering. 541-553 - Qiang Chen, Pin Wan, Yonghua Wang, Jiangfan Li, Yirui Xiao:

Research on Cognitive Radio Spectrum Sensing Method Based on Information Geometry. 554-564 - Fan Yang, Yi Zhuang, Jun Wang:

Android Malware Detection Using Hybrid Analysis and Machine Learning Technique. 565-575 - Huibing Wang, Mingwei Lin

, Jinbo Xiong, Li Lin, Ruliang Xiao
:
Workload-Aware Page-Level Flash Translation Layer for NAND Flash-Based Storage Systems. 576-588 - Leiming Yan, Zeyu Chen, Ping Zang:

Biclustering Evolutionary Spatiotemporal Community in Global Trading Network. 589-598
Optimization and Classification
- Xiaohui Wei, Lanxin Li, Xingwang Wang, Yuanyuan Liu:

Cost Optimization for Time-Bounded Request Scheduling in Geo-Distributed Datacenters. 601-610 - Na Li, Jin Han:

The Application of Naive Bayes Classifier in Name Disambiguation. 611-618 - Lei Shi, Xi Fu, Jing Li:

Mobility Prediction-Based Service Scheduling Optimization Algorithm in Cloudlets. 619-630 - Qi Liu, Hao Wu, Xiaodong Liu, Nigel Linge:

Single Appliance Recognition Using Statistical Features Based k-NN Classification. 631-640 - Jia Hao

, Binbin Zhang, Kun Yue, Juan Wang, Hao Wu:
Performance Measurement and Configuration Optimization of Virtual Machines Based on the Bayesian Network. 641-652 - Jian Li, Guojing Wu:

Image Recapture Detection Through Residual-Based Local Descriptors and Machine Learning. 653-660 - Yawen Chen, Wenan Tan, Yibo Pan:

A Method Towards Community Detection Based on Estimation of Distribution Algorithm. 661-671 - Yuling Liu, Qi Li, Guojiang Xin:

Sentiment Analysis with Improved Adaboost and Transfer Learning Based on Gaussian Process. 672-683 - Yan Liu, Wentao Zhao, Qiang Liu, Linyuan Yu, Dongxu Wang:

HL-HAR: Hierarchical Learning Based Human Activity Recognition in Wearable Computing. 684-693 - Sheng Xiang, Yigang He, Liuchen Chang, Kehan Wu, Chaolong Zhang:

An Improved Quantum-Inspired Evolutionary Algorithm for Knapsack Problems. 694-708 - Yue-lin Shen, Wenbing Zhang:

Output-Based Sampled Data Control for Linear Systems: A Measurement Error Estimation Approach. 709-716 - Wenjun Wang, Hui Wang, Jia Zhao, Li Lv:

Adaptive Firefly Algorithm with a Modified Attractiveness Strategy. 717-726 - Xuan Xiao, Peng Wang, Jian-Hong Wang:

Newton Method for Interval Predictor Model with Sphere Parameter Set. 727-737 - Gonglin Yuan, Wujie Hu, Zhou Sheng

:
A Conjugate Gradient Algorithm with Yuan-Wei-Lu Line Search. 738-746 - Yilong Shi, Hong Lin, Yuqiang Li:

IU-PMF: Probabilistic Matrix Factorization Model Fused with Item Similarity and User Similarity. 747-758 - Tao Li, Ting Wang, Jin Deng, Li Zhang:

New Delay-Dependent Stability for Neutral Systems with Its Application to Partial Circuit Model. 759-771 - Wei Li, Changxin Huang, Kaimin Chen, Songchen Han:

A Quantitative Evaluation Method of Surveillance Coverage of UAVs Swarm. 772-782 - Yijing Ren, Ren Ren:

Chaos Prediction of Fast Fading Channel of Multi-rates Digital Modulation Using Support Vector Machines. 783-790
Short Paper
- Junjie Jin, Wei Zhang:

System Log-Based Android Root State Detection. 793-798 - Dongmin Li, Jing Li, Sai Liu, Chao Wang:

Quantified Attribute Access Control Model for Cloud Storage Platform. 799-804 - Ting Wang, Min Lei, Jingjie Chen, Shiqi Deng, Yu Yang:

Dynamically-Enabled Defense Effectiveness Evaluation in Home Internet Based on Vulnerability Analysis. 805-815 - Fugao Zhang, Zining Cao:

The Formal Transformation of AADL Based on Z-CoIA. 816-822 - Liping Liu, Linlin Ci, Wei Liu:

Masking Signature Data Errors of Software-Based Control Flow Checking Techniques Employing Redundancy Signature. 823-828 - Yibo Pan, Wenan Tan, Yawen Chen:

The Analysis of Key Nodes in Complex Social Networks. 829-836 - Li Li, Lina Li, Shanqing Zhang, Zaorang Yang, Jianfeng Lu, Chin-Chen Chang:

Novel Schemes for Bike-Share Service Authentication Using Aesthetic QR Code and Color Visual Cryptography. 837-842 - Ping Wang, Zhiping Zhou:

An Improved RFID Search Protocol. 843-848 - Ming Zhong, Bo Xu:

A Developmental Evolutionary Algorithm for 0-1 Knapsack Problem. 849-854 - Shangqing Liu, Yanchao Zhao, Bing Chen:

WiSmart : Robust Human Access and Identification for Smart Homes Using WiFi Signals. 855-861 - Can Wu, Yunhai Xiao, Wenjie Liu:

Robust Face Recognition Model with Adaptive Correction Term via Generalized Alternating Direction Method of Multipliers. 862-873

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














