Xianyi Chen, Haidong Zhong, Lizhi Xiong, Zhihua Xia: Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion.1326235:1-1326235:9
Dawen Xu, Kai Chen, Rangding Wang, Shubing Su: Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification.1734961:1-1734961:14
Ming Luo, Yi Luo, Yuwei Wan, Ze Wang: Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT.6140978:1-6140978:10
Rui Zhang, Di Xiao, Yanting Chang: A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing.1591206:1-1591206:15
Suk-Hwan Lee: Reversible Data Hiding for DNA Sequence Using Multilevel Histogram Shifting.3530969:1-3530969:13
So Ryoung Park, Ilku Nam, Sanguk Noh: Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments.3580536:1-3580536:13
Zhiyuan Jiang, Chao Feng, Chaojing Tang: An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression.4610320:1-4610320:21
Hongliang Zhu, Meiqi Chen, Maohua Sun, Xin Liao, Lei Hu: Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing.5841967:1-5841967:12
Pham-Duy Thanh, Hiep-Vu Van, Insoo Koo: Efficient Channel Selection and Routing Algorithm for Multihop, Multichannel Cognitive Radio Networks with Energy Harvesting under Jamming Attacks.7543212:1-7543212:12
Yanan Chen, Zhenyu Lu, Hu Xiong, Weixiang Xu: Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario.1378583:1-1378583:14
Jorge Granjal, Artur Pedroso: An Intrusion Detection and Prevention Framework for Internet-Integrated CoAP WSN.1753897:1-1753897:14
Chenyu Wang, Guoai Xu, Wenting Li: A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment.9062675:1-9062675:15
Yuntao Zhao, Wenbo Zhang, Yongxin Feng, Bo Yu: A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack.9463653:1-9463653:8
Mohamed Idhammad, Karim Afdel, Mustapha Belouch: Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest.1263123:1-1263123:13
Ye Yuan, Liji Wu, Yijun Yang, Xiangmin Zhang: A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism.2483619:1-2483619:13
Manhua Liu, Shuxin Liu, Weiwu Yan: Latent Fingerprint Segmentation Based on Ridge Density and Orientation Consistency.4529652:1-4529652:10
Yi-Hong Du, Shi-Hua Liu: Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks.4691203:1-4691203:7
Jun Xu, Xiong Zhang, Meng Zhou: A High-Security and Smart Interaction System Based on Hand Gesture Recognition for Internet of Things.4879496:1-4879496:11
Qingyi Zhu, Seng W. Loke, Ye Zhang: State-Based Switching for Optimal Control of Computer Virus Propagation with External Device Blocking.4982523:1-4982523:10
Chunming Zhang, Jingwei Xiao: Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model.5353060:1-5353060:10