


default search action
4th ICCCS 2018: Haikou, China
- Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part IV. Lecture Notes in Computer Science 11066, Springer 2018, ISBN 978-3-030-00014-1
Encryption
- Zhicheng Zhao, Yaqun Zhao, Fengmei Liu:
The Research of Cryptosystem Recognition Based on Randomness Test's Return Value. 3-15 - Xi Chen, Yun Liu, Yong Li, Changlu Lin:
Threshold Proxy Re-encryption and Its Application in Blockchain. 16-25 - Liping Zhao, Xiaoni Du, Chenhuang Wu:
Trace Representation of the Sequences Derived from Polynomial Quotient. 26-37 - Hui-Ran Li, Mingxing Luo, Hong Lai:
Unified Quantum No-Go Theorems of Pure States. 38-47 - Mingda Liu
, Jing Shang
, Peng Liu
, Yijuan Shi
, Mian Wang
:
VideoChain: Trusted Video Surveillance Based on Blockchain for Campus. 48-58
Information Hiding
- Jun Wang
, Wenbo Wan, Mingsheng Zhang, Liming Zou, Jiande Sun:
A Blind Quantization Watermarking Scheme for Screen Content Image. 61-71 - Jin Shi, Li Zhang, Shuijun Yin, Weiwei Liu, Jiangtao Zhai, Guangjie Liu, Yuewei Dai:
A Comprehensive Analysis of Interval Based Network Flow Watermarking. 72-84 - Yazhou Kong
, Liancheng Zhang, Zhenxing Wang
, Yi Guo, Wen Guo:
A Covert Communication Model Based on IPv6 Multicast. 85-98 - Yi Chen, Hongxia Wang, Hanzhou Wu, Yanli Chen, Yong Liu:
A Data Hiding Scheme with High Quality for H.264/AVC Video Streams. 99-110 - Yitong Meng, Jinlong Fei, Yan Chen, Yuefei Zhu:
A Domain Name Model of Anonymous Network Hidden Service. 111-122 - Quansheng Gao
, Kaixi Wang
:
A Layered Steganography Model Based on User Interactions. 123-134 - Bin Ma, Xiaoyu Wang, Bing Li, Yunqing Shi:
A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hiding. 135-146 - Niandong Liao, Caixia Sun, Lingyun Xiang, Feng Li:
A Multiple Watermarking Scheme for Content Authentication of OOXML Format Documents. 147-159 - Li Li, Xin Li, Tong Qiao, Xiaoyu Xu, Shanqing Zhang, Chin-Chen Chang:
A Novel Framework of Robust Video Watermarking Based on Statistical Model. 160-172 - Jielin Jiang, Yan Cui, Yadang Chen, Guangwei Gao:
A Novel Nonlocal Low Rank Technique for Fabric Defect Detection. 173-182 - Xianglei Hu, Haishan Chen, Jiangqun Ni, Wenkang Su
:
A Novel Steganography Scheme Based on Asymmetric Embedding Model. 183-194 - Shiqin Liu
, Minjun Zhao
, Jixin Ma
, Jiangyuan Yao, Yucong Duan
, Xiaoyi Zhou
:
A Novel Watermarking Technology Based on Posterior Probability SVM and Improved GA. 195-207 - Minjun Zhao
, Shiqin Liu
, Chunjie Cao
, Jiangyuan Yao, Xiaoyi Zhou
:
A Secure Blind Watermarking Scheme Based on Dual Frequency Domains and Ergodic Matrix. 208-220 - Xiang Wang, Tianze Shu, Min Xie, Qingqi Pei:
Adaptive Robust Reversible Watermarking Scheme. 221-230 - Fang Cao, Yalei Zhang, Bowen An, Heng Yao, Zhenjun Tang:
An Improved Reversible Data Hiding Scheme with Large Payload Based on Image Local-Complexity. 231-241 - Guojiang Xin, Xitong Qi, Changsong Ding:
An Improved Tamper Detection and Location Scheme for DOCX Format Documents. 242-251 - Wen-chao Xie, Yi-yuan Yang, Zhaohong Li, Jin-wei Wang, Min Zhang:
An Information Hiding Algorithm for HEVC Videos Based on PU Partitioning Modes. 252-264 - Shiyu Li, Dengpan Ye, Shunzhi Jiang, Changrui Liu, Xiaoguang Niu, Xiangyang Luo:
Attack on Deep Steganalysis Neural Networks. 265-276 - Yiyuan Liang, Wei Zhang, Kehua Yang:
Attention-Based Chinese Word Embedding. 277-287 - Huanhuan Hu, Xin Zuo, Weiming Zhang, Nenghai Yu:
Covert Communication by Exploring Statistical and Linguistical Distortion in Text. 288-301 - Jielin Jiang, Yan Cui, Zilong Jin, Chunnian Fan:
Fast Three-Phase Fabric Defect Detection. 302-312 - Yifeng Sun, Xiaoyu Xu, Haitao Song, Guangming Tang, Shunxiang Yang:
Improving Testing Accuracy of Convolutional Neural Network for Steganalysis Using Segmented Subimages. 313-323 - Xiaoming Zhang, Qian Qiang, Weisheng Wang, Zhanfeng Wang, Xianglin Wei:
IPFRA: An Online Protocol Reverse Analysis Mechanism. 324-333 - Jialing Liu, Jingbing Li, Jing Chen, Xiangxi Zou, Jieren Cheng, Jing Liu
:
Medical Image Watermarking Based on SIFT-DCT Perceptual Hashing. 334-345 - Guangxin Fu, Qingbao Li, Zhifeng Chen, Guangyu Zeng, Juanjuan Gu:
Network Storage Covert Channel Detection Based on Data Joint Analysis. 346-357 - Xiaoli He, Hong Jiang, Yu Song, He Xiao:
Optimal Resource Allocation for Underlay Cognitive Radio Networks. 358-371 - Yi Puyang, Zhaoxia Yin, Xinpeng Zhang:
Reversible Data Embedding and Scrambling Method Based on JPEG Images. 372-381 - Dong Li, Yingnan Zhang, Ke Niu, Xiaoyuan Yang:
Reversible Data Hiding for Video. 382-391 - Sijin Cheng, Fangjun Huang:
Reversible Data Hiding in JPEG Images Based on Two-Dimensional Histogram Modification. 392-403 - Hanzhou Wu
, Wei Wang
, Jing Dong, Yanli Chen, Hongxia Wang, Songyang Wu:
Reversible Embedding to Covers Full of Boundaries. 404-415 - Yue Li, Hong-Xia Wang:
Robust H.264/AVC Video Watermarking Without Intra Distortion Drift. 416-427 - Zhenxing Qian
, Lin Pan, Sheng Li, Xinpeng Zhang:
Steganography by Constructing Marbling Texture. 428-439 - Yi Puyang, Zhenxing Qian
, Zhaoxia Yin, Xinpeng Zhang:
Style Transferring Based Data Hiding for Color Images. 440-449 - Zhiqiang Li, Gaoman Zhang, Wei Zhang, Hanwu Chen, Marek A. Perkowski:
Synthesis of Quantum Barrel Shifters. 450-462 - Yi Long, Yuling Liu:
Text Coverless Information Hiding Based on Word2vec. 463-472 - Jianjun Zhang, Yicheng Xie, Jun Shen, Lucai Wang, HaiJun Lin:
Text Information Hiding Method Using the Custom Components. 473-484 - Xin Zuo, Huanhuan Hu, Weiming Zhang, Nenghai Yu:
Text Semantic Steganalysis Based on Word Embedding. 485-495 - Ruowu Wu, Sen Wang, Hui Han, Xiang Chen, Xuhong Yin, Yun Lin
:
The Assessment Research of Communication Jamming Effect Based on Grey Relational Analysis. 496-505 - Shilin Li, Jing Wu, Taoyun Zhou, Dengzhun Wang, Zhuolin Gao:
The Phase and Amplitude Errors Frequency Dependence in L-Band Aperture Synthesis Radiometer Using External Noise Sources. 506-517 - Xu Yang, Yongbin Zhao, Ranran Li, Fengfeng Li, Xiaolin Qi:
Tracing System of Meat Supply Based on RFID and Two-Dimensional Code Technology. 518-527
IOT Security
- Jianming Cui, Rongquan Sui, Xiaojun Zhang, Hengzhong Li, Ning Cao:
A Biometrics-Based Remote User Authentication Scheme Using Smart Cards. 531-542 - Liangbo Xie, Wei Nie, Xiaolong Yang, Yong Wang, Mu Zhou:
A BLF Generation Scheme with Clock Variance-Tolerance for Baseband Processor of EPC Gen2 UHF RFID Tag. 543-552 - Kun Yang, Mingzhe Liu
, Yaming Yang, Xin Jiang:
A Design of Mobile Phone Privacy Protection Based on Block Chain. 553-562 - Langping Tang, Yuren Zhou, Zefeng Chen:
A Dominance-Based Constrained Optimization Evolutionary Algorithm for the 4-th Tensor Power Problem of Matrix Multiplication. 563-575 - Donghui Li, Cong Shen
, Xiaopeng Dai, Haiwen Chen:
A Kind of Agricultural Content Networking Information Fusion Method Based on Ontology. 576-588 - Zhongmiao Kang, Wenting Jiang, Yan Chen:
A Lightweight Graph-Based Model for Inter-networking Access Control. 589-597 - Jinlong Chen, Mengke Jiang, Kun Xie, Zhen Guo, Hang Pan, Xianjun Chen:
A Method for Energy Consumption Audit and Intelligent Decision of Green Buildings. 598-607 - Yang Yang, Xiang yang Gong, Xuesong Qiu, Zhipeng Gao, Haitao Yu:
A Mixed Mobile Charging Strategy in Rechargeable Wireless Sensor Networks. 608-621 - Sohaib Manzoor, Xiaojun Hei, Wenqing Cheng:
A Multi-controller Load Balancing Strategy for Software Defined WiFi Networks. 622-633 - Rongzhen Bian, Mingfu Xue, Jian Wang:
A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis. 634-646 - Ye Zhou, Jiabin Yuan, Xuwei Tang:
A Novel Part-Based Model for Fine-Grained Vehicle Recognition. 647-658 - Zhe Wang
, Weidong Yi, Yongrui Chen, Ming Li:
A Novel Photovoltaic Cell Simulator for Green Internet of Things. 659-670 - Andy Wang, Chen Wang, Meng Bi, Jian Xu
:
A Review of Privacy-Preserving Machine Learning Classification. 671-682 - Xiaodong Liu, Qi Liu, Yanyun Zou, Guizhi Wang:
A Self-organizing LSTM-Based Approach to PM2.5 Forecast. 683-693 - Jianming Cui, Chen Chen, Xiaojun Zhang, Yihui Liu, Ning Cao:
A Three-Factor Remote Authentication Scheme for Multi-server Environment. 694-705 - Xiaoliang Wang, Jianming Jiang, Baowei Wang, Zhihua Xia
:
A VANET Anonymous Authentication Mechanism for Multi-level Application Scenarios. 706-717

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.