


default search action
Search dblp for Publications
export results for "toc:db/conf/trustcom/trustcom2016.bht:"
@inproceedings{DBLP:conf/trustcom/0007YB16, author = {Guoqiang Li and Bian Yang and Christoph Busch}, title = {A Fingerprint Indexing Algorithm on Encrypted Domain}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1030--1037}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0172}, doi = {10.1109/TRUSTCOM.2016.0172}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/0007YB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AbduljabbarJIHH16, author = {Zaid Ameen Abduljabbar and Hai Jin and Ayad Ibrahim and Zaid Alaa Hussien and Mohammed Abdulridha Hussain and Salah H. Abbdal and Deqing Zou}, title = {Privacy-Preserving Image Retrieval in IoT-Cloud}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {799--806}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0141}, doi = {10.1109/TRUSTCOM.2016.0141}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AbduljabbarJIHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AbegundeXS16, author = {Jacob Abegunde and Hannan Xiao and Joseph Spring}, title = {A Dynamic Game with Adaptive Strategies for {IEEE} 802.15.4 and IoT}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {473--480}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0099}, doi = {10.1109/TRUSTCOM.2016.0099}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AbegundeXS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AhamedSJ16, author = {Farhad Ahamed and Seyed A. Shahrestani and Bahman Javadi}, title = {Security Aware and Energy-Efficient Virtual Machine Consolidation in Cloud Computing Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1516--1523}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0236}, doi = {10.1109/TRUSTCOM.2016.0236}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AhamedSJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AhmedKKA16, author = {Idrees Ahmed and Abid Khan and Muhammad Saleem Khan and Mansoor Ahmed}, title = {Aggregated Signatures for Chaining: {A} Secure Provenance Scheme}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2012--2017}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0307}, doi = {10.1109/TRUSTCOM.2016.0307}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AhmedKKA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AkramBCMS16, author = {Raja Naeem Akram and Pierre{-}Fran{\c{c}}ois Bonnefoi and Serge Chaumette and Konstantinos Markantonakis and Damien Sauveron}, title = {Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {606--614}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0116}, doi = {10.1109/TRUSTCOM.2016.0116}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AkramBCMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Atoofian16, author = {Ehsan Atoofian}, title = {Temperature-Aware Register Mapping in GPGPUs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1636--1643}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0252}, doi = {10.1109/TRUSTCOM.2016.0252}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Atoofian16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AzabAA16, author = {Ahmad Azab and Mamoun Alazab and Mahdi Aiash}, title = {Machine Learning Based Botnet Identification Traffic}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1788--1794}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0275}, doi = {10.1109/TRUSTCOM.2016.0275}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AzabAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BasuKV016, author = {Anirban Basu and Shinsaku Kiyomoto and Jaideep Vaidya and Stephen Marsh}, title = {PrefRank: Quantification and Aggregation of Subjective User Preferences}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {7--13}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0039}, doi = {10.1109/TRUSTCOM.2016.0039}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BasuKV016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BiPY16, author = {Xiu{-}Li Bi and Chi{-}Man Pun and Xiaochen Yuan}, title = {Adaptive Polar Based Filtering Method for Image Copy-Move Forgery Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {952--956}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0161}, doi = {10.1109/TRUSTCOM.2016.0161}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BiPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BlakemoreRC16, author = {Christine Blakemore and Jo{\~{a}}o Redol and Miguel Correia}, title = {Fingerprinting for Web Applications: From Devices to Related Groups}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {144--151}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0057}, doi = {10.1109/TRUSTCOM.2016.0057}, timestamp = {Wed, 13 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BlakemoreRC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoCZ16, author = {Xiaoxiao Cao and Bing Chen and Yanchao Zhao}, title = {Wi-Wri: Fine-Grained Writing Recognition Using Wi-Fi Signals}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1366--1373}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0216}, doi = {10.1109/TRUSTCOM.2016.0216}, timestamp = {Tue, 05 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaoCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoLW16, author = {Zhenhai Cao and Bo Lang and Jinmiao Wang}, title = {An Efficient and Fine-Grained Access Control Scheme for Multidimensional Data Aggregation in Smart Grid}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {362--369}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0085}, doi = {10.1109/TRUSTCOM.2016.0085}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaoLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoQLS16, author = {Yuan Cao and Heng Qi and Keqiu Li and Milos Stojmenovic}, title = {Multiple Query-Independent Values Based Asymmetric Ranking for Approximate Nearest Neighbor Search}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1628--1635}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0251}, doi = {10.1109/TRUSTCOM.2016.0251}, timestamp = {Tue, 04 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaoQLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoSWL16, author = {Liu Cao and Yuqing Sun and Shaoqing Wang and Mingzhu Li}, title = {Detecting Malicious Behavior and Collusion for Online Rating System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1046--1053}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0174}, doi = {10.1109/TRUSTCOM.2016.0174}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CaoSWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoWLCYPY16, author = {Dong Cao and Shanshan Wang and Qun Li and Zhenxiang Chen and Qiben Yan and Lizhi Peng and Bo Yang}, title = {DroidCollector: {A} High Performance Framework for High Quality Android Traffic Collection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1753--1758}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0269}, doi = {10.1109/TRUSTCOM.2016.0269}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaoWLCYPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChaisiriK16, author = {Sivadon Chaisiri and Ryan K. L. Ko}, title = {From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {535--543}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0107}, doi = {10.1109/TRUSTCOM.2016.0107}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChaisiriK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChakrabortyARM16, author = {Nilesh Chakraborty and S. Vijay Anand and Gurpinder Singh Randhawa and Samrat Mondal}, title = {On Designing Leakage-Resilient Vibration Based Authentication Techniques}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1875--1881}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0287}, doi = {10.1109/TRUSTCOM.2016.0287}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChakrabortyARM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChangZDL16, author = {Xiaoshan Chang and Zenghua Zhao and Bingxue Diao and Tao Li}, title = {Experimental Study of Disruption-Tolerant Transport Protocol for Mobile Ad-Hoc Networks with Connection Diversity}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1613--1620}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0249}, doi = {10.1109/TRUSTCOM.2016.0249}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChangZDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenCYSTG16, author = {Yong Chen and Chao Chen and Yanlong Yin and Xian{-}He Sun and Rajeev Thakur and William Gropp}, title = {Rethinking High Performance Computing System Architecture for Scientific Big Data Applications}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1605--1612}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0248}, doi = {10.1109/TRUSTCOM.2016.0248}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenCYSTG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenCZZX16, author = {Zhengyang Chen and Renjie Chen and Yu Zhang and Jianzhong Zhang and Jingdong Xu}, title = {A Statistical-Feature {ML} Approach to {IP} Traffic Classification Based on {CUDA}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2235--2239}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0344}, doi = {10.1109/TRUSTCOM.2016.0344}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenCZZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenDYWL16, author = {Changyuan Chen and Ran Dai and Tingting Yang and Zuxin Wu and Quan Li}, title = {The Design and Application of an Intelligentialized Monitoring System for Mooring Safety}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2031--2034}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0310}, doi = {10.1109/TRUSTCOM.2016.0310}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenDYWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenLWH16, author = {Chao Chen and Kun{-}Yu Lin and Chang{-}Dong Wang and Dong Huang}, title = {{CSBD:} {A} Nonlinear Clustering Method Based on Cluster Shrinking and Border Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2240--2245}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0345}, doi = {10.1109/TRUSTCOM.2016.0345}, timestamp = {Thu, 13 Feb 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenLWH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenLZLZ16, author = {Pei Chen and Yaping Lin and Wei Zhang and Xiaoying Li and Shiwen Zhang}, title = {Preserving Location and Content Privacy for Secure Ranked Queries in Location Based Services}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {892--899}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0153}, doi = {10.1109/TRUSTCOM.2016.0153}, timestamp = {Tue, 19 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenLZLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenM16, author = {Long Chen and Yue Mao}, title = {Forensic Analysis of Email on Android Volatile Memory}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {945--951}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0160}, doi = {10.1109/TRUSTCOM.2016.0160}, timestamp = {Tue, 28 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenS16, author = {Shu Chen and Hong Shen}, title = {Semantic-Aware Dummy Selection for Location Privacy Preservation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {752--759}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0135}, doi = {10.1109/TRUSTCOM.2016.0135}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenS16a, author = {Houwu Chen and Jiwu Shu}, title = {Sznajd2: {A} Community-Aware Opinion Dynamics Model}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1477--1484}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0231}, doi = {10.1109/TRUSTCOM.2016.0231}, timestamp = {Sat, 17 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenSC16, author = {Yu Chen and Yuliang Shi and Li{-}zhen Cui}, title = {Model for Hiding Data Relationships Based on Chunk-Confusion in Cloud Computing}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {837--844}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0146}, doi = {10.1109/TRUSTCOM.2016.0146}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenTWZG16, author = {Shanshan Chen and Xiaoxin Tang and Hongwei Wang and Han Zhao and Minyi Guo}, title = {Towards Scalable and Reliable In-Memory Storage System: {A} Case Study with Redis}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1660--1667}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0255}, doi = {10.1109/TRUSTCOM.2016.0255}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenTWZG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenYZZX16, author = {Zhengyang Chen and Bowen Yu and Yu Zhang and Jianzhong Zhang and Jingdong Xu}, title = {Automatic Mobile Application Traffic Identification by Convolutional Neural Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {301--307}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0077}, doi = {10.1109/TRUSTCOM.2016.0077}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenYZZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenZXW16, author = {Haibin Chen and Lei Zhang and Junyuan Xie and Chongjun Wang}, title = {New Efficient Certificateless Blind Signature Scheme}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {349--353}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0083}, doi = {10.1109/TRUSTCOM.2016.0083}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenZXW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengLMZZW16, author = {Longwang Cheng and Wei Li and Dongtang Ma and Li Zhou and Chunsheng Zhu and Jibo Wei}, title = {Towards an Effective Secret Key Generation Scheme for Imperfect Channel State Information}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {915--920}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0156}, doi = {10.1109/TRUSTCOM.2016.0156}, timestamp = {Sat, 01 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChengLMZZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengWMW16, author = {Li Cheng and Yijie Wang and Xingkong Ma and Yongjun Wang}, title = {{GSLAC:} {A} General Scalable and Low-Overhead Alert Correlation Method}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {316--323}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0079}, doi = {10.1109/TRUSTCOM.2016.0079}, timestamp = {Thu, 01 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChengWMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChomsiriHNT16, author = {Thawatchai Chomsiri and Xiangjian He and Priyadarsi Nanda and Zhiyuan Tan}, title = {An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {178--184}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0061}, doi = {10.1109/TRUSTCOM.2016.0061}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChomsiriHNT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CuiLLY16, author = {Haoyi Cui and Qingzhong Li and Hui Li and Zhongmin Yan}, title = {Healthcare Fraud Detection Based on Trustworthiness of Doctors}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {74--81}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0048}, doi = {10.1109/TRUSTCOM.2016.0048}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CuiLLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DaiYTZG16, author = {You Dai and Jin Yan and Xiaoxin Tang and Han Zhao and Minyi Guo}, title = {Online Credit Card Fraud Detection: {A} Hybrid Framework with Big Data Technologies}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1644--1651}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0253}, doi = {10.1109/TRUSTCOM.2016.0253}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DaiYTZG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DangHN16, author = {Thanh Dat Dang and Doan B. Hoang and Priyadarsi Nanda}, title = {A Novel Hash-Based File Clustering Scheme for Efficient Distributing, Storing, and Retrieving of Large Scale Health Records}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1485--1491}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0232}, doi = {10.1109/TRUSTCOM.2016.0232}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DangHN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DangI16, author = {Quang{-}Vinh Dang and Claudia{-}Lavinia Ignat}, title = {Computational Trust Model for Repeated Trust Games}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {34--41}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0043}, doi = {10.1109/TRUSTCOM.2016.0043}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DangI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DengBZW16, author = {Liang Deng and Hanli Bai and Dan Zhao and Fang Wang}, title = {Evaluating Multi-core and Many-Core Architectures through Parallelizing a High-Order {WENO} Solver}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2167--2174}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0333}, doi = {10.1109/TRUSTCOM.2016.0333}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DengBZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DengGWP16, author = {Changyi Deng and Ruifeng Guo and Hongliang Wang and Azhen Peng}, title = {A Dynamic Power Management Algorithm for Sporadic Tasks in Real-Time Embedded Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2073--2078}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0318}, doi = {10.1109/TRUSTCOM.2016.0318}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DengGWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DillonC16, author = {Tharam S. Dillon and Elizabeth Chang}, title = {Trust and Risk Semantics and Prediction through Big Data Analytics to Encompass Cloud Services, Cyber-Physical Systems, and Social Media: Issues and Challenges}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {185--193}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0062}, doi = {10.1109/TRUSTCOM.2016.0062}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DillonC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DingWWZZ16, author = {Weiwei Ding and Jin Wang and Xiumin Wang and Ruimin Zhao and Yanqin Zhu}, title = {Optimal Flow Allocation and Linear Network Coding Design for Multiple Multicasts under the Requirements of Information Theoretical Security}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {576--583}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0112}, doi = {10.1109/TRUSTCOM.2016.0112}, timestamp = {Wed, 18 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DingWWZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DongW16, author = {Wei Dong and Jianjun Wang}, title = {{JPEG} Compression Forensics against Resizing}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1001--1007}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0168}, doi = {10.1109/TRUSTCOM.2016.0168}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DongW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuCLY16, author = {Haizhou Du and Zhengbo Chen and Qifen Li and Yongwen Yang}, title = {A Novel Text Feature Weight Calculation Method Applied to Power Field}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1700--1705}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0260}, doi = {10.1109/TRUSTCOM.2016.0260}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DuCLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FanYXS16, author = {Xiaochen Fan and Panlong Yang and Chaocan Xiang and Lei Shi}, title = {iMap: {A} Crowdsensing Based System for Outdoor Radio Signal Strength Map}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1442--1447}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0226}, doi = {10.1109/TRUSTCOM.2016.0226}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FanYXS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FangLHF16, author = {Kunding Fang and Xiaohong Li and Jianye Hao and Zhiyong Feng}, title = {Formal Modeling and Verification of Security Protocols on Cloud Computing Systems Based on {UML} 2.3}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {852--859}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0148}, doi = {10.1109/TRUSTCOM.2016.0148}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FangLHF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FattahiMP16, author = {Jaouhar Fattahi and Mohamed Mejri and Emil Pricop}, title = {Authentication by Witness Functions}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1990--1997}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0304}, doi = {10.1109/TRUSTCOM.2016.0304}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FattahiMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FengWL16, author = {Bo Feng and Chentao Wu and Jie Li}, title = {{MLC:} An Efficient Multi-level Log Compression Method for Cloud Backup Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1358--1365}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0215}, doi = {10.1109/TRUSTCOM.2016.0215}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FengWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FloresQJ16, author = {Denys A. Flores and Farrukh Qazi and Arshad Jhumka}, title = {Bring Your Own Disclosure: Analysing {BYOD} Threats to Corporate Information}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1008--1015}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0169}, doi = {10.1109/TRUSTCOM.2016.0169}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FloresQJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FuLLD16, author = {Jianming Fu and Pengwei Li and Yan Lin and Shuang Ding}, title = {Android App Malicious Behavior Detection Based on User Intention}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {560--567}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0110}, doi = {10.1109/TRUSTCOM.2016.0110}, timestamp = {Wed, 23 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FuLLD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FuLZ16, author = {Jianming Fu and Yan Lin and Xu Zhang}, title = {Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {394--401}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0089}, doi = {10.1109/TRUSTCOM.2016.0089}, timestamp = {Thu, 17 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FuLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FukushimaSHNDGN16, author = {Kazuhide Fukushima and Youssef Souissi and Seira Hidano and Robert Nguyen and Jean{-}Luc Danger and Sylvain Guilley and Yuto Nakano and Shinsaku Kiyomoto and Laurent Sauvage}, title = {Delay {PUF} Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {201--207}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0064}, doi = {10.1109/TRUSTCOM.2016.0064}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FukushimaSHNDGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoLSS16, author = {Hongyun Gao and Fujun Liu and Shengjuan Sun and Gaotao Shi}, title = {A New Model Based on {GEP-SWPM} for Predicting Heavy Metals Speciation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2122--2126}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0326}, doi = {10.1109/TRUSTCOM.2016.0326}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaoLSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoX16, author = {Shengli Gao and Ruini Xue}, title = {{BOLAS+:} Scalable Lightweight Locality-Aware Scheduling for Hadoop}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1077--1084}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0178}, doi = {10.1109/TRUSTCOM.2016.0178}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaoX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaraeKC16, author = {Jeffery Garae and Ryan K. L. Ko and Sivadon Chaisiri}, title = {UVisP: User-centric Visualization of Data Provenance with Gestalt Principles}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1923--1930}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0294}, doi = {10.1109/TRUSTCOM.2016.0294}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaraeKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GheidC16, author = {Zakaria Gheid and Yacine Challal}, title = {Efficient and Privacy-Preserving k-Means Clustering for Big Data Mining}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {791--798}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0140}, doi = {10.1109/TRUSTCOM.2016.0140}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GheidC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GongWZL16, author = {Lirui Gong and Jiawei Wang and Xiang Zhang and Kai Lei}, title = {Intelligent Forwarding Strategy Based on Online Machine Learning in Named Data Networking}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1288--1294}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0206}, doi = {10.1109/TRUSTCOM.2016.0206}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GongWZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GongYXMYY16, author = {Liangyi Gong and Wu Yang and Chaocan Xiang and Dapeng Man and Miao Yu and Zuwei Yin}, title = {WiSal: Ubiquitous WiFi-Based Device-Free Passive Subarea Localization without Intensive Site-Survey}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1129--1136}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0185}, doi = {10.1109/TRUSTCOM.2016.0185}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GongYXMYY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GottwaltWL16, author = {Florian Gottwalt and Adrian Waller and Weiru Liu}, title = {Natural Laws as a Baseline for Network Anomaly Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {370--377}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0086}, doi = {10.1109/TRUSTCOM.2016.0086}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GottwaltWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GranadilloRGD16, author = {Gustavo {Gonzalez Granadillo} and Jose Rubio{-}Hernan and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar}, title = {Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {340--348}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0082}, doi = {10.1109/TRUSTCOM.2016.0082}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GranadilloRGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuHLYHJ16, author = {Chonglin Gu and Ke Hu and Zhenlong Li and Qiang Yuan and Hejiao Huang and Xiaohua Jia}, title = {Lowering Down the Cost for Green Cloud Data Centers by Using ESDs and Energy Trading}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1508--1515}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0235}, doi = {10.1109/TRUSTCOM.2016.0235}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuHLYHJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuanL16, author = {Lei Guan and Yutong Lu}, title = {Using Dynamic Granularity Strategy to Accelerate Unbalanced Tree Search}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1302--1310}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0208}, doi = {10.1109/TRUSTCOM.2016.0208}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuanL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoCHD16, author = {Xiaojun Guo and Guang Cheng and Yifei Hu and Mian Dai}, title = {Progress in Command and Control Server Finding Schemes of Botnet}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1723--1727}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0264}, doi = {10.1109/TRUSTCOM.2016.0264}, timestamp = {Tue, 26 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GuoCHD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoLLHL16, author = {Ping Guo and Bin Lin and Xin Li and Rongxi He and Sen Li}, title = {Optimal Deployment and Dimensioning of Fog Computing Supported Vehicular Network}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2058--2062}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0315}, doi = {10.1109/TRUSTCOM.2016.0315}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoLLHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoS16, author = {Longkun Guo and Hong Shen}, title = {Privacy-Preserving Internet Traffic Publication}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {884--891}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0152}, doi = {10.1109/TRUSTCOM.2016.0152}, timestamp = {Wed, 20 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoWYHW16, author = {Zonghao Guo and Ou Wei and Peng Yu and Lansheng Han and Weiming Wu}, title = {Model Checking Probabilistic Network Propagation Protection Strategies}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {354--361}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0084}, doi = {10.1109/TRUSTCOM.2016.0084}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoWYHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoWZC16, author = {Jian Guo and Lirong Wang and Wenliang Zhu and Xiaohe Chen}, title = {The Analysis of Crosstalk Noise Component in Wearable Device}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2202--2205}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0339}, doi = {10.1109/TRUSTCOM.2016.0339}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoWZC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoZZ16, author = {Yanbin Guo and Jianzhong Zhang and Yu Zhang}, title = {An Algorithm for Analyzing the City Residents' Activity Information through Mobile Big Data Mining}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2133--2138}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0328}, doi = {10.1109/TRUSTCOM.2016.0328}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GuoZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanGRMX16, author = {Hongfang Han and Ang Gao and Jianji Ren and Yongqiang Ma and Xiao Xue}, title = {An {O2O} Service Recommendation Algorithm Based on User Context and Trust Service}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1904--1909}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0291}, doi = {10.1109/TRUSTCOM.2016.0291}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HanGRMX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanHCWS16, author = {Yandong Han and Zhiyu Hao and Lei Cui and Chonghua Wang and Yafei Sang}, title = {A Hybrid Monitoring Mechanism in Virtualized Environments}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1038--1045}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0173}, doi = {10.1109/TRUSTCOM.2016.0173}, timestamp = {Mon, 01 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HanHCWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanLLDQ16, author = {Lin Han and Zhiyang Li and Weijiang Liu and Ke Dai and Wenyu Qu}, title = {Minimum Control Latency of {SDN} Controller Placement}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2175--2180}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0334}, doi = {10.1109/TRUSTCOM.2016.0334}, timestamp = {Tue, 10 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HanLLDQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanQBD16, author = {Zijun Han and Guangzhi Qu and Dona Burkard and Kelvin Dobbins}, title = {A Memory Access Pattern-Based Program Profiling System for Dynamic Parallelism Prediction}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1448--1454}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0227}, doi = {10.1109/TRUSTCOM.2016.0227}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HanQBD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanzlikKKD16, author = {Lucjan Hanzlik and Kamil Kluczniak and Miroslaw Kutylowski and Shlomi Dolev}, title = {Local Self-Organization with Strong Privacy Protection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {775--782}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0138}, doi = {10.1109/TRUSTCOM.2016.0138}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HanzlikKKD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HaoGWS16, author = {Zhongyuan Hao and Wei Guo and Jizeng Wei and Dazhi Sun}, title = {Dual Processing Engine Architecture to Speed Up Optimal Ate Pairing on {FPGA} Platform}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {584--589}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0113}, doi = {10.1109/TRUSTCOM.2016.0113}, timestamp = {Sun, 27 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HaoGWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HeL016, author = {Xinglu He and Kai Lu and Gen Li}, title = {Taint Reverse Propagation for Analysis of Privacy Leak}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1718--1722}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0263}, doi = {10.1109/TRUSTCOM.2016.0263}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HeL016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HeXXLX16, author = {Shiming He and Kun Xie and Kexin Xie and Zhetao Li and Chuan Xu}, title = {Interference-Aware Multi-source Transmission}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1233--1240}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0199}, doi = {10.1109/TRUSTCOM.2016.0199}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HeXXLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HouZWCWL16, author = {Gang Hou and Kuanjiu Zhou and Yanran Wu and Zongzheng Chi and Jie Wang and Mingchu Li}, title = {{ETSTM:} {A} New Green Software Model}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1825--1830}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0280}, doi = {10.1109/TRUSTCOM.2016.0280}, timestamp = {Wed, 14 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HouZWCWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuC0S16, author = {Feng Hu and Bing Chen and Xiaojun Zhu and Hong Shen}, title = {SDN-Based Efficient Bandwidth Allocation for Caching Enabled Cognitive Radio Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1382--1389}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0218}, doi = {10.1109/TRUSTCOM.2016.0218}, timestamp = {Sat, 26 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuC0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuWWCZ16, author = {Shengshan Hu and Qian Wang and Jingjun Wang and Sherman S. M. Chow and Qin Zou}, title = {Securing Fast Learning! Ridge Regression over Encrypted Big Data}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {19--26}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0041}, doi = {10.1109/TRUSTCOM.2016.0041}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuWWCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuWZF16, author = {Zongshuai Hu and Yong Wang and Lipeng Zhang and Rusen Fan}, title = {Bad Data Injection Attacks Identification in Power System on Fast Decoupled Load Flow}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1970--1975}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0301}, doi = {10.1109/TRUSTCOM.2016.0301}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuWZF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangDWW16, author = {Haiping Huang and Jianpeng Du and Hui Wang and Ruchuan Wang}, title = {A Multi-keyword Multi-user Searchable Encryption Scheme Based on Cloud Storage}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1937--1943}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0296}, doi = {10.1109/TRUSTCOM.2016.0296}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuangDWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangLWS16, author = {Xi Huang and Xiaoguang Liu and Gang Wang and Ming Su}, title = {A Robust Image Hashing with Enhanced Randomness by Using Random Walk on Zigzag Blocking}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {14--18}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0040}, doi = {10.1109/TRUSTCOM.2016.0040}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuangLWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangZQ16, author = {Xingyuan Huang and Jiandong Zhang and Kun Qian}, title = {Big Data Analysis on the Relationship between the Organizational Career Management and Knowledge Workers' Work Involved - Take the High-Tech Enterprise as an Example}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2251--2256}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0347}, doi = {10.1109/TRUSTCOM.2016.0347}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuangZQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HussainSP16, author = {Sardar Hussain and Richard O. Sinnott and Ron Poet}, title = {A Security-Oriented Workflow Framework for Collaborative Environments}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {707--714}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0129}, doi = {10.1109/TRUSTCOM.2016.0129}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HussainSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JayarathnaVT16, author = {Dilshan Jayarathna and Vijay Varadharajan and Udaya Kiran Tupakula}, title = {Integrated Security for Services Hosted in Virtual Environments}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {82--89}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0049}, doi = {10.1109/TRUSTCOM.2016.0049}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JayarathnaVT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JayasingheMGAM16, author = {Danushka Jayasinghe and Konstantinos Markantonakis and Iakovos Gurulian and Raja Naeem Akram and Keith Mayes}, title = {Extending {EMV} Tokenised Payments to Offline-Environments}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {443--450}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0095}, doi = {10.1109/TRUSTCOM.2016.0095}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JayasingheMGAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiWTWWTZZ16, author = {Changqing Ji and Baofeng Wang and Shuai Tao and Junfeng Wu and Zumin Wang and Long Tang and Tiange Zu and Gui Zhao}, title = {Inverted Voronoi-Based kNN Query Processing with MapReduce}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2263--2268}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0349}, doi = {10.1109/TRUSTCOM.2016.0349}, timestamp = {Mon, 28 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JiWTWWTZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiaWZWJ16, author = {Chengjin Jia and Jin Wang and Yanqin Zhu and Zhengqing Wen and Juncheng Jia}, title = {Joint Selection of Providers and the New Comer for Optimal Repair in Distributed Storage Network with Network Coding}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1567--1574}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0243}, doi = {10.1109/TRUSTCOM.2016.0243}, timestamp = {Wed, 18 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiaWZWJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiaYKXCS16, author = {Minglei Jia and Yanqin Yang and Lei Kuang and Wenchao Xu and Tianxing Chu and Hongzhi Song}, title = {An Indoor and Outdoor Seamless Positioning System Based on Android Platform}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1114--1120}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0183}, doi = {10.1109/TRUSTCOM.2016.0183}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiaYKXCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangLXTYK16, author = {Meng Jiang and Yanbo Liu and Wenchao Xu and Feilong Tang and Yanqin Yang and Lei Kuang}, title = {An Optimized Layered Routing Algorithm for {GEO/LEO} Hybrid Satellite Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1153--1158}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0188}, doi = {10.1109/TRUSTCOM.2016.0188}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiangLXTYK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangQSWL16, author = {Jianguo Jiang and Biao Qi and Zhixin Shi and Yan Wang and Bin Lv}, title = {Botnet Detection Method Analysis on the Effect of Feature Extraction}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1882--1888}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0288}, doi = {10.1109/TRUSTCOM.2016.0288}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiangQSWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Jianyong16, author = {Fang Jianyong}, title = {Research on the Nonintrusive Resource Level Fault Injection Technology for Windows System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1856--1860}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0284}, doi = {10.1109/TRUSTCOM.2016.0284}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Jianyong16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JinGQZPL16, author = {Yibo Jin and Yuan Gao and Zhuzhong Qian and Mingyu Zhai and Hui Peng and Sanglu Lu}, title = {Workload-Aware Scheduling Across Geo-distributed Data Centers}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1455--1462}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0228}, doi = {10.1109/TRUSTCOM.2016.0228}, timestamp = {Thu, 04 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JinGQZPL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JinW16, author = {Hua Jin and Changda Wang}, title = {Robustness of the Packet Delay Channels}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {260--267}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0072}, doi = {10.1109/TRUSTCOM.2016.0072}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JinW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JinZTF16, author = {Jiangming Jin and Yang Zhang and Shanjiang Tang and Hongfei Fan}, title = {Performance Modeling and Analysis for Critical Section Contention in Parallel Codes}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2139--2146}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0329}, doi = {10.1109/TRUSTCOM.2016.0329}, timestamp = {Tue, 22 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JinZTF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JingZDXL16, author = {Jing Wang and Xianfeng Zhao and Yanjie Deng and Shibo Xu and Jichun Li}, title = {Research on Key Technologies and Standard Framework of Secure and Smart Container}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2063--2067}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0316}, doi = {10.1109/TRUSTCOM.2016.0316}, timestamp = {Mon, 12 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JingZDXL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KacemWCB16, author = {Thabet Kacem and Duminda Wijesekera and Paulo Cesar G. da Costa and Alexandre Barreto}, title = {An {ADS-B} Intrusion Detection System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {544--551}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0108}, doi = {10.1109/TRUSTCOM.2016.0108}, timestamp = {Thu, 10 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KacemWCB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KarthikS16, author = {N. Karthik and Ananthanarayana V. S.}, title = {Data Trustworthiness in Wireless Sensor Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2181--2186}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0335}, doi = {10.1109/TRUSTCOM.2016.0335}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KarthikS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KejariwalO16, author = {Arun Kejariwal and Francois Orsini}, title = {On the Definition of Real-Time: Applications and Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2213--2220}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0341}, doi = {10.1109/TRUSTCOM.2016.0341}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KejariwalO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KenazaALLW16, author = {Tayeb Kenaza and Mahdi Aiash and Jonathan Loo and Aboubaker Lasebae and Gill Whitney}, title = {A Progressive Approach to Design Authentication Protocols for Mobile Heterogeneous Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1776--1781}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0273}, doi = {10.1109/TRUSTCOM.2016.0273}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KenazaALLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KenazaBLA16, author = {Tayeb Kenaza and Khadidja Bennaceur and Abdenour Labed and Mahdi Aiash}, title = {Enhancing the {SVDD} Accuracy in Intrusion Detection Systems by Removing External Voids}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1765--1770}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0271}, doi = {10.1109/TRUSTCOM.2016.0271}, timestamp = {Tue, 28 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KenazaBLA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KhanAKK16, author = {Muhammad Saleem Khan and Idrees Ahmed and Abid Khan and Majid Iqbal Khan}, title = {Adaptive Reputation Weights Assignment Scheme for MANETs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {160--167}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0059}, doi = {10.1109/TRUSTCOM.2016.0059}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KhanAKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KuangTGFCXYZW16, author = {Kaiyuan Kuang and Zhanyong Tang and Xiaoqing Gong and Dingyi Fang and Xiaojiang Chen and Tianzhang Xing and Guixin Ye and Jie Zhang and Zheng Wang}, title = {Exploiting Dynamic Scheduling for VM-Based Code Obfuscation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {489--496}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0101}, doi = {10.1109/TRUSTCOM.2016.0101}, timestamp = {Tue, 12 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KuangTGFCXYZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LaiWSLQZ16, author = {Meng Lai and Jiajun Wang and Tao Song and Ning Liu and Zhengwei Qi and Weijia Zhou}, title = {{VSP:} {A} Virtual Smartphone Platform to Enhance the Capability of Physical Smartphone}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1434--1441}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0225}, doi = {10.1109/TRUSTCOM.2016.0225}, timestamp = {Thu, 05 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LaiWSLQZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Lei0FLZ16, author = {Shiming Lei and Chao Wang and Haijie Fang and Xi Li and Xuehai Zhou}, title = {{SCADIS:} {A} Scalable Accelerator for Data-Intensive String Set Matching on FPGAs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1190--1197}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0193}, doi = {10.1109/TRUSTCOM.2016.0193}, timestamp = {Thu, 19 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Lei0FLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LenzZ16, author = {Thomas Lenz and Bernd Zwattendorfer}, title = {Towards Cross-Border Authorization in European eID Federations}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {426--434}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0093}, doi = {10.1109/TRUSTCOM.2016.0093}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LenzZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiC16, author = {Yamin Li and Wanming Chu}, title = {Adjusting Parameters of k-Ary n-Cube to Achieve Better Cost Performance}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1218--1225}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0197}, doi = {10.1109/TRUSTCOM.2016.0197}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiCLSCL16, author = {Xiaochao Li and Chunhui Cao and Pengtao Li and Shuli Shen and Yihui Chen and Lin Li}, title = {Energy-Efficient Hardware Implementation of {LUKS} {PBKDF2} with {AES} on {FPGA}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {402--409}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0090}, doi = {10.1109/TRUSTCOM.2016.0090}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiCLSCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiJSWLLR16, author = {Peng Li and Xingtong Jin and Rebecca J. Stones and Gang Wang and Zhongwei Li and Xiaoguang Liu and Mingming Ren}, title = {Parallelizing Degraded Read for Erasure Coded Cloud Storage Systems Using Collective Communications}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1272--1279}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0204}, doi = {10.1109/TRUSTCOM.2016.0204}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiJSWLLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLC16, author = {Lulu Li and Zhuo Li and Xin Chen}, title = {Capacity Analysis and Link Scheduling Design in Double-Channel Full-Duplex Wireless Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1581--1588}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0245}, doi = {10.1109/TRUSTCOM.2016.0245}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLD16, author = {Minghui Li and Zhaobin Liu and Kang Dong}, title = {Privacy Preservation in Social Network against Public Neighborhood Attacks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1575--1580}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0244}, doi = {10.1109/TRUSTCOM.2016.0244}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLGLH16, author = {Xin Li and Bin Lin and Ping Guo and Sen Li and Rongxi He}, title = {Design and Planning of Heterogeneous Marine Sensor Networks for Marine Intelligent Transportation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2052--2057}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0314}, doi = {10.1109/TRUSTCOM.2016.0314}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLGLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLWL16, author = {Juan{-}Hui Li and Pei{-}Zhen Li and Chang{-}Dong Wang and Jian{-}Huang Lai}, title = {Community Detection in Complicated Network Based on the Multi-view Weighted Signed Permanence}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1589--1596}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0246}, doi = {10.1109/TRUSTCOM.2016.0246}, timestamp = {Thu, 13 Feb 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiLWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLZWCD16, author = {Jian Li and Wenhuan Lu and Chen Zhang and Jianguo Wei and Xiaochun Cao and Jianwu Dang}, title = {A Study on Detection and Recovery of Speech Signal Tampering}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {678--682}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0125}, doi = {10.1109/TRUSTCOM.2016.0125}, timestamp = {Mon, 02 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiLZWCD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiWHSF16, author = {Qian Li and Weiguo Wu and Jianhang Huang and Zeyu Sun and Mingxia Feng}, title = {A Novel Trustworthy Framework for Cloud Based Rendering Application}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1951--1956}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0298}, doi = {10.1109/TRUSTCOM.2016.0298}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiWHSF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiXG16, author = {Dali Li and Chuanfu Xu and Ningbo Guo}, title = {Evaluating and Optimizing Parallel {LU-SGS} for High-Order {CFD} Simulations on the Tianhe-2 Supercomputer}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1182--1189}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0192}, doi = {10.1109/TRUSTCOM.2016.0192}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiXG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiYLZWL16, author = {Hui Li and Guoqiao Ye and Xuezheng Liu and Fei Zhao and Di Wu and Xiaola Lin}, title = {URLSight: Profiling Mobile Users via Large-Scale Internet Metadata Analytics}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1728--1733}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0265}, doi = {10.1109/TRUSTCOM.2016.0265}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiYLZWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZDLYM16, author = {Tao Li and Kezhao Zhao and Qiankun Dong and Jiabing Ling and Yulu Yang and Wenjing Ma}, title = {Data-Oriented Runtime Scheduling Framework on Multi-GPUs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1311--1318}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0209}, doi = {10.1109/TRUSTCOM.2016.0209}, timestamp = {Fri, 12 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZDLYM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiangFWG16, author = {Kaiyuan Liang and Yanzhao Feng and Jizeng Wei and Wei Guo}, title = {SecPage - {A} Lightweight Memory Protection Architecture}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1917--1922}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0293}, doi = {10.1109/TRUSTCOM.2016.0293}, timestamp = {Sun, 27 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiangFWG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LinWJYZW16, author = {Zimin Lin and Rui Wang and Xiaoqi Jia and Jingyu Yang and Daojuan Zhang and Chuankun Wu}, title = {ForceDROID: Extracting Hidden Information in Android Apps by Forced Execution Technique}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {386--393}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0088}, doi = {10.1109/TRUSTCOM.2016.0088}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LinWJYZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LinWJZW16, author = {Zimin Lin and Rui Wang and Xiaoqi Jia and Shengzhi Zhang and Chuankun Wu}, title = {Classifying Android Malware with Dynamic Behavior Dependency Graphs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {378--385}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0087}, doi = {10.1109/TRUSTCOM.2016.0087}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LinWJZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LingGL16, author = {Cheng Ling and Jing{-}Yang Gao and Gang Lu}, title = {Phylogenetic Likelihood Estimation on GPUs Using Vertical Partitioning Scheme}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1210--1217}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0196}, doi = {10.1109/TRUSTCOM.2016.0196}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LingGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuBW16, author = {Juhua Liu and Guoqiang Bai and Xingjun Wu}, title = {Efficient Hardware Implementation of Roadrunner for Lightweight Application}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {224--227}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0067}, doi = {10.1109/TRUSTCOM.2016.0067}, timestamp = {Sat, 03 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuBW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuDCZW16, author = {Qiang Liu and Xiaoshe Dong and Heng Chen and Zhengdong Zhu and Yinfeng Wang}, title = {An Efficient Framework for Incremental Graph Computation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1420--1426}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0223}, doi = {10.1109/TRUSTCOM.2016.0223}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuDCZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuJWYZZ16, author = {Zechao Liu and Zoe Lin Jiang and Xuan Wang and Siu{-}Ming Yiu and Chunkai Zhang and Xiaomeng Zhao}, title = {Dynamic Attribute-Based Access Control in Cloud Storage Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {129--137}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0055}, doi = {10.1109/TRUSTCOM.2016.0055}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuJWYZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLLQTC16, author = {Yang Liu and Wenxin Li and Keqiu Li and Heng Qi and Xiaoyi Tao and Sheng Chen}, title = {Scheduling Dependent Coflows with Guaranteed Job Completion Time}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2109--2115}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0324}, doi = {10.1109/TRUSTCOM.2016.0324}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLLQTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLMZZZ16, author = {Feng Liu and Pengpeng Luo and Zhujuan Ma and Cheng Zhang and Yiwen Zhang and Erzhou Zhu}, title = {Security Secret Information Hiding Based on Hash Function and Invisible {ASCII} Characters Replacement}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1963--1969}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0300}, doi = {10.1109/TRUSTCOM.2016.0300}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLMZZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLSZ16, author = {Peng Liu and Yidong Li and Yingpeng Sang and Ji Zhang}, title = {Anonymity-Based Privacy Preserving Network Data Publication}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {823--828}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0144}, doi = {10.1109/TRUSTCOM.2016.0144}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuTXCZF16, author = {Cang Liu and Chuan Tang and Zuocheng Xing and Lirui Chen and Yang Zhang and Guitao Fu}, title = {An Architecture of Parallel Tiled {QRD} Algorithm for {MIMO-OFDM} Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2092--2096}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0321}, doi = {10.1109/TRUSTCOM.2016.0321}, timestamp = {Wed, 16 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuTXCZF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuXLTWL16, author = {Na Liu and Peng Xiao and Ying Lu and Xiao{-}Jun Tang and Hai{-}Wen Wang and Ming{-}Xia Li}, title = {A Topic Approach to Sentence Ordering for Multi-document Summarization}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1390--1395}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0219}, doi = {10.1109/TRUSTCOM.2016.0219}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuXLTWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuXTKY16, author = {Yanbo Liu and Wenchao Xu and Feilong Tang and Lei Kuang and Yanqin Yang}, title = {An Improved Multi-path Routing Algorithm for Hybrid {LEO-MEO} Satellite Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1101--1105}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0181}, doi = {10.1109/TRUSTCOM.2016.0181}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuXTKY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuS16, author = {Yang Lu and Richard O. Sinnott}, title = {Semantic-Based Privacy Protection of Electronic Health Records for Collaborative Research}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {519--526}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0105}, doi = {10.1109/TRUSTCOM.2016.0105}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoFHWX16, author = {Yuchuan Luo and Shaojing Fu and Kai Huang and Dongsheng Wang and Ming Xu}, title = {Securely Outsourcing of Bilinear Pairings with Untrusted Servers for Cloud Storage}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {623--629}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0118}, doi = {10.1109/TRUSTCOM.2016.0118}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LuoFHWX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoLLRSW16, author = {Wu Luo and Wei Liu and Yang Luo and Anbang Ruan and Qingni Shen and Zhonghai Wu}, title = {Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {152--159}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0058}, doi = {10.1109/TRUSTCOM.2016.0058}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuoLLRSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoLSSRW16, author = {Yang Luo and Wu Luo and Xiaoning Sun and Qingni Shen and Anbang Ruan and Zhonghai Wu}, title = {Whispers between the Containers: High-Capacity Covert Channel Attacks in Docker}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {630--637}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0119}, doi = {10.1109/TRUSTCOM.2016.0119}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuoLSSRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LvLF16, author = {Yali Lv and Cheng{-}Kuan Lin and Jianxi Fan}, title = {Hamiltonian Cycle and Path Embeddings in 3-Ary n-Cubes Based on K1, 2-Structure Faults}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1226--1232}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0198}, doi = {10.1109/TRUSTCOM.2016.0198}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LvLF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LyuLYZ16, author = {Fang Lyu and Yapin Lin and Junfeng Yang and Junhai Zhou}, title = {SUIDroid: An Efficient Hardening-Resilient Approach to Android App Clone Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {511--518}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0104}, doi = {10.1109/TRUSTCOM.2016.0104}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LyuLYZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaWL16, author = {Jingwei Ma and Gang Wang and Xiaoguang Liu}, title = {DedupeSwift: Object-Oriented Storage System Based on Data Deduplication}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1069--1076}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0177}, doi = {10.1109/TRUSTCOM.2016.0177}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaYKMCWWL16, author = {Jingwei Ma and Boxue Yin and Zhi Kong and Yuxiang Ma and Chang Chen and Long Wang and Gang Wang and Xiaoguang Liu}, title = {Leveraging Page-Level Compression in MySQL - {A} Practice at Baidu}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1085--1092}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0179}, doi = {10.1109/TRUSTCOM.2016.0179}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaYKMCWWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MadhounP16, author = {Nour El Madhoun and Guy Pujolle}, title = {Security Enhancements in {EMV} Protocol for {NFC} Mobile Payment}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1889--1895}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0289}, doi = {10.1109/TRUSTCOM.2016.0289}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MadhounP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MansorMAMG16, author = {Hafizah Mansor and Konstantinos Markantonakis and Raja Naeem Akram and Keith Mayes and Iakovos Gurulian}, title = {Log Your Car: The Non-invasive Vehicle Forensics}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {974--982}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0164}, doi = {10.1109/TRUSTCOM.2016.0164}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MansorMAMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ManzoorTS16, author = {Salman Manzoor and Ahmed Taha and Neeraj Suri}, title = {Trust Validation of Cloud IaaS: {A} Customer-centric Approach}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {97--104}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0051}, doi = {10.1109/TRUSTCOM.2016.0051}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ManzoorTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaoGYL16, author = {KunPeng Mao and Songtao Guo and Yuanyuan Yang and Guiyan Liu}, title = {{MRDC:} Multicast Data Restoration in Fat-Tree Data Center Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1500--1507}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0234}, doi = {10.1109/TRUSTCOM.2016.0234}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MaoGYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MarraMSA16, author = {Antonio La Marra and Fabio Martinelli and Andrea Saracino and Alessandro Aldini}, title = {On Probabilistic Application Compliance}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1848--1855}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0283}, doi = {10.1109/TRUSTCOM.2016.0283}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MarraMSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MartinelliSS16, author = {Fabio Martinelli and Andrea Saracino and Mina Sheikhalishahi}, title = {Modeling Privacy Aware Information Sharing Systems: {A} Formal and General Approach}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {767--774}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0137}, doi = {10.1109/TRUSTCOM.2016.0137}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MartinelliSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MengLLL16, author = {Weizhi Meng and Xiapu Luo and Wenjuan Li and Yan Li}, title = {Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1061--1068}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0176}, doi = {10.1109/TRUSTCOM.2016.0176}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MengLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MengXCZ16, author = {Xuying Meng and Zhiwei Xu and Bo Chen and Yujun Zhang}, title = {Privacy-Preserving Query Log Sharing Based on Prior N-Word Aggregation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {722--729}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0131}, doi = {10.1109/TRUSTCOM.2016.0131}, timestamp = {Fri, 15 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MengXCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MinLLC16, author = {Xinping Min and Qingzhong Li and Lei Liu and Lizhen Cui}, title = {A Permissioned Blockchain Framework for Supporting Instant Transaction and Dynamic Block Size}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {90--96}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0050}, doi = {10.1109/TRUSTCOM.2016.0050}, timestamp = {Wed, 08 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MinLLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MisraSB16, author = {Gaurav Misra and Jose M. Such and Hamed Balogun}, title = {{IMPROVE} - Identifying Minimal PROfile VEctors for Similarity Based Access Control}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {868--875}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0150}, doi = {10.1109/TRUSTCOM.2016.0150}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MisraSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NayakT16, author = {Sanjeet Kumar Nayak and Somanath Tripathy}, title = {Privacy Preserving Provable Data Possession for Cloud Based Electronic Health Record System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {860--867}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0149}, doi = {10.1109/TRUSTCOM.2016.0149}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NayakT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NieLQ16, author = {Lihai Nie and Zhiyang Li and Wenyu Qu}, title = {Association Rules Discovery via Approximate Method from Probabilistic Database}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {909--914}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0155}, doi = {10.1109/TRUSTCOM.2016.0155}, timestamp = {Tue, 10 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NieLQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NingZYSM16, author = {Fangxiao Ning and Min Zhu and Ruibang You and Gang Shi and Dan Meng}, title = {Group-Based Memory Deduplication against Covert Channel Attacks in Virtualized Environments}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {194--200}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0063}, doi = {10.1109/TRUSTCOM.2016.0063}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NingZYSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OuWSZA16, author = {Changhai Ou and Zhu Wang and Degang Sun and Xinping Zhou and Juan Ai}, title = {Power Traces Clipping and Splicing Enhanced Correlation Collision Analysis}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {989--995}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0166}, doi = {10.1109/TRUSTCOM.2016.0166}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/OuWSZA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PadilloLV16, author = {Francisco Padillo and Jos{\'{e}} Mar{\'{\i}}a Luna and Sebasti{\'{a}}n Ventura}, title = {Subgroup Discovery on Big Data: Exhaustive Methodologies Using Map-Reduce}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1684--1691}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0258}, doi = {10.1109/TRUSTCOM.2016.0258}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PadilloLV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PanM16, author = {Jinkun Pan and Xiaoguang Mao}, title = {DomXssMicro: {A} Micro Benchmark for Evaluating DOM-Based Cross-Site Scripting Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {208--215}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0065}, doi = {10.1109/TRUSTCOM.2016.0065}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PanM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PantangiXM16, author = {Ajay Pantangi and Kaiqi Xiong and Mufaddal Makati}, title = {SECUPerf: End-to-End Security and Performance Assessment of Cloud Services}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1747--1752}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0268}, doi = {10.1109/TRUSTCOM.2016.0268}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PantangiXM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Pattaranantakul16, author = {Montida Pattaranantakul and Ruan He and Ahmed Meddahi and Zonghua Zhang}, title = {SecMANO: Towards Network Functions Virtualization {(NFV)} Based Security MANagement and Orchestration}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {598--605}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0115}, doi = {10.1109/TRUSTCOM.2016.0115}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Pattaranantakul16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PeiWCJGGZ16, author = {Songwen Pei and Jinkai Wang and Wenyang Cui and Linhua Jiang and Tongsheng Geng and Jean{-}Luc Gaudiot and St{\'{e}}phane Zuckerman}, title = {Codelet Scheduling by Genetic Algorithm}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1492--1499}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0233}, doi = {10.1109/TRUSTCOM.2016.0233}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PeiWCJGGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PeiWMX16, author = {Xiaoqiang Pei and Yijie Wang and Xingkong Ma and Fangliang Xu}, title = {Pipelined Online Data Insertion for Erasure Codes in Distributed Storage Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1159--1166}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0189}, doi = {10.1109/TRUSTCOM.2016.0189}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PeiWMX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PeiWYLP16, author = {Xin Pei and Yongjian Wang and Wei Yao and Jiuchuan Lin and Ruxiang Peng}, title = {Security Enhanced Attribute Based Signcryption for Private Data Sharing in Cloud}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {737--743}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0133}, doi = {10.1109/TRUSTCOM.2016.0133}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PeiWYLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PengCA16, author = {Jian Peng and Kim{-}Kwang Raymond Choo and Helen Ashman}, title = {Astroturfing Detection in Social Media: Using Binary n-Gram Analysis for Authorship Attribution}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {121--128}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0054}, doi = {10.1109/TRUSTCOM.2016.0054}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PengCA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PengY16, author = {Hao Peng and Mengzhuo You}, title = {The Health Care Fraud Detection Using the Pharmacopoeia Spectrum Tree and Neural Network Analytic Contribution Hierarchy Process}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2006--2011}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0306}, doi = {10.1109/TRUSTCOM.2016.0306}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PengY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiaoY016, author = {Yanchen Qiao and Xiaochun Yun and Yongzheng Zhang}, title = {How to Automatically Identify the Homology of Different Malware}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {929--936}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0158}, doi = {10.1109/TRUSTCOM.2016.0158}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiaoY016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiaoY016a, author = {Yanchen Qiao and Xiaochun Yun and Yongzheng Zhang}, title = {Fast Reused Function Retrieval Method Based on Simhash and Inverted Index}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {937--944}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0159}, doi = {10.1109/TRUSTCOM.2016.0159}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiaoY016a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiaoZXZH16, author = {Hong Qiao and Dafang Zhang and Kun Xie and Ji Zhang and Shiming He}, title = {Power-Bandwidth Aware Cooperative Routing in Multi-radio Multi-channel Wireless Network}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1342--1349}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0213}, doi = {10.1109/TRUSTCOM.2016.0213}, timestamp = {Wed, 18 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiaoZXZH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QinWLL16, author = {Xiongpai Qin and Bangguo Wang and Ruchuan Lai and Keqin Li}, title = {Improving Robustness of a {SVR} Based Algorithm Trading Model with Carefully Crafted Features and a Diversified Portfolio}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1676--1683}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0257}, doi = {10.1109/TRUSTCOM.2016.0257}, timestamp = {Fri, 27 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QinWLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QinZL16, author = {Haiyan Qin and Yonglong Zhang and Bin Li}, title = {pHSA: {A} Price Schedule for Heterogeneous Spectrum Auction}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2103--2108}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0323}, doi = {10.1109/TRUSTCOM.2016.0323}, timestamp = {Tue, 05 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QinZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QuYYXGX16, author = {Hongyang Qu and Zhiwen Yu and Zhiyong Yu and Huang Xu and Bin Guo and Xing Xie}, title = {What Is My Next Job: Predicting the Company Size and Position in Career Changes}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1668--1675}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0256}, doi = {10.1109/TRUSTCOM.2016.0256}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QuYYXGX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RahmanBK16, author = {Mohammad Shahriar Rahman and Anirban Basu and Shinsaku Kiyomoto}, title = {Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1759--1764}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0270}, doi = {10.1109/TRUSTCOM.2016.0270}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RahmanBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RahmanEK16, author = {Mohammad Shahriar Rahman and Keita Emura and Shinsaku Kiyomoto}, title = {On the Leakage Resilient Cryptography in Game-Theoretic Settings}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1984--1989}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0303}, doi = {10.1109/TRUSTCOM.2016.0303}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RahmanEK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RaoWZ16, author = {Qiang Rao and Jianjun Wang and Liming Zhang}, title = {Enhancing Source Camera Identification Based on Multiplicative Denoising Filter}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {983--988}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0165}, doi = {10.1109/TRUSTCOM.2016.0165}, timestamp = {Tue, 14 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RaoWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RenJZLW16, author = {Yongjian Ren and Dailiang Jin and Dongyu Zheng and Lei Liu and Xinjing Wei}, title = {An Analytical Model of Data Plane Performance Subject to Prioritized Service}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1537--1542}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0239}, doi = {10.1109/TRUSTCOM.2016.0239}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RenJZLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RongWLWX16, author = {Hong Rong and Huimei Wang and Jian Liu and Wei Wu and Ming Xian}, title = {Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {236--243}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0069}, doi = {10.1109/TRUSTCOM.2016.0069}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RongWLWX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SaadaouiSB16, author = {Amina Saadaoui and Nihel Ben Youssef Ben Souayeh and Adel Bouhoula}, title = {An Accurate FDD-Based Approach for Discovering Distributed Firewalls Misconfigurations}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {552--559}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0109}, doi = {10.1109/TRUSTCOM.2016.0109}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SaadaouiSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SangL0X16, author = {Yafei Sang and Shicong Li and Yongzheng Zhang and Tao Xu}, title = {ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning via Byte Embedding}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {284--291}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0075}, doi = {10.1109/TRUSTCOM.2016.0075}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SangL0X16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SarantinosBAA16, author = {Nikolaos Sarantinos and Chafika Benzaid and Omar Arabiat and Ameer Al{-}Nemrat}, title = {Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1782--1787}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0274}, doi = {10.1109/TRUSTCOM.2016.0274}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SarantinosBAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SasagawaOK16, author = {Takashi Sasagawa and Satoshi Ohzahata and Toshihiko Kato}, title = {Suppressing Selfish Transmissions with Extending {NAV} Period and Resetting {CW} of Access Point in Wireless {LAN}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1910--1916}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0292}, doi = {10.1109/TRUSTCOM.2016.0292}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SasagawaOK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ScoonK16, author = {Craig Scoon and Ryan K. L. Ko}, title = {The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1998--2005}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0305}, doi = {10.1109/TRUSTCOM.2016.0305}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ScoonK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Serrano-PerezSC16, author = {Jos{\'{e}} de Jes{\'{u}}s Serrano{-}P{\'{e}}rez and Mois{\'{e}}s Salinas{-}Rosales and Nareli Cruz Cort{\'{e}}s}, title = {Universal Steganography Detector Based on an Artificial Immune System for {JPEG} Images}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1896--1903}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0290}, doi = {10.1109/TRUSTCOM.2016.0290}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Serrano-PerezSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShenXWG16, author = {Chao Shen and Haodi Xu and Haijun Wang and Xiaohong Guan}, title = {Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1054--1060}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0175}, doi = {10.1109/TRUSTCOM.2016.0175}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShenXWG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShenZ16, author = {Tong Shen and Dafang Zhang}, title = {Rule Selector: {A} Novel Scalable Model for High-Performance Flow Recognition}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1121--1128}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0184}, doi = {10.1109/TRUSTCOM.2016.0184}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShenZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShengGCWG16, author = {Long Sheng and Xiaoyun Guang and Feng Chen and Hui Wang and Kang Gao}, title = {A Review on Complex Network Dynamics in Evolutionary Algorithm}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2221--2226}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0342}, doi = {10.1109/TRUSTCOM.2016.0342}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShengGCWG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShepherdAGLMASC16, author = {Carlton Shepherd and Ghada Arfaoui and Iakovos Gurulian and Robert P. Lee and Konstantinos Markantonakis and Raja Naeem Akram and Damien Sauveron and Emmanuel Conchon}, title = {Secure and Trusted Execution: Past, Present, and Future - {A} Critical Review in the Context of the Internet of Things and Cyber-Physical Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {168--177}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0060}, doi = {10.1109/TRUSTCOM.2016.0060}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShepherdAGLMASC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShinoharaKSS16, author = {Ryoki Shinohara and Takashi Kamimoto and Kazuya Sato and Hiroshi Shigeno}, title = {Cache Control Method Mitigating Packet Concentration of Router Caused by Interest Flooding Attack}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {324--331}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0080}, doi = {10.1109/TRUSTCOM.2016.0080}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShinoharaKSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShuGDYH16, author = {Peng Shu and Rong Gu and Qianhao Dong and Chunfeng Yuan and Yihua Huang}, title = {Accelerating Big Data Applications on Tiered Storage System with Various Eviction Policies}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1350--1357}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0214}, doi = {10.1109/TRUSTCOM.2016.0214}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShuGDYH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShuLLL16, author = {Jian Shu and Weijie Lin and Linlan Liu and Xuyan Luo}, title = {Topology Prediction Mechanism for Pocket Switched Network Based on Deep Belief Network}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1811--1817}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0278}, doi = {10.1109/TRUSTCOM.2016.0278}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShuLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SignorelloPG16, author = {Salvatore Signorello and Maria Rita Palattella and Luigi Alfredo Grieco}, title = {Security Challenges in Future NDN-Enabled VANETs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1771--1775}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0272}, doi = {10.1109/TRUSTCOM.2016.0272}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SignorelloPG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SilvaMPL16, author = {Jo{\~{a}}o A. Silva and Ricardo Monteiro and Herv{\'{e}} Paulino and Jo{\~{a}}o M. Louren{\c{c}}o}, title = {Ephemeral Data Storage for Networks of Hand-Held Devices}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1106--1113}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0182}, doi = {10.1109/TRUSTCOM.2016.0182}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SilvaMPL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Stricot-Tarboton16, author = {Shaun Stricot{-}Tarboton and Sivadon Chaisiri and Ryan K. L. Ko}, title = {Taxonomy of Man-in-the-Middle Attacks on {HTTPS}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {527--534}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0106}, doi = {10.1109/TRUSTCOM.2016.0106}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Stricot-Tarboton16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuFYS16, author = {Mang Su and Anmin Fu and Yan Yu and Guozhen Shi}, title = {Resource-centric Dynamic Access Control in Cloud}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1957--1962}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0299}, doi = {10.1109/TRUSTCOM.2016.0299}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SuFYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuWWL16, author = {Dan Su and Wei Wang and Xing Wang and Jiqiang Liu}, title = {Anomadroid: Profiling Android Applications' Behaviors for Identifying Unknown Malapps}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {691--698}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0127}, doi = {10.1109/TRUSTCOM.2016.0127}, timestamp = {Wed, 11 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SuWWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuZLZ16, author = {Xin Su and Dafang Zhang and Wenjia Li and Kai Zhao}, title = {A Deep Learning Approach to Android Malware Feature Learning and Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {244--251}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0070}, doi = {10.1109/TRUSTCOM.2016.0070}, timestamp = {Tue, 24 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SuZLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunLLL16, author = {Yujie Sun and Weijiang Liu and Zhaobin Liu and Chao Liu}, title = {Comparison of Five Packet-Sampling-Based Methods for Detecting Elephant Flows}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2018--2023}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0308}, doi = {10.1109/TRUSTCOM.2016.0308}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunSDZH16, author = {Degang Sun and Jun Shi and Xuejie Ding and Meng Zhang and Wei{-}qing Huang}, title = {Method for Detecting Information Leakage from Computer Display in Electromagnetic Radiation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2041--2046}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0312}, doi = {10.1109/TRUSTCOM.2016.0312}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SunSDZH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunSLW16, author = {Qian Sun and Qingni Shen and Cong Li and Zhonghai Wu}, title = {SeLance: Secure Load Balancing of Virtual Machines in Cloud}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {662--669}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0123}, doi = {10.1109/TRUSTCOM.2016.0123}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunSLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunSZC16, author = {Shibin Sun and Yuliang Shi and Shidong Zhang and Lizhen Cui}, title = {A Privacy Protection Mechanism for NoSql Database Based on Data Chunks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {829--836}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0145}, doi = {10.1109/TRUSTCOM.2016.0145}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunSZC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TanY16, author = {Yujuan Tan and Zhichao Yan}, title = {Multi-objective Based Performance Evaluation of Deduplication Approaches}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1137--1144}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0186}, doi = {10.1109/TRUSTCOM.2016.0186}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TanY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TangLJW16, author = {Hongyan Tang and Ying Li and Tong Jia and Zhonghai Wu}, title = {Evaluating Performance of Rescheduling Strategies in Cloud System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1559--1566}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0242}, doi = {10.1109/TRUSTCOM.2016.0242}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TangLJW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TaubmannRR16, author = {Benjamin Taubmann and No{\"{e}}lle Rakotondravony and Hans P. Reiser}, title = {CloudPhylactor: Harnessing Mandatory Access Control for Virtual Machine Introspection in Cloud Data Centers}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {957--964}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0162}, doi = {10.1109/TRUSTCOM.2016.0162}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TaubmannRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TengCSB16, author = {Yiping Teng and Xiang Cheng and Sen Su and Rong Bi}, title = {Privacy-Preserving Top-k Nearest Keyword Search on Outsourced Graphs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {815--822}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0143}, doi = {10.1109/TRUSTCOM.2016.0143}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TengCSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TianQDL16, author = {Jianbang Tian and Zhuzhong Qian and Mianxiong Dong and Sanglu Lu}, title = {FairShare: Dynamic Max-Min Fairness Bandwidth Allocation in Datacenters}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1463--1470}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0229}, doi = {10.1109/TRUSTCOM.2016.0229}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TianQDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TouatiHC16, author = {Lyes Touati and Hamed Hellaoui and Yacine Challal}, title = {Threshold Yoking/Grouping Proofs Based on {CP-ABE} for IoT Applications}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {568--575}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0111}, doi = {10.1109/TRUSTCOM.2016.0111}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TouatiHC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TrojaB16, author = {Erald Troja and Spiridon Bakiras}, title = {Privacy-Preserving Location-Aware Mobile Advertisement}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {783--790}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0139}, doi = {10.1109/TRUSTCOM.2016.0139}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TrojaB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Tse16, author = {Savio S. H. Tse}, title = {Bicriteria Load Balancing for Online Placement in Heterogeneous Servers with Extreme Upper Bounds}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1319--1326}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0210}, doi = {10.1109/TRUSTCOM.2016.0210}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Tse16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TseWL16, author = {Daniel Tse and Lu Wang and Yuxi Li}, title = {Mobility Management for Enterprises in {BYOD} Deployment}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {638--645}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0120}, doi = {10.1109/TRUSTCOM.2016.0120}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TseWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/UsmanJHN16, author = {Muhammad Usman and Mian Ahmad Jan and Xiangjian He and Priyadarsi Nanda}, title = {Data Sharing in Secure Multimedia Wireless Sensor Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {590--597}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0114}, doi = {10.1109/TRUSTCOM.2016.0114}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/UsmanJHN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangALLH16, author = {Yaobin Wang and Hong An and Zhiqin Liu and Ling Li and Jun Huang}, title = {A Flexible Chip Multiprocessor Simulator Dedicated for Thread Level Speculation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2127--2132}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0327}, doi = {10.1109/TRUSTCOM.2016.0327}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangALLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangCCZLW16, author = {Hui Wang and Xiaohe Chen and Xinjian Chen and Peilin Zang and Yunqing Liu and Lirong Wang}, title = {Fall Detection Based on {KPCA} and 3D {KPCA}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2187--2191}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0336}, doi = {10.1109/TRUSTCOM.2016.0336}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangCCZLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangJMH16, author = {Ying Wang and Yang Ju and Tiantian Miao and Rongxi He}, title = {Chunk-Based Resource Allocation with Fairness Consideration for Layered Multicast Streaming in {OFDMA} Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2047--2051}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0313}, doi = {10.1109/TRUSTCOM.2016.0313}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangJMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLDQ16, author = {Jun Wang and Zhiyang Li and Yegang Du and Wenyu Qu}, title = {Stacked Product Quantization for Nearest Neighbor Search on Large Datasets}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1621--1627}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0250}, doi = {10.1109/TRUSTCOM.2016.0250}, timestamp = {Tue, 10 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangLDQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLGQM16, author = {Yuwei Wang and Min Liu and Bo Gao and Chenchong Qin and Cheng Ma}, title = {{I/O} Congestion-Aware Computing Resource Assignment and Scheduling in Virtualized Cloud Environments}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1280--1287}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0205}, doi = {10.1109/TRUSTCOM.2016.0205}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLGQM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLLWC16, author = {Shiqing Wang and Yuanyuan Li and Zhiyang Li and Junfeng Wu and Fengjuan Chen}, title = {Surveillance Methods of Running Condition of Chemical Equipments Based on Skyline}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2246--2250}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0346}, doi = {10.1109/TRUSTCOM.2016.0346}, timestamp = {Mon, 28 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangLLWC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLZX16, author = {Changhai Wang and Meng Li and Jianzhong Zhang and Yuwei Xu}, title = {A Model with Hierarchical Classifiers for Activity Recognition on Mobile Devices}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1295--1301}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0207}, doi = {10.1109/TRUSTCOM.2016.0207}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangSSL16, author = {Bo Wang and Ying Song and Yuzhong Sun and Jun Liu}, title = {Improvements to Online Distributed Monitoring Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1093--1100}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0180}, doi = {10.1109/TRUSTCOM.2016.0180}, timestamp = {Fri, 10 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangSSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangSZ16, author = {Shu{-}Yan Wang and Jia{-}Ze Sun and Ju Zhang}, title = {The Method of Generating Web Link Security Testing Scenario Based on {UML} Diagram}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1831--1838}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0281}, doi = {10.1109/TRUSTCOM.2016.0281}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangW16, author = {Jiequn Wang and Lei Wang}, title = {A Novel Solution of Data Analysis in Modern Sports Education}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2269--2272}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0350}, doi = {10.1109/TRUSTCOM.2016.0350}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWCZ16, author = {Yan Wang and Lirong Wang and Xiaohe Chen and Wenliang Zhu}, title = {P Wave Detection and Delineation Based on Distances Transform}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2197--2201}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0338}, doi = {10.1109/TRUSTCOM.2016.0338}, timestamp = {Tue, 28 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangWCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWGM16, author = {Liang Wang and Weiping Wang and Jingzi Gu and Dan Meng}, title = {Delta-Generalization: High Accuracy Data Release for Privacy Preserving}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1861--1866}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0285}, doi = {10.1109/TRUSTCOM.2016.0285}, timestamp = {Thu, 13 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangWGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWHW16, author = {Xueyi Wang and Xingwei Wang and Min Huang and Zun Wang}, title = {Combinatorial Reverse Auction-Based Service Provision in Social Clouds}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2097--2102}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0322}, doi = {10.1109/TRUSTCOM.2016.0322}, timestamp = {Mon, 04 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangWHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangXHXH16, author = {Caimei Wang and Yan Xiong and Wenchao Huang and Huihua Xia and Jianmeng Huang}, title = {Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {42--49}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0044}, doi = {10.1109/TRUSTCOM.2016.0044}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangXHXH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangXZY16, author = {Changhai Wang and Yuwei Xu and Jianzhong Zhang and Wenping Yu}, title = {{SW-HMM:} {A} Method for Evaluating Confidence of Smartphone-Based Activity Recognition}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2086--2091}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0320}, doi = {10.1109/TRUSTCOM.2016.0320}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangXZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangYHXLS16, author = {Jie Wang and Ce Yu and Zhi Hong and Jian Xiao and Chen Li and Jizhou Sun}, title = {Pattern Aware Cache Management for Efficient Subset Retrieving of Astronomical Image Data}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1396--1403}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0220}, doi = {10.1109/TRUSTCOM.2016.0220}, timestamp = {Wed, 21 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangYHXLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangYTZH16, author = {Xiaolei Wang and Yuexiang Yang and Chuan Tang and Yingzhi Zeng and Jie He}, title = {DroidContext: Identifying Malicious Mobile Privacy Leak Using Context}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {807--814}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0142}, doi = {10.1109/TRUSTCOM.2016.0142}, timestamp = {Tue, 20 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangYTZH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangYZLZ16, author = {Ziyu Wang and Jiahai Yang and Shize Zhang and Chenxi Li and Hui Zhang}, title = {Automatic Model Selection for Anomaly Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {276--283}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0074}, doi = {10.1109/TRUSTCOM.2016.0074}, timestamp = {Sat, 20 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangYZLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZLW16, author = {Shijia Wang and Liang Zhou and Yuanyuan Li and Junfeng Wu}, title = {Parallel Monte Carlo Method with MapReduce for Option Pricing}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2116--2121}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0325}, doi = {10.1109/TRUSTCOM.2016.0325}, timestamp = {Mon, 28 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangZLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZWY16, author = {Yu Wang and Yuqing Zhang and Kai Wang and Jingbo Yan}, title = {Security Analysis and Vulnerability Detection of Gesture-Based Lock in Android Applications}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {410--417}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0091}, doi = {10.1109/TRUSTCOM.2016.0091}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangZWY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WeiJZZX16, author = {Xiaochao Wei and Han Jiang and Chuan Zhao and Minghao Zhao and Qiuliang Xu}, title = {Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {418--425}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0092}, doi = {10.1109/TRUSTCOM.2016.0092}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WeiJZZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WeiPYLWM16, author = {Yi Wei and Li Pan and Dong Yuan and Shijun Liu and Lei Wu and Xiangxu Meng}, title = {A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1543--1550}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0240}, doi = {10.1109/TRUSTCOM.2016.0240}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WeiPYLWM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WenDZJ16, author = {Zilong Wen and Weiqi Dai and Deqing Zou and Hai Jin}, title = {PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing Infrastructures}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {683--690}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0126}, doi = {10.1109/TRUSTCOM.2016.0126}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WenDZJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WenY16, author = {Juping Wen and QingDan Yuan}, title = {Social Circles Discovery Based on Structural and Attribute Similarities}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1652--1659}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0254}, doi = {10.1109/TRUSTCOM.2016.0254}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WenY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WengL16, author = {Wu{-}Xiang Weng and Shou{-}Chih Lo}, title = {Fall Detection Based on Tilt Angle and Acceleration Variations}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1712--1717}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0262}, doi = {10.1109/TRUSTCOM.2016.0262}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WengL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WengLL16, author = {Xu Weng and Zhaobin Liu and Zhiyang Li}, title = {An Efficient Influence Maximization Algorithm Considering Both Positive and Negative Relationships}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1931--1936}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0295}, doi = {10.1109/TRUSTCOM.2016.0295}, timestamp = {Wed, 11 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WengLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WillKW16, author = {Mark A. Will and Ryan K. L. Ko and Ian H. Witten}, title = {Privacy Preserving Computation by Fragmenting Individual Bits and Distributing Gates}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {900--908}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0154}, doi = {10.1109/TRUSTCOM.2016.0154}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WillKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuHWX16, author = {Genqiang Wu and Yeping He and JingZheng Wu and Xianyao Xia}, title = {Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function Computation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {921--928}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0157}, doi = {10.1109/TRUSTCOM.2016.0157}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuHWX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuHYSSZ16, author = {Renke Wu and Linpeng Huang and Peng Yu and Kai Shen and Qiuwei Shi and Haojie Zhou}, title = {Meta-Model Evolution with Self-Adaptation: An Empirical Development Approach for Distributed Parallel Computing Framework}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2227--2234}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0343}, doi = {10.1109/TRUSTCOM.2016.0343}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuHYSSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuLLJ16, author = {Jigang Wu and Ningjing Liu and Siew Kei Lam and Guiyuan Jiang}, title = {Shortest Partial Path First Algorithm for Reconfigurable Processor Array with Faults}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1198--1203}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0194}, doi = {10.1109/TRUSTCOM.2016.0194}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuLLJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuLWHL16, author = {Jain{-}Shing Wu and Yuh{-}Jye Lee and Te{-}En Wei and Chih{-}Hung Hsieh and Chia{-}Min Lai}, title = {ChainSpot: Mining Service Logs for Cyber Security Threat Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1867--1874}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0286}, doi = {10.1109/TRUSTCOM.2016.0286}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuLWHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuWQJLXS16, author = {Junfeng Wu and Yitong Wan and Wenyu Qu and Changqing Ji and Yuanyuan Li and Peng Xiao and Jianwei Sun}, title = {A Novel Image Retrieval Approach with Bag-of-Word Model and Gabor Feature}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1706--1711}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0261}, doi = {10.1109/TRUSTCOM.2016.0261}, timestamp = {Mon, 28 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuWQJLXS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuXCZ16, author = {Danye Wu and Zhiwei Xu and Bo Chen and Yujun Zhang}, title = {What If Routers Are Malicious? Mitigating Content Poisoning Attack in {NDN}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {481--488}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0100}, doi = {10.1109/TRUSTCOM.2016.0100}, timestamp = {Fri, 15 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuXCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuZL0W16, author = {Huijun Wu and Liming Zhu and Kai Lu and Gen Li and Dongyao Wu}, title = {StageFS: {A} Parallel File System Optimizing Metadata Performance for {SSD} Based Clusters}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2147--2152}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0330}, doi = {10.1109/TRUSTCOM.2016.0330}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuZL0W16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaWP16, author = {Hui Xia and Guodong Wang and Zhenkuan Pan}, title = {Node Trust Prediction Framework in Mobile Ad Hoc Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {50--56}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0045}, doi = {10.1109/TRUSTCOM.2016.0045}, timestamp = {Fri, 06 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XiaWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoAC16, author = {Hannan Xiao and Awatif Ali Alshehri and Bruce Christianson}, title = {A Cloud-Based {RFID} Authentication Protocol with Insecure Communication Channels}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {332--339}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0081}, doi = {10.1109/TRUSTCOM.2016.0081}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoAC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoCCWLWB16, author = {Yajuan Xiao and Shoufeng Cao and Zhenzhong Cao and Fengyu Wang and Fengbo Lin and Jiayan Wu and Hancheng Bi}, title = {Matching Similar Functions in Different Versions of a Malware}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {252--259}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0071}, doi = {10.1109/TRUSTCOM.2016.0071}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoCCWLWB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoLQQY16, author = {Peng Xiao and Zhiyang Li and Heng Qi and Wenyu Qu and Haisheng Yu}, title = {An Efficient DDoS Detection with Bloom Filter in {SDN}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0038}, doi = {10.1109/TRUSTCOM.2016.0038}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoLQQY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoWJM16, author = {Peipei Xiao and Yufeng Wang and Qun Jin and Jianhua Ma}, title = {A Privacy-Preserving Incentive Scheme for Advertisement Dissemination in Vehicular Social Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1741--1746}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0267}, doi = {10.1109/TRUSTCOM.2016.0267}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoWJM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoXLL16, author = {Xiongren Xiao and Guoqi Xie and Renfa Li and Keqin Li}, title = {Minimizing Schedule Length of Energy Consumption Constrained Parallel Applications on Heterogeneous Distributed Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1471--1476}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0230}, doi = {10.1109/TRUSTCOM.2016.0230}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoXLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XieWL16, author = {Yuanyuan Xie and Jiang Wu and Fengzhu Liu}, title = {A Hierarchic Hybrid Scheduling Algorithm for Static Task with Precedence Constraints}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2079--2085}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0319}, doi = {10.1109/TRUSTCOM.2016.0319}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XieWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XieZLLG16, author = {Tianyi Xie and Yuanyuan Zhang and Juanru Li and Hui Liu and Dawu Gu}, title = {New Exploit Methods against Ptmalloc of {GLIBC}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {646--653}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0121}, doi = {10.1109/TRUSTCOM.2016.0121}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XieZLLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuCCSZ16, author = {Youjun Xu and Xianglan Chen and Zhinan Cheng and Jiachen Song and Yuxiang Zhang}, title = {Improving Energy Efficiency by Phase-Grained Migration for Asymmetric Multicore}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1412--1419}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0222}, doi = {10.1109/TRUSTCOM.2016.0222}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuCCSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuFGSPSY16, author = {Jingheng Xu and Haohuan Fu and Lin Gan and Yu Song and Hongbo Peng and Wen Shi and Guangwen Yang}, title = {Evaluating the {POWER8} Architecture through Optimizing Stencil-Based Algorithms}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1374--1381}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0217}, doi = {10.1109/TRUSTCOM.2016.0217}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuFGSPSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuH16, author = {Yuanchao Xu and Zeyi Hou}, title = {NVM-Assisted Non-redundant Logging for Android Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1427--1433}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0224}, doi = {10.1109/TRUSTCOM.2016.0224}, timestamp = {Wed, 05 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuHYL16, author = {Wen Xu and Jiangqiang Hu and Jianchuan Yin and Ke Li}, title = {Ship Automatic Collision Avoidance by Altering Course Based on Ship Dynamic Domain}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2024--2030}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0309}, doi = {10.1109/TRUSTCOM.2016.0309}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuHYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuLLQ16, author = {Renhai Xu and Wenxin Li and Keqiu Li and Heng Qi}, title = {Towards Application-Aware In-Network Bandwidth Management in Data Centers}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2206--2212}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0340}, doi = {10.1109/TRUSTCOM.2016.0340}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuLLQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuLNCZ16, author = {Shibo Xu and Qingzhou Li and Peng Ni and Wensheng Cao and Xianfeng Zhao}, title = {The Application of Ad-Hoc Network in Smart Container Tracking System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2068--2072}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0317}, doi = {10.1109/TRUSTCOM.2016.0317}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuLNCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuWLS16, author = {Yemao Xu and Jialong Wang and Yanhong Liu and Li Shen}, title = {Fast Task Submission in Software Thread Level Speculation Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2160--2166}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0332}, doi = {10.1109/TRUSTCOM.2016.0332}, timestamp = {Thu, 03 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuWLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuZY16, author = {Zhikai Xu and Hongli Zhang and Xiang{-}Zhan Yu}, title = {Multiple Mix-Zones Deployment for Continuous Location Privacy Protection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {760--766}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0136}, doi = {10.1109/TRUSTCOM.2016.0136}, timestamp = {Sun, 19 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XueHZ16, author = {Nian Xue and Xin Huang and Jie Zhang}, title = {S2Net: {A} Security Framework for Software Defined Intelligent Building Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {654--661}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0122}, doi = {10.1109/TRUSTCOM.2016.0122}, timestamp = {Sat, 12 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XueHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangCWGX16, author = {Liu Yang and Xingmin Cui and Changyuan Wang and Shanqing Guo and Xin{-}Shun Xu}, title = {Risk Analysis of Exposed Methods to JavaScript in Hybrid Apps}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {458--464}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0097}, doi = {10.1109/TRUSTCOM.2016.0097}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangCWGX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangHLYY16, author = {Xinyu Yang and Xiaofei He and Jie Lin and Wei Yu and Qingyu Yang}, title = {A Game-Theoretic Model on Coalitional Attacks in Smart Grid}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {435--442}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0094}, doi = {10.1109/TRUSTCOM.2016.0094}, timestamp = {Tue, 14 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangHLYY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangJXHWZC16, author = {Xiaoyan Yang and Han Jiang and Qiuliang Xu and Mengbo Hou and Xiaochao Wei and Minghao Zhao and Kim{-}Kwang Raymond Choo}, title = {A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {670--677}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0124}, doi = {10.1109/TRUSTCOM.2016.0124}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangJXHWZC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangLLH16, author = {Xu Yang and Ting{-}Ting Lee and Joseph K. Liu and Xinyi Huang}, title = {Trust Enhancement over Range Search for Encrypted Data}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {66--73}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0047}, doi = {10.1109/TRUSTCOM.2016.0047}, timestamp = {Wed, 17 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangLLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangSYW16, author = {Yan Yang and Xingang Shi and Xia Yin and Zhiliang Wang}, title = {The Power of Prefix Hijackings in the Internet Hierarchy}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {228--235}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0068}, doi = {10.1109/TRUSTCOM.2016.0068}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangSYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangZLZ16, author = {Xu Yang and Yuexin Zhang and Joseph K. Liu and YaLi Zeng}, title = {A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {138--143}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0056}, doi = {10.1109/TRUSTCOM.2016.0056}, timestamp = {Tue, 30 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangZLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YiMLYW16, author = {Zibo Yi and Jun Ma and Lei Luo and Jie Yu and Qingbo Wu}, title = {Improving JavaScript Malware Classifier's Security against Evasion by Particle Swarm Optimization}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1734--1740}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0266}, doi = {10.1109/TRUSTCOM.2016.0266}, timestamp = {Wed, 22 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YiMLYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Yin0L16, author = {Tao Yin and Yongzheng Zhang and Jia Li}, title = {AppBot: {A} Novel {P2P} Botnet Architecture Resistant to Graph-Based Tracking}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {615--622}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0117}, doi = {10.1109/TRUSTCOM.2016.0117}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Yin0L16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuCZ16, author = {Fajiang Yu and Lie Chen and Huanguo Zhang}, title = {Virtual {TPM} Dynamic Trust Extension Suitable for Frequent Migrations}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {57--65}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0046}, doi = {10.1109/TRUSTCOM.2016.0046}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuSWR16, author = {Fangwen Yu and Ming Su and Gang Wang and Mingming Ren}, title = {Error Decomposition Algorithm for Approximating the k-Error Linear Complexity of Periodic Sequences}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {505--510}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0103}, doi = {10.1109/TRUSTCOM.2016.0103}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuSWR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZengLXZ16, author = {Fanzi Zeng and Jie Li and Jisheng Xu and Jing Zhong}, title = {A Trust-Based Cooperative Spectrum Sensing Scheme against {SSDF} Attack in CRNs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1167--1173}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0190}, doi = {10.1109/TRUSTCOM.2016.0190}, timestamp = {Fri, 10 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZengLXZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZengWWCLW16, author = {Juru Zeng and Yuncheng Wu and Yao Wu and Hong Chen and Cuiping Li and Shan Wang}, title = {Energy-Efficient and Privacy-Preserving Range Query in Participatory Sensing}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {876--883}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0151}, doi = {10.1109/TRUSTCOM.2016.0151}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZengWWCLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhang0QWL16, author = {Wei Zhang and Sheng Zhang and Zhuzhong Qian and Kaiyuan Wen and Sanglu Lu}, title = {Virtual Network Deployment in Hybrid Data Center Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1256--1263}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0202}, doi = {10.1109/TRUSTCOM.2016.0202}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Zhang0QWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhang16, author = {Jiliang Zhang}, title = {Combinational Logic Binding for {FPGA} System Security}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {216--223}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0066}, doi = {10.1109/TRUSTCOM.2016.0066}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Zhang16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangC16, author = {Huirong Zhang and Jianwen Cao}, title = {A Subgraph Preconditioning Algorithm for Large Linear Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2153--2159}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0331}, doi = {10.1109/TRUSTCOM.2016.0331}, timestamp = {Tue, 11 Feb 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangFCYZ16, author = {Zheng Zhang and Dan Feng and Jianxi Chen and Ya Yu and Jing Zeng}, title = {The Design and Implementation of a Lightweight Management Framework for Non-volatile Memory}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1551--1558}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0241}, doi = {10.1109/TRUSTCOM.2016.0241}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangFCYZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangHMYJ16, author = {Yunan Zhang and Qingjia Huang and Xinjian Ma and Zeming Yang and Jianguo Jiang}, title = {Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {965--973}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0163}, doi = {10.1109/TRUSTCOM.2016.0163}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangHMYJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangJ016, author = {Qian Zhang and Ying Jiang and Peng Wu}, title = {Modelling and Analysis of Network Security - An Algebraic Approach}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {308--315}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0078}, doi = {10.1109/TRUSTCOM.2016.0078}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangJ016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLHZ16, author = {Jian Zhang and Pin Liu and Jianbiao He and Yawei Zhang}, title = {A Hadoop Based Analysis and Detection Model for {IP} Spoofing Typed DDoS Attack}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1976--1983}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0302}, doi = {10.1109/TRUSTCOM.2016.0302}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLLXC16, author = {Shuai Zhang and Lei Liu and Hui Li and Zongshui Xiao and Lizhen Cui}, title = {MTPGraph: {A} Data-Driven Approach to Predict Medical Risk Based on Temporal Profile Graph}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1174--1181}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0191}, doi = {10.1109/TRUSTCOM.2016.0191}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLLXC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLMC16, author = {Puheng Zhang and Chuang Lin and Kun Meng and Ying Chen}, title = {A Comprehensive Optimization for Performance, Energy Efficiency, and Maintenance in Cloud Datacenters}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1264--1271}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0203}, doi = {10.1109/TRUSTCOM.2016.0203}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLW16, author = {Shaobo Zhang and Qin Liu and Guojun Wang}, title = {Enhancing Location Privacy through User-Defined Grid in Location-Based Services}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {730--736}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0132}, doi = {10.1109/TRUSTCOM.2016.0132}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLY16, author = {Yong Zhang and Bo Liu and Fan Yang}, title = {Differential Evolution Based Selective Ensemble of Extreme Learning Machine}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1327--1333}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0211}, doi = {10.1109/TRUSTCOM.2016.0211}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLYSC16, author = {Xinwen Zhang and Huakang Li and Yitao Yang and Guozi Sun and Guangxuan Chen}, title = {{LIPPS:} Logistics Information Privacy Protection System Based on Encrypted {QR} Code}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {996--1000}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0167}, doi = {10.1109/TRUSTCOM.2016.0167}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLYSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLZ16, author = {Jiexin Zhang and Xiaoxue Liu and Peidong Zhu}, title = {Securing Power System State Estimation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {699--706}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0128}, doi = {10.1109/TRUSTCOM.2016.0128}, timestamp = {Tue, 01 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangPWL16, author = {Jianyi Zhang and Yang Pan and Zhiqiang Wang and Biao Liu}, title = {{URL} Based Gateway Side Phishing Detection Method}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {268--275}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0073}, doi = {10.1109/TRUSTCOM.2016.0073}, timestamp = {Mon, 06 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangPWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangTTLS16, author = {Heng Zhang and Ahmed Taha and Rub{\'{e}}n Trapero and Jesus Luna and Neeraj Suri}, title = {{SENTRY:} {A} Novel Approach for Mitigating Application Layer DDoS Threats}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {465--472}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0098}, doi = {10.1109/TRUSTCOM.2016.0098}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangTTLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangXJJ16, author = {Guozhu Zhang and Luning Xia and Shijie Jia and Yafei Ji}, title = {Identification of Cloned {HF} {RFID} Proximity Cards Based on {RF} Fingerprinting}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {292--300}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0076}, doi = {10.1109/TRUSTCOM.2016.0076}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangXJJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangXZZ16, author = {Yang Zhang and Zuocheng Xing and Li Zhou and Chunsheng Zhu}, title = {Locality Protected Dynamic Cache Allocation Scheme on GPUs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1524--1530}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0237}, doi = {10.1109/TRUSTCOM.2016.0237}, timestamp = {Mon, 10 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangXZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangZW16, author = {Qijia Zhang and Fangjin Zhu and Canhui Wang}, title = {An Enhanced Node Mapping Algorithm for {VNE} Problem Based on Path Relevance}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1204--1209}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0195}, doi = {10.1109/TRUSTCOM.2016.0195}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoY16, author = {Jian Zhao and Jianchuan Yin}, title = {Study on the Control of Fractional-Order {PID} for Underwater Vehicle Attitude Angle}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2035--2040}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0311}, doi = {10.1109/TRUSTCOM.2016.0311}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoZ16, author = {Huan Zhao and Xixiang Zhang}, title = {A Mobile Security-Related Behavior Prevention Model Based on Speech Personality Traits}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1803--1810}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0277}, doi = {10.1109/TRUSTCOM.2016.0277}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengJHLW16, author = {Dongyu Zheng and Dailiang Jin and Yuanzhe Hao and Lei Liu and Xinjing Wei}, title = {Prediction of Consecutive Road Node Congestion Based on Queueing Model}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1531--1536}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0238}, doi = {10.1109/TRUSTCOM.2016.0238}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengJHLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengYSM16, author = {Xianyi Zheng and Lulu Yang and Gang Shi and Dan Meng}, title = {Secure Mobile Payment Employing Trusted Computing on TrustZone Enabled Platforms}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1944--1950}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0297}, doi = {10.1109/TRUSTCOM.2016.0297}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengYSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouCSL16, author = {Kailai Zhou and Hong Chen and Hui Sun and Cuiping Li}, title = {A Skew-Insensitive Hashing Sync and Construction Scheme for Many-Core Coprocessors}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1334--1341}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0212}, doi = {10.1109/TRUSTCOM.2016.0212}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouCSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouCZZ16, author = {Tianqi Zhou and Bing Chen and Chunsheng Zhu and Xiangping Zhai}, title = {{TPAHS:} {A} Truthful and Profit Maximizing Double Auction for Heterogeneous Spectrums}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {27--33}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0042}, doi = {10.1109/TRUSTCOM.2016.0042}, timestamp = {Wed, 16 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouCZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouLLW16, author = {Lei Zhou and Xiaowei Liu and Qin Liu and Guojun Wang}, title = {A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {451--457}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0096}, doi = {10.1109/TRUSTCOM.2016.0096}, timestamp = {Mon, 23 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouLLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouSWOA16, author = {Xinping Zhou and Degang Sun and Zhu Wang and Changhai Ou and Juan Ai}, title = {Double-Key Recovery Based Correlation Power Analysis}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1016--1022}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0170}, doi = {10.1109/TRUSTCOM.2016.0170}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouSWOA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouSY16, author = {Bo Zhou and Qi Shi and Po Yang}, title = {A Survey on Quantitative Evaluation of Web Service Security}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {715--721}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0130}, doi = {10.1109/TRUSTCOM.2016.0130}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouWQHL16, author = {Xiuwen Zhou and Qianhong Wu and Bo Qin and Xinyi Huang and Jianwei Liu}, title = {Distributed Bitcoin Account Management}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {105--112}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0052}, doi = {10.1109/TRUSTCOM.2016.0052}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouWQHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouXGC16, author = {Jiang Zhou and Wei Xie and Qiang Gu and Yong Chen}, title = {Hierarchical Consistent Hashing for Heterogeneous Object-Based Storage}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1597--1604}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0247}, doi = {10.1109/TRUSTCOM.2016.0247}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouXGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouZJL16, author = {Zhiwei Zhou and Junwu Zhu and Yi Jiang and Bin Li}, title = {A Truthful Greedy Mechanism toward Resource Sharing for Cloudlets in Mobile Cloud Computing}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1241--1247}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0200}, doi = {10.1109/TRUSTCOM.2016.0200}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouZJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouZXC16, author = {Huibin Zhou and Dafang Zhang and Kun Xie and Yuxiang Chen}, title = {Robust Spatio-temporal Tensor Recovery for Internet Traffic Data}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1404--1411}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0221}, doi = {10.1109/TRUSTCOM.2016.0221}, timestamp = {Wed, 18 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouZXC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuCWW16, author = {Wenliang Zhu and Xiaohe Chen and Yan Wang and Lirong Wang}, title = {The Survey of Low-Power Sleep Monitoring Algorithm Based on the Wrist Movement Signal}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2192--2196}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0337}, doi = {10.1109/TRUSTCOM.2016.0337}, timestamp = {Tue, 28 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuCWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuCZWK16, author = {Dali Zhu and Junhuang Chen and Yanfang Zhang and Siye Wang and Huafeng Kong}, title = {An Efficient Approach of Integrating {RFID} and Vision Techniques in Object Surveillance System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1023--1029}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0171}, doi = {10.1109/TRUSTCOM.2016.0171}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuCZWK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuJL16, author = {Liang Zhu and Hai Jin and Xiaofei Liao}, title = {A Tool to Detect Performance Problems of Multi-threaded Programs on {NUMA} Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1145--1152}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0187}, doi = {10.1109/TRUSTCOM.2016.0187}, timestamp = {Wed, 23 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuLW16, author = {Xiaoyu Zhu and Qin Liu and Guojun Wang}, title = {A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {845--851}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0147}, doi = {10.1109/TRUSTCOM.2016.0147}, timestamp = {Mon, 23 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuPLRF16, author = {Dali Zhu and Na Pang and Gang Li and Wenjing Rong and Zheming Fan}, title = {WiN: Non-invasive Abnormal Activity Detection Leveraging Fine-Grained WiFi Signals}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {744--751}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0134}, doi = {10.1109/TRUSTCOM.2016.0134}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuPLRF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuWXCW16, author = {Hong Zhu and Bin Wu and Meiyi Xie and Zongmin Cui and Zongda Wu}, title = {Secure Shortest Path Search over Encrypted Graph Supporting Synonym Query in Cloud Computing}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {497--504}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0102}, doi = {10.1109/TRUSTCOM.2016.0102}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuWXCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuYJSF16, author = {Dali Zhu and Ying Yang and Hao Jin and Jing Shao and Weimiao Feng}, title = {Application of Modified {BLP} Model on Mobile Web Operating System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1818--1824}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0279}, doi = {10.1109/TRUSTCOM.2016.0279}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuYJSF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuangMC16, author = {Yu Zhuang and Yu Mao and Xin Chen}, title = {A Limited-Iteration Bisecting K-Means for Fast Clustering Large Datasets}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2257--2262}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0348}, doi = {10.1109/TRUSTCOM.2016.0348}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuangMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZouLLZZX16, author = {Lida Zou and Qingzhong Li and Hui Li and Shidong Zhang and Yongqing Zheng and Zongshui Xiao}, title = {Penalty Cost Minimization for Multi-tenant Query Deadline Employing Cache Optimization and Log Based Dispatching}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1248--1255}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0201}, doi = {10.1109/TRUSTCOM.2016.0201}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZouLLZZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZuoMYSL16, author = {Cong Zuo and James Macindoe and Siyin Yang and Ron Steinfeld and Joseph K. Liu}, title = {Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {113--120}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0053}, doi = {10.1109/TRUSTCOM.2016.0053}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZuoMYSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZuoZ16, author = {Liudong Zuo and Mengxia Michelle Zhu}, title = {Improved Scheduling Algorithms for Single-Path Multiple Bandwidth Reservation Requests}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1692--1699}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0259}, doi = {10.1109/TRUSTCOM.2016.0259}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZuoZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustcom/2016, title = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7845250/proceeding}, isbn = {978-1-5090-3205-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.