- Yang Su, Wenzhe Zhang, Wenwei Tao, Zhizhong Qiao:
A Network Illegal Access Detection Method Based on PSO-SVM Algorithm in Power Monitoring System. ICCCS (2) 2018: 450-459 - Jieli Sun, Zhiqing Zhu, Yanpiao Zhang, Yanxia Zhao, Yao Zhai:
Research on Personalized Recommendation Case Base and Data Source Based on Case-Based Reasoning. ICCCS (2) 2018: 114-123 - Tiantian Tan, Baosheng Wang, Zhou Xu, Yong Tang:
The New Progress in the Research of Binary Vulnerability Analysis. ICCCS (2) 2018: 265-276 - Tiantian Tan, Baosheng Wang, Zhou Xu, Yong Tang:
The New Progress in the Research of Binary Vulnerability Exploits. ICCCS (2) 2018: 277-286 - Runzhe Tao, Yonghong Zhang, Lihua Wang, Xiaoping Zhao:
Research of Tool State Recognition Based on CEEMD-WPT. ICCCS (2) 2018: 59-70 - Yuhang Wang, Hongli Zhang, Shen Su:
VAT: A Velocity-Aware Trajectory Privacy Preservation Scheme for IoT Searching. ICCCS (2) 2018: 357-365 - Hongbin Wang, Ming He, Lianke Zhou, Zijin Li, Haomin Zhan, Rang Wang:
Remove-Duplicate Algorithm Based on Meta Search Result. ICCCS (2) 2018: 33-44 - Dingcheng Wang, Yiyi Lu, Beijing Chen, Liming Chen:
Research on Intuitionistic Fuzzy Multiple Output Least Squares Support Vector Regression. ICCCS (2) 2018: 389-398 - Xue Wang, Pingzeng Liu, Xuefei Liu:
Research on Key Climatic Factors of Desert Based on Big Data. ICCCS (2) 2018: 105-113 - Haiyong Wang, Yao Peng:
A CP-ABE Access Control Scheme Based on Proxy Re-encryption in Cloud Storage. ICCCS (2) 2018: 413-425 - Yu-xiang Wang, Qi Wang, Zhi-feng Zhou:
The Handoff Mechanism Based on Mobile Location Prediction. ICCCS (2) 2018: 254-264 - Hongbin Wang, Guisheng Yin, Lianke Zhou, Yupeng Zhang, Zhen Cao:
Social Networks Node Mining Algorithm of Based on Greedy Subgraph. ICCCS (2) 2018: 157-168 - Qi Wang, Dehua Zhou, Quanlong Guan, Yanling Li, Jimian Yang:
A Privacy-Preserving Classifier in Statistic Pattern Recognition. ICCCS (2) 2018: 496-507 - Junhua Xi, Kouquan Zheng:
The Benchmark Performance Testing Method for Cluster Heterogeneous Network Based on STC Platform. ICCCS (2) 2018: 223-231 - Ting Xiao, Yongfeng Huang:
Design and Implementation of Web System Based on Blockchain. ICCCS (2) 2018: 706-717 - Tong Xiao, Jingbing Li, Jing Liu, Jieren Cheng, Uzair Aslam Bhatti:
A Robust Algorithm of Encrypted Face Recognition Based on DWT-DCT and Tent Map. ICCCS (2) 2018: 508-518 - Junquan Yang, Song Liu, Wenwei Tao, Chao Hu:
A Distributed Security Feature Selection Algorithm Based on K-means in Power Grid System. ICCCS (2) 2018: 439-449 - Luhui Yang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Zhaozhi Yan, Yuguang Zou, Wenchao Huang:
A Novel Detection Method for Word-Based DGA. ICCCS (2) 2018: 472-483 - Dan Yang, Tiezheng Nie, Jing Zhang:
Temporal Evolution Data Model for Heterogeneous Entities: Modeling with Temporal and Evolution Information. ICCCS (2) 2018: 202-211 - Xiaohui Yang, Yue Yu:
DDoS Attacks Detection and Traceback Method Based on Flow Entropy Algorithm and MPLS Principle. ICCCS (2) 2018: 670-683 - Mengmeng Yao, Dongsheng Zhou, Rui Deng, Mingda Liu:
A Security Protocol for Access to Sensitive Data in Trusted Cloud Server. ICCCS (2) 2018: 531-542 - Zhongxu Yin, Zhufeng Li, Yan Cao:
A Web Application Runtime Application Self-protection Scheme against Script Injection Attacks. ICCCS (2) 2018: 566-577 - Shuyan Yu:
Towards the Cloud Computing from Services to Securities and Challenges. ICCCS (2) 2018: 334-343 - Ruizhi Zhang, Jieren Cheng, Xiangyan Tang, Qiang Liu, Xiangfeng He:
DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm. ICCCS (2) 2018: 654-669 - Junbao Zhang, Guohua Liu, Zhao Chen:
Serialization of Lifecycles in ACBP Model as Regular Expressions. ICCCS (2) 2018: 147-156 - Hongrun Zhang, Bin Li, Shunquan Tan:
A New Steganographic Distortion Function with Explicit Considerations of Modification Interactions. ICCCS (2) 2018: 460-471 - Hongbin Zhang, Pengcheng Ma, Meihua Wang:
Detecting Inconsistency and Incompleteness in Access Control Policies. ICCCS (2) 2018: 731-739 - Chao Zhang, Junmei Wang, Pingzeng Liu, Wanming Ren, Weijie Chen, Yanyan Wang:
Traffic Accident Time Series Analysis. ICCCS (2) 2018: 344-356 - Xiaoming Zhang, Zhanfeng Wang, Xianglin Wei, Zihan Zhuo, Chao Hu:
A Delay Step Based Geolocation Data Verification Method. ICCCS (2) 2018: 426-438 - Lin Zhang, Ruili Zhao, Mengxing Huang, Zhonghua Liu, Jieren Cheng, Yu Zhang:
Research on Indirect Location Technology of Ground Target Based on Scene Matching. ICCCS (2) 2018: 90-104