default search action
KSII Transactions on Internet and Information Systems, Volume 14
Volume 14, Number 1, January 2020
- Xiaorong Xu, Andi Hu, Yingbiao Yao, Wei Feng:
Joint Beamforming and Power Splitting Design for Physical Layer Security in Cognitive SWIPT Decode-and-Forward Relay Networks. 1-19 - Longqi Wang, Ding Xu:
Resource allocation in downlink SWIPT-based cooperative NOMA systems. 20-39 - Bangwon Seo:
SLNR-based Precoder Design in Multiuser Interference Channel with Channel Estimation Error. 40-52 - Huanan Yu, Yongxin Li, Yao Du:
Dynamic Synchronous Phasor Measurement Algorithm Based on Compressed Sensing. 53-76 - Jing Zhang, Jianhan Pan, Zhicheng Cai, Min Li, Lin Cui:
Knowledge Transfer Using User-Generated Data within Real-Time Cloud Services. 77-92 - Jin Xu, Hanqing Ding, Zeqi Yu, Zhe Zhang, Weihua Liu, Xueyan Chen:
Joint Space-time Coding and Power Domain Non-orthogonal Multiple Access for Future Wireless System. 93-113 - I Made Sukarsa, Putu Wira Buana, Urip Yogantara:
Multi Parameter Design in AIML Framework for Balinese Calendar Knowledge Access. 114-130 - Gaoli Liang, Ran Liu, Yulu Fu, Hua Zhang, Heng Wang, Shafiq ur Réhman, Mingming Guo:
An Innovative Approach to Track Moving Object based on RFID and Laser Ranging Information. 131-147 - Syed W. Haider, Guijun Zhuang, Amir Ikram, Bilal Anwar:
Consumers' Device Choice in E-Retail: Do Regulatory Focus and Chronotype Matter? 148-167
- Lang Lin, Rangding Wang, Diqun Yan, Li Dong:
A Robust Method for Speech Replay Attack Detection. 168-182 - Chuanyan Hao, Zilong Jin, Zhixin Yang, Yadang Chen:
An Interactive Perspective Scene Completion Framework Guided by Complanate Mesh. 183-200 - Zhaoyun Chen, Dafei Huang, Lei Luo, Mei Wen, Chunyuan Zhang:
Efficient Parallel TLD on CPU-GPU Platform for Real-Time Tracking. 201-220
- Shiuh-Ku Weng, Jung-Yi Tu:
A Visualization Jump Lists tool for Digital Forensics of Windows. 221-239 - Yongxin Feng, Yingyun Kang, Hao Zhang, Wenbo Zhang:
FAFS: A Fuzzy Association Feature Selection Method for Network Malicious Traffic Detection. 240-259 - Kyungho Son, Byungik Kim, Taejin Lee:
Cyber-attack group analysis method based on association of cyber-attack information. 260-280 - Wenyi Tang, Bo Qin, Yanan Li, Qianhong Wu:
Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing. 281-298 - Nur Fadhilah Mohd Shari, Amizah Malip, Wan Ainun Mior Othman:
Revocation Protocol for Group Signatures in VANETs: A Secure Construction. 299-322 - Yingying Wang, Chengsong Yang, Na Ren, Changqing Zhu, Ting Rui, Dong Wang:
An Adaptive Watermark Detection Algorithm for Vector Geographic Data. 323-343 - Anuj Kumar Singh, B. D. K. Patro:
Elliptic Curve Signcryption Based Security Protocol for RFID. 344-365 - Beijing Chen, Jiaxin Wang, Yingyue Chen, Zilong Jin, Hiuk Jae Shim, Yun-Qing Shi:
High-Capacity Robust Image Steganography via Adversarial Network. 366-381 - Khulood Abu Maria, Mohammad Ahmad Alia, Maher A. Alsarayreh, Eman M. Abu Maria:
UN-Substituted Video Steganography. 382-403 - Mingming Zhang, Quan Zhou, Yan-lang Hu:
A reversible data hiding scheme in JPEG bitstreams using DCT coefficients truncation. 404-421 - Gangcan Sun, Mengge Liu, Zhuo Han, Chuanyong Zhao:
Multiple Eavesdropper-Based Physical Layer Security in SIMO System With Antenna Correlation. 422-436 - Quy-Anh Bui, Wei-Bin Lee, Jung-San Lee, Hsiao-Ling Wu, Jo-Yun Liu:
Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations. 437-454 - Negalign Wake Hundera, Qian Mei, Hu Xiong, Dagmawit Mesfin Geressu:
A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing. 455-472
Volume 14, Number 2, February 2020
- Sohail Ahmed, Malik Muhammad Asim, Nadeem Qaisar Mehmood, Mubashir Ali, Babar Shahzaad:
Implementation of Class-Based Low Latency Fair Queueing (CBLLFQ) Packet Scheduling Algorithm for HSDPA Core Network. 473-494 - Qiaodan Zhang, Kaixue Hao, Mei Li:
Improved Correlation Identification of Subsurface Using All Phase FFT Algorithm. 495-513 - Di Wu, Shaojin Geng, Xingjuan Cai, Guoyou Zhang, Fei Xue:
A many-objective optimization WSN energy balance model. 514-537 - K. U. Kala, M. Nandhini:
Gated Recurrent Unit Architecture for Context-Aware Recommendations with improved Similarity Measures. 538-561 - Shenghua Zhai, Jianping An:
Improving Physical-Layer Security for Full-duplex Radio aided Two-Way Relay Networks. 562-576 - Dan Li, Julong Lan, Yuxiang Hu:
Central Control over Distributed Service Function Path. 577-594 - Youngho Kwon, Jun Hwang:
Mathematical modeling for flocking flight of autonomous multi-UAV system, including environmental factors. 595-609
- QuanMeng Ma, Guang Jiang, DianZhi Lai, Hua Cui, Huansheng Song:
Fast, Accurate Vehicle Detection and Distance Estimation. 610-630 - Rahib H. Abiyev, Murat Arslan, Idoko John Bush:
Sign Language Translation Using Deep Convolutional Neural Networks. 631-653 - Changwon Wang, Young Kim, Seung Hyun Lee, Nak-Jun Sung, Se Dong Min, Min-Hyung Choi:
Activity and Safety Recognition using Smart Work Shoes for Construction Worksite. 654-670 - Xiaorui Zhang, Xuefeng Yu, Wei Sun, Aiguo Song:
An Optimized Model for the Local Compression Deformation of Soft Tissue. 671-686 - Jielin Jiang, Zilong Jin, Boheng Wang, Li Ma, Yan Cui:
A Sobel Operator Combined with Patch Statistics Algorithm for Fabric Defect Detection. 687-701
- Yanping Shen, Kangfeng Zheng, Chunhua Wu, Yixian Yang:
A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection. 702-723 - Hyeopgoo Yeo, Seung-il Sonh, Min-goo Kang:
IP Design of Corrected Block TEA Cipher with Variable-Length Message for Smart IoT. 724-737 - Tingting Zhang, Junru Zhu, Yang Liu, Fulong Chen:
The Novel Efficient Dual-field FIPS Modular Multiplication. 738-756
- Sangyub Lee, Jaekyu Lee, Hyeonjoong Cho:
A Hand Gesture Recognition Method using Inertial Sensor for Rapid Operation on Embedded Device. 757-770 - Hyeseung Park, Seungchul Park, Young-Bok Joo:
Robust Real-time Detection of Abandoned Objects using a Dual Background Model. 771-788 - Sangwoo Hahm:
A Study of the Roles of Leadership Styles and Attitudes with Social Responsibility for the 4th Industrial Revolution. 789-806 - Deuk Kyu Kum:
Extended CEP Model for Effective Enterprise Systems Service Monitoring. 807-825 - Sungjin Lee, Min Hong, Sungyeup Kim, Seong Jun Choi:
Effect Analysis of Virtual-reality Vestibular Rehabilitation based on Eye-tracking. 826-840 - Dalyapraz Dauletbak, Jongwook Woo:
Big Data Analysis and Prediction of Traffic in Los Angeles. 841-854 - Wenguang Ma, Wei Ma:
Deep Window Detection in Street Scenes. 855-870 - Sungtae Lee, Kwanho Park, Hyungwoo Park:
Sound Quality Enhancement by using the Single Core Exciter in OLED Panel. 871-888 - Gi-Myeong Ryu, Jaesung Kim, Jongsuk Ruth Lee:
Analysis of Computational Science and Engineering SW Data Format for Multi-physics and Visualization. 889-906 - Xiaoli Li, Shan Zhang, Kang Wang:
PM2.5 Estimation Based on Image Analysis. 907-923
Volume 14, Number 3, March 2020
- Xibin Jia, Weiting Li, Yuechen Wang, Sung-Chan Hong, Xing Su:
An Action Unit co-occurrence constraint 3DCNN based Action Unit recognition approach. 924-942 - Ahreum Shin, Intae Ryoo, Seokhoon Kim:
Self-organization Scheme of WSNs with Mobile Sensors and Mobile Multiple Sinks for Big Data Computing. 943-961 - Yunjie Chen, Yuhang Qin, Zilong Jin, Zhiyong Fan, Mao Cai:
A Triple Residual Multiscale Fully Convolutional Network Model for Multimodal Infant Brain MRI Segmentation. 962-975
- Jung-Jae Kim, Min-Woo Ryu, Si-Ho Cha:
Approximate k values using Repulsive Force without Domain Knowledge in k-means. 976-990
- Sang-Kon Kim, Taekon Kim, Jinhwan Koh:
Improvement of Wireless Connectivity and Efficiency in E-Healthcare Service System Using a Proxy in Body Area Device. 991-1013
- Mohemmed Sha, Mohamudha Parveen Rahamathulla:
Cloud-based Healthcare data management Framework. 1014-1025
- Weilong Ding, Xiao Ding, Kai Chen, Zang-xin Wan, Yan Xu, Yuanjing Feng:
A Computer Model for Simulating the Bicycle Rider's Behavior in a Virtual Riding System. 1026-1042 - Haoting Liu, Ming Lv, Weiqun Yu, Zhenhui Guo, Xin Li:
Subjective Imaging Effect Assessment for Intelligent Imaging Terminal Design: a Method for Engineering Site. 1043-1064
- Can Zhang, Dan Wu, Liang Ao, Meng Wang, Yueming Cai:
Social-Aware Collaborative Caching Based on User Preferences for D2D Content Sharing. 1065-1085
- Jiaze Shang, Weipeng An, Yu Liu, Bang Han, Yaodan Guo:
Oil Pipeline Weld Defect Identification System Based on Convolutional Neural Network. 1086-1103 - Sejin Park, Woojin Jeong, Young Shik Moon:
X-ray Image Segmentation using Multi-task Learning. 1104-1120 - Sung-Jun Park, Md. Mahbubul Islam, Joong-Hwan Baek:
Visual Object Tracking Fusing CNN and Color Histogram based Tracker and Depth Estimation for Automatic Immersive Audio Mixing. 1121-1141 - Huanlong Zhang, Junfeng Liu, Zhicheng Nie, Jie Zhang, Jianwei Zhang:
A new visual tracking approach based on salp swarm algorithm for abrupt motion tracking. 1142-1166 - Zhenzhen Yang, Nan Kuang, Yongpeng Yang, Bin Kang:
Brain MR Multimodal Medical Image Registration Based on Image Segmentation and Symmetric Self-similarity. 1167-1187 - Guangzhe Zhao, Hanting Yang, Yong Tao, Lei Zhang, Chunxiao Zhao:
Lightweight CNN-based Expression Recognition on Humanoid Robot. 1188-1203
- Jian Zhang, Jian Tang, Zhonghui Wang, Feng Wang, Gang Yu:
Load-Balancing Rendezvous Approach for Mobility-Enabled Adaptive Energy-Efficient Data Collection in WSNs. 1204-1227
- Israr Hussain, Jishen Zeng, Xinhong, Shunquan Tan:
A Survey on Deep Convolutional Neural Networks for Image Steganography and Steganalysis. 1228-1248 - Taek-Young Youn, Nam-Su Jho:
Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption. 1249-1262 - Gang Liu, Runnan Zhang, Bo Wan, Shaomin Ji, Yumin Tian:
Extended Role-Based Access Control with Context-Based Role Filtering. 1263-1279 - Ju-Seong Ko, Jin Kwak:
Private Key Recovery on Bitcoin with Duplicated Signatures. 1280-1300
- Kaili Xia, Xianyang Jiang, Yingbiao Yao, Xianghong Tang:
Optimization Algorithm for Spectrum Sensing Delay Time in Cognitive Radio Networks Using Decoding Forward Relay. 1301-1312 - Zongyi Liu, Guomei Zhang, Wei Meng, Xiaohui Ma, Guobing Li:
Multiple-Phase Energy Detection and Effective Capacity Based Resource Allocation Against Primary User Emulation Attacks in Cognitive Radio Networks. 1313-1336 - Ridha Ouni, Monji Zaidi, Maazen Alsabaan, Wadood Abdul, Amr Alasaad:
Mobile geolocation techniques for indoor environment monitoring. 1337-1362 - Li Li, Zhenghui Feng, Yanzhi Tang, Zhangjie Peng, Lisen Wang, Weilu Shao:
User Clustering Scheme for Downlink of NOMA System. 1363-1376 - Shiji Li, Guyu Hu, Youwei Ding, Yun Zhou:
Delay Tolerant Packet Forwarding Algorithm Based on Location Estimation for Micro Aerial Vehicle Networks. 1377-1399
Volume 14, Number 4, April 2020
- Jie Zhang, Jianing Zhang, Shuhao Ma, Jie Yang, Guan Gui:
Chatbot Design Method Using Hybrid Word Vector Expression Model Based on Real Telemarketing Data. 1400-1418 - Yujia Ge, Yurong Nan, Yi Chen:
Maximizing Information Transmission for Energy Harvesting Sensor Networks by an Uneven Clustering Protocol and Energy Management. 1419-1436 - Wuzhao Li, Yechuang Wang, Youqiang Sun, Jie Ma:
Research on Low-energy Adaptive Clustering Hierarchy Protocol based on Multi-objective Coupling Algorithm. 1437-1459 - Xiaolin Jia, Yuhao Feng, Yajun Gu:
A Simple and Fast Anti-collision Protocol for Large-scale RFID Tags Identification. 1460-1478 - Hazim Jarrah, Peter Han Joo Chong, Nurul I. Sarkar, Jairo A. Gutiérrez:
Network Coding-Based Fault Diagnosis Protocol for Dynamic Networks. 1479-1501 - Mahmut Durgun, Levent Gökrem:
VLC4WoT : Visible Light Communication for Web of Things. 1502-1519
- Jing Chen, Honghua Yan, Chunxiao Wang, Xuyan Liu:
A Hybrid Cloud Testing System Based on Virtual Machines and Networks. 1520-1542
- Raheel Zafar, Muhammad Noman Malik, Huma Hayat Khan, Aamir Saeed Malik:
Decoding Brain Patterns for Colored and Grayscale Images using Multivariate Pattern Analysis. 1543-1561 - Xiaofei Wang, Wei Yang, Yan Liu, Rui Sun, Jun Hu, Longcheng Yang, Boyang Hou:
Segmented Douglas-Peucker Algorithm Based on the Node Importance. 1562-1578 - Jianguo Duan, Nan Xie, Lianhui Li:
Optimal Buffer Allocation in Multi-Product Repairable Production Lines Based on Multi-State Reliability and Structural Complexity. 1579-1602 - Qianhui Dong, Yibing Li, Qian Sun, Yuan Tian:
An A2CL Algorithm based on Information Optimization Strategy for MMRS. 1603-1623
- Alireza Amirshahi, Morteza Romoozi, Mohammad Ali Raayatpanah, Seyyed Amir Asghari:
Modeling Geographical Anycasting Routing in Vehicular Networks. 1624-1647
- Byeong-Chun Shin, Jeong-Kweon Seo:
Experimental Optimal Choice Of Initial Candidate Inliers Of The Feature Pairs With Well-Ordering Property For The Sample Consensus Method In The Stitching Of Drone-based Aerial Images. 1648-1672 - Xiaoyun Duan, Shin-Jin Kang, Jong-In Choi, Soo Kyun Kim:
Mixed Reality System for Virtual Chemistry Lab. 1673-1688 - Lili Meng, Hongfei Li, Jia Zhang, Yanyan Tan, Yuwei Ren, Huaxiang Zhang:
Convolutional auto-encoder based multiple description coding network. 1689-1703 - Heekyung Yang, Sungyong Kang, Chanung Park, Jeongwook Lee, Kyungmin Yu, Kyungha Min:
A Hierarchical deep model for food classification from photographs. 1704-1720 - Qing Tian, Heyang Sun, Chuang Ma, Meng Cao, Yi Chu:
Age Estimation via Selecting Discriminated Features and Preserving Geometry. 1721-1737 - Xiaorui Zhang, Hailun Wu, Wei Sun, Chengsheng Yuan:
An Optimized Mass-spring Model with Shape Restoration Ability Based on Volume Conservation. 1738-1756
- Jeong Ho Kwak:
A study on the evolution of post-smartphone technologies in the 5G technology environment. 1757-1772
- Jingxian Zhou, Zengqi Wang:
Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network. 1773-1795 - Sasan Saqaeeyan, Hamid Haj Seyyed Javadi, Hossein Amirkhani:
Anomaly Detection in Smart Homes Using Bayesian Networks. 1796-1816
- Mostafa Zaman Chowdhury, Md. Tashikur Rahman, Yeong Min Jang:
An Analytical Hierarchy Process Combined with Game Theory for Interface Selection in 5G Heterogeneous Networks. 1817-1836 - Jingpu Wang, Xin Song, Li Dong:
Resource Allocation and EE-SE Tradeoff for H-CRAN with NOMA-Based D2D Communications. 1837-1860
Volume 14, Number 5, May 2020
- Muhammad Hasnain, Imran Ghani, Muhammad Fermi Pasha, Chern Hong Lim, Seung Ryul Jeong:
A Comprehensive Review on Regression Test Case Prioritization Techniques for Web Services. 1861-1885 - Hemn Barzan Abdalla, Awder M. Ahmed, Mustafa A. Al Sibahee:
Optimization Driven MapReduce Framework for Indexing and Retrieval of Big Data. 1886-1908 - Jianwei Chen, Jianbo Li, Manzoor Ahmed, Junjie Pang, MinChao Lu, Xiufang Sun:
Next Location Prediction with a Graph Convolutional Network Based on a Seq2seq Framework. 1909-1928
- Chaya Shivalingagowda, P. V. Y. Jayasree, Dinesh K. Sah:
Efficient Energy and Position Aware Routing Protocol for Wireless Sensor Networks. 1929-1950 - Ha Yoon Song, Seongjin Park:
An Analysis of Correlation between Personality and Visiting Place using Spearman's Rank Correlation Coefficient. 1951-1966 - Phat Nguyen Huu, Quang Tran Minh, Hoang Lai The:
An ANN-based gesture recognition algorithm for smart-home applications. 1967-1983 - Wenqin Zhuang, Mingkai Chen, Xin Wei, Haibo Li:
Social-Aware Resource Allocation Based on Cluster Formation and Matching Theory in D2D Underlaying Cellular Networks. 1984-2002 - Junke Li, Bing Guo, Yan Shen, Deguang Li:
Low-power Scheduling Framework for Heterogeneous Architecture under Performance Constraint. 2003-2021
- Vesna S. Ruzicic, Zivadin M. Micic:
Knowledge Management Assessment Using PDCA based in Global and Local Standards: in the Case of Technics and Informatics Studies. 2022-2042
- Guoyu Wang, Hongsheng Zhang:
DMB+, a General Data Transmission Technique. 2043-2060
- Shahbaz Hussain, Ying Li, Wenli Li:
Psychological contract-based Consumer Repurchase behavior On Social commerce platform: An Empirical study. 2061-2083 - Longlong Jiao, Senlin Luo, Wangtong Liu, Limin Pan:
AIT: A method for operating system kernel function call graph generation with a virtualization technique. 2084-2100 - Sahar Yassine, Seifedine Kadry, Miguel-Ángel Sicilia:
Statistical Profiles of Users' Interactions with Videos in Large Repositories: Mining of Khan Academy Repository. 2101-2121 - Mohammed Maree, Rami Hodrob, Mohammed Belkhatir, Saadat M. Alhashmi:
A Knowledge-based Model for Semantic Oriented Contextual Advertising. 2122-2140 - Shufang Li, Zhengping Hu, Mengyao Zhao:
Moving Object Detection Using Sparse Approximation and Sparse Coding Migration. 2141-2155
- Soo-Young Jeong, Won-Ho Kim:
Thermal Imaging Fire Detection Algorithm with Minimal False Detection. 2156-2170 - Chunhe Shi, Chengdong Wu:
Vehicle Face Recognition Algorithm Based on Weighted Nonnegative Matrix Factorization with Double Regularization Terms. 2171-2185 - Jiyeon Kim, Hyung-Jong Kim:
DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective. 2186-2203
- SeulKi Choi, Jin Kwak:
Feature Analysis and Detection Techniques for Piracy Sites. 2204-2220 - Ji Woong Jang, SungMoon Kwon, SungJin Kim, Jungtaek Seo, Junhyoung Oh, Kyungho Lee:
Cybersecurity Framework for IIoT-Based Power System Connected to Microgrid. 2221-2235 - Yahye Abukar Ahmed, Baris Koçer, Bander Ali Saleh Al-rimy:
Automated Analysis Approach for the Detection of High Survivable Ransomware. 2236-2257 - Nguyen Huy Truong:
A Novel Cryptosystem Based on Steganography and Automata Technique for Searchable Encryption. 2258-2274
- Xin Bian, Jinfeng Tian, Hong Wang, Mingqi Li, Rongfang Song:
A Simplified Zero-Forcing Receiver for Multi-User Uplink Systems Based on CB-OSFB Modulation. 2275-2293 - Jian Su, Ruoyu Xu, Shiming Yu, Baowei Wang, Jiuru Wang:
Idle Slots Skipped Mechanism based Tag Identification Algorithm with Enhanced Collision Detection. 2294-2309
Volume 14, Number 6, June 2020
- Ruihui Mu, Xiaoqin Zeng:
Auxiliary Stacked Denoising Autoencoder based Collaborative Filtering Recommendation. 2310-2332
- Changsu Jung:
Prioritized Data Transmission Mechanism for IoT. 2333-2353 - Byeong-Mo Chang, Janine Cassandra Son, Kwanghoon Choi:
A GQM Approach to Evaluation of the Quality of SmartThings Applications Using Static Analysis. 2354-2376 - Enjie Ding, Yue Zhang, Yun Xin, Lei Zhang, Yu Huo, Yafeng Liu:
A Robust and Device-Free Daily Activities Recognition System using Wi-Fi Signals. 2377-2397
- Sheeraz Ahmed, Ali Raza, Shahryar Shafique Qurashi, Mukhtar Ahmad, Muhammad Yousaf Ali Khan, Asif Nawaz, Rohi Tariq:
RPSMDSM: Residential Power Scheduling and Modelling for Demand Side Management. 2398-2421
- Yang Li, Gaochao Xu, Jiaqi Ge, Peng Liu, Xiaodong Fu:
Energy-Efficient Resource Allocation for Application Including Dependent Tasks in Mobile Edge Computing. 2422-2443
- Yang Chi, Jinjiang Li:
Video Saliency Detection Using Bi-directional LSTM. 2444-2463 - Tariq Rahim, Soo Young Shin:
Subjective Evaluation of Ultra-high Definition (UHD) Videos. 2464-2479 - Jun Ming, Benshun Yi, Yungang Zhang, Huixin Li:
Low-dose CT Image Denoising Using Classification Densely Connected Residual Network. 2480-2496 - Cunbo Lu, Wengu Chen, Haibo Xu:
Deterministic Bipolar Compressed Sensing Matrices from Binary Sequence Family. 2497-2517
- Jin Myoung Kim, Hae Young Lee:
An Adaptive Key Redistribution Method for Filtering-based Wireless Sensor Networks. 2518-2533 - Lunzhi Deng, Tian Xia, Xiuru He:
Provably secure certificateless encryption scheme in the standard model. 2534-2553 - Chin-Feng Lee, Chin-Chen Chang, Guanlong Li:
A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images. 2554-2575 - Chengwan He, Yue He:
A Reusable SQL Injection Detection Method for Java Web Applications. 2576-2590 - Shahid Anwar, Mohamad Fadli Zolkipli, Vitaliy Mezhuyev, Zakira Inayat:
A Smart Framework for Mobile Botnet Detection Using Static Analysis. 2591-2611 - Qiu-yu Zhang, Yu-zhou Li, Yingjie Hu:
An Encrypted Speech Retrieval Scheme Based on Long Short-Term Memory Neural Network and Deep Hashing. 2612-2633 - Xiucai Ding, Xianyi Chen, Mengling Zou, Guangxing Zhang:
ASSVD: Adaptive Sparse Singular Value Decomposition for High Dimensional Matrices. 2634-2648
- Jiangfeng Sun, Hongxia Bie, Xingwang Li:
Security performance analysis of SIMO relay systems over Composite Fading Channels. 2649-2669 - Ali Raza, Muhammad Fahad Khan, Muazzam Maqsood, Bilal Haider Bukhari, Farhan Aadil:
Adaptive k-means clustering for Flying Ad-hoc Networks. 2670-2685 - Siyang Xu, Xin Song, Lin Xia, Zhigang Xie:
Energy Efficiency Maximization for Energy Harvesting Bidirectional Cooperative Sensor Networks with AF Mode. 2686-2708 - Fadhil Mukhlif, Kamarul Ariffin Bin Noordin, Omar B. Abdul-Ghafoor:
Energy Harvesting Technique for Efficient Wireless Cognitive Sensor Networks Based on SWIPT Game Theory. 2709-2734 - Jian Su, Ruoyu Xu, Shimin Yu, Baowei Wang, Jiuru Wang:
Redundant rule Detection for Software-Defined Networking. 2735-2751
Volume 14, Number 7, July 2020
- Abdullah Al-Alyan, Saad Al-Ahmadi:
Robust URL Phishing Detection Based on Deep Learning. 2752-2768 - Rui Liang, Hanwen Guo, Jiayu Liu, Ziyang Liu:
Scenic Image Research Based on Big Data Analysis - Take China's Four Ancient Cities as an Example. 2769-2784 - Minsoo Kim, Gil-Jin Jang, Ji-Hwan Kim, Minho Lee:
Speaker Adaptation Using i-Vector Based Clustering. 2785-2799
- Junyan Wang:
Pareto fronts-driven Multi-Objective Cuckoo Search for 5G Network Optimization. 2800-2814 - Adnan Abid, Muhammad Faraz Manzoor, Muhammad Shoaib Farooq, Uzma Farooq, Muzammil Hussain:
Challenges and Issues of Resource Allocation Techniques in Cloud Computing. 2815-2839
- Yiltan Bitirim, Duygu Çelik Ertugrul:
An analysis of user behaviors on the search engine results pages based on the demographic characteristics. 2840-2861
- N. Rajesh Kumar, R. Bala Krishnan, G. Manikandan, N. R. Raajan:
An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission. 2862-2878 - Qingzhu Wang, Dan Yu, Yihai Zhu:
Angle-Range-Polarization Estimation for Polarization Sensitive Bistatic FDA-MIMO Radar via PARAFAC Algorithm. 2879-2890 - Changbo Hou, Shuai Guo:
Automatic carrier phase delay synchronization of PGC demodulation algorithm in fiber-optic interferometric sensors. 2891-2903 - Hyeonseung Im, Dohyung Kim:
An Overview of Content Poisoning in NDN: Attacks, Countermeasures, and Direction. 2904-2918
- Aeyoung Kim, Changda Wang, Seung-Hyun Seo:
PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation. 2919-2937 - Zhisen Tang, Yuanlin Zheng, Wei Wang, Kaiyang Liao:
Image Quality Assessment by Combining Masking Texture and Perceptual Color Difference Model. 2938-2956 - Tuoqia Cao, Dongxia Chang, Yao Zhao:
A new Ensemble Clustering Algorithm using a Reconstructed Mapping Coefficient. 2957-2980 - Jinwei Wang, Renfeng Liu, Hao Wang, Bin Wu, Yun-Qing Shi:
Quaternion Markov Splicing Detection for Color Images Based on Quaternion Discrete Cosine Transform. 2981-2996 - Ankit Garg, Ashish Negi:
A Survey on Content Aware Image Resizing Methods. 2997-3017 - Hongan Wei, Binqian Zhou, Ying Fang, Yiwen Xu, Tiesong Zhao:
Fast Depth Video Coding with Intra Prediction on VVC. 3018-3038 - Gun-Yoon Shin, Sung-Sam Hong, Dong-Wook Kim, Cheol-Hun Hwang, Myung-Mook Han, Hwayoung Kim, Young Jae Kim:
A framework of Multi Linear Regression based on Fuzzy Theory and Situation Awareness and its application to Beach Risk Assessment. 3039-3056
- Wei Meng, Laichun Li:
Matrix completion based adaptive sampling for measuring network delay with online support. 3057-3075
- Hui Wang, Chengjie Wang, Zihao Shen, Dengwei Lin:
IKPCA-ELM-based Intrusion Detection Method. 3076-3092 - Xinqian Liu, Jiadong Ren, Haitao He, Qian Wang, Shengting Sun:
A Novel Network Anomaly Detection Method based on Data Balancing and Recursive Feature Addition. 3093-3115 - Xue-Yang Li, Yan Chang, Shibin Zhang:
Quantum Secret Sharing Scheme with Credible Authentication based on Quantum Walk. 3116-3133
- Junyi Liu, Hongbing Huang, Yijun Zhong, Jiale He, Tiancong Huang, Qian Xiao, Weiheng Jiang:
Joint wireless and computational resource allocation for ultra-dense mobile-edge computing networks. 3134-3155 - Rui Guo, Yingjie Wu:
Polar Code Design for Nakagami-m Channel. 3156-3167
Volume 14, Number 8, August 2020
- Fuqiang Lin, Xingkong Ma, Yaofeng Chen, Jiajun Zhou, Bo Liu:
PC-SAN: Pretraining-Based Contextual Self-Attention Model for Topic Essay Generation. 3168-3186 - Meijuan Yin, Xiaonan Liu, Gongzhen He, Jing Chen, Ziqi Tang, Bo Zhao:
A Method of Finding Hidden Key Users Based on Transfer Entropy in Microblog Network. 3187-3200
- Manjunath G. Asuti, Prabhugoud I. Basarkod:
TLSA: A Two Level Scheduling Algorithm for Multiple packets Arrival in TSCH Networks. 3201-3223 - Seungcheol Lee, Jaehyun Lee, Sengphil Hong, Jae-Hoon Kim:
Lightweight End-to-End Blockchain for IoT Applications. 3224-3242
- Usama Mir:
Bitcoin and Its Energy Usage: Existing Approaches, Important Opinions, Current Trends, and Future Challenges. 3243-3256 - Keonsoo Lee, Yunyoung Nam:
A Method of Evaluating Korean Articulation Quality for Rehabilitation of Articulation Disorder in Children. 3257-3269 - Waqas Nawaz, Kifayat Ullah Khan, Khalid Bashir:
A Review on Path Selection and Navigation Approaches Towards an Assisted Mobility of Visually Impaired People. 3270-3294
- Fuquan Zhu, Huajun Wang, Liping Yang, Changguo Li, Sen Wang:
Lossless Compression for Hyperspectral Images based on Adaptive Band Selection and Adaptive Predictor Selection. 3295-3311 - Wakeel Ahmad, Syed Muhammad Adnan Shah, Aun Irtaza:
Plants Disease Phenotyping using Quinary Patterns as Texture Descriptor. 3312-3327
- Xianming Li, Guangzhong Sun:
A Solution to Privacy Preservation in Publishing Human Trajectories. 3328-3349
- Jing Zhang, Changzhen Li, Luyao Du, Wei Chen:
Research on Ship to Ship Channel Characteristics Based on Effect of Antenna Location in Inland Waterway at 5.9 GHz. 3350-3365 - Yonghong Chen, Jie Yang, Xuehong Cao, Shibing Zhang:
Energy Efficiency Analysis and Optimization of Multiantenna Heterogeneous Cellular Networks Modeled by Matérn Hard-core Point Process. 3366-3383
- Chung-Il Kim, Yongjang Cho, Seungwon Jung, Jehyeok Rew, Eenjun Hwang:
Animal Sounds Classification Scheme Based on Multi-Feature Network with Mixed Datasets. 3384-3398 - Zilong Jin, Yuxin Xu, Xiaorui Zhang, Jin Wang, Lejun Zhang:
Trajectory-prediction based relay scheme for time-sensitive data communication in VANETs. 3399-3419 - Jungsoo Park, Long Nguyen-Vu, George Bencivengo, Souhwan Jung:
Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence. 3420-3436 - Noo Ri On, Gi-Myeong Ryu, Myoung-Ju Koh, Jongsuk Ruth Lee, Nam-Gyu Kim:
An Empirical Study on the Intention to Reuse Computational Science and Engineering Platforms: A Case Study of EDISON. 3437-3456 - Chul Hwan Kwon, Dong Hyuk Jo, Hugo Guimarães Mariano:
Exploring the Determinants of Relationship Quality in Retail Banking Services. 3457-3472 - Wonseok Chae, Yejin Kim:
Text-driven Speech Animation with Emotion Control. 3473-3487 - Wei Fang, Weinan Yi, Lin Pang, Shuonan Hou:
A Method of License Plate Location and Character Recognition based on CNN. 3488-3500 - Shuang Li, Sha-sha Du, Wenfeng Huang, Siyu Liang, Jinxi Deng, Le Wang, Huiwu Huang, Xinhai Liao, Shen Su:
A Light-weighted Data Collection Method for DNS Simulation on the Cyber Range. 3501-3518 - Jian Liu, Yidi Huang:
Comparison of Different CNN Models in Tuberculosis Detecting. 3519-3533 - Jingwen Liu, Junshan Tan, Jiaohua Qin, Xuyu Xiang:
Smoke Image Recognition Method Based on the optimization of SVM parameters with Improved Fruit Fly Algorithm. 3534-3549 - Shuhua Huang, Weiwei Liu, Guangjie Liu, Yuewei Dai, Wen Tian:
Exploiting Correlation Characteristics to Detect Covert digital communication. 3550-3566 - Ling Tan, Dawei Xuan, Jingming Xia, Chao Wang:
Weather Recognition Based on 3C-CNN. 3567-3582
Volume 14, Number 9, September 2020
- Husnu Baris Baydargil, Jangsik Park, Do-Young Kang, Hyun Kang, Kook Cho:
A Parallel Deep Convolutional Neural Network for Alzheimer's disease classification on PET/CT brain images. 3583-3597 - Xiufang Sun, Jianbo Li, Zhiqiang Lv, Chuanhao Dong:
Traffic Flow Prediction Model Based on Spatio-Temporal Dilated Graph Convolution. 3598-3614
- Shiqiang Zhang, Yang Cao, Zhenhu Ning, Fei Xue, Dongzhi Cao, Yongli Yang:
A Heterogeneous IoT Node Authentication Scheme Based on Hybrid Blockchain and Trust Value. 3615-3638 - Sohail Abbas, Muhammad Haqdad, Muhammad Zahid Khan, Haseeb Ur Rehman, Ajab Khan, Atta ur Rehman Khan:
Survivability Analysis of MANET Routing Protocols under DOS Attacks. 3639-3662
- K. Devi, D. Paulraj, Balaubramanian Muthusenthil:
Deep Learning Based Security Model for Cloud based Task Scheduling. 3663-3679
- Pei Li, Zi Yang Liu:
E-customized Product: User-centered Co-design Experiences. 3680-3692
- Karthika Veeramani, Suresh Jaganathan:
Land Registration: Use-case of e-Governance using Blockchain Technology. 3693-3711
- Tong Liu, Jianghua Cheng, Zhimin Yuan, Honghu Hua, Kangcheng Zhao:
Video smoke detection with block DNCNN and visual change image. 3712-3729 - Hyun Yoo, Kyungyong Chung:
Deep Learning-based Evolutionary Recommendation Model for Heterogeneous Big Data Integration. 3730-3744 - Rui Gao, Deqiang Cheng, Jie Yao, Liangliang Chen:
Low-Rank Representation-Based Image Super-Resolution Reconstruction with Edge-Preserving. 3745-3761 - Xin Wang, Xin Zhang, Chen Ning:
Infrared Target Recognition using Heterogeneous Features with Multi-kernel Transfer Learning. 3762-3781 - Jangseok Oh, Hyung Gil Hong, Yongjun Cho, Haeyong Yun, Kap-Ho Seo, Hochul Kim, Mingi Kim, Onseok Lee:
A reliable quasi-dense corresponding points for structure from motion. 3782-3796 - Jeong Hoon Han, In Soo Kim, Cheol Hee Lee, Young Shik Moon:
Crack Detection Method for Tunnel Lining Surfaces using Ternary Classifier. 3797-3822 - Yifan He, Feng Li, Huihui Bai, Yao Zhao:
Adaptive Importance Channel Selection for Perceptual Image Compression. 3823-3840
- Kritsanapong Somsuk:
The new Weakness of RSA and The Algorithm to Solve this Problem. 3841-3857 - Jongkwan Lee:
Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems. 3858-0 - E. Nirmala, S. Muthurajkumar:
A Four-Layer Robust Storage in Cloud using Privacy Preserving Technique with Reliable Computational Intelligence in Fog-Edge. 3870-3884 - Yunchao Wang, Zehui Wu, Qiang Wei, Qingxian Wang:
EPfuzzer: Improving Hybrid Fuzzing with Hardest-to-reach Branch Prioritization. 3885-3906
- Jingrui Su, Guangliang Ren, Bo Zhao, Jian Ding:
Enhancing Irregular Repetition Slotted ALOHA with Polarization Diversity in LEO Satellite Networks. 3907-3923 - Nhu-Tai Do, In Seop Na, Soo-Hyung Kim:
HSFE Network and Fusion Model based Dynamic Hand Gesture Recognition. 3924-3940
Volume 14, Number 10, October 2020
- Wenzheng Yu, Hanxiaoya Zhang, Tianliang Chen, Jing Liu, Yanbo Shen:
The Analysis of Climate Change in Haiyan County. 3941-3954 - Juho Jung, Manbok Park, Kuk Cho, Cheol Mun, Junho Ahn:
Intelligent Hybrid Fusion Algorithm with Vision Patterns for Generation of Precise Digital Road Maps in Self-driving Vehicles. 3955-3971 - Hechan Tian, Fenlin Liu, Xiangyang Luo, Fan Zhang, Yaqiong Qiao:
Microblog User Geolocation by Extracting Local Words Based on Word Clustering and Wrapper Feature Selection. 3972-3988
- Xue-Yong Yu, Xin-Hui Guo:
Data anomaly detection and Data fusion based on Incremental Principal Component Analysis in Fog Computing. 3989-4006
- Mohammad Azad:
Knowledge Representation Using Decision Trees Constructed Based on Binary Splits. 4007-4024
- Zhi Li, Qi Zhu:
An Offloading Strategy for Multi-User Energy Consumption Optimization in Multi-MEC Scene. 4025-4041
- Modigari Narendra, M. L. Valarmathi, L. Jani Anbarasi:
Optimization of 3D Triangular Mesh Watermarking Using ACO-Weber's Law. 4042-4059 - Chenchen Sun, Ziguan Cui, Zongliang Gan, Feng Liu:
No-reference Image Blur Assessment Based on Multi-scale Spatial Local Features. 4060-4079 - Shuaihui Qi, Jungang Yang, Xiaofeng Song, Chen Jian:
Multi-Task FaceBoxes: A Lightweight Face Detector Based on Channel Attention and Context Information. 4080-4097 - Suwon Lee:
Real-time Object Recognition with Pose Initialization for Large-scale Standalone Mobile Augmented Reality. 4098-4116 - Bin Jiang, Qiang Ren, Fei Dai, Tian Zhou, Guan Gui:
Parallel Multi-task Cascade Convolution Neural Network Optimization Algorithm for Real-time Dynamic Face Recognition. 4117-4135
- Yong-Woon Hwang, Im-Yeong Lee:
CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud. 4136-4156 - Hao Hu, Jing Liu, Jinglei Tan, Jiang Liu:
SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game. 4157-4175 - Dandy Pramana Hostiadi, Waskitho Wibisono, Tohari Ahmad:
B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis. 4176-4197 - Shahrzad Azizi, Davud Mohammadpur:
Searchable Encrypted String for Query Support on Different Encrypted Data Types. 4198-4213
- Kwihoon Kim, Joo-Hyung Lee:
Deep CNN based Pilot Allocation Scheme in Massive MIMO systems. 4214-4230 - Xianbin Xie, Yan Bi, Xi Nie:
Capacity Analysis of an AF Relay Cooperative NOMA System Using MRC. 4231-4245
Volume 14, Number 11, November 2020
- Junwei Li, Zhisong Pan:
Network Traffic Classification Based on Deep Learning. 4246-4267 - Si Shen, Guojiang Shen, Yang Shen, Duanyang Liu, Xi Yang, Xiangjie Kong:
PGA: An Efficient Adaptive Traffic Signal Timing Optimization Scheme Using Actor-Critic Reinforcement Learning Algorithm. 4268-4289 - Abdullah Ali Alshehri, Adam Lutz, Soundararajan Ezekiel, Larry Pearlstein, John Conlen:
DCNN Optimization Using Multi-Resolution Image Fusion. 4290-4309
- Young-Hoon Goo, Kyu-Seok Shim, Ui-Jun Baek, Myung-Sup Kim:
Two-Pathway Model for Enhancement of Protocol Reverse Engineering. 4310-4330 - Deepanjal Shrestha, Wenan Tan, Adesh Khadka, Seung Ryul Jeong:
Digital Tourism Security System for Nepal. 4331-4354
- Zhuolei Xiao, Yerong Zhang, Jie Yang:
Large-Scale Phase Retrieval via Stochastic Reweighted Amplitude Flow. 4355-4371
- Jianlong Liu, Wen'an Zhou, Lixia Lin:
Socially Aware Device-to-multi-device User Grouping for Popular Content Distribution. 4372-4394
- Zhen Zhong, Minjuan Wang, Wanlin Gao:
A multisource image fusion method for multimodal pig-body feature detection. 4395-4412 - Weizhong Li, Honghua Ma:
Realistic Scenes Reproduction Based on Total Variation. 4413-4425 - Xiaopin Zhao, Weibin Liu, Weiwei Xing, Xiang Wei:
DA-Res2Net: a novel Densely connected residual Attention network for image semantic segmentation. 4426-4442 - Zheng Hui, Quan Zhou:
A Reversible Data Hiding Method for AMBTC Compressed Image without Expansion inside Stego Format. 4443-4462 - Zhuo Chen, Xiaobin Zheng, Tao Guan:
Structure-Preserving Mesh Simplification. 4463-4482
- Haitao Xu, Weiguo Zhang, Zuozhang Zhuo:
A Network Partition Approach for MFD-Based Urban Transportation Network Model. 4483-4501
- Shiqiang Zhu, Gaoli Wang, Yu He, Haifeng Qian:
Integral Attacks on Some Lightweight Block Ciphers. 4502-4521 - M. Vedaraj, P. Ezhumalai:
Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme. 4522-4536 - Hsing-Han Liu, Pin-Chang Su, Meng-Hua Hsu:
An Improved Steganography Method Based on Least-Significant-Bit Substitution and Pixel-Value Differencing. 4537-4556 - Ziling Zhou, Shunquan Tan, Jishen Zeng, Han Chen, Shaobin Hong:
Ensemble Deep Learning Features for Real-World Image Steganalysis. 4557-4572 - Nur Afiqah Suzelan Amir, Amizah Malip, Wan Ainun Mior Othman:
Securing Anonymous Authenticated Announcement Protocol for Group Signature in Internet of Vehicles. 4573-4594
- Xin Song, Li Dong, Xue Huang, Lei Qin, Xiuwei Han:
Energy-efficient Power Allocation based on worst-case performance optimization under channel uncertainties. 4595-4610 - Shasha Zhao, Fei Wang, Yueqiang Ning, Yi Xiao, Dengying Zhang:
Vertical Handoff Decision Algorithm combined Improved Entropy Weighting with GRA for Heterogeneous Wireless Networks. 4611-4624
Volume 14, Number 12, December 2020
- Jieren Cheng, Yue Yang, Xiangyan Tang, Naixue Xiong, Yuan Zhang, Feifei Lei:
Generative Adversarial Networks: A Literature Review. 4625-4647 - Do Young Choi, Jung-Hwan Oh, Ji Kwang Kim, Seung Eun Lee:
Energy Efficient and Low-Cost Server Architecture for Hadoop Storage Appliance. 4648-4663 - Qingfeng Jing, Huaxia Wang, Liming Yang:
Study on Fast-Changing Mixed-Modulation Recognition Based on Neural Network Algorithms. 4664-4681
- Zhiwei Li, Yu Lu, Zengguang Wang, Wenxin Qiao, Donghao Zhao:
Smart Anti-jamming Mobile Communication for Cloud and Edge-Aided UAV Network. 4682-4705
- Hoon Jung, Bong Gyou Lee:
The Impact of Transforming Unstructured Data into Structured Data on a Churn Prediction Model for Loan Customers. 4706-4724 - Junli Mao, Lishui Chen, Jiacong Li, Yi Ge:
Controller Backup and Replication for Reliable Multi-domain SDN. 4725-4747 - Ki Youn Kim, In Kuk Song:
Exploring Working Group's Psychological Subjectivity on Public Smart Work Services in a Cloud-based Social Networking. 4748-4762
- Hyeon-Ho Kim, Suchul Lee, Seokmin Han:
Railroad Surface Defect Segmentation Using a Modified Fully Convolutional Network. 4763-4775
- Minhaz Uddin Ahmed, Kim Yeong Hyeon, Phill-Kyu Rhee:
EER-ASSL: Combining Rollback Learning and Deep Learning for Rapid Adaptive Object Detection. 4776-4794 - Han Sun, Wen Geng, Jiaquan Shen, Ningzhong Liu, Dong Liang, Huiyu Zhou:
Deeper SSD: Simultaneous Up-sampling and Down-sampling for Drone Detection. 4795-4815 - Francis Jesmar P. Montalbo:
A Computer-Aided Diagnosis of Brain Tumors Using a Fine-Tuned YOLO-based Model with Transfer Learning. 4816-4834 - Shinjin Kang:
Facial Feature Based Image-to-Image Translation Method. 4835-4848 - Sangwoo Hahm, Hyungwoo Park:
An Interdisciplinary Study of A Leaders' Voice Characteristics: Acoustical Analysis and Members' Cognition. 4849-4865 - Ibrahim Aliyu, Jonathan Gana Kolo, Aibinu Abiodun Musa, Mutiu Adesina Adegboye, Chang Gyoon Lim:
Incorporating Recognition in Catfish Counting Algorithm Using Artificial Neural Network and Geometry. 4866-4888
- Hae Seon Jeong, Jin Kwak:
Automated Detection Technique for Suspected Copyright Infringement Sites. 4889-4908 - Chanwoong Hwang, Doyeon Kim, Taejin Lee:
Semi-supervised based Unknown Attack Detection in EDR Environment. 4909-4926
- Shaharyar Kamal, Hojin Kang, Cesar A. Azurdia-Meza, Dong Seong Kim:
Improved Dual Sinc Pulses to Reduce ICI Power and PAPR in OFDM-based Systems. 4927-4945 - Fangmin Xu, Pengkai Zou, Haiquan Wang, Haiyan Cao, Xin Fang, Zhirui Hu:
Resource Allocation for D2D Communication in Cellular Networks Based on Stochastic Geometry and Graph-coloring Theory. 4946-4960
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.