default search action
4th ICCCS 2018: Haikou, China
- Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part V. Lecture Notes in Computer Science 11067, Springer 2018, ISBN 978-3-030-00017-2
IOT Security
- Jing Xu, Hongyan Qian, Yanchao Zhao:
Accurate Moving Distance Estimation via Multi-modal Fusion from IMU Sensors and WiFi Signal. 3-15 - Cui Zhao, Han Ding, Kaiyan Cui, Fan Liang:
Accurate UHF Tag Authentication Using Near-Field Capabilities. 16-26 - Chenxin Wang, Shunyao Kang:
ADFL: An Improved Algorithm for American Fuzzy Lop in Fuzz Testing. 27-36 - Wentian Zheng, Lijun Yang, Meng Wu:
An Improved Distributed PCA-Based Outlier Detection in Wireless Sensor Network. 37-49 - Yuxia Zhang, Xin Zhang, Fengtong Wen:
An Improved IoT Notion-Based Authentication and Key Agreement Protocol for Heterogenous Ad Hoc Wireless Sensor Network. 50-62 - Xiaodong Liu, Qi Liu:
Appliance Recognition Based on Continuous Quadratic Programming. 63-72 - Yanhan Yang, Yaming Yang, Jinlian Chen, Mingzhe Liu:
Application of BlockChain in Internet of Things. 73-82 - Chen Jin, Zeshui Xu, Guizhi Wang:
Assessment of Haze Effects in Human Lives: A Case Study of Investigation in Nanjing. 83-93 - Gongbo Wang, Weiyu Dong, Rui Chang:
Association Analysis of Firmware Based on NoSQL Database. 94-105 - Dong-fen Li, Rui-Jin Wang, Daniel Adu-Gyamfi, Jin-lian Chen, Ya-Ming Yang, Ming-Zhe Liu:
Authentication of Quantum Dialogue Under Noise. 106-117 - Shengqian Ma, Fanchen Meng, Yanruixuan Ma, Jisong Su:
Automatic Integrated Exhaust Fan Based on AT89S51 Single Chip Microcomputer. 118-127 - Suying Li, Zhenzhou Ma, Peitao Han, Siyang Zhao, Peiying Guo, Hepeng Dai:
Bring Intelligence to Ports Based on Internet of Things. 128-137 - Shanliang Xue, Mengying Li, Peiru Yang:
Centroid Location Technology Based on Fuzzy Clustering and Data Consistency. 138-147 - Xing Zhang, Liang Zhou:
Classification of Car Scratch Types Based on Optimized BP Neural Network. 148-158 - Jianjing Cui, Jun Long, Erxue Min, Qiang Liu, Qian Li:
Comparative Study of CNN and RNN for Deep Learning Based Intrusion Detection System. 159-170 - Yajie Sun, Yanqing Yuan, Lihua Wang:
Composite Structure Health Monitoring Review Based on FBG Sensor. 171-179 - Wenting Jiang, Yan Chen, Yingqian Liao:
Correlation Analysis of Alarm Data Based on Fuzzy Rule in Power Network. 180-190 - Min Cui, Fengtong Mei, Qiangyi Li, Qiangnan Li:
Coverage Holes Recovery Algorithm of Underwater Wireless Sensor Networks. 191-204 - Sunil Kr. Jha, Parimala Paramasivam, Zhaoqing Pan, Jinwei Wang:
Decision Stump and StackingC-Based Hybrid Algorithm for Healthcare Data Classification. 205-216 - Ziqing Zhang, Pingzeng Liu:
Design and Development of Wheat Production Information Management System Based on Internet of Things. 217-227 - Chun-ling Jiang, Song Xue:
Design of Indoor LED Intelligent Dimming and Color Modulation System Based on Zigbee. 228-240 - Tianyou Chang, Qiang Wei, Wenwen Liu, Yangyang Geng:
Detecting PLC Program Malicious Behaviors Based on State Verification. 241-255 - Xiaopeng Li, Fei Xiao, Ling Li, Jiangjiang Shen, Fengchen Qian:
Detection Method of Hardware Trojan Based on Wavelet Noise Reduction and Neural Network. 256-265 - Ning Liu, Min Yang, Hang Zhang, Chen Yang, Yang Zhao, Jianchao Gan, Shibin Zhang:
Detection of Android Applications with Malicious Behavior Based on Sparse Bayesian Learning Algorithm. 266-275 - Yue Fu, Rong Du, Dagang Li:
Distribution of CA-Role in Block-Chain Systems. 276-285 - Lingren Wang, Jingbing Li, Jieren Cheng, Uzair Aslam Bhatti, Qianning Dai:
DoS Attacks Intrusion Detection Algorithm Based on Support Vector Machine. 286-297 - Chunru Zhou, Min Lei, Kunchang Li, Li Xu, Wei Bi:
Dynamic-Enabled Defense Strategy Base on Improved CVSS for the Home Internet. 298-307 - Xiawei Jiang, Weidong Yi, Yongrui Chen, Hao He:
Energy Efficient Smart Irrigation System Based on 6LoWPAN. 308-319 - Zhiqiang Ruan, Haibo Luo, Wenzhong Lin:
Enhancing Named-Based Caching in NDN. 320-330 - Jianyong Zhang, Pingzeng Liu, Xue Wang, Rui Zhao:
Farmland Intelligent Information Collection System Based on NB-IoT. 331-343 - Wenzao Li, Bing Wan, Zhan Wen, Jianwei Liu, Yue Cao, Tao Wu, Jiliu Zhou:
FRDV: A DTN Routing Based on Human Moving Status in Urban Environments. 344-355 - Bin Ma, Qi Li:
High Speed Pharmaceutical Packaging Detection System Based on Genetic Algorithm and Memory Optimization. 356-368 - Kai Xue, Junyi Wang:
Identifying Influential Spreaders by Temporal Efficiency Centrality in Temporal Network. 369-383 - Yousheng Zhou, Chujun Wu:
Identifying Rumor Source of Online Social Networks in the SEIR Model. 384-394 - Liyang, Pingzeng Liu, Bangguo Li, Xueru Yu:
Intelligent Control System of Cucumber Production in the Greenhouse Based on Internet of Things. 395-406 - YuQun, Yan Zhang, Xiuli Wang, Baoquan Li:
Intelligent Poultry Environment Control System Based on Internet of Things. 407-417 - Lei Wang, Kunqin Li, Xianxiang Chen:
Internet of Things Security Analysis of Smart Campus. 418-428 - Hangyu Hu, Xuemeng Zhai, Mingda Wang, Guangmin Hu:
Linked-Behaviors Profiling in IoT Networks Using Network Connection Graphs (NCGs). 429-439 - Shaojun Yan, Haihua Liang, Xinpeng Zhang:
Location Privacy-Preserving Scheme Based on Multiple Virtual Maps. 440-452 - Shiyuan Zhang, Hui He, Zhi Wang, Mingze Gao, Jinsong Mao:
Low-Power Listen Based Driver Drowsiness Detection System Using Smartwatch. 453-464 - Hongyi Chen, Jinshu Su, Linbo Qiao, Yi Zhang, Qin Xin:
Malware Collusion Attack Against Machine Learning Based Methods: Issues and Countermeasures. 465-477 - Kondwani M. Kamoto, Qi Liu:
Monitoring Home Energy Usage Using an Unsupervised NILM Algorithm Based on Entropy Index Constraints Competitive Agglomeration (EICCA). 478-490 - Xueli Hu, Qi Xi, Zhenxing Wang:
Monitoring of Root Privilege Escalation in Android Kernel. 491-503 - Shirui Huang, Hengwei Zhang, Jindong Wang, Jianming Huang:
Network Defense Decision-Making Method Based on Stochastic Differential Game Model. 504-516 - Zhouwen Tan, Hongli Liu, Ziji Ma, Yun Cheng:
Noise Modeling and Analysis for Indoor Broadband Power Line Communication. 517-527 - Changchun Dong, Liang Zhou:
Optimization Algorithm for Freight Car Transportation Scheduling Optimization Based on Process Scheduling Optimization. 528-538 - Xingnan Li, Yi Cai, Wenhong Zhu:
Power Data Cleaning Method Based on Isolation Forest and LSTM Neural Network. 539-550 - Zhan Shi, Xingnan Li, Zhuo Su:
Power Missing Data Filling Based on Improved k-Means Algorithm and RBF Neural Network. 551-562 - Shujie Lu, Jia Yu, Ji Zhu:
Properties Emulation on TD-LTE Electric Power Wireless Private. 563-573 - Xi Li, Hanwu Chen, Zhihao Liu, Wenjie Liu, Mengke Xu:
Spatial Search for Two Marked Vertices on Hypercube by Continuous-Time Quantum Walk. 574-583 - Yixiang Jiang, Limei Fang:
Research and Application of Access Control Technology. 584-593 - Jianyong Zhang, Pingzeng Liu, Bangguo Li, Changqing Song:
Research and Implementation on the Traceability Equipment of the Whole Agricultural Industrial Chain. 594-605 - Ranran Li, Yongbin Zhao, Qing Xu, Xiaolin Qi:
Research of Subnetting Based on Huffman Coding. 606-616 - Zhaoyue Zhang, Jing Zhang, Sen Wang:
Research on Application of ATC Operation Security Based on Data Mining. 617-625 - Ning Wang, Yanyan Qin, Shuyang Guo:
Research on Application of Network Security Technology Based on Data Mining. 626-635 - Ke Jia, Xiaoming Ju, Hongbin Zhang:
Research on Big Data Fusion Method of Smart Grid in the Environment of Internet of Things. 636-647 - Qinghao Zeng, Renjun Tang, Xianjun Chen, Hang Pan, Jinlong Chen, Hui Zhou:
Research on Building Energy Consumption Acquisition System Based on Configuration. 648-657 - Jinhai Li, Yunlei Ma, Huisheng Zhu, Youshi He:
Research on Feedback Effects Between Perception of Internet Word of Mouth and Online Reviews Based on Dynamic Endogeneity. 658-669 - Li Jin, Li Li:
Research on Fire Image Detection Technology Base on RBF. 670-681 - Hongwei Zhu, Yajun Liu, Yingjiu Guo, Jing Jiang:
Research on Indoor Positioning Method Based on Visible Light Communication Technology. 682-690 - Xiao Long, Liang Zhou, Hongyuan Zheng:
Research on Real-Time Storage Technology of UAV Freight Stream Data. 691-700 - Chaoyi Liu, Lei Zhang, Lu Wang, Xiaolan Zhu, Xiaoying Wang:
Research on Syndrome Classification and Risk Factors Extraction of Tibetan Medicine Based on Clustering. 701-711 - Lin Hou, Laiwen Wei, Chen Wang, Andi Wang, Jian Xu:
Research on Two-Factor Identity Authentication System Based on Smart Phone and User Password. 712-723 - Qin Zhou, Yaming Yang, Jinlian Chen, Mingzhe Liu:
Review on Blockchain Application for Internet of Things. 724-733 - Ling-Ling Xia, Bo Song, Liang Zhang:
Rumor Spreading Model Considering Rumor's Attraction in Heterogeneous Social Networks. 734-745
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.