Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icccsec/icccsec2018-2.bht:"
@inproceedings{DBLP:conf/icccsec/CaoZ18, author = {Yanning Cao and Xiaoshu Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research on Data Mining Method for Breast Cancer Case Data}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {71--78}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_7}, doi = {10.1007/978-3-030-00009-7\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/CaoZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChaiLCLLE18, author = {Yixuan Chai and Guohua Liu and Zhao Chen and Feng Li and Yue Li and Esther Astaewwa Effah}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Temporal Collaborative Filtering Algorithm Based on Purchase Cycle}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {191--201}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_18}, doi = {10.1007/978-3-030-00009-7\_18}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ChaiLCLLE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenFGMH18, author = {Fuli Chen and Rui Fan and Bifeng Guo and Fuyu Ma and Weitao He}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research into Effects of Shrimp Aquaculture by Extensible Mind Mapping}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {45--58}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_5}, doi = {10.1007/978-3-030-00009-7\_5}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenFGMH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenZG18, author = {Zhenjia Chen and Yonghui Zhang and Xia Guo}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {The Application of Distributed Database on Spectrum Big Data}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {212--222}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_20}, doi = {10.1007/978-3-030-00009-7\_20}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/DongMZ18, author = {Ting Dong and Song{-}Ya Ma and Pei Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Controlled Remote Preparation of an Arbitrary Two-Qubit State via the Brown State Under the Noisy Environment}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {643--653}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_58}, doi = {10.1007/978-3-030-00009-7\_58}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/DongMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/GuiCX18, author = {Fei Gui and Yao{-}jie Chen and Ya{-}ting Xue}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research on Flame Generation Method Based on Particle System and Texture Mapping}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {79--89}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_8}, doi = {10.1007/978-3-030-00009-7\_8}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/GuiCX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/GuoTJT18, author = {Cheng Guo and Pengxu Tian and Yingmo Jie and Xinyu Tang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {484--495}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_44}, doi = {10.1007/978-3-030-00009-7\_44}, timestamp = {Tue, 10 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/GuoTJT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/GuoWL18, author = {Yanchao Guo and Linfeng Wei and Jianzhu Lu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {The Design and Implementation of a Backup and Disaster Recovery System for vSphere Data Center Based on Swift Cloud Storage}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {242--253}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_23}, doi = {10.1007/978-3-030-00009-7\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/GuoWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HanHZB18, author = {Huirui Han and Mengxing Huang and Yu Zhang and Uzair Aslam Bhatti}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {An Architecture of Secure Health Information Storage System Based on Blockchain Technology}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {578--588}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_52}, doi = {10.1007/978-3-030-00009-7\_52}, timestamp = {Wed, 01 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/HanHZB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HuangLC18, author = {Shan Huang and Ming Li and Hao Chen}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {The Quasi-circular Mapping Visualization Based on Extending and Reordering Dimensions for Visual Clustering Analysis}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {287--299}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_27}, doi = {10.1007/978-3-030-00009-7\_27}, timestamp = {Tue, 07 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/HuangLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HuangT18, author = {Jianbiao Huang and Linli Tao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Study on Cloud Logistics Distribution Model of Agricultural Products}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {169--181}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_16}, doi = {10.1007/978-3-030-00009-7\_16}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/HuangT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiF18, author = {Wan Li and Fenling Feng}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Railway Passenger Volume Forecast Based on Web Search Terms and Adversarial Nets}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {9--20}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_2}, doi = {10.1007/978-3-030-00009-7\_2}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiLWWZ18, author = {Bangguo Li and Pingzeng Liu and Xiaotong Wu and Xue Wang and Rui Zhao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Design and Application of Agricultural Product Traceability Management Platform}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {684--693}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_61}, doi = {10.1007/978-3-030-00009-7\_61}, timestamp = {Fri, 14 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiLWWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiLWZ18, author = {Bangguo Li and Pingzeng Liu and Xiaotong Wu and Jianyong Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Design and Implementation of the Product Quality Traceability System for Winter Jujube}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {694--705}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_62}, doi = {10.1007/978-3-030-00009-7\_62}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiLWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiSWL18, author = {Mohan Li and Yanbin Sun and Le Wang and Hui Lu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Quality-Aware Query Based on Relative Source Quality}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {3--8}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_1}, doi = {10.1007/978-3-030-00009-7\_1}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiSWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiWWZ18, author = {Gen Li and Kejie Wen and Yaxuan Wu and Baili Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Topk Service Composition Algorithm Based on Optimal QoS}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {309--321}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_29}, doi = {10.1007/978-3-030-00009-7\_29}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiWWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LinLLZYZ18, author = {Ping Lin and Tao Li and Xiaojie Liu and Hui Zhao and Jin Yang and Fangdong Zhu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {601--611}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_54}, doi = {10.1007/978-3-030-00009-7\_54}, timestamp = {Mon, 17 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LinLLZYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuCTJS18, author = {Chunxia Liu and Youyu Chen and Shu Tong and Wangdong Jiang and Guang Sun}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Study on Revenue Distribution of Information Sharing in the {C2M} Supply Chain}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {543--552}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_49}, doi = {10.1007/978-3-030-00009-7\_49}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiuCTJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuLG18, author = {Pai Liu and Fenlin Liu and Daofu Gong}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Video Quality Assessment Algorithm Based on Persistence-of-Vision Effect}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {366--376}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_34}, doi = {10.1007/978-3-030-00009-7\_34}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiuLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuMLS18, author = {Qin Liu and Tinghuai Ma and Jian Li and Wenhai Shen}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Workflow Task Scheduling Algorithm Based on {IFCM} and {IACO}}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {377--388}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_35}, doi = {10.1007/978-3-030-00009-7\_35}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiuMLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuTCC18, author = {Boyi Liu and Xiangyan Tang and Jieren Cheng and Jiquan Chen}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Design and Verification of a Security Policy to Defense DDoS Attack for Cloud Robot}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {718--730}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_64}, doi = {10.1007/978-3-030-00009-7\_64}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiuTCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LuCDH18, author = {Xin Lu and Lifeng Cao and Xuehui Du and Zhiyan Hu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Tag-Based Protection Method for Multi-tenant Data Security}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {553--565}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_50}, doi = {10.1007/978-3-030-00009-7\_50}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LuCDH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LuCWJC18, author = {Hui Lu and Xiang Cui and Le Wang and Yu Jiang and Meng Cui}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {The Research on Security Audit for Information System Classified Protection}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {300--308}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_28}, doi = {10.1007/978-3-030-00009-7\_28}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LuCWJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LuoM18, author = {Wei Luo and Wenping Ma}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {519--530}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_47}, doi = {10.1007/978-3-030-00009-7\_47}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LuoM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/MaS18, author = {Bin Ma and Yecheng Sun}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research on Real-Time Monitoring of Human Body Temperature Based on Fiber Bragg Grating Sensing Technology}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {124--133}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_12}, doi = {10.1007/978-3-030-00009-7\_12}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/MaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/MaSFW18, author = {Xiaofeng Ma and Xiaofeng Song and Chao Fan and Xi Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {An Evolutionary Algorithm Based on Multi-view and Prior Information for Community Detection}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {589--600}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_53}, doi = {10.1007/978-3-030-00009-7\_53}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/MaSFW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/MengZZZZ18, author = {Qingyu Meng and Huanhuan Zhang and Mingquan Zhou and Shifeng Zhao and Pengbo Zhou}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {The Classification of Traditional Chinese Painting Based on {CNN}}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {232--241}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_22}, doi = {10.1007/978-3-030-00009-7\_22}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/MengZZZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/RenKL018, author = {Yongjun Ren and Linhui Kong and Yepeng Liu and Jin Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Consistency Guarantee Method of Electronic Record Based on Blockchain in Cloud Storage}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {633--642}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_57}, doi = {10.1007/978-3-030-00009-7\_57}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/RenKL018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShangYW18, author = {Yaoyao Shang and Shuangmao Yang and Wei Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Botnet Detection with Hybrid Analysis on Flow Based and Graph Based Features of Network Traffic}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {612--621}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_55}, doi = {10.1007/978-3-030-00009-7\_55}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ShangYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShenW018, author = {Yaosheng Shen and Ding Wang and Ping Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Revisiting Anonymous Two-Factor Authentication Schemes for Cloud Computing}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {134--146}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_13}, doi = {10.1007/978-3-030-00009-7\_13}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ShenW018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/SuZTQ18, author = {Yang Su and Wenzhe Zhang and Wenwei Tao and Zhizhong Qiao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Network Illegal Access Detection Method Based on {PSO-SVM} Algorithm in Power Monitoring System}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {450--459}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_41}, doi = {10.1007/978-3-030-00009-7\_41}, timestamp = {Tue, 23 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/SuZTQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/SunZZZZ18, author = {Jieli Sun and Zhiqing Zhu and Yanpiao Zhang and Yanxia Zhao and Yao Zhai}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research on Personalized Recommendation Case Base and Data Source Based on Case-Based Reasoning}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {114--123}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_11}, doi = {10.1007/978-3-030-00009-7\_11}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/SunZZZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/TanWXT18, author = {Tiantian Tan and Baosheng Wang and Zhou Xu and Yong Tang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {The New Progress in the Research of Binary Vulnerability Analysis}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {265--276}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_25}, doi = {10.1007/978-3-030-00009-7\_25}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/TanWXT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/TanWXT18a, author = {Tiantian Tan and Baosheng Wang and Zhou Xu and Yong Tang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {The New Progress in the Research of Binary Vulnerability Exploits}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {277--286}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_26}, doi = {10.1007/978-3-030-00009-7\_26}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/TanWXT18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/TaoZWZ18, author = {Runzhe Tao and Yonghong Zhang and Lihua Wang and Xiaoping Zhao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research of Tool State Recognition Based on {CEEMD-WPT}}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {59--70}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_6}, doi = {10.1007/978-3-030-00009-7\_6}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/TaoZWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/Wang0S18, author = {Yuhang Wang and Hongli Zhang and Shen Su}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {{VAT:} {A} Velocity-Aware Trajectory Privacy Preservation Scheme for IoT Searching}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {357--365}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_33}, doi = {10.1007/978-3-030-00009-7\_33}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/Wang0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangHZLZW18, author = {Hongbin Wang and Ming He and Lianke Zhou and Zijin Li and Haomin Zhan and Rang Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Remove-Duplicate Algorithm Based on Meta Search Result}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {33--44}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_4}, doi = {10.1007/978-3-030-00009-7\_4}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangHZLZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangLCC18, author = {Dingcheng Wang and Yiyi Lu and Beijing Chen and Liming Chen}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research on Intuitionistic Fuzzy Multiple Output Least Squares Support Vector Regression}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {389--398}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_36}, doi = {10.1007/978-3-030-00009-7\_36}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangLCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangLL18, author = {Xue Wang and Pingzeng Liu and Xuefei Liu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research on Key Climatic Factors of Desert Based on Big Data}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {105--113}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_10}, doi = {10.1007/978-3-030-00009-7\_10}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangP18, author = {Haiyong Wang and Yao Peng}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A {CP-ABE} Access Control Scheme Based on Proxy Re-encryption in Cloud Storage}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {413--425}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_38}, doi = {10.1007/978-3-030-00009-7\_38}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangWZ18, author = {Yu{-}xiang Wang and Qi Wang and Zhi{-}feng Zhou}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {The Handoff Mechanism Based on Mobile Location Prediction}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {254--264}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_24}, doi = {10.1007/978-3-030-00009-7\_24}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangYZZC18, author = {Hongbin Wang and Guisheng Yin and Lianke Zhou and Yupeng Zhang and Zhen Cao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Social Networks Node Mining Algorithm of Based on Greedy Subgraph}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {157--168}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_15}, doi = {10.1007/978-3-030-00009-7\_15}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangYZZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangZGLY18, author = {Qi Wang and Dehua Zhou and Quanlong Guan and Yanling Li and Jimian Yang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Privacy-Preserving Classifier in Statistic Pattern Recognition}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {496--507}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_45}, doi = {10.1007/978-3-030-00009-7\_45}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangZGLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XiZ18, author = {Junhua Xi and Kouquan Zheng}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {The Benchmark Performance Testing Method for Cluster Heterogeneous Network Based on {STC} Platform}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {223--231}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_21}, doi = {10.1007/978-3-030-00009-7\_21}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/XiZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XiaoH18, author = {Ting Xiao and Yongfeng Huang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Design and Implementation of Web System Based on Blockchain}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {706--717}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_63}, doi = {10.1007/978-3-030-00009-7\_63}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/XiaoH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XiaoLLCB18, author = {Tong Xiao and Jingbing Li and Jing Liu and Jieren Cheng and Uzair Aslam Bhatti}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Robust Algorithm of Encrypted Face Recognition Based on {DWT-DCT} and Tent Map}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {508--518}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_46}, doi = {10.1007/978-3-030-00009-7\_46}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/XiaoLLCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YangLTH18, author = {Junquan Yang and Song Liu and Wenwei Tao and Chao Hu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Distributed Security Feature Selection Algorithm Based on K-means in Power Grid System}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {439--449}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_40}, doi = {10.1007/978-3-030-00009-7\_40}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YangLTH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YangLZDYZH18, author = {Luhui Yang and Guangjie Liu and Jiangtao Zhai and Yuewei Dai and Zhaozhi Yan and Yuguang Zou and Wenchao Huang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Novel Detection Method for Word-Based {DGA}}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {472--483}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_43}, doi = {10.1007/978-3-030-00009-7\_43}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/YangLZDYZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YangNZ18, author = {Dan Yang and Tiezheng Nie and Jing Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Temporal Evolution Data Model for Heterogeneous Entities: Modeling with Temporal and Evolution Information}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {202--211}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_19}, doi = {10.1007/978-3-030-00009-7\_19}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YangNZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YangY18, author = {Xiaohui Yang and Yue Yu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {DDoS Attacks Detection and Traceback Method Based on Flow Entropy Algorithm and {MPLS} Principle}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {670--683}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_60}, doi = {10.1007/978-3-030-00009-7\_60}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YangY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YaoZDL18, author = {Mengmeng Yao and Dongsheng Zhou and Rui Deng and Mingda Liu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Security Protocol for Access to Sensitive Data in Trusted Cloud Server}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {531--542}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_48}, doi = {10.1007/978-3-030-00009-7\_48}, timestamp = {Mon, 15 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YaoZDL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YinLC18, author = {Zhongxu Yin and Zhufeng Li and Yan Cao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Web Application Runtime Application Self-protection Scheme against Script Injection Attacks}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {566--577}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_51}, doi = {10.1007/978-3-030-00009-7\_51}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YinLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/Yu18, author = {Shuyan Yu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Towards the Cloud Computing from Services to Securities and Challenges}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {334--343}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_31}, doi = {10.1007/978-3-030-00009-7\_31}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/Yu18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangCT0H18, author = {Ruizhi Zhang and Jieren Cheng and Xiangyan Tang and Qiang Liu and Xiangfeng He}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {654--669}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_59}, doi = {10.1007/978-3-030-00009-7\_59}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangCT0H18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangLC18, author = {Junbao Zhang and Guohua Liu and Zhao Chen}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Serialization of Lifecycles in {ACBP} Model as Regular Expressions}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {147--156}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_14}, doi = {10.1007/978-3-030-00009-7\_14}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangLT18, author = {Hongrun Zhang and Bin Li and Shunquan Tan}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A New Steganographic Distortion Function with Explicit Considerations of Modification Interactions}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {460--471}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_42}, doi = {10.1007/978-3-030-00009-7\_42}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangMW18, author = {Hongbin Zhang and Pengcheng Ma and Meihua Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Detecting Inconsistency and Incompleteness in Access Control Policies}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {731--739}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_65}, doi = {10.1007/978-3-030-00009-7\_65}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangWLRCW18, author = {Chao Zhang and Junmei Wang and Pingzeng Liu and Wanming Ren and Weijie Chen and Yanyan Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Traffic Accident Time Series Analysis}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {344--356}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_32}, doi = {10.1007/978-3-030-00009-7\_32}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangWLRCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangWWZH18, author = {Xiaoming Zhang and Zhanfeng Wang and Xianglin Wei and Zihan Zhuo and Chao Hu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Delay Step Based Geolocation Data Verification Method}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {426--438}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_39}, doi = {10.1007/978-3-030-00009-7\_39}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangWWZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangZHLCZ18, author = {Lin Zhang and Ruili Zhao and Mengxing Huang and Zhonghua Liu and Jieren Cheng and Yu Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research on Indirect Location Technology of Ground Target Based on Scene Matching}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {90--104}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_9}, doi = {10.1007/978-3-030-00009-7\_9}, timestamp = {Wed, 01 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangZHLCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangZWL18, author = {Jie Zhang and Yongsheng Zhang and Xiaolong Wu and Guoyun Li}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Teaching Video Recommendation Based on Student Evaluation}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {182--190}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_17}, doi = {10.1007/978-3-030-00009-7\_17}, timestamp = {Fri, 19 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangZWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhaoDLCY18, author = {Lihua Zhao and Minghui Du and Weibao Lei and Lin Chen and Lei Yang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Towards Multi-task Fair Sharing for Multi-resource Allocation in Cloud Computing}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {322--333}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_30}, doi = {10.1007/978-3-030-00009-7\_30}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ZhaoDLCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhaoSLG18, author = {Zheng Zhao and Tao Shang and Jianwei Liu and Zhengyu Guan}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Clustering Algorithm for Privacy Preservation on MapReduce}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {622--632}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_56}, doi = {10.1007/978-3-030-00009-7\_56}, timestamp = {Mon, 04 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ZhaoSLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhuWSD18, author = {Zhiqiang Zhu and Jin Wu and Lei Sun and Ruiyu Dou}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {{RCS:} Hybrid Co-scheduling Optimization in Virtualized System}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {21--32}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_3}, doi = {10.1007/978-3-030-00009-7\_3}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhuWSD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZuoZZH18, author = {Liming Zuo and Mengli Zhang and Tingting Zhang and Kaiyu Hu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Blind Signature Scheme with Disclaimer Contract in the Standard Model}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {401--412}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_37}, doi = {10.1007/978-3-030-00009-7\_37}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZuoZZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2018-2, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7}, doi = {10.1007/978-3-030-00009-7}, isbn = {978-3-030-00008-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2018-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.