default search action
TrustCom/BigDataSE/ISPA 2016: Tianjin, China
- 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016. IEEE 2016, ISBN 978-1-5090-3205-1
TrustCom 2016: The 15th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications
TrustCom Trust Track
- Peng Xiao, Zhiyang Li, Heng Qi, Wenyu Qu, Haisheng Yu:
An Efficient DDoS Detection with Bloom Filter in SDN. 1-6 - Anirban Basu, Shinsaku Kiyomoto, Jaideep Vaidya, Stephen Marsh:
PrefRank: Quantification and Aggregation of Subjective User Preferences. 7-13 - Xi Huang, Xiaoguang Liu, Gang Wang, Ming Su:
A Robust Image Hashing with Enhanced Randomness by Using Random Walk on Zigzag Blocking. 14-18 - Shengshan Hu, Qian Wang, Jingjun Wang, Sherman S. M. Chow, Qin Zou:
Securing Fast Learning! Ridge Regression over Encrypted Big Data. 19-26 - Tianqi Zhou, Bing Chen, Chunsheng Zhu, Xiangping Zhai:
TPAHS: A Truthful and Profit Maximizing Double Auction for Heterogeneous Spectrums. 27-33 - Quang-Vinh Dang, Claudia-Lavinia Ignat:
Computational Trust Model for Repeated Trust Games. 34-41 - Caimei Wang, Yan Xiong, Wenchao Huang, Huihua Xia, Jianmeng Huang:
Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus. 42-49 - Hui Xia, Guo-Dong Wang, Zhenkuan Pan:
Node Trust Prediction Framework in Mobile Ad Hoc Networks. 50-56 - Fajiang Yu, Lie Chen, Huanguo Zhang:
Virtual TPM Dynamic Trust Extension Suitable for Frequent Migrations. 57-65 - Xu Yang, Ting-Ting Lee, Joseph K. Liu, Xinyi Huang:
Trust Enhancement over Range Search for Encrypted Data. 66-73 - Haoyi Cui, Qingzhong Li, Hui Li, Zhongmin Yan:
Healthcare Fraud Detection Based on Trustworthiness of Doctors. 74-81 - Dilshan Jayarathna, Vijay Varadharajan, Udaya Kiran Tupakula:
Integrated Security for Services Hosted in Virtual Environments. 82-89 - Xinping Min, Qingzhong Li, Lei Liu, Lizhen Cui:
A Permissioned Blockchain Framework for Supporting Instant Transaction and Dynamic Block Size. 90-96 - Salman Manzoor, Ahmed Taha, Neeraj Suri:
Trust Validation of Cloud IaaS: A Customer-centric Approach. 97-104 - Xiuwen Zhou, Qianhong Wu, Bo Qin, Xinyi Huang, Jianwei Liu:
Distributed Bitcoin Account Management. 105-112 - Cong Zuo, James Macindoe, Siyin Yang, Ron Steinfeld, Joseph K. Liu:
Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption. 113-120 - Jian Peng, Kim-Kwang Raymond Choo, Helen Ashman:
Astroturfing Detection in Social Media: Using Binary n-Gram Analysis for Authorship Attribution. 121-128 - Zechao Liu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Chunkai Zhang, Xiaomeng Zhao:
Dynamic Attribute-Based Access Control in Cloud Storage Systems. 129-137 - Xu Yang, Yuexin Zhang, Joseph K. Liu, YaLi Zeng:
A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks. 138-143 - Christine Blakemore, João Redol, Miguel Correia:
Fingerprinting for Web Applications: From Devices to Related Groups. 144-151 - Wu Luo, Wei Liu, Yang Luo, Anbang Ruan, Qingni Shen, Zhonghai Wu:
Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations. 152-159 - Muhammad Saleem Khan, Idrees Ahmed, Abid Khan, Majid Iqbal Khan:
Adaptive Reputation Weights Assignment Scheme for MANETs. 160-167 - Carlton Shepherd, Ghada Arfaoui, Iakovos Gurulian, Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram, Damien Sauveron, Emmanuel Conchon:
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems. 168-177 - Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan:
An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. 178-184 - Tharam S. Dillon, Elizabeth Chang:
Trust and Risk Semantics and Prediction through Big Data Analytics to Encompass Cloud Services, Cyber-Physical Systems, and Social Media: Issues and Challenges. 185-193
TrustCom Security Track
- Fangxiao Ning, Min Zhu, Ruibang You, Gang Shi, Dan Meng:
Group-Based Memory Deduplication against Covert Channel Attacks in Virtualized Environments. 194-200 - Kazuhide Fukushima, Youssef Souissi, Seira Hidano, Robert Nguyen, Jean-Luc Danger, Sylvain Guilley, Yuto Nakano, Shinsaku Kiyomoto, Laurent Sauvage:
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology. 201-207 - Jinkun Pan, Xiaoguang Mao:
DomXssMicro: A Micro Benchmark for Evaluating DOM-Based Cross-Site Scripting Detection. 208-215 - Jiliang Zhang:
Combinational Logic Binding for FPGA System Security. 216-223 - Juhua Liu, Guoqiang Bai, Xingjun Wu:
Efficient Hardware Implementation of Roadrunner for Lightweight Application. 224-227 - Yan Yang, Xingang Shi, Xia Yin, Zhiliang Wang:
The Power of Prefix Hijackings in the Internet Hierarchy. 228-235 - Hong Rong, Huimei Wang, Jian Liu, Wei Wu, Ming Xian:
Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments. 236-243 - Xin Su, Dafang Zhang, Wenjia Li, Kai Zhao:
A Deep Learning Approach to Android Malware Feature Learning and Detection. 244-251 - Yajuan Xiao, Shoufeng Cao, Zhenzhong Cao, Fengyu Wang, Fengbo Lin, Jiayan Wu, Hancheng Bi:
Matching Similar Functions in Different Versions of a Malware. 252-259 - Hua Jin, Changda Wang:
Robustness of the Packet Delay Channels. 260-267 - Jianyi Zhang, Yang Pan, Zhiqiang Wang, Biao Liu:
URL Based Gateway Side Phishing Detection Method. 268-275 - Ziyu Wang, Jiahai Yang, Shize Zhang, Chenxi Li, Hui Zhang:
Automatic Model Selection for Anomaly Detection. 276-283 - Yafei Sang, Shicong Li, Yongzheng Zhang, Tao Xu:
ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning via Byte Embedding. 284-291 - Guozhu Zhang, Luning Xia, Shijie Jia, Yafei Ji:
Identification of Cloned HF RFID Proximity Cards Based on RF Fingerprinting. 292-300 - Zhengyang Chen, Bowen Yu, Yu Zhang, Jianzhong Zhang, Jingdong Xu:
Automatic Mobile Application Traffic Identification by Convolutional Neural Networks. 301-307 - Qian Zhang, Ying Jiang, Peng Wu:
Modelling and Analysis of Network Security - An Algebraic Approach. 308-315 - Li Cheng, Yijie Wang, Xingkong Ma, Yongjun Wang:
GSLAC: A General Scalable and Low-Overhead Alert Correlation Method. 316-323 - Ryoki Shinohara, Takashi Kamimoto, Kazuya Sato, Hiroshi Shigeno:
Cache Control Method Mitigating Packet Concentration of Router Caused by Interest Flooding Attack. 324-331 - Hannan Xiao, Awatif Ali Alshehri, Bruce Christianson:
A Cloud-Based RFID Authentication Protocol with Insecure Communication Channels. 332-339 - Gustavo Gonzalez Granadillo, Jose Rubio-Hernan, Joaquín García-Alfaro, Hervé Debar:
Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms. 340-348 - Haibin Chen, Lei Zhang, Junyuan Xie, Chongjun Wang:
New Efficient Certificateless Blind Signature Scheme. 349-353 - Zonghao Guo, Ou Wei, Peng Yu, Lansheng Han, Weiming Wu:
Model Checking Probabilistic Network Propagation Protection Strategies. 354-361 - Zhenhai Cao, Bo Lang, Jinmiao Wang:
An Efficient and Fine-Grained Access Control Scheme for Multidimensional Data Aggregation in Smart Grid. 362-369 - Florian Gottwalt, Adrian Waller, Weiru Liu:
Natural Laws as a Baseline for Network Anomaly Detection. 370-377 - Zimin Lin, Rui Wang, Xiaoqi Jia, Shengzhi Zhang, Chuankun Wu:
Classifying Android Malware with Dynamic Behavior Dependency Graphs. 378-385 - Zimin Lin, Rui Wang, Xiaoqi Jia, Jingyu Yang, Daojuan Zhang, Chuankun Wu:
ForceDROID: Extracting Hidden Information in Android Apps by Forced Execution Technique. 386-393 - Jianming Fu, Yan Lin, Xu Zhang:
Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table. 394-401 - Xiaochao Li, Chunhui Cao, Pengtao Li, Shuli Shen, Yihui Chen, Lin Li:
Energy-Efficient Hardware Implementation of LUKS PBKDF2 with AES on FPGA. 402-409 - Yu Wang, Yuqing Zhang, Kai Wang, Jingbo Yan:
Security Analysis and Vulnerability Detection of Gesture-Based Lock in Android Applications. 410-417 - Xiaochao Wei, Han Jiang, Chuan Zhao, Minghao Zhao, Qiuliang Xu:
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries. 418-425 - Thomas Lenz, Bernd Zwattendorfer:
Towards Cross-Border Authorization in European eID Federations. 426-434 - Xinyu Yang, Xiaofei He, Jie Lin, Wei Yu, Qingyu Yang:
A Game-Theoretic Model on Coalitional Attacks in Smart Grid. 435-442 - Danushka Jayasinghe, Konstantinos Markantonakis, Iakovos Gurulian, Raja Naeem Akram, Keith Mayes:
Extending EMV Tokenised Payments to Offline-Environments. 443-450 - Lei Zhou, Xiaowei Liu, Qin Liu, Guojun Wang:
A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation. 451-457 - Liu Yang, Xingmin Cui, Changyuan Wang, Shanqing Guo, Xin-Shun Xu:
Risk Analysis of Exposed Methods to JavaScript in Hybrid Apps. 458-464 - Heng Zhang, Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri:
SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats. 465-472 - Jacob Abegunde, Hannan Xiao, Joseph Spring:
A Dynamic Game with Adaptive Strategies for IEEE 802.15.4 and IoT. 473-480 - Danye Wu, Zhiwei Xu, Bo Chen, Yujun Zhang:
What If Routers Are Malicious? Mitigating Content Poisoning Attack in NDN. 481-488 - Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Tianzhang Xing, Guixin Ye, Jie Zhang, Zheng Wang:
Exploiting Dynamic Scheduling for VM-Based Code Obfuscation. 489-496 - Hong Zhu, Bin Wu, Meiyi Xie, Zongmin Cui, Zongda Wu:
Secure Shortest Path Search over Encrypted Graph Supporting Synonym Query in Cloud Computing. 497-504 - Fangwen Yu, Ming Su, Gang Wang, Mingming Ren:
Error Decomposition Algorithm for Approximating the k-Error Linear Complexity of Periodic Sequences. 505-510 - Fang Lyu, Yapin Lin, Junfeng Yang, Junhai Zhou:
SUIDroid: An Efficient Hardening-Resilient Approach to Android App Clone Detection. 511-518 - Yang Lu, Richard O. Sinnott:
Semantic-Based Privacy Protection of Electronic Health Records for Collaborative Research. 519-526 - Shaun Stricot-Tarboton, Sivadon Chaisiri, Ryan K. L. Ko:
Taxonomy of Man-in-the-Middle Attacks on HTTPS. 527-534 - Sivadon Chaisiri, Ryan K. L. Ko:
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty. 535-543 - Thabet Kacem, Duminda Wijesekera, Paulo Cesar G. da Costa, Alexandre Barreto:
An ADS-B Intrusion Detection System. 544-551 - Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula:
An Accurate FDD-Based Approach for Discovering Distributed Firewalls Misconfigurations. 552-559 - Jianming Fu, Pengwei Li, Yan Lin, Shuang Ding:
Android App Malicious Behavior Detection Based on User Intention. 560-567 - Lyes Touati, Hamed Hellaoui, Yacine Challal:
Threshold Yoking/Grouping Proofs Based on CP-ABE for IoT Applications. 568-575 - Weiwei Ding, Jin Wang, Xiumin Wang, Ruimin Zhao, Yanqin Zhu:
Optimal Flow Allocation and Linear Network Coding Design for Multiple Multicasts under the Requirements of Information Theoretical Security. 576-583 - Zhongyuan Hao, Wei Guo, Jizeng Wei, Dazhi Sun:
Dual Processing Engine Architecture to Speed Up Optimal Ate Pairing on FPGA Platform. 584-589 - Muhammad Usman, Mian Ahmad Jan, Xiangjian He, Priyadarsi Nanda:
Data Sharing in Secure Multimedia Wireless Sensor Networks. 590-597 - Montida Pattaranantakul, Ruan He, Ahmed Meddahi, Zonghua Zhang:
SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration. 598-605 - Raja Naeem Akram, Pierre-François Bonnefoi, Serge Chaumette, Konstantinos Markantonakis, Damien Sauveron:
Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements. 606-614 - Tao Yin, Yongzheng Zhang, Jia Li:
AppBot: A Novel P2P Botnet Architecture Resistant to Graph-Based Tracking. 615-622 - Yuchuan Luo, Shaojing Fu, Kai Huang, Dongsheng Wang, Ming Xu:
Securely Outsourcing of Bilinear Pairings with Untrusted Servers for Cloud Storage. 623-629 - Yang Luo, Wu Luo, Xiaoning Sun, Qingni Shen, Anbang Ruan, Zhonghai Wu:
Whispers between the Containers: High-Capacity Covert Channel Attacks in Docker. 630-637 - Daniel Tse, Lu Wang, Yuxi Li:
Mobility Management for Enterprises in BYOD Deployment. 638-645 - Tianyi Xie, Yuanyuan Zhang, Juanru Li, Hui Liu, Dawu Gu:
New Exploit Methods against Ptmalloc of GLIBC. 646-653 - Nian Xue, Xin Huang, Jie Zhang:
S2Net: A Security Framework for Software Defined Intelligent Building Networks. 654-661 - Qian Sun, Qingni Shen, Cong Li, Zhonghai Wu:
SeLance: Secure Load Balancing of Virtual Machines in Cloud. 662-669 - Xiaoyan Yang, Han Jiang, Qiuliang Xu, Mengbo Hou, Xiaochao Wei, Minghao Zhao, Kim-Kwang Raymond Choo:
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol. 670-677 - Jian Li, Wenhuan Lu, Chen Zhang, Jianguo Wei, Xiaochun Cao, Jianwu Dang:
A Study on Detection and Recovery of Speech Signal Tampering. 678-682 - Zilong Wen, Weiqi Dai, Deqing Zou, Hai Jin:
PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing Infrastructures. 683-690 - Dan Su, Wei Wang, Xing Wang, Jiqiang Liu:
Anomadroid: Profiling Android Applications' Behaviors for Identifying Unknown Malapps. 691-698 - Jiexin Zhang, Xiaoxue Liu, Peidong Zhu:
Securing Power System State Estimation. 699-706 - Sardar Hussain, Richard O. Sinnott, Ron Poet:
A Security-Oriented Workflow Framework for Collaborative Environments. 707-714 - Bo Zhou, Qi Shi, Po Yang:
A Survey on Quantitative Evaluation of Web Service Security. 715-721
TrustCom Privacy Track
- Xuying Meng, Zhiwei Xu, Bo Chen, Yujun Zhang:
Privacy-Preserving Query Log Sharing Based on Prior N-Word Aggregation. 722-729 - Shaobo Zhang, Qin Liu, Guojun Wang:
Enhancing Location Privacy through User-Defined Grid in Location-Based Services. 730-736 - Xin Pei, Yongjian Wang, Wei Yao, Jiuchuan Lin, Ruxiang Peng:
Security Enhanced Attribute Based Signcryption for Private Data Sharing in Cloud. 737-743 - Dali Zhu, Na Pang, Gang Li, Wenjing Rong, Zheming Fan:
WiN: Non-invasive Abnormal Activity Detection Leveraging Fine-Grained WiFi Signals. 744-751 - Shu Chen, Hong Shen:
Semantic-Aware Dummy Selection for Location Privacy Preservation. 752-759 - Zhikai Xu, Hongli Zhang, Xiang-Zhan Yu:
Multiple Mix-Zones Deployment for Continuous Location Privacy Protection. 760-766 - Fabio Martinelli, Andrea Saracino, Mina Sheikhalishahi:
Modeling Privacy Aware Information Sharing Systems: A Formal and General Approach. 767-774 - Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Shlomi Dolev:
Local Self-Organization with Strong Privacy Protection. 775-782 - Erald Troja, Spiridon Bakiras:
Privacy-Preserving Location-Aware Mobile Advertisement. 783-790 - Zakaria Gheid, Yacine Challal:
Efficient and Privacy-Preserving k-Means Clustering for Big Data Mining. 791-798 - Zaid Ameen Abduljabbar, Hai Jin, Ayad Ibrahim, Zaid Alaa Hussien, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Privacy-Preserving Image Retrieval in IoT-Cloud. 799-806 - Xiaolei Wang, Yuexiang Yang, Chuan Tang, Yingzhi Zeng, Jie He:
DroidContext: Identifying Malicious Mobile Privacy Leak Using Context. 807-814 - Yiping Teng, Xiang Cheng, Sen Su, Rong Bi:
Privacy-Preserving Top-k Nearest Keyword Search on Outsourced Graphs. 815-822 - Peng Liu, Yidong Li, Yingpeng Sang, Ji Zhang:
Anonymity-Based Privacy Preserving Network Data Publication. 823-828 - Shibin Sun, Yuliang Shi, Shidong Zhang, Lizhen Cui:
A Privacy Protection Mechanism for NoSql Database Based on Data Chunks. 829-836 - Yu Chen, Yuliang Shi, Li-zhen Cui:
Model for Hiding Data Relationships Based on Chunk-Confusion in Cloud Computing. 837-844 - Xiaoyu Zhu, Qin Liu, Guojun Wang:
A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing. 845-851 - Kunding Fang, Xiaohong Li, Jianye Hao, Zhiyong Feng:
Formal Modeling and Verification of Security Protocols on Cloud Computing Systems Based on UML 2.3. 852-859 - Sanjeet Kumar Nayak, Somanath Tripathy:
Privacy Preserving Provable Data Possession for Cloud Based Electronic Health Record System. 860-867 - Gaurav Misra, Jose M. Such, Hamed Balogun:
IMPROVE - Identifying Minimal PROfile VEctors for Similarity Based Access Control. 868-875 - Juru Zeng, Yuncheng Wu, Yao Wu, Hong Chen, Cuiping Li, Shan Wang:
Energy-Efficient and Privacy-Preserving Range Query in Participatory Sensing. 876-883 - Longkun Guo, Hong Shen:
Privacy-Preserving Internet Traffic Publication. 884-891 - Pei Chen, Yaping Lin, Wei Zhang, Xiaoying Li, Shiwen Zhang:
Preserving Location and Content Privacy for Secure Ranked Queries in Location Based Services. 892-899 - Mark A. Will, Ryan K. L. Ko, Ian H. Witten:
Privacy Preserving Computation by Fragmenting Individual Bits and Distributing Gates. 900-908 - Lihai Nie, Zhiyang Li, Wenyu Qu:
Association Rules Discovery via Approximate Method from Probabilistic Database. 909-914 - Longwang Cheng, Wei Li, Dongtang Ma, Li Zhou, Chunsheng Zhu, Jibo Wei:
Towards an Effective Secret Key Generation Scheme for Imperfect Channel State Information. 915-920 - Genqiang Wu, Yeping He, JingZheng Wu, Xianyao Xia:
Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function Computation. 921-928
TrustCom Forensics Track
- Yanchen Qiao, Xiaochun Yun, Yongzheng Zhang:
How to Automatically Identify the Homology of Different Malware. 929-936 - Yanchen Qiao, Xiaochun Yun, Yongzheng Zhang:
Fast Reused Function Retrieval Method Based on Simhash and Inverted Index. 937-944 - Long Chen, Yue Mao:
Forensic Analysis of Email on Android Volatile Memory. 945-951 - Xiu-Li Bi, Chi-Man Pun, Xiaochen Yuan:
Adaptive Polar Based Filtering Method for Image Copy-Move Forgery Detection. 952-956 - Benjamin Taubmann, Noëlle Rakotondravony, Hans P. Reiser:
CloudPhylactor: Harnessing Mandatory Access Control for Virtual Machine Introspection in Cloud Data Centers. 957-964 - Yunan Zhang, Qingjia Huang, Xinjian Ma, Zeming Yang, Jianguo Jiang:
Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification. 965-973 - Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, Iakovos Gurulian:
Log Your Car: The Non-invasive Vehicle Forensics. 974-982 - Qiang Rao, Jianjun Wang, Liming Zhang:
Enhancing Source Camera Identification Based on Multiplicative Denoising Filter. 983-988 - Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai:
Power Traces Clipping and Splicing Enhanced Correlation Collision Analysis. 989-995 - Xinwen Zhang, Huakang Li, Yitao Yang, Guozi Sun, Guangxuan Chen:
LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code. 996-1000 - Wei Dong, Jianjun Wang:
JPEG Compression Forensics against Resizing. 1001-1007 - Denys A. Flores, Farrukh Qazi, Arshad Jhumka:
Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information. 1008-1015 - Xinping Zhou, Degang Sun, Zhu Wang, Changhai Ou, Juan Ai:
Double-Key Recovery Based Correlation Power Analysis. 1016-1022 - Dali Zhu, Junhuang Chen, Yanfang Zhang, Siye Wang, Huafeng Kong:
An Efficient Approach of Integrating RFID and Vision Techniques in Object Surveillance System. 1023-1029 - Guoqiang Li, Bian Yang, Christoph Busch:
A Fingerprint Indexing Algorithm on Encrypted Domain. 1030-1037 - Yandong Han, Zhiyu Hao, Lei Cui, Chonghua Wang, Yafei Sang:
A Hybrid Monitoring Mechanism in Virtualized Environments. 1038-1045 - Liu Cao, Yuqing Sun, Shaoqing Wang, Mingzhu Li:
Detecting Malicious Behavior and Collusion for Online Rating System. 1046-1053 - Chao Shen, Haodi Xu, Haijun Wang, Xiaohong Guan:
Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis. 1054-1060 - Weizhi Meng, Xiapu Luo, Wenjuan Li, Yan Li:
Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice. 1061-1068
ISPA 2016: The 14th IEEE International Symposium on Parallel and Distributed Processing with Applications
- Jingwei Ma, Gang Wang, Xiaoguang Liu:
DedupeSwift: Object-Oriented Storage System Based on Data Deduplication. 1069-1076 - Shengli Gao, Ruini Xue:
BOLAS+: Scalable Lightweight Locality-Aware Scheduling for Hadoop. 1077-1084 - Jingwei Ma, Boxue Yin, Zhi Kong, Yuxiang Ma, Chang Chen, Long Wang, Gang Wang, Xiaoguang Liu:
Leveraging Page-Level Compression in MySQL - A Practice at Baidu. 1085-1092 - Bo Wang, Ying Song, Yuzhong Sun, Jun Liu:
Improvements to Online Distributed Monitoring Systems. 1093-1100 - Yanbo Liu, Wenchao Xu, Feilong Tang, Lei Kuang, Yanqin Yang:
An Improved Multi-path Routing Algorithm for Hybrid LEO-MEO Satellite Networks. 1101-1105 - João A. Silva, Ricardo Monteiro, Hervé Paulino, João M. Lourenço:
Ephemeral Data Storage for Networks of Hand-Held Devices. 1106-1113 - Minglei Jia, Yanqin Yang, Lei Kuang, Wenchao Xu, Tianxing Chu, Hongzhi Song:
An Indoor and Outdoor Seamless Positioning System Based on Android Platform. 1114-1120 - Tong Shen, Dafang Zhang:
Rule Selector: A Novel Scalable Model for High-Performance Flow Recognition. 1121-1128 - Liangyi Gong, Wu Yang, Chaocan Xiang, Dapeng Man, Miao Yu, Zuwei Yin:
WiSal: Ubiquitous WiFi-Based Device-Free Passive Subarea Localization without Intensive Site-Survey. 1129-1136 - Yujuan Tan, Zhichao Yan:
Multi-objective Based Performance Evaluation of Deduplication Approaches. 1137-1144 - Liang Zhu, Hai Jin, Xiaofei Liao:
A Tool to Detect Performance Problems of Multi-threaded Programs on NUMA Systems. 1145-1152 - Meng Jiang, Yanbo Liu, Wenchao Xu, Feilong Tang, Yanqin Yang, Lei Kuang:
An Optimized Layered Routing Algorithm for GEO/LEO Hybrid Satellite Networks. 1153-1158 - Xiaoqiang Pei, Yijie Wang, Xingkong Ma, Fangliang Xu:
Pipelined Online Data Insertion for Erasure Codes in Distributed Storage Systems. 1159-1166 - Fanzi Zeng, Jie Li, Jisheng Xu, Jing Zhong:
A Trust-Based Cooperative Spectrum Sensing Scheme against SSDF Attack in CRNs. 1167-1173 - Shuai Zhang, Lei Liu, Hui Li, Zongshui Xiao, Lizhen Cui:
MTPGraph: A Data-Driven Approach to Predict Medical Risk Based on Temporal Profile Graph. 1174-1181 - Dali Li, Chuanfu Xu, Ningbo Guo:
Evaluating and Optimizing Parallel LU-SGS for High-Order CFD Simulations on the Tianhe-2 Supercomputer. 1182-1189 - Shiming Lei, Chao Wang, Haijie Fang, Xi Li, Xuehai Zhou:
SCADIS: A Scalable Accelerator for Data-Intensive String Set Matching on FPGAs. 1190-1197 - Jigang Wu, Ningjing Liu, Siew Kei Lam, Guiyuan Jiang:
Shortest Partial Path First Algorithm for Reconfigurable Processor Array with Faults. 1198-1203 - Qijia Zhang, Fangjin Zhu, Canhui Wang:
An Enhanced Node Mapping Algorithm for VNE Problem Based on Path Relevance. 1204-1209 - Cheng Ling, Jing-Yang Gao, Gang Lu:
Phylogenetic Likelihood Estimation on GPUs Using Vertical Partitioning Scheme. 1210-1217 - Yamin Li, Wanming Chu:
Adjusting Parameters of k-Ary n-Cube to Achieve Better Cost Performance. 1218-1225 - Yali Lv, Cheng-Kuan Lin, Jianxi Fan:
Hamiltonian Cycle and Path Embeddings in 3-Ary n-Cubes Based on K1, 2-Structure Faults. 1226-1232 - Shiming He, Kun Xie, Kexin Xie, Zhetao Li, Chuan Xu:
Interference-Aware Multi-source Transmission. 1233-1240 - Zhiwei Zhou, Junwu Zhu, Yi Jiang, Bin Li:
A Truthful Greedy Mechanism toward Resource Sharing for Cloudlets in Mobile Cloud Computing. 1241-1247 - Lida Zou, Qingzhong Li, Hui Li, Shidong Zhang, Yongqing Zheng, Zongshui Xiao:
Penalty Cost Minimization for Multi-tenant Query Deadline Employing Cache Optimization and Log Based Dispatching. 1248-1255 - Wei Zhang, Sheng Zhang, Zhuzhong Qian, Kaiyuan Wen, Sanglu Lu:
Virtual Network Deployment in Hybrid Data Center Networks. 1256-1263 - Puheng Zhang, Chuang Lin, Kun Meng, Ying Chen:
A Comprehensive Optimization for Performance, Energy Efficiency, and Maintenance in Cloud Datacenters. 1264-1271 - Peng Li, Xingtong Jin, Rebecca J. Stones, Gang Wang, Zhongwei Li, Xiaoguang Liu, Mingming Ren:
Parallelizing Degraded Read for Erasure Coded Cloud Storage Systems Using Collective Communications. 1272-1279 - Yuwei Wang, Min Liu, Bo Gao, Chenchong Qin, Cheng Ma:
I/O Congestion-Aware Computing Resource Assignment and Scheduling in Virtualized Cloud Environments. 1280-1287 - Lirui Gong, Jiawei Wang, Xiang Zhang, Kai Lei:
Intelligent Forwarding Strategy Based on Online Machine Learning in Named Data Networking. 1288-1294 - Changhai Wang, Meng Li, Jianzhong Zhang, Yuwei Xu:
A Model with Hierarchical Classifiers for Activity Recognition on Mobile Devices. 1295-1301 - Lei Guan, Yutong Lu:
Using Dynamic Granularity Strategy to Accelerate Unbalanced Tree Search. 1302-1310 - Tao Li, Kezhao Zhao, Qiankun Dong, Jiabing Ling, Yulu Yang, Wenjing Ma:
Data-Oriented Runtime Scheduling Framework on Multi-GPUs. 1311-1318 - Savio S. H. Tse:
Bicriteria Load Balancing for Online Placement in Heterogeneous Servers with Extreme Upper Bounds. 1319-1326 - Yong Zhang, Bo Liu, Fan Yang:
Differential Evolution Based Selective Ensemble of Extreme Learning Machine. 1327-1333 - Kailai Zhou, Hong Chen, Hui Sun, Cuiping Li:
A Skew-Insensitive Hashing Sync and Construction Scheme for Many-Core Coprocessors. 1334-1341 - Hong Qiao, Dafang Zhang, Kun Xie, Ji Zhang, Shiming He:
Power-Bandwidth Aware Cooperative Routing in Multi-radio Multi-channel Wireless Network. 1342-1349 - Peng Shu, Rong Gu, Qianhao Dong, Chunfeng Yuan, Yihua Huang:
Accelerating Big Data Applications on Tiered Storage System with Various Eviction Policies. 1350-1357 - Bo Feng, Chentao Wu, Jie Li:
MLC: An Efficient Multi-level Log Compression Method for Cloud Backup Systems. 1358-1365 - Xiaoxiao Cao, Bing Chen, Yanchao Zhao:
Wi-Wri: Fine-Grained Writing Recognition Using Wi-Fi Signals. 1366-1373 - Jingheng Xu, Haohuan Fu, Lin Gan, Yu Song, Hongbo Peng, Wen Shi, Guangwen Yang:
Evaluating the POWER8 Architecture through Optimizing Stencil-Based Algorithms. 1374-1381 - Feng Hu, Bing Chen, Xiaojun Zhu, Hong Shen:
SDN-Based Efficient Bandwidth Allocation for Caching Enabled Cognitive Radio Networks. 1382-1389 - Na Liu, Peng Xiao, Ying Lu, Xiao-Jun Tang, Hai-Wen Wang, Ming-Xia Li:
A Topic Approach to Sentence Ordering for Multi-document Summarization. 1390-1395 - Jie Wang, Ce Yu, Zhi Hong, Jian Xiao, Chen Li, Jizhou Sun:
Pattern Aware Cache Management for Efficient Subset Retrieving of Astronomical Image Data. 1396-1403 - Huibin Zhou, Dafang Zhang, Kun Xie, Yuxiang Chen:
Robust Spatio-temporal Tensor Recovery for Internet Traffic Data. 1404-1411 - Youjun Xu, Xianglan Chen, Zhinan Cheng, Jiachen Song, Yuxiang Zhang:
Improving Energy Efficiency by Phase-Grained Migration for Asymmetric Multicore. 1412-1419 - Qiang Liu, Xiaoshe Dong, Heng Chen, Zhengdong Zhu, Yinfeng Wang:
An Efficient Framework for Incremental Graph Computation. 1420-1426 - Yuanchao Xu, Zeyi Hou:
NVM-Assisted Non-redundant Logging for Android Systems. 1427-1433 - Meng Lai, Jiajun Wang, Tao Song, Ning Liu, Zhengwei Qi, Weijia Zhou:
VSP: A Virtual Smartphone Platform to Enhance the Capability of Physical Smartphone. 1434-1441 - Xiaochen Fan, Panlong Yang, Chaocan Xiang, Lei Shi:
iMap: A Crowdsensing Based System for Outdoor Radio Signal Strength Map. 1442-1447 - Zijun Han, Guangzhi Qu, Dona Burkard, Kelvin Dobbins:
A Memory Access Pattern-Based Program Profiling System for Dynamic Parallelism Prediction. 1448-1454 - Yibo Jin, Yuan Gao, Zhuzhong Qian, Mingyu Zhai, Hui Peng, Sanglu Lu:
Workload-Aware Scheduling Across Geo-distributed Data Centers. 1455-1462 - Jianbang Tian, Zhuzhong Qian, Mianxiong Dong, Sanglu Lu:
FairShare: Dynamic Max-Min Fairness Bandwidth Allocation in Datacenters. 1463-1470 - Xiongren Xiao, Guoqi Xie, Renfa Li, Keqin Li:
Minimizing Schedule Length of Energy Consumption Constrained Parallel Applications on Heterogeneous Distributed Systems. 1471-1476 - Houwu Chen, Jiwu Shu:
Sznajd2: A Community-Aware Opinion Dynamics Model. 1477-1484 - Thanh Dat Dang, Doan B. Hoang, Priyadarsi Nanda:
A Novel Hash-Based File Clustering Scheme for Efficient Distributing, Storing, and Retrieving of Large Scale Health Records. 1485-1491 - Songwen Pei, Jinkai Wang, Wenyang Cui, Linhua Jiang, Tongsheng Geng, Jean-Luc Gaudiot, Stéphane Zuckerman:
Codelet Scheduling by Genetic Algorithm. 1492-1499 - KunPeng Mao, Songtao Guo, Yuanyuan Yang, Guiyan Liu:
MRDC: Multicast Data Restoration in Fat-Tree Data Center Networks. 1500-1507 - Chonglin Gu, Ke Hu, Zhenlong Li, Qiang Yuan, Hejiao Huang, Xiaohua Jia:
Lowering Down the Cost for Green Cloud Data Centers by Using ESDs and Energy Trading. 1508-1515 - Farhad Ahamed, Seyed A. Shahrestani, Bahman Javadi:
Security Aware and Energy-Efficient Virtual Machine Consolidation in Cloud Computing Systems. 1516-1523 - Yang Zhang, Zuocheng Xing, Li Zhou, Chunsheng Zhu:
Locality Protected Dynamic Cache Allocation Scheme on GPUs. 1524-1530 - Dongyu Zheng, Dailiang Jin, Yuanzhe Hao, Lei Liu, Xinjing Wei:
Prediction of Consecutive Road Node Congestion Based on Queueing Model. 1531-1536 - Yongjian Ren, Dailiang Jin, Dongyu Zheng, Lei Liu, Xinjing Wei:
An Analytical Model of Data Plane Performance Subject to Prioritized Service. 1537-1542 - Yi Wei, Li Pan, Dong Yuan, Shijun Liu, Lei Wu, Xiangxu Meng:
A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market. 1543-1550 - Zheng Zhang, Dan Feng, Jianxi Chen, Ya Yu, Jing Zeng:
The Design and Implementation of a Lightweight Management Framework for Non-volatile Memory. 1551-1558 - Hongyan Tang, Ying Li, Tong Jia, Zhonghai Wu:
Evaluating Performance of Rescheduling Strategies in Cloud System. 1559-1566 - Chengjin Jia, Jin Wang, Yanqin Zhu, Zhengqing Wen, Juncheng Jia:
Joint Selection of Providers and the New Comer for Optimal Repair in Distributed Storage Network with Network Coding. 1567-1574 - Minghui Li, Zhaobin Liu, Kang Dong:
Privacy Preservation in Social Network against Public Neighborhood Attacks. 1575-1580 - Lulu Li, Zhuo Li, Xin Chen:
Capacity Analysis and Link Scheduling Design in Double-Channel Full-Duplex Wireless Networks. 1581-1588 - Juan-Hui Li, Pei-Zhen Li, Chang-Dong Wang, Jian-Huang Lai:
Community Detection in Complicated Network Based on the Multi-view Weighted Signed Permanence. 1589-1596 - Jiang Zhou, Wei Xie, Qiang Gu, Yong Chen:
Hierarchical Consistent Hashing for Heterogeneous Object-Based Storage. 1597-1604 - Yong Chen, Chao Chen, Yanlong Yin, Xian-He Sun, Rajeev Thakur, William Gropp:
Rethinking High Performance Computing System Architecture for Scientific Big Data Applications. 1605-1612 - Xiaoshan Chang, Zenghua Zhao, Bingxue Diao, Tao Li:
Experimental Study of Disruption-Tolerant Transport Protocol for Mobile Ad-Hoc Networks with Connection Diversity. 1613-1620 - Jun Wang, Zhiyang Li, Yegang Du, Wenyu Qu:
Stacked Product Quantization for Nearest Neighbor Search on Large Datasets. 1621-1627 - Yuan Cao, Heng Qi, Keqiu Li, Milos Stojmenovic:
Multiple Query-Independent Values Based Asymmetric Ranking for Approximate Nearest Neighbor Search. 1628-1635 - Ehsan Atoofian:
Temperature-Aware Register Mapping in GPGPUs. 1636-1643
BigDataSE 2016: The 10th IEEE International Conference on Big Data Science and Engineering
- You Dai, Jin Yan, Xiaoxin Tang, Han Zhao, Minyi Guo:
Online Credit Card Fraud Detection: A Hybrid Framework with Big Data Technologies. 1644-1651 - Juping Wen, QingDan Yuan:
Social Circles Discovery Based on Structural and Attribute Similarities. 1652-1659 - Shanshan Chen, Xiaoxin Tang, Hongwei Wang, Han Zhao, Minyi Guo:
Towards Scalable and Reliable In-Memory Storage System: A Case Study with Redis. 1660-1667 - Hongyang Qu, Zhiwen Yu, Zhiyong Yu, Huang Xu, Bin Guo, Xing Xie:
What Is My Next Job: Predicting the Company Size and Position in Career Changes. 1668-1675 - Xiongpai Qin, Bangguo Wang, Ruchuan Lai, Keqin Li:
Improving Robustness of a SVR Based Algorithm Trading Model with Carefully Crafted Features and a Diversified Portfolio. 1676-1683 - Francisco Padillo, José María Luna, Sebastián Ventura:
Subgroup Discovery on Big Data: Exhaustive Methodologies Using Map-Reduce. 1684-1691 - Liudong Zuo, Mengxia Michelle Zhu:
Improved Scheduling Algorithms for Single-Path Multiple Bandwidth Reservation Requests. 1692-1699 - Haizhou Du, Zhengbo Chen, Qifen Li, Yongwen Yang:
A Novel Text Feature Weight Calculation Method Applied to Power Field. 1700-1705 - Junfeng Wu, Yitong Wan, Wenyu Qu, Changqing Ji, Yuanyuan Li, Peng Xiao, Jianwei Sun:
A Novel Image Retrieval Approach with Bag-of-Word Model and Gabor Feature. 1706-1711
UbiSafe 2016: The 8th IEEE International Symposium on UbiSafe Computing
- Wu-Xiang Weng, Shou-Chih Lo:
Fall Detection Based on Tilt Angle and Acceleration Variations. 1712-1717 - Xinglu He, Kai Lu, Gen Li:
Taint Reverse Propagation for Analysis of Privacy Leak. 1718-1722 - Xiaojun Guo, Guang Cheng, Yifei Hu, Mian Dai:
Progress in Command and Control Server Finding Schemes of Botnet. 1723-1727 - Hui Li, Guoqiao Ye, Xuezheng Liu, Fei Zhao, Di Wu, Xiaola Lin:
URLSight: Profiling Mobile Users via Large-Scale Internet Metadata Analytics. 1728-1733 - Zibo Yi, Jun Ma, Lei Luo, Jie Yu, Qingbo Wu:
Improving JavaScript Malware Classifier's Security against Evasion by Particle Swarm Optimization. 1734-1740 - Peipei Xiao, Yufeng Wang, Qun Jin, Jianhua Ma:
A Privacy-Preserving Incentive Scheme for Advertisement Dissemination in Vehicular Social Networks. 1741-1746 - Ajay Pantangi, Kaiqi Xiong, Mufaddal Makati:
SECUPerf: End-to-End Security and Performance Assessment of Cloud Services. 1747-1752 - Dong Cao, Shanshan Wang, Qun Li, Zhenxiang Chen, Qiben Yan, Lizhi Peng, Bo Yang:
DroidCollector: A High Performance Framework for High Quality Android Traffic Collection. 1753-1758 - Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings. 1759-1764
EFINS 2016: The 3rd International Workshop on the Emerging Future Internet and Network Security
- Tayeb Kenaza, Khadidja Bennaceur, Abdenour Labed, Mahdi Aiash:
Enhancing the SVDD Accuracy in Intrusion Detection Systems by Removing External Voids. 1765-1770 - Salvatore Signorello, Maria Rita Palattella, Luigi Alfredo Grieco:
Security Challenges in Future NDN-Enabled VANETs. 1771-1775 - Tayeb Kenaza, Mahdi Aiash, Jonathan Loo, Aboubaker Lasebae, Gill Whitney:
A Progressive Approach to Design Authentication Protocols for Mobile Heterogeneous Networks. 1776-1781 - Nikolaos Sarantinos, Chafika Benzaid, Omar Arabiat, Ameer Al-Nemrat:
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities. 1782-1787 - Ahmad Azab, Mamoun Alazab, Mahdi Aiash:
Machine Learning Based Botnet Identification Traffic. 1788-1794
TrustWSN 2016: The 2nd IEEE International Workshop on Trust and Security in Wireless Sensor Networks
- Huan Zhao, Xixiang Zhang:
A Mobile Security-Related Behavior Prevention Model Based on Speech Personality Traits. 1803-1810 - Jian Shu, Weijie Lin, Linlan Liu, Xuyan Luo:
Topology Prediction Mechanism for Pocket Switched Network Based on Deep Belief Network. 1811-1817
TrustSoft 2016: The 2nd IEEE International Workshop on Trustworthy Software Systems
- Dali Zhu, Ying Yang, Hao Jin, Jing Shao, Weimiao Feng:
Application of Modified BLP Model on Mobile Web Operating System. 1818-1824 - Gang Hou, Kuanjiu Zhou, Yanran Wu, Zongzheng Chi, Jie Wang, Mingchu Li:
ETSTM: A New Green Software Model. 1825-1830 - Shu-Yan Wang, Jia-Ze Sun, Ju Zhang:
The Method of Generating Web Link Security Testing Scenario Based on UML Diagram. 1831-1838 - Antonio La Marra, Fabio Martinelli, Andrea Saracino, Alessandro Aldini:
On Probabilistic Application Compliance. 1848-1855 - Fang Jianyong:
Research on the Nonintrusive Resource Level Fault Injection Technology for Windows System. 1856-1860
LSNS 2016: The 5th International Workshop on Large-Scale Network Security
- Liang Wang, Weiping Wang, Jingzi Gu, Dan Meng:
Delta-Generalization: High Accuracy Data Release for Privacy Preserving. 1861-1866 - Jain-Shing Wu, Yuh-Jye Lee, Te-En Wei, Chih-Hung Hsieh, Chia-Min Lai:
ChainSpot: Mining Service Logs for Cyber Security Threat Detection. 1867-1874 - Nilesh Chakraborty, S. Vijay Anand, Gurpinder Singh Randhawa, Samrat Mondal:
On Designing Leakage-Resilient Vibration Based Authentication Techniques. 1875-1881 - Jianguo Jiang, Biao Qi, Zhixin Shi, Yan Wang, Bin Lv:
Botnet Detection Method Analysis on the Effect of Feature Extraction. 1882-1888 - Nour El Madhoun, Guy Pujolle:
Security Enhancements in EMV Protocol for NFC Mobile Payment. 1889-1895 - José de Jesús Serrano-Pérez, Moisés Salinas-Rosales, Nareli Cruz Cortés:
Universal Steganography Detector Based on an Artificial Immune System for JPEG Images. 1896-1903 - Hongfang Han, Ang Gao, Jianji Ren, Yongqiang Ma, Xiao Xue:
An O2O Service Recommendation Algorithm Based on User Context and Trust Service. 1904-1909 - Takashi Sasagawa, Satoshi Ohzahata, Toshihiko Kato:
Suppressing Selfish Transmissions with Extending NAV Period and Resetting CW of Access Point in Wireless LAN. 1910-1916 - Kaiyuan Liang, Yanzhao Feng, Jizeng Wei, Wei Guo:
SecPage - A Lightweight Memory Protection Architecture. 1917-1922 - Jeffery Garae, Ryan K. L. Ko, Sivadon Chaisiri:
UVisP: User-centric Visualization of Data Provenance with Gestalt Principles. 1923-1930 - Xu Weng, Zhaobin Liu, Zhiyang Li:
An Efficient Influence Maximization Algorithm Considering Both Positive and Negative Relationships. 1931-1936
TSCloud 2016: The 6th IEEE International Symposium on Trust and Security in Cloud Computing
- Haiping Huang, Jianpeng Du, Hui Wang, Ruchuan Wang:
A Multi-keyword Multi-user Searchable Encryption Scheme Based on Cloud Storage. 1937-1943 - Xianyi Zheng, Lulu Yang, Gang Shi, Dan Meng:
Secure Mobile Payment Employing Trusted Computing on TrustZone Enabled Platforms. 1944-1950 - Qian Li, Weiguo Wu, Jianhang Huang, Zeyu Sun, Mingxia Feng:
A Novel Trustworthy Framework for Cloud Based Rendering Application. 1951-1956 - Mang Su, Anmin Fu, Yan Yu, Guozhen Shi:
Resource-centric Dynamic Access Control in Cloud. 1957-1962
SPAPT 2016: The 1st International Workshop on Security and Privacy in Advanced Persistent Threat
- Feng Liu, Pengpeng Luo, Zhujuan Ma, Cheng Zhang, Yiwen Zhang, Erzhou Zhu:
Security Secret Information Hiding Based on Hash Function and Invisible ASCII Characters Replacement. 1963-1969 - Zongshuai Hu, Yong Wang, Lipeng Zhang, Rusen Fan:
Bad Data Injection Attacks Identification in Power System on Fast Decoupled Load Flow. 1970-1975 - Jian Zhang, Pin Liu, Jianbiao He, Yawei Zhang:
A Hadoop Based Analysis and Detection Model for IP Spoofing Typed DDoS Attack. 1976-1983 - Mohammad Shahriar Rahman, Keita Emura, Shinsaku Kiyomoto:
On the Leakage Resilient Cryptography in Game-Theoretic Settings. 1984-1989 - Jaouhar Fattahi, Mohamed Mejri, Emil Pricop:
Authentication by Witness Functions. 1990-1997 - Craig Scoon, Ryan K. L. Ko:
The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws. 1998-2005 - Hao Peng, Mengzhuo You:
The Health Care Fraud Detection Using the Pharmacopoeia Spectrum Tree and Neural Network Analytic Contribution Hierarchy Process. 2006-2011 - Idrees Ahmed, Abid Khan, Muhammad Saleem Khan, Mansoor Ahmed:
Aggregated Signatures for Chaining: A Secure Provenance Scheme. 2012-2017 - Yujie Sun, Weijiang Liu, Zhaobin Liu, Chao Liu:
Comparison of Five Packet-Sampling-Based Methods for Detecting Elephant Flows. 2018-2023
3C in ITS 2016: Computing, Communication, and Control Technologies in Intelligent Transportation Systems
- Wen Xu, Jiangqiang Hu, Jianchuan Yin, Ke Li:
Ship Automatic Collision Avoidance by Altering Course Based on Ship Dynamic Domain. 2024-2030 - Changyuan Chen, Ran Dai, Tingting Yang, Zuxin Wu, Quan Li:
The Design and Application of an Intelligentialized Monitoring System for Mooring Safety. 2031-2034 - Jian Zhao, Jianchuan Yin:
Study on the Control of Fractional-Order PID for Underwater Vehicle Attitude Angle. 2035-2040 - Degang Sun, Jun Shi, Xuejie Ding, Meng Zhang, Wei-qing Huang:
Method for Detecting Information Leakage from Computer Display in Electromagnetic Radiation. 2041-2046 - Ying Wang, Yang Ju, Tiantian Miao, Rongxi He:
Chunk-Based Resource Allocation with Fairness Consideration for Layered Multicast Streaming in OFDMA Systems. 2047-2051 - Xin Li, Bin Lin, Ping Guo, Sen Li, Rongxi He:
Design and Planning of Heterogeneous Marine Sensor Networks for Marine Intelligent Transportation. 2052-2057 - Ping Guo, Bin Lin, Xin Li, Rongxi He, Sen Li:
Optimal Deployment and Dimensioning of Fog Computing Supported Vehicular Network. 2058-2062 - Jing Wang, Xianfeng Zhao, Yanjie Deng, Shibo Xu, Jichun Li:
Research on Key Technologies and Standard Framework of Secure and Smart Container. 2063-2067 - Shibo Xu, Qingzhou Li, Peng Ni, Wensheng Cao, Xianfeng Zhao:
The Application of Ad-Hoc Network in Smart Container Tracking System. 2068-2072
FFCN 2016: The 4th International Symposium on Frontier of Future Communication Networks
- Changyi Deng, Ruifeng Guo, Hongliang Wang, Azhen Peng:
A Dynamic Power Management Algorithm for Sporadic Tasks in Real-Time Embedded Systems. 2073-2078 - Yuanyuan Xie, Jiang Wu, Fengzhu Liu:
A Hierarchic Hybrid Scheduling Algorithm for Static Task with Precedence Constraints. 2079-2085 - Changhai Wang, Yuwei Xu, Jianzhong Zhang, Wenping Yu:
SW-HMM: A Method for Evaluating Confidence of Smartphone-Based Activity Recognition. 2086-2091 - Cang Liu, Chuan Tang, Zuocheng Xing, Lirui Chen, Yang Zhang, Guitao Fu:
An Architecture of Parallel Tiled QRD Algorithm for MIMO-OFDM Systems. 2092-2096 - Xueyi Wang, Xingwei Wang, Min Huang, Zun Wang:
Combinatorial Reverse Auction-Based Service Provision in Social Clouds. 2097-2102 - Haiyan Qin, Yonglong Zhang, Bin Li:
pHSA: A Price Schedule for Heterogeneous Spectrum Auction. 2103-2108 - Yang Liu, Wenxin Li, Keqiu Li, Heng Qi, Xiaoyi Tao, Sheng Chen:
Scheduling Dependent Coflows with Guaranteed Job Completion Time. 2109-2115 - Shijia Wang, Liang Zhou, Yuanyuan Li, Junfeng Wu:
Parallel Monte Carlo Method with MapReduce for Option Pricing. 2116-2121
ETCS 2016: The 2016 International Workshop on Emerging Topics in Computer Science
- Hongyun Gao, Fujun Liu, Shengjuan Sun, Gaotao Shi:
A New Model Based on GEP-SWPM for Predicting Heavy Metals Speciation. 2122-2126 - Yaobin Wang, Hong An, Zhiqin Liu, Ling Li, Jun Huang:
A Flexible Chip Multiprocessor Simulator Dedicated for Thread Level Speculation. 2127-2132 - Yanbin Guo, Jianzhong Zhang, Yu Zhang:
An Algorithm for Analyzing the City Residents' Activity Information through Mobile Big Data Mining. 2133-2138 - Jiangming Jin, Yang Zhang, Shanjiang Tang, Hongfei Fan:
Performance Modeling and Analysis for Critical Section Contention in Parallel Codes. 2139-2146 - Huijun Wu, Liming Zhu, Kai Lu, Gen Li, Dongyao Wu:
StageFS: A Parallel File System Optimizing Metadata Performance for SSD Based Clusters. 2147-2152 - Huirong Zhang, Jianwen Cao:
A Subgraph Preconditioning Algorithm for Large Linear Systems. 2153-2159 - Yemao Xu, Jialong Wang, Yanhong Liu, Li Shen:
Fast Task Submission in Software Thread Level Speculation Systems. 2160-2166 - Liang Deng, Hanli Bai, Dan Zhao, Fang Wang:
Evaluating Multi-core and Many-Core Architectures through Parallelizing a High-Order WENO Solver. 2167-2174 - Lin Han, Zhiyang Li, Weijiang Liu, Ke Dai, Wenyu Qu:
Minimum Control Latency of SDN Controller Placement. 2175-2180 - N. Karthik, Ananthanarayana V. S.:
Data Trustworthiness in Wireless Sensor Networks. 2181-2186
AEIT 2016: The 2016 International Workshop on Assistive Engineering and Information Technologies
- Hui Wang, Xiaohe Chen, Xinjian Chen, Peilin Zang, Yunqing Liu, Lirong Wang:
Fall Detection Based on KPCA and 3D KPCA. 2187-2191 - Wenliang Zhu, Xiaohe Chen, Yan Wang, Lirong Wang:
The Survey of Low-Power Sleep Monitoring Algorithm Based on the Wrist Movement Signal. 2192-2196 - Yan Wang, Lirong Wang, Xiaohe Chen, Wenliang Zhu:
P Wave Detection and Delineation Based on Distances Transform. 2197-2201 - Jian Guo, Lirong Wang, Wenliang Zhu, Xiaohe Chen:
The Analysis of Crosstalk Noise Component in Wearable Device. 2202-2205 - Renhai Xu, Wenxin Li, Keqiu Li, Heng Qi:
Towards Application-Aware In-Network Bandwidth Management in Data Centers. 2206-2212
NCDM 2016: The 2016 International Workshop on Network Computing and Data Management
- Arun Kejariwal, Francois Orsini:
On the Definition of Real-Time: Applications and Systems. 2213-2220 - Long Sheng, Xiaoyun Guang, Feng Chen, Hui Wang, Kang Gao:
A Review on Complex Network Dynamics in Evolutionary Algorithm. 2221-2226 - Renke Wu, Linpeng Huang, Peng Yu, Kai Shen, Qiuwei Shi, Haojie Zhou:
Meta-Model Evolution with Self-Adaptation: An Empirical Development Approach for Distributed Parallel Computing Framework. 2227-2234 - Zhengyang Chen, Renjie Chen, Yu Zhang, Jianzhong Zhang, Jingdong Xu:
A Statistical-Feature ML Approach to IP Traffic Classification Based on CUDA. 2235-2239 - Chao Chen, Kun-Yu Lin, Chang-Dong Wang, Dong Huang:
CSBD: A Nonlinear Clustering Method Based on Cluster Shrinking and Border Detection. 2240-2245 - Shiqing Wang, Yuanyuan Li, Zhiyang Li, Junfeng Wu, Fengjuan Chen:
Surveillance Methods of Running Condition of Chemical Equipments Based on Skyline. 2246-2250 - Xingyuan Huang, Jiandong Zhang, Kun Qian:
Big Data Analysis on the Relationship between the Organizational Career Management and Knowledge Workers' Work Involved - Take the High-Tech Enterprise as an Example. 2251-2256 - Yu Zhuang, Yu Mao, Xin Chen:
A Limited-Iteration Bisecting K-Means for Fast Clustering Large Datasets. 2257-2262 - Changqing Ji, Baofeng Wang, Shuai Tao, Junfeng Wu, Zumin Wang, Long Tang, Tiange Zu, Gui Zhao:
Inverted Voronoi-Based kNN Query Processing with MapReduce. 2263-2268 - Jiequn Wang, Lei Wang:
A Novel Solution of Data Analysis in Modern Sports Education. 2269-2272
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.