Search dblp for Publications

export results for "toc:db/conf/icccsec/icccsec2017-2.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icccsec/0003X17,
  author       = {Fan Wu and
                  Lili Xu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {A Chaotic Map-Based Authentication and Key Agreement Scheme with User
                  Anonymity for Cloud Computing},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {189--200},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_16},
  doi          = {10.1007/978-3-319-68542-7\_16},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/0003X17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ChenHMY17,
  author       = {Fan Chen and
                  Hongjie He and
                  Tinghuai Ma and
                  Shu Yan},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Reversible Data Hiding in Encrypted Image Based on Block Classification
                  Scrambling},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {162--174},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_14},
  doi          = {10.1007/978-3-319-68542-7\_14},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ChenHMY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ChenPL17,
  author       = {Juan Chen and
                  Fei Peng and
                  Min Long},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {A Perceptual Encryption Scheme for {HEVC} Video with Lossless Compression},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {396--407},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_33},
  doi          = {10.1007/978-3-319-68542-7\_33},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ChenPL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ChenTP17,
  author       = {Yawen Chen and
                  Wenan Tan and
                  Yibo Pan},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {A Method Towards Community Detection Based on Estimation of Distribution
                  Algorithm},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {661--671},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_57},
  doi          = {10.1007/978-3-319-68542-7\_57},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ChenTP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ChenW0LX17,
  author       = {Qiang Chen and
                  Pin Wan and
                  Yonghua Wang and
                  Jiangfan Li and
                  Yirui Xiao},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Research on Cognitive Radio Spectrum Sensing Method Based on Information
                  Geometry},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {554--564},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_47},
  doi          = {10.1007/978-3-319-68542-7\_47},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ChenW0LX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ChengZMW17,
  author       = {Yong Cheng and
                  Huaizhe Zhou and
                  Jun Ma and
                  Zhiying Wang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Efficient {CP-ABE} with Non-monotonic Access Structures},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {315--325},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_26},
  doi          = {10.1007/978-3-319-68542-7\_26},
  timestamp    = {Sat, 30 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ChengZMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/DaiS17,
  author       = {Yan Dai and
                  Jie Shao},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {An Enhanced Method of Trajectory Privacy Preservation Through Trajectory
                  Reconstruction},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {230--243},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_19},
  doi          = {10.1007/978-3-319-68542-7\_19},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/DaiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/DuLLW17,
  author       = {Miao Du and
                  Yongzhong Li and
                  Qing Lu and
                  Kun Wang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Bayesian Game Based Pseudo Honeypot Model in Social Networks},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {62--71},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_6},
  doi          = {10.1007/978-3-319-68542-7\_6},
  timestamp    = {Tue, 18 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/DuLLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/DuMLW17,
  author       = {Gang Du and
                  Chunguang Ma and
                  Zengpeng Li and
                  Ding Wang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan
                  Scheme},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {256--267},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_21},
  doi          = {10.1007/978-3-319-68542-7\_21},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/DuMLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/FuYX17,
  author       = {Shaojing Fu and
                  Yunpeng Yu and
                  Ming Xu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant
                  Computation in the Cloud},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_1},
  doi          = {10.1007/978-3-319-68542-7\_1},
  timestamp    = {Thu, 04 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/FuYX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/GuYZX17,
  author       = {Wenwu Gu and
                  Gaobo Yang and
                  Dengyong Zhang and
                  Ming Xia},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {A Robust Seam Carving Forgery Detection Approach by Three-Element
                  Joint Density of Difference Matrix},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {418--432},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_35},
  doi          = {10.1007/978-3-319-68542-7\_35},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/GuYZX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/GuoLZ17,
  author       = {Rui Guo and
                  Xiong Li and
                  Dong Zheng},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Privacy-Preserving Medical Information Systems Using Multi-authority
                  Content-Based Encryption in Cloud},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {268--279},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_22},
  doi          = {10.1007/978-3-319-68542-7\_22},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/GuoLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/HaoZYWW17,
  author       = {Jia Hao and
                  Binbin Zhang and
                  Kun Yue and
                  Juan Wang and
                  Hao Wu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Performance Measurement and Configuration Optimization of Virtual
                  Machines Based on the Bayesian Network},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {641--652},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_55},
  doi          = {10.1007/978-3-319-68542-7\_55},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/HaoZYWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/HuangFCGHLL17,
  author       = {Yanyu Huang and
                  Chuan Fu and
                  Xuan Chen and
                  Hao Guo and
                  Xiaoyu He and
                  Jin Li and
                  Zheli Liu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {A Mutation Approach of Detecting {SQL} Injection Vulnerabilities},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {175--188},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_15},
  doi          = {10.1007/978-3-319-68542-7\_15},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/HuangFCGHLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/JiLW17,
  author       = {Bingyu Ji and
                  Ran Li and
                  Chang{-}an Wu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Spatial-Temporal Correlation Based Multi-resolution Hybrid Motion
                  Estimation for Frame Rate Up-Conversion},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {408--417},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_34},
  doi          = {10.1007/978-3-319-68542-7\_34},
  timestamp    = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/JiLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/JiangZ17,
  author       = {Li Jiang and
                  Yi Zhuang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Detect Storage Vulnerability of User-Input Privacy in Android Applications
                  with Static and Dynamic Analysis},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {280--291},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_23},
  doi          = {10.1007/978-3-319-68542-7\_23},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/JiangZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/JinZ17,
  author       = {Chunhua Jin and
                  Jianyang Zhao},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Efficient and Short Identity-Based Deniable Authenticated Encryption},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {244--255},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_20},
  doi          = {10.1007/978-3-319-68542-7\_20},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/JinZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/JinZ17a,
  author       = {Junjie Jin and
                  Wei Zhang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {System Log-Based Android Root State Detection},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {793--798},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_69},
  doi          = {10.1007/978-3-319-68542-7\_69},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/JinZ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiCFY17,
  author       = {Ping Li and
                  Qiang Chen and
                  Wen Fan and
                  Songtao Yuan},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Registration of {OCT} Fundus Images with Color Fundus Images Based
                  on Invariant Features},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {471--482},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_40},
  doi          = {10.1007/978-3-319-68542-7\_40},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiCFY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiGXT17,
  author       = {Fei Li and
                  Wei Gao and
                  Dongqing Xie and
                  Chunming Tang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Certificateless Cryptography with {KGC} Trust Level 3 Revisited},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {292--304},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_24},
  doi          = {10.1007/978-3-319-68542-7\_24},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiGXT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiH17,
  author       = {Na Li and
                  Jin Han},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {The Application of Naive Bayes Classifier in Name Disambiguation},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {611--618},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_52},
  doi          = {10.1007/978-3-319-68542-7\_52},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiHCH17,
  author       = {Wei Li and
                  Changxin Huang and
                  Kaimin Chen and
                  Songchen Han},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {A Quantitative Evaluation Method of Surveillance Coverage of UAVs
                  Swarm},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {772--782},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_67},
  doi          = {10.1007/978-3-319-68542-7\_67},
  timestamp    = {Thu, 22 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiHCH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiKY17,
  author       = {Zhengqian Li and
                  Pinhui Ke and
                  Zhifan Ye},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {New Construction of Low-Hit-Zone Frequency Hopping Sequence Sets with
                  Optimal Partial Hamming Correlation},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {40--49},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_4},
  doi          = {10.1007/978-3-319-68542-7\_4},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiKY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiLLW17,
  author       = {Dongmin Li and
                  Jing Li and
                  Sai Liu and
                  Chao Wang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Quantified Attribute Access Control Model for Cloud Storage Platform},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {799--804},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_70},
  doi          = {10.1007/978-3-319-68542-7\_70},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiLLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiLZYLC17,
  author       = {Li Li and
                  Lina Li and
                  Shanqing Zhang and
                  Zaorang Yang and
                  Jianfeng Lu and
                  Chin{-}Chen Chang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Novel Schemes for Bike-Share Service Authentication Using Aesthetic
                  {QR} Code and Color Visual Cryptography},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {837--842},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_75},
  doi          = {10.1007/978-3-319-68542-7\_75},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiLZYLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiW17,
  author       = {Jian Li and
                  Guojing Wu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Image Recapture Detection Through Residual-Based Local Descriptors
                  and Machine Learning},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {653--660},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_56},
  doi          = {10.1007/978-3-319-68542-7\_56},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiWDZ17,
  author       = {Tao Li and
                  Ting Wang and
                  Jin Deng and
                  Li Zhang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {New Delay-Dependent Stability for Neutral Systems with Its Application
                  to Partial Circuit Model},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {759--771},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_66},
  doi          = {10.1007/978-3-319-68542-7\_66},
  timestamp    = {Mon, 28 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiWDZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiZL17,
  author       = {Xinning Li and
                  Zhiping Zhou and
                  Lele Liu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {A Method of Group Behavior Analysis for Enhanced Affinity Propagation},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {506--517},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_43},
  doi          = {10.1007/978-3-319-68542-7\_43},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiZW17,
  author       = {Jing Li and
                  Zhiping Zhou and
                  Ping Wang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Server-Less Lightweight Authentication Protocol for {RFID} System},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {305--314},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_25},
  doi          = {10.1007/978-3-319-68542-7\_25},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LinHH17,
  author       = {Po{-}Ching Lin and
                  Yu{-}Ting Hsu and
                  Ren{-}Hung Hwang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Detecting and Preventing DDoS Attacks in SDN-Based Data Center Networks},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {50--61},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_5},
  doi          = {10.1007/978-3-319-68542-7\_5},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LinHH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LinWL17,
  author       = {Feipeng Lin and
                  Bo Wang and
                  Yabin Li},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Differential Direction Adaptive Based Reversible Information Hiding},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {346--356},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_29},
  doi          = {10.1007/978-3-319-68542-7\_29},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LinWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LinXLTF17,
  author       = {Xiang Lin and
                  Juan Xu and
                  Hu Liu and
                  Xuwei Tang and
                  Maomao Fu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {A High-Capacity Quantum Secret Sharing Protocol Based on Single D-Level
                  Particles},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {138--146},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_12},
  doi          = {10.1007/978-3-319-68542-7\_12},
  timestamp    = {Fri, 19 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LinXLTF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiuCL17,
  author       = {Liping Liu and
                  Linlin Ci and
                  Wei Liu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Masking Signature Data Errors of Software-Based Control Flow Checking
                  Techniques Employing Redundancy Signature},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {823--828},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_73},
  doi          = {10.1007/978-3-319-68542-7\_73},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiuCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiuLX17,
  author       = {Yuling Liu and
                  Qi Li and
                  Guojiang Xin},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Sentiment Analysis with Improved Adaboost and Transfer Learning Based
                  on Gaussian Process},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {672--683},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_58},
  doi          = {10.1007/978-3-319-68542-7\_58},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiuLX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiuWLL17,
  author       = {Qi Liu and
                  Hao Wu and
                  Xiaodong Liu and
                  Nigel Linge},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Single Appliance Recognition Using Statistical Features Based k-NN
                  Classification},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {631--640},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_54},
  doi          = {10.1007/978-3-319-68542-7\_54},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiuWLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiuYY17,
  author       = {Lingjun Liu and
                  Weiyu Yu and
                  Cui Yang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Adaptive Hybrid Wavelet Regularization Method for Compressive Imaging},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {461--470},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_39},
  doi          = {10.1007/978-3-319-68542-7\_39},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiuYY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiuZC17,
  author       = {Shangqing Liu and
                  Yanchao Zhao and
                  Bing Chen},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {WiSmart : Robust Human Access and Identification for Smart Homes Using
                  WiFi Signals},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {855--861},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_78},
  doi          = {10.1007/978-3-319-68542-7\_78},
  timestamp    = {Tue, 05 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiuZC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiuZLYW17,
  author       = {Yan Liu and
                  Wentao Zhao and
                  Qiang Liu and
                  Linyuan Yu and
                  Dongxu Wang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {{HL-HAR:} Hierarchical Learning Based Human Activity Recognition in
                  Wearable Computing},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {684--693},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_59},
  doi          = {10.1007/978-3-319-68542-7\_59},
  timestamp    = {Tue, 28 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiuZLYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/NiuLW17,
  author       = {Shufen Niu and
                  Zhenbin Li and
                  Caifen Wang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Privacy-Preserving Multi-party Aggregate Signcryption for Heterogeneous
                  Systems},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {216--229},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_18},
  doi          = {10.1007/978-3-319-68542-7\_18},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/NiuLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/PanTC17,
  author       = {Yibo Pan and
                  Wenan Tan and
                  Yawen Chen},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {The Analysis of Key Nodes in Complex Social Networks},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {829--836},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_74},
  doi          = {10.1007/978-3-319-68542-7\_74},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/PanTC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/PengTJ17,
  author       = {Zhiniang Peng and
                  Shaohua Tang and
                  Linzhi Jiang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {A Symmetric Authenticated Proxy Re-encryption Scheme with Provable
                  Security},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {86--99},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_8},
  doi          = {10.1007/978-3-319-68542-7\_8},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/PengTJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/QuCW17,
  author       = {Zhiguo Qu and
                  Zhenwen Cheng and
                  Mingming Wang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {A Robust Quantum Watermark Algorithm Based on Quantum Log-Polar Images},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {450--460},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_38},
  doi          = {10.1007/978-3-319-68542-7\_38},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/QuCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/RenR17,
  author       = {Yijing Ren and
                  Ren Ren},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Chaos Prediction of Fast Fading Channel of Multi-rates Digital Modulation
                  Using Support Vector Machines},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {783--790},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_68},
  doi          = {10.1007/978-3-319-68542-7\_68},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/RenR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ShangTHGWLX17,
  author       = {Baolin Shang and
                  Jiaju Tan and
                  Xiaobing Hong and
                  Xuemei Guo and
                  Guoli Wang and
                  Gonggui Liu and
                  Shouren Xue},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Spatiotemporal Radio Tomographic Imaging with Bayesian Compressive
                  Sensing for RSS-Based Indoor Target Localization},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {528--540},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_45},
  doi          = {10.1007/978-3-319-68542-7\_45},
  timestamp    = {Fri, 04 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ShangTHGWLX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ShangZJ17,
  author       = {Ronghua Shang and
                  Weitong Zhang and
                  Licheng Jiao},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Detection in {SAR} Images Based on Histogram and Improved Elitist
                  Genetic Fuzzy Clustering},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {541--553},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_46},
  doi          = {10.1007/978-3-319-68542-7\_46},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ShangZJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ShenZ17,
  author       = {Yue{-}lin Shen and
                  Wenbing Zhang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Output-Based Sampled Data Control for Linear Systems: {A} Measurement
                  Error Estimation Approach},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {709--716},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_61},
  doi          = {10.1007/978-3-319-68542-7\_61},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ShenZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ShiFL17,
  author       = {Lei Shi and
                  Xi Fu and
                  Jing Li},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Mobility Prediction-Based Service Scheduling Optimization Algorithm
                  in Cloudlets},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {619--630},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_53},
  doi          = {10.1007/978-3-319-68542-7\_53},
  timestamp    = {Tue, 23 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ShiFL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ShiLL17,
  author       = {Yilong Shi and
                  Hong Lin and
                  Yuqiang Li},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {{IU-PMF:} Probabilistic Matrix Factorization Model Fused with Item
                  Similarity and User Similarity},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {747--758},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_65},
  doi          = {10.1007/978-3-319-68542-7\_65},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ShiLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ShiLLX17,
  author       = {Yang Shi and
                  Nannan Liu and
                  Xingjian Long and
                  Lei Xu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {View-Based 3D Model Retrieval Based on Distance Learning},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {483--493},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_41},
  doi          = {10.1007/978-3-319-68542-7\_41},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ShiLLX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/TangJZJ17,
  author       = {Jian Tang and
                  Meijuan Jia and
                  Jian Zhang and
                  Meiying Jia},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {On-Line Intrusion Detection Model Based on Approximate Linear Dependent
                  Condition with Linear Latent Feature Extraction},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {336--345},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_28},
  doi          = {10.1007/978-3-319-68542-7\_28},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/TangJZJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangLCDY17,
  author       = {Ting Wang and
                  Min Lei and
                  Jingjie Chen and
                  Shiqi Deng and
                  Yu Yang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Dynamically-Enabled Defense Effectiveness Evaluation in Home Internet
                  Based on Vulnerability Analysis},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {805--815},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_71},
  doi          = {10.1007/978-3-319-68542-7\_71},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/WangLCDY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangLLZD17,
  author       = {Hao Wang and
                  Guangjie Liu and
                  Weiwei Liu and
                  Jiangtao Zhai and
                  Yuewei Dai},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Detection of Jitterbug Covert Channel Based on Partial Entropy Test},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {357--368},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_30},
  doi          = {10.1007/978-3-319-68542-7\_30},
  timestamp    = {Thu, 21 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/WangLLZD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangLXLX17,
  author       = {Huibing Wang and
                  Mingwei Lin and
                  Jinbo Xiong and
                  Li Lin and
                  Ruliang Xiao},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Workload-Aware Page-Level Flash Translation Layer for {NAND} Flash-Based
                  Storage Systems},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {576--588},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_49},
  doi          = {10.1007/978-3-319-68542-7\_49},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/WangLXLX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangQE17,
  author       = {Mingming Wang and
                  Zhiguo Qu and
                  Mohamed Elhoseny},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Quantum Secret Sharing in Noisy Environment},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {100--112},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_9},
  doi          = {10.1007/978-3-319-68542-7\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/WangQE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangWZL17,
  author       = {Wenjun Wang and
                  Hui Wang and
                  Jia Zhao and
                  Li Lv},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Adaptive Firefly Algorithm with a Modified Attractiveness Strategy},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {717--726},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_62},
  doi          = {10.1007/978-3-319-68542-7\_62},
  timestamp    = {Tue, 03 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/WangWZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangXXW17,
  author       = {Hao Wang and
                  Zhengquan Xu and
                  Lizhi Xiong and
                  Tao Wang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Conducting Correlated Laplace Mechanism for Differential Privacy},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {72--85},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_7},
  doi          = {10.1007/978-3-319-68542-7\_7},
  timestamp    = {Tue, 14 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/WangXXW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangZ17,
  author       = {Ping Wang and
                  Zhiping Zhou},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {An Improved {RFID} Search Protocol},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {843--848},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_76},
  doi          = {10.1007/978-3-319-68542-7\_76},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/WangZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WeiLWL17,
  author       = {Xiaohui Wei and
                  Lanxin Li and
                  Xingwang Wang and
                  Yuanyuan Liu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Cost Optimization for Time-Bounded Request Scheduling in Geo-Distributed
                  Datacenters},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {601--610},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_51},
  doi          = {10.1007/978-3-319-68542-7\_51},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/WeiLWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WuQZSS17,
  author       = {Jiasong Wu and
                  Shijie Qiu and
                  Rui Zeng and
                  Lotfi Senhadji and
                  Huazhong Shu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {PCANet for Color Image Classification in Various Color Spaces},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {494--505},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_42},
  doi          = {10.1007/978-3-319-68542-7\_42},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/WuQZSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WuXL17,
  author       = {Can Wu and
                  Yunhai Xiao and
                  Wenjie Liu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Robust Face Recognition Model with Adaptive Correction Term via Generalized
                  Alternating Direction Method of Multipliers},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {862--873},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_79},
  doi          = {10.1007/978-3-319-68542-7\_79},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/WuXL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WuZ17,
  author       = {Hongchen Wu and
                  Huaxiang Zhang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {{DLPDS:} Learning Users' Information Sharing Behaviors for Privacy
                  Default Setting in Recommender System},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {29--39},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_3},
  doi          = {10.1007/978-3-319-68542-7\_3},
  timestamp    = {Sat, 29 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/WuZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/XiangHCWZ17,
  author       = {Sheng Xiang and
                  Yigang He and
                  Liuchen Chang and
                  Kehan Wu and
                  Chaolong Zhang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {An Improved Quantum-Inspired Evolutionary Algorithm for Knapsack Problems},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {694--708},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_60},
  doi          = {10.1007/978-3-319-68542-7\_60},
  timestamp    = {Mon, 10 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/XiangHCWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/XiaoWW17,
  author       = {Xuan Xiao and
                  Peng Wang and
                  Jian{-}Hong Wang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Newton Method for Interval Predictor Model with Sphere Parameter Set},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {727--737},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_63},
  doi          = {10.1007/978-3-319-68542-7\_63},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/XiaoWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/XuQ17,
  author       = {Yanwei Xu and
                  Lianyong Qi},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {SimHash-Based Similar Neighbor Finding for Scalable and Privacy-Preserving
                  Service Recommendation},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {113--122},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_10},
  doi          = {10.1007/978-3-319-68542-7\_10},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/XuQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/YanCZ17,
  author       = {Leiming Yan and
                  Zeyu Chen and
                  Ping Zang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Biclustering Evolutionary Spatiotemporal Community in Global Trading
                  Network},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {589--598},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_50},
  doi          = {10.1007/978-3-319-68542-7\_50},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/YanCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/YanLLWDL17,
  author       = {Xuehu Yan and
                  Yuliang Lu and
                  Lintao Liu and
                  Song Wan and
                  Wanmeng Ding and
                  Hanlin Liu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {433--440},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_36},
  doi          = {10.1007/978-3-319-68542-7\_36},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/YanLLWDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/YangLHC17,
  author       = {Bin Yang and
                  Zhenyu Li and
                  Weifeng Hu and
                  Enguo Cao},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {A Median Filtering Forensics Approach Based on Machine Learning},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {518--527},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_44},
  doi          = {10.1007/978-3-319-68542-7\_44},
  timestamp    = {Mon, 23 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/YangLHC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/YangZDY17,
  author       = {Ce Yang and
                  Weiming Zhang and
                  Jiachen Ding and
                  Nenghai Yu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Probability-p Order-Preserving Encryption},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {16--28},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_2},
  doi          = {10.1007/978-3-319-68542-7\_2},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/YangZDY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/YangZW17,
  author       = {Fan Yang and
                  Yi Zhuang and
                  Jun Wang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Android Malware Detection Using Hybrid Analysis and Machine Learning
                  Technique},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {565--575},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_48},
  doi          = {10.1007/978-3-319-68542-7\_48},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/YangZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/YiJGM17,
  author       = {Faliu Yi and
                  Yousun Jeoung and
                  Ruili Geng and
                  Inkyu Moon},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Image Authentication Based on Least Significant Bit Hiding and Double
                  Random Phase Encoding Technique},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {326--335},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_27},
  doi          = {10.1007/978-3-319-68542-7\_27},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/YiJGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/YinTWKT17,
  author       = {Yi Yin and
                  Yuichiro Tateiwa and
                  Yun Wang and
                  Yoshiaki Katayama and
                  Naohisa Takahashi},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {An Inconsistency Detection Method for Security Policy and Firewall
                  Policy Based on {CSP} Solver},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {147--161},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_13},
  doi          = {10.1007/978-3-319-68542-7\_13},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/YinTWKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/YuanHS17,
  author       = {Gonglin Yuan and
                  Wujie Hu and
                  Zhou Sheng},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {A Conjugate Gradient Algorithm with Yuan-Wei-Lu Line Search},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {738--746},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_64},
  doi          = {10.1007/978-3-319-68542-7\_64},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/YuanHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhangC17,
  author       = {Fugao Zhang and
                  Zining Cao},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {The Formal Transformation of {AADL} Based on Z-CoIA},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {816--822},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_72},
  doi          = {10.1007/978-3-319-68542-7\_72},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhangC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhangHWL17,
  author       = {Qihui Zhang and
                  Xuexian Hu and
                  Jianghong Wei and
                  Wenfen Liu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Universally Composable Three-Party Password Authenticated Key Exchange},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {123--137},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_11},
  doi          = {10.1007/978-3-319-68542-7\_11},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhangHWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhangLP17,
  author       = {Yun Zhang and
                  Na Li and
                  Zongju Peng},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Learning Based Fast {H.264/AVC} to {HEVC} {INTRA} Video Transcoding
                  for Cloud Media Computing},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {385--395},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_32},
  doi          = {10.1007/978-3-319-68542-7\_32},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhangLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhangW17,
  author       = {Xin Zhang and
                  Fengtong Wen},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {An Anonymous User Authentication and Key Distribution Protocol for
                  Heterogenous Wireless Sensor Network},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {201--215},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_17},
  doi          = {10.1007/978-3-319-68542-7\_17},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhangW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhaoPLL17,
  author       = {Yanjia Zhao and
                  Tianming Pang and
                  Xiaoyun Liang and
                  Zhaohong Li},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Frame-Deletion Detection for Static-Background Video Based on Multi-scale
                  Mutual Information},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {371--384},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_31},
  doi          = {10.1007/978-3-319-68542-7\_31},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhaoPLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhongX17,
  author       = {Ming Zhong and
                  Bo Xu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {A Developmental Evolutionary Algorithm for 0-1 Knapsack Problem},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {849--854},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_77},
  doi          = {10.1007/978-3-319-68542-7\_77},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhongX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhouYHLL17,
  author       = {Li Zhou and
                  Weiwei Yuan and
                  Kangya He and
                  Chenliang Li and
                  Qiang Li},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Kernel Searching Strategy for Recommender Searching Mechanism},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {441--449},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_37},
  doi          = {10.1007/978-3-319-68542-7\_37},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhouYHLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2017-2,
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7},
  doi          = {10.1007/978-3-319-68542-7},
  isbn         = {978-3-319-68541-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2017-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics