Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icccsec/icccsec2018-4.bht:"
@inproceedings{DBLP:conf/icccsec/0006GQGY18, author = {Yang Yang and Xiang yang Gong and Xuesong Qiu and Zhipeng Gao and Haitao Yu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Mixed Mobile Charging Strategy in Rechargeable Wireless Sensor Networks}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {608--621}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_53}, doi = {10.1007/978-3-030-00015-8\_53}, timestamp = {Sat, 17 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/0006GQGY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/BianXW18, author = {Rongzhen Bian and Mingfu Xue and Jian Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {634--646}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_55}, doi = {10.1007/978-3-030-00015-8\_55}, timestamp = {Thu, 17 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/BianXW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/CaoZAYT18, author = {Fang Cao and Yalei Zhang and Bowen An and Heng Yao and Zhenjun Tang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {An Improved Reversible Data Hiding Scheme with Large Payload Based on Image Local-Complexity}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {231--241}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_20}, doi = {10.1007/978-3-030-00015-8\_20}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/CaoZAYT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenJXGPC18, author = {Jinlong Chen and Mengke Jiang and Kun Xie and Zhen Guo and Hang Pan and Xianjun Chen}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Method for Energy Consumption Audit and Intelligent Decision of Green Buildings}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {598--607}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_52}, doi = {10.1007/978-3-030-00015-8\_52}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenJXGPC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenLLL18, author = {Xi Chen and Yun Liu and Yong Li and Changlu Lin}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Threshold Proxy Re-encryption and Its Application in Blockchain}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {16--25}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_2}, doi = {10.1007/978-3-030-00015-8\_2}, timestamp = {Wed, 25 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ChenLLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenWWCL18, author = {Yi Chen and Hongxia Wang and Hanzhou Wu and Yanli Chen and Yong Liu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Data Hiding Scheme with High Quality for {H.264/AVC} Video Streams}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {99--110}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_9}, doi = {10.1007/978-3-030-00015-8\_9}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenWWCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChengH18, author = {Sijin Cheng and Fangjun Huang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Reversible Data Hiding in {JPEG} Images Based on Two-Dimensional Histogram Modification}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {392--403}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_34}, doi = {10.1007/978-3-030-00015-8\_34}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChengH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/CuiCZLC18, author = {Jianming Cui and Chen Chen and Xiaojun Zhang and Yihui Liu and Ning Cao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Three-Factor Remote Authentication Scheme for Multi-server Environment}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {694--705}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_60}, doi = {10.1007/978-3-030-00015-8\_60}, timestamp = {Fri, 14 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/CuiCZLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/CuiSZLC18, author = {Jianming Cui and Rongquan Sui and Xiaojun Zhang and Hengzhong Li and Ning Cao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Biometrics-Based Remote User Authentication Scheme Using Smart Cards}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {531--542}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_46}, doi = {10.1007/978-3-030-00015-8\_46}, timestamp = {Fri, 14 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/CuiSZLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/FuLCZG18, author = {Guangxin Fu and Qingbao Li and Zhifeng Chen and Guangyu Zeng and Juanjuan Gu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Network Storage Covert Channel Detection Based on Data Joint Analysis}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {346--357}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_30}, doi = {10.1007/978-3-030-00015-8\_30}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/FuLCZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/GaoW18, author = {Quansheng Gao and Kaixi Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Layered Steganography Model Based on User Interactions}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {123--134}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_11}, doi = {10.1007/978-3-030-00015-8\_11}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/GaoW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HeJSX18, author = {Xiaoli He and Hong Jiang and Yu Song and He Xiao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Optimal Resource Allocation for Underlay Cognitive Radio Networks}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {358--371}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_31}, doi = {10.1007/978-3-030-00015-8\_31}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/HeJSX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HuCNS18, author = {Xianglei Hu and Haishan Chen and Jiangqun Ni and Wenkang Su}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Novel Steganography Scheme Based on Asymmetric Embedding Model}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {183--194}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_16}, doi = {10.1007/978-3-030-00015-8\_16}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/HuCNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HuZZY18, author = {Huanhuan Hu and Xin Zuo and Weiming Zhang and Nenghai Yu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Covert Communication by Exploring Statistical and Linguistical Distortion in Text}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {288--301}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_25}, doi = {10.1007/978-3-030-00015-8\_25}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/HuZZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/JiangCCG18, author = {Jielin Jiang and Yan Cui and Yadang Chen and Guangwei Gao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Novel Nonlocal Low Rank Technique for Fabric Defect Detection}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {173--182}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_15}, doi = {10.1007/978-3-030-00015-8\_15}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/JiangCCG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/JiangCJF18, author = {Jielin Jiang and Yan Cui and Zilong Jin and Chunnian Fan}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Fast Three-Phase Fabric Defect Detection}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {302--312}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_26}, doi = {10.1007/978-3-030-00015-8\_26}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/JiangCJF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/KangJC18, author = {Zhongmiao Kang and Wenting Jiang and Yan Chen}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Lightweight Graph-Based Model for Inter-networking Access Control}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {589--597}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_51}, doi = {10.1007/978-3-030-00015-8\_51}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/KangJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/KongZWGG18, author = {Yazhou Kong and Liancheng Zhang and Zhenxing Wang and Yi Guo and Wen Guo}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Covert Communication Model Based on IPv6 Multicast}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {85--98}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_8}, doi = {10.1007/978-3-030-00015-8\_8}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/KongZWGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiLL18, author = {Hui{-}Ran Li and Mingxing Luo and Hong Lai}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Unified Quantum No-Go Theorems of Pure States}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {38--47}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_4}, doi = {10.1007/978-3-030-00015-8\_4}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiLQXZC18, author = {Li Li and Xin Li and Tong Qiao and Xiaoyu Xu and Shanqing Zhang and Chin{-}Chen Chang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Novel Framework of Robust Video Watermarking Based on Statistical Model}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {160--172}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_14}, doi = {10.1007/978-3-030-00015-8\_14}, timestamp = {Wed, 17 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiLQXZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiSDC18, author = {Donghui Li and Cong Shen and Xiaopeng Dai and Haiwen Chen}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Kind of Agricultural Content Networking Information Fusion Method Based on Ontology}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {576--588}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_50}, doi = {10.1007/978-3-030-00015-8\_50}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiSDC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiW18, author = {Yue Li and Hong{-}Xia Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Robust {H.264/AVC} Video Watermarking Without Intra Distortion Drift}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {416--427}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_36}, doi = {10.1007/978-3-030-00015-8\_36}, timestamp = {Tue, 31 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiWZWG18, author = {Shilin Li and Jing Wu and Taoyun Zhou and Dengzhun Wang and Zhuolin Gao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {The Phase and Amplitude Errors Frequency Dependence in L-Band Aperture Synthesis Radiometer Using External Noise Sources}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {506--517}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_44}, doi = {10.1007/978-3-030-00015-8\_44}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiWZWG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiYJLNL18, author = {Shiyu Li and Dengpan Ye and Shunzhi Jiang and Changrui Liu and Xiaoguang Niu and Xiangyang Luo}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Attack on Deep Steganalysis Neural Networks}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {265--276}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_23}, doi = {10.1007/978-3-030-00015-8\_23}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiYJLNL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiZN018, author = {Dong Li and Yingnan Zhang and Ke Niu and Xiaoyuan Yang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Reversible Data Hiding for Video}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {382--391}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_33}, doi = {10.1007/978-3-030-00015-8\_33}, timestamp = {Mon, 18 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiZN018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiZZCP18, author = {Zhiqiang Li and Gaoman Zhang and Wei Zhang and Hanwu Chen and Marek A. Perkowski}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Synthesis of Quantum Barrel Shifters}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {450--462}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_39}, doi = {10.1007/978-3-030-00015-8\_39}, timestamp = {Fri, 14 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiZZCP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiangZY18, author = {Yiyuan Liang and Wei Zhang and Kehua Yang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Attention-Based Chinese Word Embedding}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {277--287}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_24}, doi = {10.1007/978-3-030-00015-8\_24}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiangZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiaoSXL18, author = {Niandong Liao and Caixia Sun and Lingyun Xiang and Feng Li}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Multiple Watermarking Scheme for Content Authentication of {OOXML} Format Documents}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {147--159}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_13}, doi = {10.1007/978-3-030-00015-8\_13}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiaoSXL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuLCZCL18, author = {Jialing Liu and Jingbing Li and Jing Chen and Xiangxi Zou and Jieren Cheng and Jing Liu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Medical Image Watermarking Based on {SIFT-DCT} Perceptual Hashing}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {334--345}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_29}, doi = {10.1007/978-3-030-00015-8\_29}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiuLCZCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuLZW18, author = {Xiaodong Liu and Qi Liu and Yanyun Zou and Guizhi Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Self-organizing LSTM-Based Approach to {PM2.5} Forecast}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {683--693}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_59}, doi = {10.1007/978-3-030-00015-8\_59}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiuLZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuSLSW18, author = {Mingda Liu and Jing Shang and Peng Liu and Yijuan Shi and Mian Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {VideoChain: Trusted Video Surveillance Based on Blockchain for Campus}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {48--58}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_5}, doi = {10.1007/978-3-030-00015-8\_5}, timestamp = {Tue, 16 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiuSLSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuZMYDZ18, author = {Shiqin Liu and Minjun Zhao and Jixin Ma and Jiangyuan Yao and Yucong Duan and Xiaoyi Zhou}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Novel Watermarking Technology Based on Posterior Probability {SVM} and Improved {GA}}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {195--207}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_17}, doi = {10.1007/978-3-030-00015-8\_17}, timestamp = {Mon, 12 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiuZMYDZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LongL18, author = {Yi Long and Yuling Liu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Text Coverless Information Hiding Based on Word2vec}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {463--472}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_40}, doi = {10.1007/978-3-030-00015-8\_40}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LongL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/MaWLS18, author = {Bin Ma and Xiaoyu Wang and Bing Li and Yunqing Shi}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hiding}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {135--146}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_12}, doi = {10.1007/978-3-030-00015-8\_12}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/MaWLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ManzoorHC18, author = {Sohaib Manzoor and Xiaojun Hei and Wenqing Cheng}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Multi-controller Load Balancing Strategy for Software Defined WiFi Networks}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {622--633}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_54}, doi = {10.1007/978-3-030-00015-8\_54}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ManzoorHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/MengFCZ18, author = {Yitong Meng and Jinlong Fei and Yan Chen and Yuefei Zhu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Domain Name Model of Anonymous Network Hidden Service}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {111--122}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_10}, doi = {10.1007/978-3-030-00015-8\_10}, timestamp = {Thu, 26 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/MengFCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/PuyangQYZ18, author = {Yi Puyang and Zhenxing Qian and Zhaoxia Yin and Xinpeng Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Style Transferring Based Data Hiding for Color Images}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {440--449}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_38}, doi = {10.1007/978-3-030-00015-8\_38}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/PuyangQYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/PuyangYZ18, author = {Yi Puyang and Zhaoxia Yin and Xinpeng Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Reversible Data Embedding and Scrambling Method Based on {JPEG} Images}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {372--381}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_32}, doi = {10.1007/978-3-030-00015-8\_32}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/PuyangYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/QianPLZ18, author = {Zhenxing Qian and Lin Pan and Sheng Li and Xinpeng Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Steganography by Constructing Marbling Texture}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {428--439}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_37}, doi = {10.1007/978-3-030-00015-8\_37}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/QianPLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShiZYLZLD18, author = {Jin Shi and Li Zhang and Shuijun Yin and Weiwei Liu and Jiangtao Zhai and Guangjie Liu and Yuewei Dai}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Comprehensive Analysis of Interval Based Network Flow Watermarking}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {72--84}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_7}, doi = {10.1007/978-3-030-00015-8\_7}, timestamp = {Fri, 14 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ShiZYLZLD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/SunXSTY18, author = {Yifeng Sun and Xiaoyu Xu and Haitao Song and Guangming Tang and Shunxiang Yang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Improving Testing Accuracy of Convolutional Neural Network for Steganalysis Using Segmented Subimages}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {313--323}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_27}, doi = {10.1007/978-3-030-00015-8\_27}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/SunXSTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/TangZC18, author = {Langping Tang and Yuren Zhou and Zefeng Chen}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Dominance-Based Constrained Optimization Evolutionary Algorithm for the 4-th Tensor Power Problem of Matrix Multiplication}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {563--575}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_49}, doi = {10.1007/978-3-030-00015-8\_49}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/TangZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangJWX18, author = {Xiaoliang Wang and Jianming Jiang and Baowei Wang and Zhihua Xia}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A {VANET} Anonymous Authentication Mechanism for Multi-level Application Scenarios}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {706--717}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_61}, doi = {10.1007/978-3-030-00015-8\_61}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangJWX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangSXP18, author = {Xiang Wang and Tianze Shu and Min Xie and Qingqi Pei}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Adaptive Robust Reversible Watermarking Scheme}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {221--230}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_19}, doi = {10.1007/978-3-030-00015-8\_19}, timestamp = {Wed, 27 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/WangSXP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangWBX18, author = {Andy Wang and Chen Wang and Meng Bi and Jian Xu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Review of Privacy-Preserving Machine Learning Classification}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {671--682}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_58}, doi = {10.1007/978-3-030-00015-8\_58}, timestamp = {Fri, 24 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/WangWBX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangWZZS18, author = {Jun Wang and Wenbo Wan and Mingsheng Zhang and Liming Zou and Jiande Sun}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Blind Quantization Watermarking Scheme for Screen Content Image}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {61--71}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_6}, doi = {10.1007/978-3-030-00015-8\_6}, timestamp = {Thu, 22 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangWZZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangYCL18, author = {Zhe Wang and Weidong Yi and Yongrui Chen and Ming Li}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Novel Photovoltaic Cell Simulator for Green Internet of Things}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {659--670}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_57}, doi = {10.1007/978-3-030-00015-8\_57}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangYCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WuWDCWW18, author = {Hanzhou Wu and Wei Wang and Jing Dong and Yanli Chen and Hongxia Wang and Songyang Wu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Reversible Embedding to Covers Full of Boundaries}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {404--415}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_35}, doi = {10.1007/978-3-030-00015-8\_35}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/WuWDCWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WuWHCYL18, author = {Ruowu Wu and Sen Wang and Hui Han and Xiang Chen and Xuhong Yin and Yun Lin}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {The Assessment Research of Communication Jamming Effect Based on Grey Relational Analysis}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {496--505}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_43}, doi = {10.1007/978-3-030-00015-8\_43}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/WuWHCYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XieNYWZ18, author = {Liangbo Xie and Wei Nie and Xiaolong Yang and Yong Wang and Mu Zhou}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A {BLF} Generation Scheme with Clock Variance-Tolerance for Baseband Processor of {EPC} Gen2 {UHF} {RFID} Tag}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {543--552}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_47}, doi = {10.1007/978-3-030-00015-8\_47}, timestamp = {Thu, 07 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/XieNYWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XieYLWZ18, author = {Wen{-}chao Xie and Yi{-}yuan Yang and Zhaohong Li and Jin{-}wei Wang and Min Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {An Information Hiding Algorithm for {HEVC} Videos Based on {PU} Partitioning Modes}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {252--264}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_22}, doi = {10.1007/978-3-030-00015-8\_22}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/XieYLWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XinQD18, author = {Guojiang Xin and Xitong Qi and Changsong Ding}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {An Improved Tamper Detection and Location Scheme for {DOCX} Format Documents}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {242--251}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_21}, doi = {10.1007/978-3-030-00015-8\_21}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/XinQD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YangLYJ18, author = {Kun Yang and Mingzhe Liu and Yaming Yang and Xin Jiang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Design of Mobile Phone Privacy Protection Based on Block Chain}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {553--562}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_48}, doi = {10.1007/978-3-030-00015-8\_48}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YangLYJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YangZLLQ18, author = {Xu Yang and Yongbin Zhao and Ranran Li and Fengfeng Li and Xiaolin Qi}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Tracing System of Meat Supply Based on {RFID} and Two-Dimensional Code Technology}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {518--527}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_45}, doi = {10.1007/978-3-030-00015-8\_45}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YangZLLQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangQWWW18, author = {Xiaoming Zhang and Qian Qiang and Weisheng Wang and Zhanfeng Wang and Xianglin Wei}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {{IPFRA:} An Online Protocol Reverse Analysis Mechanism}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {324--333}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_28}, doi = {10.1007/978-3-030-00015-8\_28}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangQWWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangXSWL18, author = {Jianjun Zhang and Yicheng Xie and Jun Shen and Lucai Wang and HaiJun Lin}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Text Information Hiding Method Using the Custom Components}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {473--484}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_41}, doi = {10.1007/978-3-030-00015-8\_41}, timestamp = {Tue, 25 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangXSWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhaoDW18, author = {Liping Zhao and Xiaoni Du and Chenhuang Wu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Trace Representation of the Sequences Derived from Polynomial Quotient}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {26--37}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_3}, doi = {10.1007/978-3-030-00015-8\_3}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhaoDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhaoLCYZ18, author = {Minjun Zhao and Shiqin Liu and Chunjie Cao and Jiangyuan Yao and Xiaoyi Zhou}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Secure Blind Watermarking Scheme Based on Dual Frequency Domains and Ergodic Matrix}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {208--220}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_18}, doi = {10.1007/978-3-030-00015-8\_18}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhaoLCYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhaoZL18, author = {Zhicheng Zhao and Yaqun Zhao and Fengmei Liu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {The Research of Cryptosystem Recognition Based on Randomness Test's Return Value}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {3--15}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_1}, doi = {10.1007/978-3-030-00015-8\_1}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhaoZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhouYT18, author = {Ye Zhou and Jiabin Yuan and Xuwei Tang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Novel Part-Based Model for Fine-Grained Vehicle Recognition}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {647--658}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_56}, doi = {10.1007/978-3-030-00015-8\_56}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhouYT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZuoHZY18, author = {Xin Zuo and Huanhuan Hu and Weiming Zhang and Nenghai Yu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Text Semantic Steganalysis Based on Word Embedding}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {485--495}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_42}, doi = {10.1007/978-3-030-00015-8\_42}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZuoHZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2018-4, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8}, doi = {10.1007/978-3-030-00015-8}, isbn = {978-3-030-00014-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2018-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.