Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icccsec/icccsec2017-2.bht:"
@inproceedings{DBLP:conf/icccsec/0003X17, author = {Fan Wu and Lili Xu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {189--200}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_16}, doi = {10.1007/978-3-319-68542-7\_16}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/0003X17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenHMY17, author = {Fan Chen and Hongjie He and Tinghuai Ma and Shu Yan}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Reversible Data Hiding in Encrypted Image Based on Block Classification Scrambling}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {162--174}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_14}, doi = {10.1007/978-3-319-68542-7\_14}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ChenHMY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenPL17, author = {Juan Chen and Fei Peng and Min Long}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {A Perceptual Encryption Scheme for {HEVC} Video with Lossless Compression}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {396--407}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_33}, doi = {10.1007/978-3-319-68542-7\_33}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenPL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenTP17, author = {Yawen Chen and Wenan Tan and Yibo Pan}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {A Method Towards Community Detection Based on Estimation of Distribution Algorithm}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {661--671}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_57}, doi = {10.1007/978-3-319-68542-7\_57}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ChenTP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenW0LX17, author = {Qiang Chen and Pin Wan and Yonghua Wang and Jiangfan Li and Yirui Xiao}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Research on Cognitive Radio Spectrum Sensing Method Based on Information Geometry}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {554--564}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_47}, doi = {10.1007/978-3-319-68542-7\_47}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ChenW0LX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChengZMW17, author = {Yong Cheng and Huaizhe Zhou and Jun Ma and Zhiying Wang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Efficient {CP-ABE} with Non-monotonic Access Structures}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {315--325}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_26}, doi = {10.1007/978-3-319-68542-7\_26}, timestamp = {Sat, 30 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChengZMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/DaiS17, author = {Yan Dai and Jie Shao}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {An Enhanced Method of Trajectory Privacy Preservation Through Trajectory Reconstruction}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {230--243}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_19}, doi = {10.1007/978-3-319-68542-7\_19}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/DaiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/DuLLW17, author = {Miao Du and Yongzhong Li and Qing Lu and Kun Wang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Bayesian Game Based Pseudo Honeypot Model in Social Networks}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {62--71}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_6}, doi = {10.1007/978-3-319-68542-7\_6}, timestamp = {Tue, 18 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/DuLLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/DuMLW17, author = {Gang Du and Chunguang Ma and Zengpeng Li and Ding Wang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {256--267}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_21}, doi = {10.1007/978-3-319-68542-7\_21}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/DuMLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/FuYX17, author = {Shaojing Fu and Yunpeng Yu and Ming Xu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {3--15}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_1}, doi = {10.1007/978-3-319-68542-7\_1}, timestamp = {Thu, 04 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/FuYX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/GuYZX17, author = {Wenwu Gu and Gaobo Yang and Dengyong Zhang and Ming Xia}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {A Robust Seam Carving Forgery Detection Approach by Three-Element Joint Density of Difference Matrix}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {418--432}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_35}, doi = {10.1007/978-3-319-68542-7\_35}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/GuYZX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/GuoLZ17, author = {Rui Guo and Xiong Li and Dong Zheng}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {268--279}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_22}, doi = {10.1007/978-3-319-68542-7\_22}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/GuoLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HaoZYWW17, author = {Jia Hao and Binbin Zhang and Kun Yue and Juan Wang and Hao Wu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Performance Measurement and Configuration Optimization of Virtual Machines Based on the Bayesian Network}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {641--652}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_55}, doi = {10.1007/978-3-319-68542-7\_55}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/HaoZYWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HuangFCGHLL17, author = {Yanyu Huang and Chuan Fu and Xuan Chen and Hao Guo and Xiaoyu He and Jin Li and Zheli Liu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {A Mutation Approach of Detecting {SQL} Injection Vulnerabilities}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {175--188}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_15}, doi = {10.1007/978-3-319-68542-7\_15}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/HuangFCGHLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/JiLW17, author = {Bingyu Ji and Ran Li and Chang{-}an Wu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Spatial-Temporal Correlation Based Multi-resolution Hybrid Motion Estimation for Frame Rate Up-Conversion}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {408--417}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_34}, doi = {10.1007/978-3-319-68542-7\_34}, timestamp = {Wed, 29 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/JiLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/JiangZ17, author = {Li Jiang and Yi Zhuang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Detect Storage Vulnerability of User-Input Privacy in Android Applications with Static and Dynamic Analysis}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {280--291}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_23}, doi = {10.1007/978-3-319-68542-7\_23}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/JiangZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/JinZ17, author = {Chunhua Jin and Jianyang Zhao}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Efficient and Short Identity-Based Deniable Authenticated Encryption}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {244--255}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_20}, doi = {10.1007/978-3-319-68542-7\_20}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/JinZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/JinZ17a, author = {Junjie Jin and Wei Zhang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {System Log-Based Android Root State Detection}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {793--798}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_69}, doi = {10.1007/978-3-319-68542-7\_69}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/JinZ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiCFY17, author = {Ping Li and Qiang Chen and Wen Fan and Songtao Yuan}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Registration of {OCT} Fundus Images with Color Fundus Images Based on Invariant Features}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {471--482}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_40}, doi = {10.1007/978-3-319-68542-7\_40}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiCFY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiGXT17, author = {Fei Li and Wei Gao and Dongqing Xie and Chunming Tang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Certificateless Cryptography with {KGC} Trust Level 3 Revisited}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {292--304}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_24}, doi = {10.1007/978-3-319-68542-7\_24}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiGXT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiH17, author = {Na Li and Jin Han}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {The Application of Naive Bayes Classifier in Name Disambiguation}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {611--618}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_52}, doi = {10.1007/978-3-319-68542-7\_52}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiHCH17, author = {Wei Li and Changxin Huang and Kaimin Chen and Songchen Han}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {A Quantitative Evaluation Method of Surveillance Coverage of UAVs Swarm}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {772--782}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_67}, doi = {10.1007/978-3-319-68542-7\_67}, timestamp = {Thu, 22 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiHCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiKY17, author = {Zhengqian Li and Pinhui Ke and Zhifan Ye}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {New Construction of Low-Hit-Zone Frequency Hopping Sequence Sets with Optimal Partial Hamming Correlation}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {40--49}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_4}, doi = {10.1007/978-3-319-68542-7\_4}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiKY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiLLW17, author = {Dongmin Li and Jing Li and Sai Liu and Chao Wang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Quantified Attribute Access Control Model for Cloud Storage Platform}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {799--804}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_70}, doi = {10.1007/978-3-319-68542-7\_70}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiLLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiLZYLC17, author = {Li Li and Lina Li and Shanqing Zhang and Zaorang Yang and Jianfeng Lu and Chin{-}Chen Chang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Novel Schemes for Bike-Share Service Authentication Using Aesthetic {QR} Code and Color Visual Cryptography}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {837--842}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_75}, doi = {10.1007/978-3-319-68542-7\_75}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiLZYLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiW17, author = {Jian Li and Guojing Wu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Image Recapture Detection Through Residual-Based Local Descriptors and Machine Learning}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {653--660}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_56}, doi = {10.1007/978-3-319-68542-7\_56}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiWDZ17, author = {Tao Li and Ting Wang and Jin Deng and Li Zhang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {New Delay-Dependent Stability for Neutral Systems with Its Application to Partial Circuit Model}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {759--771}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_66}, doi = {10.1007/978-3-319-68542-7\_66}, timestamp = {Mon, 28 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiWDZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiZL17, author = {Xinning Li and Zhiping Zhou and Lele Liu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {A Method of Group Behavior Analysis for Enhanced Affinity Propagation}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {506--517}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_43}, doi = {10.1007/978-3-319-68542-7\_43}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiZW17, author = {Jing Li and Zhiping Zhou and Ping Wang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Server-Less Lightweight Authentication Protocol for {RFID} System}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {305--314}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_25}, doi = {10.1007/978-3-319-68542-7\_25}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LinHH17, author = {Po{-}Ching Lin and Yu{-}Ting Hsu and Ren{-}Hung Hwang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Detecting and Preventing DDoS Attacks in SDN-Based Data Center Networks}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {50--61}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_5}, doi = {10.1007/978-3-319-68542-7\_5}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LinHH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LinWL17, author = {Feipeng Lin and Bo Wang and Yabin Li}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Differential Direction Adaptive Based Reversible Information Hiding}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {346--356}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_29}, doi = {10.1007/978-3-319-68542-7\_29}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LinWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LinXLTF17, author = {Xiang Lin and Juan Xu and Hu Liu and Xuwei Tang and Maomao Fu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {A High-Capacity Quantum Secret Sharing Protocol Based on Single D-Level Particles}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {138--146}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_12}, doi = {10.1007/978-3-319-68542-7\_12}, timestamp = {Fri, 19 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LinXLTF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuCL17, author = {Liping Liu and Linlin Ci and Wei Liu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Masking Signature Data Errors of Software-Based Control Flow Checking Techniques Employing Redundancy Signature}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {823--828}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_73}, doi = {10.1007/978-3-319-68542-7\_73}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiuCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuLX17, author = {Yuling Liu and Qi Li and Guojiang Xin}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Sentiment Analysis with Improved Adaboost and Transfer Learning Based on Gaussian Process}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {672--683}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_58}, doi = {10.1007/978-3-319-68542-7\_58}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiuLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuWLL17, author = {Qi Liu and Hao Wu and Xiaodong Liu and Nigel Linge}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Single Appliance Recognition Using Statistical Features Based k-NN Classification}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {631--640}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_54}, doi = {10.1007/978-3-319-68542-7\_54}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiuWLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuYY17, author = {Lingjun Liu and Weiyu Yu and Cui Yang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Adaptive Hybrid Wavelet Regularization Method for Compressive Imaging}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {461--470}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_39}, doi = {10.1007/978-3-319-68542-7\_39}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiuYY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuZC17, author = {Shangqing Liu and Yanchao Zhao and Bing Chen}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {WiSmart : Robust Human Access and Identification for Smart Homes Using WiFi Signals}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {855--861}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_78}, doi = {10.1007/978-3-319-68542-7\_78}, timestamp = {Tue, 05 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiuZC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuZLYW17, author = {Yan Liu and Wentao Zhao and Qiang Liu and Linyuan Yu and Dongxu Wang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {{HL-HAR:} Hierarchical Learning Based Human Activity Recognition in Wearable Computing}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {684--693}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_59}, doi = {10.1007/978-3-319-68542-7\_59}, timestamp = {Tue, 28 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiuZLYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/NiuLW17, author = {Shufen Niu and Zhenbin Li and Caifen Wang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Privacy-Preserving Multi-party Aggregate Signcryption for Heterogeneous Systems}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {216--229}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_18}, doi = {10.1007/978-3-319-68542-7\_18}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/NiuLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/PanTC17, author = {Yibo Pan and Wenan Tan and Yawen Chen}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {The Analysis of Key Nodes in Complex Social Networks}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {829--836}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_74}, doi = {10.1007/978-3-319-68542-7\_74}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/PanTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/PengTJ17, author = {Zhiniang Peng and Shaohua Tang and Linzhi Jiang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {86--99}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_8}, doi = {10.1007/978-3-319-68542-7\_8}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/PengTJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/QuCW17, author = {Zhiguo Qu and Zhenwen Cheng and Mingming Wang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {A Robust Quantum Watermark Algorithm Based on Quantum Log-Polar Images}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {450--460}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_38}, doi = {10.1007/978-3-319-68542-7\_38}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/QuCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/RenR17, author = {Yijing Ren and Ren Ren}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Chaos Prediction of Fast Fading Channel of Multi-rates Digital Modulation Using Support Vector Machines}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {783--790}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_68}, doi = {10.1007/978-3-319-68542-7\_68}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/RenR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShangTHGWLX17, author = {Baolin Shang and Jiaju Tan and Xiaobing Hong and Xuemei Guo and Guoli Wang and Gonggui Liu and Shouren Xue}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Spatiotemporal Radio Tomographic Imaging with Bayesian Compressive Sensing for RSS-Based Indoor Target Localization}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {528--540}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_45}, doi = {10.1007/978-3-319-68542-7\_45}, timestamp = {Fri, 04 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ShangTHGWLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShangZJ17, author = {Ronghua Shang and Weitong Zhang and Licheng Jiao}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Detection in {SAR} Images Based on Histogram and Improved Elitist Genetic Fuzzy Clustering}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {541--553}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_46}, doi = {10.1007/978-3-319-68542-7\_46}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ShangZJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShenZ17, author = {Yue{-}lin Shen and Wenbing Zhang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Output-Based Sampled Data Control for Linear Systems: {A} Measurement Error Estimation Approach}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {709--716}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_61}, doi = {10.1007/978-3-319-68542-7\_61}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ShenZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShiFL17, author = {Lei Shi and Xi Fu and Jing Li}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Mobility Prediction-Based Service Scheduling Optimization Algorithm in Cloudlets}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {619--630}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_53}, doi = {10.1007/978-3-319-68542-7\_53}, timestamp = {Tue, 23 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ShiFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShiLL17, author = {Yilong Shi and Hong Lin and Yuqiang Li}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {{IU-PMF:} Probabilistic Matrix Factorization Model Fused with Item Similarity and User Similarity}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {747--758}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_65}, doi = {10.1007/978-3-319-68542-7\_65}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ShiLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShiLLX17, author = {Yang Shi and Nannan Liu and Xingjian Long and Lei Xu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {View-Based 3D Model Retrieval Based on Distance Learning}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {483--493}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_41}, doi = {10.1007/978-3-319-68542-7\_41}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ShiLLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/TangJZJ17, author = {Jian Tang and Meijuan Jia and Jian Zhang and Meiying Jia}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {On-Line Intrusion Detection Model Based on Approximate Linear Dependent Condition with Linear Latent Feature Extraction}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {336--345}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_28}, doi = {10.1007/978-3-319-68542-7\_28}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/TangJZJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangLCDY17, author = {Ting Wang and Min Lei and Jingjie Chen and Shiqi Deng and Yu Yang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Dynamically-Enabled Defense Effectiveness Evaluation in Home Internet Based on Vulnerability Analysis}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {805--815}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_71}, doi = {10.1007/978-3-319-68542-7\_71}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangLCDY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangLLZD17, author = {Hao Wang and Guangjie Liu and Weiwei Liu and Jiangtao Zhai and Yuewei Dai}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Detection of Jitterbug Covert Channel Based on Partial Entropy Test}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {357--368}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_30}, doi = {10.1007/978-3-319-68542-7\_30}, timestamp = {Thu, 21 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/WangLLZD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangLXLX17, author = {Huibing Wang and Mingwei Lin and Jinbo Xiong and Li Lin and Ruliang Xiao}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Workload-Aware Page-Level Flash Translation Layer for {NAND} Flash-Based Storage Systems}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {576--588}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_49}, doi = {10.1007/978-3-319-68542-7\_49}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/WangLXLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangQE17, author = {Mingming Wang and Zhiguo Qu and Mohamed Elhoseny}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Quantum Secret Sharing in Noisy Environment}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {100--112}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_9}, doi = {10.1007/978-3-319-68542-7\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/WangQE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangWZL17, author = {Wenjun Wang and Hui Wang and Jia Zhao and Li Lv}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Adaptive Firefly Algorithm with a Modified Attractiveness Strategy}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {717--726}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_62}, doi = {10.1007/978-3-319-68542-7\_62}, timestamp = {Tue, 03 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangWZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangXXW17, author = {Hao Wang and Zhengquan Xu and Lizhi Xiong and Tao Wang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Conducting Correlated Laplace Mechanism for Differential Privacy}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {72--85}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_7}, doi = {10.1007/978-3-319-68542-7\_7}, timestamp = {Tue, 14 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/WangXXW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangZ17, author = {Ping Wang and Zhiping Zhou}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {An Improved {RFID} Search Protocol}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {843--848}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_76}, doi = {10.1007/978-3-319-68542-7\_76}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/WangZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WeiLWL17, author = {Xiaohui Wei and Lanxin Li and Xingwang Wang and Yuanyuan Liu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Cost Optimization for Time-Bounded Request Scheduling in Geo-Distributed Datacenters}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {601--610}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_51}, doi = {10.1007/978-3-319-68542-7\_51}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WeiLWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WuQZSS17, author = {Jiasong Wu and Shijie Qiu and Rui Zeng and Lotfi Senhadji and Huazhong Shu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {PCANet for Color Image Classification in Various Color Spaces}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {494--505}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_42}, doi = {10.1007/978-3-319-68542-7\_42}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WuQZSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WuXL17, author = {Can Wu and Yunhai Xiao and Wenjie Liu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Robust Face Recognition Model with Adaptive Correction Term via Generalized Alternating Direction Method of Multipliers}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {862--873}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_79}, doi = {10.1007/978-3-319-68542-7\_79}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/WuXL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WuZ17, author = {Hongchen Wu and Huaxiang Zhang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {{DLPDS:} Learning Users' Information Sharing Behaviors for Privacy Default Setting in Recommender System}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {29--39}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_3}, doi = {10.1007/978-3-319-68542-7\_3}, timestamp = {Sat, 29 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WuZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XiangHCWZ17, author = {Sheng Xiang and Yigang He and Liuchen Chang and Kehan Wu and Chaolong Zhang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {An Improved Quantum-Inspired Evolutionary Algorithm for Knapsack Problems}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {694--708}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_60}, doi = {10.1007/978-3-319-68542-7\_60}, timestamp = {Mon, 10 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/XiangHCWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XiaoWW17, author = {Xuan Xiao and Peng Wang and Jian{-}Hong Wang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Newton Method for Interval Predictor Model with Sphere Parameter Set}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {727--737}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_63}, doi = {10.1007/978-3-319-68542-7\_63}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/XiaoWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XuQ17, author = {Yanwei Xu and Lianyong Qi}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {SimHash-Based Similar Neighbor Finding for Scalable and Privacy-Preserving Service Recommendation}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {113--122}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_10}, doi = {10.1007/978-3-319-68542-7\_10}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/XuQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YanCZ17, author = {Leiming Yan and Zeyu Chen and Ping Zang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Biclustering Evolutionary Spatiotemporal Community in Global Trading Network}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {589--598}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_50}, doi = {10.1007/978-3-319-68542-7\_50}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/YanCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YanLLWDL17, author = {Xuehu Yan and Yuliang Lu and Lintao Liu and Song Wan and Wanmeng Ding and Hanlin Liu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {433--440}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_36}, doi = {10.1007/978-3-319-68542-7\_36}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/YanLLWDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YangLHC17, author = {Bin Yang and Zhenyu Li and Weifeng Hu and Enguo Cao}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {A Median Filtering Forensics Approach Based on Machine Learning}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {518--527}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_44}, doi = {10.1007/978-3-319-68542-7\_44}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/YangLHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YangZDY17, author = {Ce Yang and Weiming Zhang and Jiachen Ding and Nenghai Yu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Probability-p Order-Preserving Encryption}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {16--28}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_2}, doi = {10.1007/978-3-319-68542-7\_2}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YangZDY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YangZW17, author = {Fan Yang and Yi Zhuang and Jun Wang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Android Malware Detection Using Hybrid Analysis and Machine Learning Technique}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {565--575}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_48}, doi = {10.1007/978-3-319-68542-7\_48}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YangZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YiJGM17, author = {Faliu Yi and Yousun Jeoung and Ruili Geng and Inkyu Moon}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Image Authentication Based on Least Significant Bit Hiding and Double Random Phase Encoding Technique}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {326--335}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_27}, doi = {10.1007/978-3-319-68542-7\_27}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/YiJGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YinTWKT17, author = {Yi Yin and Yuichiro Tateiwa and Yun Wang and Yoshiaki Katayama and Naohisa Takahashi}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {An Inconsistency Detection Method for Security Policy and Firewall Policy Based on {CSP} Solver}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {147--161}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_13}, doi = {10.1007/978-3-319-68542-7\_13}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/YinTWKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YuanHS17, author = {Gonglin Yuan and Wujie Hu and Zhou Sheng}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {A Conjugate Gradient Algorithm with Yuan-Wei-Lu Line Search}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {738--746}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_64}, doi = {10.1007/978-3-319-68542-7\_64}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YuanHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangC17, author = {Fugao Zhang and Zining Cao}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {The Formal Transformation of {AADL} Based on Z-CoIA}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {816--822}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_72}, doi = {10.1007/978-3-319-68542-7\_72}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangHWL17, author = {Qihui Zhang and Xuexian Hu and Jianghong Wei and Wenfen Liu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Universally Composable Three-Party Password Authenticated Key Exchange}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {123--137}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_11}, doi = {10.1007/978-3-319-68542-7\_11}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangHWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangLP17, author = {Yun Zhang and Na Li and Zongju Peng}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Learning Based Fast {H.264/AVC} to {HEVC} {INTRA} Video Transcoding for Cloud Media Computing}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {385--395}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_32}, doi = {10.1007/978-3-319-68542-7\_32}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangW17, author = {Xin Zhang and Fengtong Wen}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {An Anonymous User Authentication and Key Distribution Protocol for Heterogenous Wireless Sensor Network}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {201--215}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_17}, doi = {10.1007/978-3-319-68542-7\_17}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhaoPLL17, author = {Yanjia Zhao and Tianming Pang and Xiaoyun Liang and Zhaohong Li}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Frame-Deletion Detection for Static-Background Video Based on Multi-scale Mutual Information}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {371--384}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_31}, doi = {10.1007/978-3-319-68542-7\_31}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ZhaoPLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhongX17, author = {Ming Zhong and Bo Xu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {A Developmental Evolutionary Algorithm for 0-1 Knapsack Problem}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {849--854}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_77}, doi = {10.1007/978-3-319-68542-7\_77}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ZhongX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhouYHLL17, author = {Li Zhou and Weiwei Yuan and Kangya He and Chenliang Li and Qiang Li}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Kernel Searching Strategy for Recommender Searching Mechanism}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {441--449}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_37}, doi = {10.1007/978-3-319-68542-7\_37}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ZhouYHLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2017-2, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7}, doi = {10.1007/978-3-319-68542-7}, isbn = {978-3-319-68541-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2017-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.