![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Information Sciences, Volume 527
Volume 527, July 2020
- Roy Cerqueti
, Massimiliano Giacalone
, Raffaele Mattera
:
Skewed non-Gaussian GARCH models for cryptocurrencies volatility modelling. 1-26 - Tiago da Cruz Asmus
, Graçaliz Pereira Dimuro
, Benjamín R. C. Bedregal
, José Antonio Sanz
, Sidnei F. Pereira Jr., Humberto Bustince
:
General interval-valued overlap functions and interval-valued overlap indices. 27-50 - Li Guo
, Hao Yu
, Fei Hao
:
Event-triggered control for stochastic networked control systems against Denial-of-Service attacks. 51-69 - Xiangguang Dai
, Xiaojie Su, Wei Zhang, Fangzheng Xue, Huaqing Li
:
Robust Manhattan non-negative matrix factorization for image recovery and representation. 70-87 - Alshahrani Mohammed, Fuxi Zhu, Ahmed Sameh, Soufiana Mekouar
, Sheng Huang:
Efficient algorithms based on centrality measures for identification of top-K influential users in social networks. 88-107 - Jia Duan
, Jiantao Zhou, Yuanman Li:
Privacy-Preserving distributed deep learning based on secret sharing. 108-127 - Sukhendu Bera, Pravash Kumar Giri
, Dipak Kumar Jana
, Kajla Basu
, Manoranjan Maiti:
Fixed charge 4D-TP for a breakable item under hybrid random type-2 uncertain environments. 128-158 - Omar Abdel Wahab
, Robin Cohen, Jamal Bentahar
, Hadi Otrok
, Azzam Mourad
, Gaith Rjoub:
An endorsement-based trust bootstrapping approach for newcomer cloud services. 159-175 - Changxin Gao
, Yang Chen, Jin-Gang Yu, Nong Sang
:
Pose-guided spatiotemporal alignment for video-based person Re-identification. 176-190 - Qidan Zhu, Yongchao Liu
, Guoxing Wen
:
Adaptive neural network control for time-varying state constrained nonlinear stochastic systems with input saturation. 191-209 - Tong Wu
, Guomin Yang
, Yi Mu
, Rongmao Chen, Shengmin Xu:
Privacy-enhanced remote data integrity checking with updatable timestamp. 210-226 - Hui Wang
, Wenjun Wang, Songyi Xiao, Zhihua Cui, Minyang Xu, Xinyu Zhou:
Improving artificial Bee colony algorithm using a new neighborhood selection mechanism. 227-240 - Bo Li, Xiaodong Du, Meng Chen:
Cross-language question retrieval with multi-layer representation and layer-wise adversary. 241-252 - Lei Mu
, Peng Wang
, Gang Xin:
Quantum-inspired algorithm with fitness landscape approximation in reduced dimensional spaces for numerical function optimization. 253-278 - Wen-Bo Xie
, Yan-Li Lee, Cong Wang, Duan-Bing Chen, Tao Zhou
:
Hierarchical clustering supported by reciprocal nearest neighbors. 279-292
- Jinjun Chen, Laurence T. Yang:
Special Section on Privacy Computing: Principles and Applications. 293 - Pedro Barbosa, Andrey Brito, Hyggo O. Almeida
:
Privacy by Evidence: A Methodology to develop privacy-friendly software applications. 294-310 - Chris Soo-Hyun Eom, Charles Cheolgi Lee, Wookey Lee, Carson K. Leung
:
Effective privacy preserving data publishing by vectorization. 311-328 - Kai Fan
, Qi Luo, Kuan Zhang
, Yintang Yang:
Cloud-based lightweight secure RFID mutual authentication protocol in IoT. 329-340 - Jun Feng
, Laurence T. Yang
, Nicholaus J. Gati, Xia Xie, Benard S. Gavuna:
Privacy-preserving computation in cyber-physical-social systems: A survey of the state-of-the-art and perspectives. 341-355 - Duy-Hien Vu
, The-Dung Luong
, Tu-Bao Ho:
An efficient approach for secure multi-party computation without authenticated channel. 356-368 - Liang Fang, Guozhen Shi, Lianhai Wang, Yongjun Li, Shujiang Xu
, Yunchuan Guo:
Incentive mechanism for cooperative authentication: An evolutionary game approach. 369-381 - Fatty M. Salem
, Ruhul Amin:
A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. 382-393 - Lei Xu
, Chungen Xu
, Joseph K. Liu, Cong Zuo, Peng Zhang:
Building a dynamic searchable encrypted medical database for multi-client. 394-405 - Shaobo Zhang
, Xinjun Mao, Kim-Kwang Raymond Choo
, Tao Peng, Guojun Wang
:
A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services. 406-419 - Mahawaga Arachchige Pathum Chamikara
, Peter Bertók
, Dongxi Liu, Seyit Ahmet Çamtepe
, Ibrahim Khalil
:
Efficient privacy preservation of big data for accurate data mining. 420-443 - Fenghua Li, Xinyu Wang
, Ben Niu
, Hui Li, Chao Li, Lihua Chen:
Exploiting location-related behaviors without the GPS data on smartphones. 444-459 - Weihao Li
, Chen Li
, Yeli Geng:
APS: Attribute-aware privacy-preserving scheme in location-based services. 460-476 - Wenjuan Tang, Kuan Zhang
, Ju Ren
, Yaoxue Zhang, Xuemin (Sherman) Shen
:
Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcing. 477-492 - Rafik Hamza
, Zheng Yan
, Khan Muhammad
, Paolo Bellavista
, Faiza Titouna:
A privacy-preserving cryptosystem for IoT E-healthcare. 493-510 - Yuxiang Ma, Yulei Wu, Jun Li, Jingguo Ge:
APCN: A scalable architecture for balancing accountability and privacy in large-scale content-based networks. 511-532 - Mang Su
, Bo Zhou, Anmin Fu
, Yan Yu, Gongxuan Zhang:
PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT. 533-547 - Yushu Zhang, Jin Jiang
, Yong Xiang
, Ye Zhu
, Liangtian Wan, Xiyuan Xie:
Cloud-assisted privacy-conscious large-scale Markowitz portfolio. 548-559 - Jiafeng Hua, Guozhen Shi, Hui Zhu
, Fengwei Wang, Ximeng Liu, Hao Li:
CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud. 560-575 - Wanchun Dou, Wenda Tang
, Xiaotong Wu, Lianyong Qi, Xiaolong Xu, Xuyun Zhang, Chunhua Hu:
An insurance theory based optimal cyber-insurance contract against moral hazard. 576-589 - Chao Lin, Debiao He
, Xinyi Huang, Xiang Xie
, Kim-Kwang Raymond Choo
:
Blockchain-based system for secure outsourcing of bilinear pairings. 590-601 - Guangchun Luo, Ke Yan
, Xu Zheng, Ling Tian, Zhipeng Cai
:
Preserving adjustable path privacy for task acquisition in Mobile Crowdsensing Systems. 602-619
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.