Search dblp for Publications

export results for "toc:db/conf/trustcom/trustcom2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/trustcom/0007YB16,
  author       = {Guoqiang Li and
                  Bian Yang and
                  Christoph Busch},
  title        = {A Fingerprint Indexing Algorithm on Encrypted Domain},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1030--1037},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0172},
  doi          = {10.1109/TRUSTCOM.2016.0172},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/0007YB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AbduljabbarJIHH16,
  author       = {Zaid Ameen Abduljabbar and
                  Hai Jin and
                  Ayad Ibrahim and
                  Zaid Alaa Hussien and
                  Mohammed Abdulridha Hussain and
                  Salah H. Abbdal and
                  Deqing Zou},
  title        = {Privacy-Preserving Image Retrieval in IoT-Cloud},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {799--806},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0141},
  doi          = {10.1109/TRUSTCOM.2016.0141},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AbduljabbarJIHH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AbegundeXS16,
  author       = {Jacob Abegunde and
                  Hannan Xiao and
                  Joseph Spring},
  title        = {A Dynamic Game with Adaptive Strategies for {IEEE} 802.15.4 and IoT},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {473--480},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0099},
  doi          = {10.1109/TRUSTCOM.2016.0099},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AbegundeXS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AhamedSJ16,
  author       = {Farhad Ahamed and
                  Seyed A. Shahrestani and
                  Bahman Javadi},
  title        = {Security Aware and Energy-Efficient Virtual Machine Consolidation
                  in Cloud Computing Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1516--1523},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0236},
  doi          = {10.1109/TRUSTCOM.2016.0236},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AhamedSJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AhmedKKA16,
  author       = {Idrees Ahmed and
                  Abid Khan and
                  Muhammad Saleem Khan and
                  Mansoor Ahmed},
  title        = {Aggregated Signatures for Chaining: {A} Secure Provenance Scheme},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2012--2017},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0307},
  doi          = {10.1109/TRUSTCOM.2016.0307},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AhmedKKA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AkramBCMS16,
  author       = {Raja Naeem Akram and
                  Pierre{-}Fran{\c{c}}ois Bonnefoi and
                  Serge Chaumette and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure
                  Elements},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {606--614},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0116},
  doi          = {10.1109/TRUSTCOM.2016.0116},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AkramBCMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Atoofian16,
  author       = {Ehsan Atoofian},
  title        = {Temperature-Aware Register Mapping in GPGPUs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1636--1643},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0252},
  doi          = {10.1109/TRUSTCOM.2016.0252},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Atoofian16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AzabAA16,
  author       = {Ahmad Azab and
                  Mamoun Alazab and
                  Mahdi Aiash},
  title        = {Machine Learning Based Botnet Identification Traffic},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1788--1794},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0275},
  doi          = {10.1109/TRUSTCOM.2016.0275},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AzabAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BasuKV016,
  author       = {Anirban Basu and
                  Shinsaku Kiyomoto and
                  Jaideep Vaidya and
                  Stephen Marsh},
  title        = {PrefRank: Quantification and Aggregation of Subjective User Preferences},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {7--13},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0039},
  doi          = {10.1109/TRUSTCOM.2016.0039},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BasuKV016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BiPY16,
  author       = {Xiu{-}Li Bi and
                  Chi{-}Man Pun and
                  Xiaochen Yuan},
  title        = {Adaptive Polar Based Filtering Method for Image Copy-Move Forgery
                  Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {952--956},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0161},
  doi          = {10.1109/TRUSTCOM.2016.0161},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BiPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BlakemoreRC16,
  author       = {Christine Blakemore and
                  Jo{\~{a}}o Redol and
                  Miguel Correia},
  title        = {Fingerprinting for Web Applications: From Devices to Related Groups},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {144--151},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0057},
  doi          = {10.1109/TRUSTCOM.2016.0057},
  timestamp    = {Wed, 13 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BlakemoreRC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoCZ16,
  author       = {Xiaoxiao Cao and
                  Bing Chen and
                  Yanchao Zhao},
  title        = {Wi-Wri: Fine-Grained Writing Recognition Using Wi-Fi Signals},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1366--1373},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0216},
  doi          = {10.1109/TRUSTCOM.2016.0216},
  timestamp    = {Tue, 05 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoLW16,
  author       = {Zhenhai Cao and
                  Bo Lang and
                  Jinmiao Wang},
  title        = {An Efficient and Fine-Grained Access Control Scheme for Multidimensional
                  Data Aggregation in Smart Grid},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {362--369},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0085},
  doi          = {10.1109/TRUSTCOM.2016.0085},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoQLS16,
  author       = {Yuan Cao and
                  Heng Qi and
                  Keqiu Li and
                  Milos Stojmenovic},
  title        = {Multiple Query-Independent Values Based Asymmetric Ranking for Approximate
                  Nearest Neighbor Search},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1628--1635},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0251},
  doi          = {10.1109/TRUSTCOM.2016.0251},
  timestamp    = {Tue, 04 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoQLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoSWL16,
  author       = {Liu Cao and
                  Yuqing Sun and
                  Shaoqing Wang and
                  Mingzhu Li},
  title        = {Detecting Malicious Behavior and Collusion for Online Rating System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1046--1053},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0174},
  doi          = {10.1109/TRUSTCOM.2016.0174},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoSWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoWLCYPY16,
  author       = {Dong Cao and
                  Shanshan Wang and
                  Qun Li and
                  Zhenxiang Chen and
                  Qiben Yan and
                  Lizhi Peng and
                  Bo Yang},
  title        = {DroidCollector: {A} High Performance Framework for High Quality Android
                  Traffic Collection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1753--1758},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0269},
  doi          = {10.1109/TRUSTCOM.2016.0269},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoWLCYPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChaisiriK16,
  author       = {Sivadon Chaisiri and
                  Ryan K. L. Ko},
  title        = {From Reactionary to Proactive Security: Context-Aware Security Policy
                  Management and Optimization under Uncertainty},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {535--543},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0107},
  doi          = {10.1109/TRUSTCOM.2016.0107},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChaisiriK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChakrabortyARM16,
  author       = {Nilesh Chakraborty and
                  S. Vijay Anand and
                  Gurpinder Singh Randhawa and
                  Samrat Mondal},
  title        = {On Designing Leakage-Resilient Vibration Based Authentication Techniques},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1875--1881},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0287},
  doi          = {10.1109/TRUSTCOM.2016.0287},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChakrabortyARM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChangZDL16,
  author       = {Xiaoshan Chang and
                  Zenghua Zhao and
                  Bingxue Diao and
                  Tao Li},
  title        = {Experimental Study of Disruption-Tolerant Transport Protocol for Mobile
                  Ad-Hoc Networks with Connection Diversity},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1613--1620},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0249},
  doi          = {10.1109/TRUSTCOM.2016.0249},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChangZDL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenCYSTG16,
  author       = {Yong Chen and
                  Chao Chen and
                  Yanlong Yin and
                  Xian{-}He Sun and
                  Rajeev Thakur and
                  William Gropp},
  title        = {Rethinking High Performance Computing System Architecture for Scientific
                  Big Data Applications},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1605--1612},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0248},
  doi          = {10.1109/TRUSTCOM.2016.0248},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenCYSTG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenCZZX16,
  author       = {Zhengyang Chen and
                  Renjie Chen and
                  Yu Zhang and
                  Jianzhong Zhang and
                  Jingdong Xu},
  title        = {A Statistical-Feature {ML} Approach to {IP} Traffic Classification
                  Based on {CUDA}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2235--2239},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0344},
  doi          = {10.1109/TRUSTCOM.2016.0344},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenCZZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenDYWL16,
  author       = {Changyuan Chen and
                  Ran Dai and
                  Tingting Yang and
                  Zuxin Wu and
                  Quan Li},
  title        = {The Design and Application of an Intelligentialized Monitoring System
                  for Mooring Safety},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2031--2034},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0310},
  doi          = {10.1109/TRUSTCOM.2016.0310},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenDYWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenLWH16,
  author       = {Chao Chen and
                  Kun{-}Yu Lin and
                  Chang{-}Dong Wang and
                  Dong Huang},
  title        = {{CSBD:} {A} Nonlinear Clustering Method Based on Cluster Shrinking
                  and Border Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2240--2245},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0345},
  doi          = {10.1109/TRUSTCOM.2016.0345},
  timestamp    = {Thu, 13 Feb 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenLWH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenLZLZ16,
  author       = {Pei Chen and
                  Yaping Lin and
                  Wei Zhang and
                  Xiaoying Li and
                  Shiwen Zhang},
  title        = {Preserving Location and Content Privacy for Secure Ranked Queries
                  in Location Based Services},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {892--899},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0153},
  doi          = {10.1109/TRUSTCOM.2016.0153},
  timestamp    = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenLZLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenM16,
  author       = {Long Chen and
                  Yue Mao},
  title        = {Forensic Analysis of Email on Android Volatile Memory},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {945--951},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0160},
  doi          = {10.1109/TRUSTCOM.2016.0160},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenS16,
  author       = {Shu Chen and
                  Hong Shen},
  title        = {Semantic-Aware Dummy Selection for Location Privacy Preservation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {752--759},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0135},
  doi          = {10.1109/TRUSTCOM.2016.0135},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenS16a,
  author       = {Houwu Chen and
                  Jiwu Shu},
  title        = {Sznajd2: {A} Community-Aware Opinion Dynamics Model},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1477--1484},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0231},
  doi          = {10.1109/TRUSTCOM.2016.0231},
  timestamp    = {Sat, 17 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenSC16,
  author       = {Yu Chen and
                  Yuliang Shi and
                  Li{-}zhen Cui},
  title        = {Model for Hiding Data Relationships Based on Chunk-Confusion in Cloud
                  Computing},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {837--844},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0146},
  doi          = {10.1109/TRUSTCOM.2016.0146},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenTWZG16,
  author       = {Shanshan Chen and
                  Xiaoxin Tang and
                  Hongwei Wang and
                  Han Zhao and
                  Minyi Guo},
  title        = {Towards Scalable and Reliable In-Memory Storage System: {A} Case Study
                  with Redis},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1660--1667},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0255},
  doi          = {10.1109/TRUSTCOM.2016.0255},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenTWZG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenYZZX16,
  author       = {Zhengyang Chen and
                  Bowen Yu and
                  Yu Zhang and
                  Jianzhong Zhang and
                  Jingdong Xu},
  title        = {Automatic Mobile Application Traffic Identification by Convolutional
                  Neural Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {301--307},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0077},
  doi          = {10.1109/TRUSTCOM.2016.0077},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenYZZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenZXW16,
  author       = {Haibin Chen and
                  Lei Zhang and
                  Junyuan Xie and
                  Chongjun Wang},
  title        = {New Efficient Certificateless Blind Signature Scheme},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {349--353},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0083},
  doi          = {10.1109/TRUSTCOM.2016.0083},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenZXW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengLMZZW16,
  author       = {Longwang Cheng and
                  Wei Li and
                  Dongtang Ma and
                  Li Zhou and
                  Chunsheng Zhu and
                  Jibo Wei},
  title        = {Towards an Effective Secret Key Generation Scheme for Imperfect Channel
                  State Information},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {915--920},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0156},
  doi          = {10.1109/TRUSTCOM.2016.0156},
  timestamp    = {Sat, 01 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengLMZZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengWMW16,
  author       = {Li Cheng and
                  Yijie Wang and
                  Xingkong Ma and
                  Yongjun Wang},
  title        = {{GSLAC:} {A} General Scalable and Low-Overhead Alert Correlation Method},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {316--323},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0079},
  doi          = {10.1109/TRUSTCOM.2016.0079},
  timestamp    = {Thu, 01 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengWMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChomsiriHNT16,
  author       = {Thawatchai Chomsiri and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Zhiyuan Tan},
  title        = {An Improvement of Tree-Rule Firewall for a Large Network: Supporting
                  Large Rule Size and Low Delay},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {178--184},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0061},
  doi          = {10.1109/TRUSTCOM.2016.0061},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChomsiriHNT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CuiLLY16,
  author       = {Haoyi Cui and
                  Qingzhong Li and
                  Hui Li and
                  Zhongmin Yan},
  title        = {Healthcare Fraud Detection Based on Trustworthiness of Doctors},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {74--81},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0048},
  doi          = {10.1109/TRUSTCOM.2016.0048},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CuiLLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DaiYTZG16,
  author       = {You Dai and
                  Jin Yan and
                  Xiaoxin Tang and
                  Han Zhao and
                  Minyi Guo},
  title        = {Online Credit Card Fraud Detection: {A} Hybrid Framework with Big
                  Data Technologies},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1644--1651},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0253},
  doi          = {10.1109/TRUSTCOM.2016.0253},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DaiYTZG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DangHN16,
  author       = {Thanh Dat Dang and
                  Doan B. Hoang and
                  Priyadarsi Nanda},
  title        = {A Novel Hash-Based File Clustering Scheme for Efficient Distributing,
                  Storing, and Retrieving of Large Scale Health Records},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1485--1491},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0232},
  doi          = {10.1109/TRUSTCOM.2016.0232},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DangHN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DangI16,
  author       = {Quang{-}Vinh Dang and
                  Claudia{-}Lavinia Ignat},
  title        = {Computational Trust Model for Repeated Trust Games},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {34--41},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0043},
  doi          = {10.1109/TRUSTCOM.2016.0043},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DangI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DengBZW16,
  author       = {Liang Deng and
                  Hanli Bai and
                  Dan Zhao and
                  Fang Wang},
  title        = {Evaluating Multi-core and Many-Core Architectures through Parallelizing
                  a High-Order {WENO} Solver},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2167--2174},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0333},
  doi          = {10.1109/TRUSTCOM.2016.0333},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DengBZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DengGWP16,
  author       = {Changyi Deng and
                  Ruifeng Guo and
                  Hongliang Wang and
                  Azhen Peng},
  title        = {A Dynamic Power Management Algorithm for Sporadic Tasks in Real-Time
                  Embedded Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2073--2078},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0318},
  doi          = {10.1109/TRUSTCOM.2016.0318},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DengGWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DillonC16,
  author       = {Tharam S. Dillon and
                  Elizabeth Chang},
  title        = {Trust and Risk Semantics and Prediction through Big Data Analytics
                  to Encompass Cloud Services, Cyber-Physical Systems, and Social Media:
                  Issues and Challenges},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {185--193},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0062},
  doi          = {10.1109/TRUSTCOM.2016.0062},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DillonC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DingWWZZ16,
  author       = {Weiwei Ding and
                  Jin Wang and
                  Xiumin Wang and
                  Ruimin Zhao and
                  Yanqin Zhu},
  title        = {Optimal Flow Allocation and Linear Network Coding Design for Multiple
                  Multicasts under the Requirements of Information Theoretical Security},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {576--583},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0112},
  doi          = {10.1109/TRUSTCOM.2016.0112},
  timestamp    = {Wed, 18 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DingWWZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DongW16,
  author       = {Wei Dong and
                  Jianjun Wang},
  title        = {{JPEG} Compression Forensics against Resizing},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1001--1007},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0168},
  doi          = {10.1109/TRUSTCOM.2016.0168},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DongW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuCLY16,
  author       = {Haizhou Du and
                  Zhengbo Chen and
                  Qifen Li and
                  Yongwen Yang},
  title        = {A Novel Text Feature Weight Calculation Method Applied to Power Field},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1700--1705},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0260},
  doi          = {10.1109/TRUSTCOM.2016.0260},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuCLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanYXS16,
  author       = {Xiaochen Fan and
                  Panlong Yang and
                  Chaocan Xiang and
                  Lei Shi},
  title        = {iMap: {A} Crowdsensing Based System for Outdoor Radio Signal Strength
                  Map},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1442--1447},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0226},
  doi          = {10.1109/TRUSTCOM.2016.0226},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanYXS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FangLHF16,
  author       = {Kunding Fang and
                  Xiaohong Li and
                  Jianye Hao and
                  Zhiyong Feng},
  title        = {Formal Modeling and Verification of Security Protocols on Cloud Computing
                  Systems Based on {UML} 2.3},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {852--859},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0148},
  doi          = {10.1109/TRUSTCOM.2016.0148},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FangLHF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FattahiMP16,
  author       = {Jaouhar Fattahi and
                  Mohamed Mejri and
                  Emil Pricop},
  title        = {Authentication by Witness Functions},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1990--1997},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0304},
  doi          = {10.1109/TRUSTCOM.2016.0304},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FattahiMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FengWL16,
  author       = {Bo Feng and
                  Chentao Wu and
                  Jie Li},
  title        = {{MLC:} An Efficient Multi-level Log Compression Method for Cloud Backup
                  Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1358--1365},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0215},
  doi          = {10.1109/TRUSTCOM.2016.0215},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FengWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FloresQJ16,
  author       = {Denys A. Flores and
                  Farrukh Qazi and
                  Arshad Jhumka},
  title        = {Bring Your Own Disclosure: Analysing {BYOD} Threats to Corporate Information},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1008--1015},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0169},
  doi          = {10.1109/TRUSTCOM.2016.0169},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FloresQJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FuLLD16,
  author       = {Jianming Fu and
                  Pengwei Li and
                  Yan Lin and
                  Shuang Ding},
  title        = {Android App Malicious Behavior Detection Based on User Intention},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {560--567},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0110},
  doi          = {10.1109/TRUSTCOM.2016.0110},
  timestamp    = {Wed, 23 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FuLLD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FuLZ16,
  author       = {Jianming Fu and
                  Yan Lin and
                  Xu Zhang},
  title        = {Code Reuse Attack Mitigation Based on Function Randomization without
                  Symbol Table},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {394--401},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0089},
  doi          = {10.1109/TRUSTCOM.2016.0089},
  timestamp    = {Thu, 17 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FuLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FukushimaSHNDGN16,
  author       = {Kazuhide Fukushima and
                  Youssef Souissi and
                  Seira Hidano and
                  Robert Nguyen and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Laurent Sauvage},
  title        = {Delay {PUF} Assessment Method Based on Side-Channel and Modeling Analyzes:
                  The Final Piece of All-in-One Assessment Methodology},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {201--207},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0064},
  doi          = {10.1109/TRUSTCOM.2016.0064},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FukushimaSHNDGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoLSS16,
  author       = {Hongyun Gao and
                  Fujun Liu and
                  Shengjuan Sun and
                  Gaotao Shi},
  title        = {A New Model Based on {GEP-SWPM} for Predicting Heavy Metals Speciation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2122--2126},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0326},
  doi          = {10.1109/TRUSTCOM.2016.0326},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoLSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoX16,
  author       = {Shengli Gao and
                  Ruini Xue},
  title        = {{BOLAS+:} Scalable Lightweight Locality-Aware Scheduling for Hadoop},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1077--1084},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0178},
  doi          = {10.1109/TRUSTCOM.2016.0178},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaraeKC16,
  author       = {Jeffery Garae and
                  Ryan K. L. Ko and
                  Sivadon Chaisiri},
  title        = {UVisP: User-centric Visualization of Data Provenance with Gestalt
                  Principles},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1923--1930},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0294},
  doi          = {10.1109/TRUSTCOM.2016.0294},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaraeKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GheidC16,
  author       = {Zakaria Gheid and
                  Yacine Challal},
  title        = {Efficient and Privacy-Preserving k-Means Clustering for Big Data Mining},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {791--798},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0140},
  doi          = {10.1109/TRUSTCOM.2016.0140},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GheidC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GongWZL16,
  author       = {Lirui Gong and
                  Jiawei Wang and
                  Xiang Zhang and
                  Kai Lei},
  title        = {Intelligent Forwarding Strategy Based on Online Machine Learning in
                  Named Data Networking},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1288--1294},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0206},
  doi          = {10.1109/TRUSTCOM.2016.0206},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GongWZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GongYXMYY16,
  author       = {Liangyi Gong and
                  Wu Yang and
                  Chaocan Xiang and
                  Dapeng Man and
                  Miao Yu and
                  Zuwei Yin},
  title        = {WiSal: Ubiquitous WiFi-Based Device-Free Passive Subarea Localization
                  without Intensive Site-Survey},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1129--1136},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0185},
  doi          = {10.1109/TRUSTCOM.2016.0185},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GongYXMYY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GottwaltWL16,
  author       = {Florian Gottwalt and
                  Adrian Waller and
                  Weiru Liu},
  title        = {Natural Laws as a Baseline for Network Anomaly Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {370--377},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0086},
  doi          = {10.1109/TRUSTCOM.2016.0086},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GottwaltWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GranadilloRGD16,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Jose Rubio{-}Hernan and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  title        = {Considering Internal Vulnerabilities and the Attacker's Knowledge
                  to Model the Impact of Cyber Events as Geometrical Prisms},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {340--348},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0082},
  doi          = {10.1109/TRUSTCOM.2016.0082},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GranadilloRGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuHLYHJ16,
  author       = {Chonglin Gu and
                  Ke Hu and
                  Zhenlong Li and
                  Qiang Yuan and
                  Hejiao Huang and
                  Xiaohua Jia},
  title        = {Lowering Down the Cost for Green Cloud Data Centers by Using ESDs
                  and Energy Trading},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1508--1515},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0235},
  doi          = {10.1109/TRUSTCOM.2016.0235},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuHLYHJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuanL16,
  author       = {Lei Guan and
                  Yutong Lu},
  title        = {Using Dynamic Granularity Strategy to Accelerate Unbalanced Tree Search},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1302--1310},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0208},
  doi          = {10.1109/TRUSTCOM.2016.0208},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuanL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoCHD16,
  author       = {Xiaojun Guo and
                  Guang Cheng and
                  Yifei Hu and
                  Mian Dai},
  title        = {Progress in Command and Control Server Finding Schemes of Botnet},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1723--1727},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0264},
  doi          = {10.1109/TRUSTCOM.2016.0264},
  timestamp    = {Tue, 26 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoCHD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoLLHL16,
  author       = {Ping Guo and
                  Bin Lin and
                  Xin Li and
                  Rongxi He and
                  Sen Li},
  title        = {Optimal Deployment and Dimensioning of Fog Computing Supported Vehicular
                  Network},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2058--2062},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0315},
  doi          = {10.1109/TRUSTCOM.2016.0315},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoLLHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoS16,
  author       = {Longkun Guo and
                  Hong Shen},
  title        = {Privacy-Preserving Internet Traffic Publication},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {884--891},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0152},
  doi          = {10.1109/TRUSTCOM.2016.0152},
  timestamp    = {Wed, 20 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoWYHW16,
  author       = {Zonghao Guo and
                  Ou Wei and
                  Peng Yu and
                  Lansheng Han and
                  Weiming Wu},
  title        = {Model Checking Probabilistic Network Propagation Protection Strategies},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {354--361},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0084},
  doi          = {10.1109/TRUSTCOM.2016.0084},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoWYHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoWZC16,
  author       = {Jian Guo and
                  Lirong Wang and
                  Wenliang Zhu and
                  Xiaohe Chen},
  title        = {The Analysis of Crosstalk Noise Component in Wearable Device},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2202--2205},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0339},
  doi          = {10.1109/TRUSTCOM.2016.0339},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoWZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoZZ16,
  author       = {Yanbin Guo and
                  Jianzhong Zhang and
                  Yu Zhang},
  title        = {An Algorithm for Analyzing the City Residents' Activity Information
                  through Mobile Big Data Mining},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2133--2138},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0328},
  doi          = {10.1109/TRUSTCOM.2016.0328},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanGRMX16,
  author       = {Hongfang Han and
                  Ang Gao and
                  Jianji Ren and
                  Yongqiang Ma and
                  Xiao Xue},
  title        = {An {O2O} Service Recommendation Algorithm Based on User Context and
                  Trust Service},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1904--1909},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0291},
  doi          = {10.1109/TRUSTCOM.2016.0291},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanGRMX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanHCWS16,
  author       = {Yandong Han and
                  Zhiyu Hao and
                  Lei Cui and
                  Chonghua Wang and
                  Yafei Sang},
  title        = {A Hybrid Monitoring Mechanism in Virtualized Environments},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1038--1045},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0173},
  doi          = {10.1109/TRUSTCOM.2016.0173},
  timestamp    = {Mon, 01 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanHCWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanLLDQ16,
  author       = {Lin Han and
                  Zhiyang Li and
                  Weijiang Liu and
                  Ke Dai and
                  Wenyu Qu},
  title        = {Minimum Control Latency of {SDN} Controller Placement},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2175--2180},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0334},
  doi          = {10.1109/TRUSTCOM.2016.0334},
  timestamp    = {Tue, 10 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanLLDQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanQBD16,
  author       = {Zijun Han and
                  Guangzhi Qu and
                  Dona Burkard and
                  Kelvin Dobbins},
  title        = {A Memory Access Pattern-Based Program Profiling System for Dynamic
                  Parallelism Prediction},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1448--1454},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0227},
  doi          = {10.1109/TRUSTCOM.2016.0227},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanQBD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanzlikKKD16,
  author       = {Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Miroslaw Kutylowski and
                  Shlomi Dolev},
  title        = {Local Self-Organization with Strong Privacy Protection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {775--782},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0138},
  doi          = {10.1109/TRUSTCOM.2016.0138},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanzlikKKD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HaoGWS16,
  author       = {Zhongyuan Hao and
                  Wei Guo and
                  Jizeng Wei and
                  Dazhi Sun},
  title        = {Dual Processing Engine Architecture to Speed Up Optimal Ate Pairing
                  on {FPGA} Platform},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {584--589},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0113},
  doi          = {10.1109/TRUSTCOM.2016.0113},
  timestamp    = {Sun, 27 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HaoGWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeL016,
  author       = {Xinglu He and
                  Kai Lu and
                  Gen Li},
  title        = {Taint Reverse Propagation for Analysis of Privacy Leak},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1718--1722},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0263},
  doi          = {10.1109/TRUSTCOM.2016.0263},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeL016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeXXLX16,
  author       = {Shiming He and
                  Kun Xie and
                  Kexin Xie and
                  Zhetao Li and
                  Chuan Xu},
  title        = {Interference-Aware Multi-source Transmission},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1233--1240},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0199},
  doi          = {10.1109/TRUSTCOM.2016.0199},
  timestamp    = {Wed, 17 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeXXLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HouZWCWL16,
  author       = {Gang Hou and
                  Kuanjiu Zhou and
                  Yanran Wu and
                  Zongzheng Chi and
                  Jie Wang and
                  Mingchu Li},
  title        = {{ETSTM:} {A} New Green Software Model},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1825--1830},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0280},
  doi          = {10.1109/TRUSTCOM.2016.0280},
  timestamp    = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HouZWCWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuC0S16,
  author       = {Feng Hu and
                  Bing Chen and
                  Xiaojun Zhu and
                  Hong Shen},
  title        = {SDN-Based Efficient Bandwidth Allocation for Caching Enabled Cognitive
                  Radio Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1382--1389},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0218},
  doi          = {10.1109/TRUSTCOM.2016.0218},
  timestamp    = {Sat, 26 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuC0S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuWWCZ16,
  author       = {Shengshan Hu and
                  Qian Wang and
                  Jingjun Wang and
                  Sherman S. M. Chow and
                  Qin Zou},
  title        = {Securing Fast Learning! Ridge Regression over Encrypted Big Data},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {19--26},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0041},
  doi          = {10.1109/TRUSTCOM.2016.0041},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuWWCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuWZF16,
  author       = {Zongshuai Hu and
                  Yong Wang and
                  Lipeng Zhang and
                  Rusen Fan},
  title        = {Bad Data Injection Attacks Identification in Power System on Fast
                  Decoupled Load Flow},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1970--1975},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0301},
  doi          = {10.1109/TRUSTCOM.2016.0301},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuWZF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangDWW16,
  author       = {Haiping Huang and
                  Jianpeng Du and
                  Hui Wang and
                  Ruchuan Wang},
  title        = {A Multi-keyword Multi-user Searchable Encryption Scheme Based on Cloud
                  Storage},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1937--1943},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0296},
  doi          = {10.1109/TRUSTCOM.2016.0296},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangDWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangLWS16,
  author       = {Xi Huang and
                  Xiaoguang Liu and
                  Gang Wang and
                  Ming Su},
  title        = {A Robust Image Hashing with Enhanced Randomness by Using Random Walk
                  on Zigzag Blocking},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {14--18},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0040},
  doi          = {10.1109/TRUSTCOM.2016.0040},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangLWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangZQ16,
  author       = {Xingyuan Huang and
                  Jiandong Zhang and
                  Kun Qian},
  title        = {Big Data Analysis on the Relationship between the Organizational Career
                  Management and Knowledge Workers' Work Involved - Take the High-Tech
                  Enterprise as an Example},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2251--2256},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0347},
  doi          = {10.1109/TRUSTCOM.2016.0347},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangZQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HussainSP16,
  author       = {Sardar Hussain and
                  Richard O. Sinnott and
                  Ron Poet},
  title        = {A Security-Oriented Workflow Framework for Collaborative Environments},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {707--714},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0129},
  doi          = {10.1109/TRUSTCOM.2016.0129},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HussainSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JayarathnaVT16,
  author       = {Dilshan Jayarathna and
                  Vijay Varadharajan and
                  Udaya Kiran Tupakula},
  title        = {Integrated Security for Services Hosted in Virtual Environments},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {82--89},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0049},
  doi          = {10.1109/TRUSTCOM.2016.0049},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JayarathnaVT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JayasingheMGAM16,
  author       = {Danushka Jayasinghe and
                  Konstantinos Markantonakis and
                  Iakovos Gurulian and
                  Raja Naeem Akram and
                  Keith Mayes},
  title        = {Extending {EMV} Tokenised Payments to Offline-Environments},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {443--450},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0095},
  doi          = {10.1109/TRUSTCOM.2016.0095},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JayasingheMGAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiWTWWTZZ16,
  author       = {Changqing Ji and
                  Baofeng Wang and
                  Shuai Tao and
                  Junfeng Wu and
                  Zumin Wang and
                  Long Tang and
                  Tiange Zu and
                  Gui Zhao},
  title        = {Inverted Voronoi-Based kNN Query Processing with MapReduce},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2263--2268},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0349},
  doi          = {10.1109/TRUSTCOM.2016.0349},
  timestamp    = {Mon, 28 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiWTWWTZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiaWZWJ16,
  author       = {Chengjin Jia and
                  Jin Wang and
                  Yanqin Zhu and
                  Zhengqing Wen and
                  Juncheng Jia},
  title        = {Joint Selection of Providers and the New Comer for Optimal Repair
                  in Distributed Storage Network with Network Coding},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1567--1574},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0243},
  doi          = {10.1109/TRUSTCOM.2016.0243},
  timestamp    = {Wed, 18 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiaWZWJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiaYKXCS16,
  author       = {Minglei Jia and
                  Yanqin Yang and
                  Lei Kuang and
                  Wenchao Xu and
                  Tianxing Chu and
                  Hongzhi Song},
  title        = {An Indoor and Outdoor Seamless Positioning System Based on Android
                  Platform},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1114--1120},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0183},
  doi          = {10.1109/TRUSTCOM.2016.0183},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiaYKXCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangLXTYK16,
  author       = {Meng Jiang and
                  Yanbo Liu and
                  Wenchao Xu and
                  Feilong Tang and
                  Yanqin Yang and
                  Lei Kuang},
  title        = {An Optimized Layered Routing Algorithm for {GEO/LEO} Hybrid Satellite
                  Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1153--1158},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0188},
  doi          = {10.1109/TRUSTCOM.2016.0188},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangLXTYK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangQSWL16,
  author       = {Jianguo Jiang and
                  Biao Qi and
                  Zhixin Shi and
                  Yan Wang and
                  Bin Lv},
  title        = {Botnet Detection Method Analysis on the Effect of Feature Extraction},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1882--1888},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0288},
  doi          = {10.1109/TRUSTCOM.2016.0288},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangQSWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Jianyong16,
  author       = {Fang Jianyong},
  title        = {Research on the Nonintrusive Resource Level Fault Injection Technology
                  for Windows System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1856--1860},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0284},
  doi          = {10.1109/TRUSTCOM.2016.0284},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Jianyong16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JinGQZPL16,
  author       = {Yibo Jin and
                  Yuan Gao and
                  Zhuzhong Qian and
                  Mingyu Zhai and
                  Hui Peng and
                  Sanglu Lu},
  title        = {Workload-Aware Scheduling Across Geo-distributed Data Centers},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1455--1462},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0228},
  doi          = {10.1109/TRUSTCOM.2016.0228},
  timestamp    = {Thu, 04 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JinGQZPL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JinW16,
  author       = {Hua Jin and
                  Changda Wang},
  title        = {Robustness of the Packet Delay Channels},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {260--267},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0072},
  doi          = {10.1109/TRUSTCOM.2016.0072},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JinW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JinZTF16,
  author       = {Jiangming Jin and
                  Yang Zhang and
                  Shanjiang Tang and
                  Hongfei Fan},
  title        = {Performance Modeling and Analysis for Critical Section Contention
                  in Parallel Codes},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2139--2146},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0329},
  doi          = {10.1109/TRUSTCOM.2016.0329},
  timestamp    = {Tue, 22 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JinZTF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JingZDXL16,
  author       = {Jing Wang and
                  Xianfeng Zhao and
                  Yanjie Deng and
                  Shibo Xu and
                  Jichun Li},
  title        = {Research on Key Technologies and Standard Framework of Secure and
                  Smart Container},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2063--2067},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0316},
  doi          = {10.1109/TRUSTCOM.2016.0316},
  timestamp    = {Mon, 12 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JingZDXL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KacemWCB16,
  author       = {Thabet Kacem and
                  Duminda Wijesekera and
                  Paulo Cesar G. da Costa and
                  Alexandre Barreto},
  title        = {An {ADS-B} Intrusion Detection System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {544--551},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0108},
  doi          = {10.1109/TRUSTCOM.2016.0108},
  timestamp    = {Thu, 10 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KacemWCB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KarthikS16,
  author       = {N. Karthik and
                  Ananthanarayana V. S.},
  title        = {Data Trustworthiness in Wireless Sensor Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2181--2186},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0335},
  doi          = {10.1109/TRUSTCOM.2016.0335},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KarthikS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KejariwalO16,
  author       = {Arun Kejariwal and
                  Francois Orsini},
  title        = {On the Definition of Real-Time: Applications and Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2213--2220},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0341},
  doi          = {10.1109/TRUSTCOM.2016.0341},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KejariwalO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KenazaALLW16,
  author       = {Tayeb Kenaza and
                  Mahdi Aiash and
                  Jonathan Loo and
                  Aboubaker Lasebae and
                  Gill Whitney},
  title        = {A Progressive Approach to Design Authentication Protocols for Mobile
                  Heterogeneous Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1776--1781},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0273},
  doi          = {10.1109/TRUSTCOM.2016.0273},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KenazaALLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KenazaBLA16,
  author       = {Tayeb Kenaza and
                  Khadidja Bennaceur and
                  Abdenour Labed and
                  Mahdi Aiash},
  title        = {Enhancing the {SVDD} Accuracy in Intrusion Detection Systems by Removing
                  External Voids},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1765--1770},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0271},
  doi          = {10.1109/TRUSTCOM.2016.0271},
  timestamp    = {Tue, 28 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KenazaBLA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KhanAKK16,
  author       = {Muhammad Saleem Khan and
                  Idrees Ahmed and
                  Abid Khan and
                  Majid Iqbal Khan},
  title        = {Adaptive Reputation Weights Assignment Scheme for MANETs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {160--167},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0059},
  doi          = {10.1109/TRUSTCOM.2016.0059},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KhanAKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KuangTGFCXYZW16,
  author       = {Kaiyuan Kuang and
                  Zhanyong Tang and
                  Xiaoqing Gong and
                  Dingyi Fang and
                  Xiaojiang Chen and
                  Tianzhang Xing and
                  Guixin Ye and
                  Jie Zhang and
                  Zheng Wang},
  title        = {Exploiting Dynamic Scheduling for VM-Based Code Obfuscation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {489--496},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0101},
  doi          = {10.1109/TRUSTCOM.2016.0101},
  timestamp    = {Tue, 12 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KuangTGFCXYZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LaiWSLQZ16,
  author       = {Meng Lai and
                  Jiajun Wang and
                  Tao Song and
                  Ning Liu and
                  Zhengwei Qi and
                  Weijia Zhou},
  title        = {{VSP:} {A} Virtual Smartphone Platform to Enhance the Capability of
                  Physical Smartphone},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1434--1441},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0225},
  doi          = {10.1109/TRUSTCOM.2016.0225},
  timestamp    = {Thu, 05 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LaiWSLQZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Lei0FLZ16,
  author       = {Shiming Lei and
                  Chao Wang and
                  Haijie Fang and
                  Xi Li and
                  Xuehai Zhou},
  title        = {{SCADIS:} {A} Scalable Accelerator for Data-Intensive String Set Matching
                  on FPGAs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1190--1197},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0193},
  doi          = {10.1109/TRUSTCOM.2016.0193},
  timestamp    = {Thu, 19 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Lei0FLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LenzZ16,
  author       = {Thomas Lenz and
                  Bernd Zwattendorfer},
  title        = {Towards Cross-Border Authorization in European eID Federations},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {426--434},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0093},
  doi          = {10.1109/TRUSTCOM.2016.0093},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LenzZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiC16,
  author       = {Yamin Li and
                  Wanming Chu},
  title        = {Adjusting Parameters of k-Ary n-Cube to Achieve Better Cost Performance},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1218--1225},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0197},
  doi          = {10.1109/TRUSTCOM.2016.0197},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiCLSCL16,
  author       = {Xiaochao Li and
                  Chunhui Cao and
                  Pengtao Li and
                  Shuli Shen and
                  Yihui Chen and
                  Lin Li},
  title        = {Energy-Efficient Hardware Implementation of {LUKS} {PBKDF2} with {AES}
                  on {FPGA}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {402--409},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0090},
  doi          = {10.1109/TRUSTCOM.2016.0090},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiCLSCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiJSWLLR16,
  author       = {Peng Li and
                  Xingtong Jin and
                  Rebecca J. Stones and
                  Gang Wang and
                  Zhongwei Li and
                  Xiaoguang Liu and
                  Mingming Ren},
  title        = {Parallelizing Degraded Read for Erasure Coded Cloud Storage Systems
                  Using Collective Communications},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1272--1279},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0204},
  doi          = {10.1109/TRUSTCOM.2016.0204},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiJSWLLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLC16,
  author       = {Lulu Li and
                  Zhuo Li and
                  Xin Chen},
  title        = {Capacity Analysis and Link Scheduling Design in Double-Channel Full-Duplex
                  Wireless Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1581--1588},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0245},
  doi          = {10.1109/TRUSTCOM.2016.0245},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLD16,
  author       = {Minghui Li and
                  Zhaobin Liu and
                  Kang Dong},
  title        = {Privacy Preservation in Social Network against Public Neighborhood
                  Attacks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1575--1580},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0244},
  doi          = {10.1109/TRUSTCOM.2016.0244},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLGLH16,
  author       = {Xin Li and
                  Bin Lin and
                  Ping Guo and
                  Sen Li and
                  Rongxi He},
  title        = {Design and Planning of Heterogeneous Marine Sensor Networks for Marine
                  Intelligent Transportation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2052--2057},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0314},
  doi          = {10.1109/TRUSTCOM.2016.0314},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLGLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLWL16,
  author       = {Juan{-}Hui Li and
                  Pei{-}Zhen Li and
                  Chang{-}Dong Wang and
                  Jian{-}Huang Lai},
  title        = {Community Detection in Complicated Network Based on the Multi-view
                  Weighted Signed Permanence},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1589--1596},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0246},
  doi          = {10.1109/TRUSTCOM.2016.0246},
  timestamp    = {Thu, 13 Feb 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLZWCD16,
  author       = {Jian Li and
                  Wenhuan Lu and
                  Chen Zhang and
                  Jianguo Wei and
                  Xiaochun Cao and
                  Jianwu Dang},
  title        = {A Study on Detection and Recovery of Speech Signal Tampering},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {678--682},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0125},
  doi          = {10.1109/TRUSTCOM.2016.0125},
  timestamp    = {Mon, 02 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLZWCD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiWHSF16,
  author       = {Qian Li and
                  Weiguo Wu and
                  Jianhang Huang and
                  Zeyu Sun and
                  Mingxia Feng},
  title        = {A Novel Trustworthy Framework for Cloud Based Rendering Application},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1951--1956},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0298},
  doi          = {10.1109/TRUSTCOM.2016.0298},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiWHSF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiXG16,
  author       = {Dali Li and
                  Chuanfu Xu and
                  Ningbo Guo},
  title        = {Evaluating and Optimizing Parallel {LU-SGS} for High-Order {CFD} Simulations
                  on the Tianhe-2 Supercomputer},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1182--1189},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0192},
  doi          = {10.1109/TRUSTCOM.2016.0192},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiXG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiYLZWL16,
  author       = {Hui Li and
                  Guoqiao Ye and
                  Xuezheng Liu and
                  Fei Zhao and
                  Di Wu and
                  Xiaola Lin},
  title        = {URLSight: Profiling Mobile Users via Large-Scale Internet Metadata
                  Analytics},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1728--1733},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0265},
  doi          = {10.1109/TRUSTCOM.2016.0265},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiYLZWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZDLYM16,
  author       = {Tao Li and
                  Kezhao Zhao and
                  Qiankun Dong and
                  Jiabing Ling and
                  Yulu Yang and
                  Wenjing Ma},
  title        = {Data-Oriented Runtime Scheduling Framework on Multi-GPUs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1311--1318},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0209},
  doi          = {10.1109/TRUSTCOM.2016.0209},
  timestamp    = {Fri, 12 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZDLYM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiangFWG16,
  author       = {Kaiyuan Liang and
                  Yanzhao Feng and
                  Jizeng Wei and
                  Wei Guo},
  title        = {SecPage - {A} Lightweight Memory Protection Architecture},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1917--1922},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0293},
  doi          = {10.1109/TRUSTCOM.2016.0293},
  timestamp    = {Sun, 27 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiangFWG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LinWJYZW16,
  author       = {Zimin Lin and
                  Rui Wang and
                  Xiaoqi Jia and
                  Jingyu Yang and
                  Daojuan Zhang and
                  Chuankun Wu},
  title        = {ForceDROID: Extracting Hidden Information in Android Apps by Forced
                  Execution Technique},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {386--393},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0088},
  doi          = {10.1109/TRUSTCOM.2016.0088},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LinWJYZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LinWJZW16,
  author       = {Zimin Lin and
                  Rui Wang and
                  Xiaoqi Jia and
                  Shengzhi Zhang and
                  Chuankun Wu},
  title        = {Classifying Android Malware with Dynamic Behavior Dependency Graphs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {378--385},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0087},
  doi          = {10.1109/TRUSTCOM.2016.0087},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LinWJZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LingGL16,
  author       = {Cheng Ling and
                  Jing{-}Yang Gao and
                  Gang Lu},
  title        = {Phylogenetic Likelihood Estimation on GPUs Using Vertical Partitioning
                  Scheme},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1210--1217},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0196},
  doi          = {10.1109/TRUSTCOM.2016.0196},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LingGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuBW16,
  author       = {Juhua Liu and
                  Guoqiang Bai and
                  Xingjun Wu},
  title        = {Efficient Hardware Implementation of Roadrunner for Lightweight Application},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {224--227},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0067},
  doi          = {10.1109/TRUSTCOM.2016.0067},
  timestamp    = {Sat, 03 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuBW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuDCZW16,
  author       = {Qiang Liu and
                  Xiaoshe Dong and
                  Heng Chen and
                  Zhengdong Zhu and
                  Yinfeng Wang},
  title        = {An Efficient Framework for Incremental Graph Computation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1420--1426},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0223},
  doi          = {10.1109/TRUSTCOM.2016.0223},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuDCZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuJWYZZ16,
  author       = {Zechao Liu and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Siu{-}Ming Yiu and
                  Chunkai Zhang and
                  Xiaomeng Zhao},
  title        = {Dynamic Attribute-Based Access Control in Cloud Storage Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {129--137},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0055},
  doi          = {10.1109/TRUSTCOM.2016.0055},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuJWYZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLLQTC16,
  author       = {Yang Liu and
                  Wenxin Li and
                  Keqiu Li and
                  Heng Qi and
                  Xiaoyi Tao and
                  Sheng Chen},
  title        = {Scheduling Dependent Coflows with Guaranteed Job Completion Time},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2109--2115},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0324},
  doi          = {10.1109/TRUSTCOM.2016.0324},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLLQTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLMZZZ16,
  author       = {Feng Liu and
                  Pengpeng Luo and
                  Zhujuan Ma and
                  Cheng Zhang and
                  Yiwen Zhang and
                  Erzhou Zhu},
  title        = {Security Secret Information Hiding Based on Hash Function and Invisible
                  {ASCII} Characters Replacement},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1963--1969},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0300},
  doi          = {10.1109/TRUSTCOM.2016.0300},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLMZZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLSZ16,
  author       = {Peng Liu and
                  Yidong Li and
                  Yingpeng Sang and
                  Ji Zhang},
  title        = {Anonymity-Based Privacy Preserving Network Data Publication},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {823--828},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0144},
  doi          = {10.1109/TRUSTCOM.2016.0144},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuTXCZF16,
  author       = {Cang Liu and
                  Chuan Tang and
                  Zuocheng Xing and
                  Lirui Chen and
                  Yang Zhang and
                  Guitao Fu},
  title        = {An Architecture of Parallel Tiled {QRD} Algorithm for {MIMO-OFDM}
                  Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2092--2096},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0321},
  doi          = {10.1109/TRUSTCOM.2016.0321},
  timestamp    = {Wed, 16 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuTXCZF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuXLTWL16,
  author       = {Na Liu and
                  Peng Xiao and
                  Ying Lu and
                  Xiao{-}Jun Tang and
                  Hai{-}Wen Wang and
                  Ming{-}Xia Li},
  title        = {A Topic Approach to Sentence Ordering for Multi-document Summarization},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1390--1395},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0219},
  doi          = {10.1109/TRUSTCOM.2016.0219},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuXLTWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuXTKY16,
  author       = {Yanbo Liu and
                  Wenchao Xu and
                  Feilong Tang and
                  Lei Kuang and
                  Yanqin Yang},
  title        = {An Improved Multi-path Routing Algorithm for Hybrid {LEO-MEO} Satellite
                  Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1101--1105},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0181},
  doi          = {10.1109/TRUSTCOM.2016.0181},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuXTKY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuS16,
  author       = {Yang Lu and
                  Richard O. Sinnott},
  title        = {Semantic-Based Privacy Protection of Electronic Health Records for
                  Collaborative Research},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {519--526},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0105},
  doi          = {10.1109/TRUSTCOM.2016.0105},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoFHWX16,
  author       = {Yuchuan Luo and
                  Shaojing Fu and
                  Kai Huang and
                  Dongsheng Wang and
                  Ming Xu},
  title        = {Securely Outsourcing of Bilinear Pairings with Untrusted Servers for
                  Cloud Storage},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {623--629},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0118},
  doi          = {10.1109/TRUSTCOM.2016.0118},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoFHWX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoLLRSW16,
  author       = {Wu Luo and
                  Wei Liu and
                  Yang Luo and
                  Anbang Ruan and
                  Qingni Shen and
                  Zhonghai Wu},
  title        = {Partial Attestation: Towards Cost-Effective and Privacy-Preserving
                  Remote Attestations},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {152--159},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0058},
  doi          = {10.1109/TRUSTCOM.2016.0058},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoLLRSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoLSSRW16,
  author       = {Yang Luo and
                  Wu Luo and
                  Xiaoning Sun and
                  Qingni Shen and
                  Anbang Ruan and
                  Zhonghai Wu},
  title        = {Whispers between the Containers: High-Capacity Covert Channel Attacks
                  in Docker},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {630--637},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0119},
  doi          = {10.1109/TRUSTCOM.2016.0119},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoLSSRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LvLF16,
  author       = {Yali Lv and
                  Cheng{-}Kuan Lin and
                  Jianxi Fan},
  title        = {Hamiltonian Cycle and Path Embeddings in 3-Ary n-Cubes Based on K1,
                  2-Structure Faults},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1226--1232},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0198},
  doi          = {10.1109/TRUSTCOM.2016.0198},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LvLF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LyuLYZ16,
  author       = {Fang Lyu and
                  Yapin Lin and
                  Junfeng Yang and
                  Junhai Zhou},
  title        = {SUIDroid: An Efficient Hardening-Resilient Approach to Android App
                  Clone Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {511--518},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0104},
  doi          = {10.1109/TRUSTCOM.2016.0104},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LyuLYZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaWL16,
  author       = {Jingwei Ma and
                  Gang Wang and
                  Xiaoguang Liu},
  title        = {DedupeSwift: Object-Oriented Storage System Based on Data Deduplication},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1069--1076},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0177},
  doi          = {10.1109/TRUSTCOM.2016.0177},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaYKMCWWL16,
  author       = {Jingwei Ma and
                  Boxue Yin and
                  Zhi Kong and
                  Yuxiang Ma and
                  Chang Chen and
                  Long Wang and
                  Gang Wang and
                  Xiaoguang Liu},
  title        = {Leveraging Page-Level Compression in MySQL - {A} Practice at Baidu},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1085--1092},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0179},
  doi          = {10.1109/TRUSTCOM.2016.0179},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaYKMCWWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MadhounP16,
  author       = {Nour El Madhoun and
                  Guy Pujolle},
  title        = {Security Enhancements in {EMV} Protocol for {NFC} Mobile Payment},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1889--1895},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0289},
  doi          = {10.1109/TRUSTCOM.2016.0289},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MadhounP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MansorMAMG16,
  author       = {Hafizah Mansor and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Keith Mayes and
                  Iakovos Gurulian},
  title        = {Log Your Car: The Non-invasive Vehicle Forensics},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {974--982},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0164},
  doi          = {10.1109/TRUSTCOM.2016.0164},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MansorMAMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ManzoorTS16,
  author       = {Salman Manzoor and
                  Ahmed Taha and
                  Neeraj Suri},
  title        = {Trust Validation of Cloud IaaS: {A} Customer-centric Approach},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {97--104},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0051},
  doi          = {10.1109/TRUSTCOM.2016.0051},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ManzoorTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaoGYL16,
  author       = {KunPeng Mao and
                  Songtao Guo and
                  Yuanyuan Yang and
                  Guiyan Liu},
  title        = {{MRDC:} Multicast Data Restoration in Fat-Tree Data Center Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1500--1507},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0234},
  doi          = {10.1109/TRUSTCOM.2016.0234},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaoGYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MarraMSA16,
  author       = {Antonio La Marra and
                  Fabio Martinelli and
                  Andrea Saracino and
                  Alessandro Aldini},
  title        = {On Probabilistic Application Compliance},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1848--1855},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0283},
  doi          = {10.1109/TRUSTCOM.2016.0283},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MarraMSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MartinelliSS16,
  author       = {Fabio Martinelli and
                  Andrea Saracino and
                  Mina Sheikhalishahi},
  title        = {Modeling Privacy Aware Information Sharing Systems: {A} Formal and
                  General Approach},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {767--774},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0137},
  doi          = {10.1109/TRUSTCOM.2016.0137},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MartinelliSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MengLLL16,
  author       = {Weizhi Meng and
                  Xiapu Luo and
                  Wenjuan Li and
                  Yan Li},
  title        = {Design and Evaluation of Advanced Collusion Attacks on Collaborative
                  Intrusion Detection Networks in Practice},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1061--1068},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0176},
  doi          = {10.1109/TRUSTCOM.2016.0176},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MengLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MengXCZ16,
  author       = {Xuying Meng and
                  Zhiwei Xu and
                  Bo Chen and
                  Yujun Zhang},
  title        = {Privacy-Preserving Query Log Sharing Based on Prior N-Word Aggregation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {722--729},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0131},
  doi          = {10.1109/TRUSTCOM.2016.0131},
  timestamp    = {Fri, 15 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MengXCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MinLLC16,
  author       = {Xinping Min and
                  Qingzhong Li and
                  Lei Liu and
                  Lizhen Cui},
  title        = {A Permissioned Blockchain Framework for Supporting Instant Transaction
                  and Dynamic Block Size},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {90--96},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0050},
  doi          = {10.1109/TRUSTCOM.2016.0050},
  timestamp    = {Wed, 08 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MinLLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MisraSB16,
  author       = {Gaurav Misra and
                  Jose M. Such and
                  Hamed Balogun},
  title        = {{IMPROVE} - Identifying Minimal PROfile VEctors for Similarity Based
                  Access Control},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {868--875},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0150},
  doi          = {10.1109/TRUSTCOM.2016.0150},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MisraSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NayakT16,
  author       = {Sanjeet Kumar Nayak and
                  Somanath Tripathy},
  title        = {Privacy Preserving Provable Data Possession for Cloud Based Electronic
                  Health Record System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {860--867},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0149},
  doi          = {10.1109/TRUSTCOM.2016.0149},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NayakT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NieLQ16,
  author       = {Lihai Nie and
                  Zhiyang Li and
                  Wenyu Qu},
  title        = {Association Rules Discovery via Approximate Method from Probabilistic
                  Database},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {909--914},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0155},
  doi          = {10.1109/TRUSTCOM.2016.0155},
  timestamp    = {Tue, 10 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NieLQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NingZYSM16,
  author       = {Fangxiao Ning and
                  Min Zhu and
                  Ruibang You and
                  Gang Shi and
                  Dan Meng},
  title        = {Group-Based Memory Deduplication against Covert Channel Attacks in
                  Virtualized Environments},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {194--200},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0063},
  doi          = {10.1109/TRUSTCOM.2016.0063},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NingZYSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/OuWSZA16,
  author       = {Changhai Ou and
                  Zhu Wang and
                  Degang Sun and
                  Xinping Zhou and
                  Juan Ai},
  title        = {Power Traces Clipping and Splicing Enhanced Correlation Collision
                  Analysis},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {989--995},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0166},
  doi          = {10.1109/TRUSTCOM.2016.0166},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/OuWSZA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PadilloLV16,
  author       = {Francisco Padillo and
                  Jos{\'{e}} Mar{\'{\i}}a Luna and
                  Sebasti{\'{a}}n Ventura},
  title        = {Subgroup Discovery on Big Data: Exhaustive Methodologies Using Map-Reduce},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1684--1691},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0258},
  doi          = {10.1109/TRUSTCOM.2016.0258},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PadilloLV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PanM16,
  author       = {Jinkun Pan and
                  Xiaoguang Mao},
  title        = {DomXssMicro: {A} Micro Benchmark for Evaluating DOM-Based Cross-Site
                  Scripting Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {208--215},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0065},
  doi          = {10.1109/TRUSTCOM.2016.0065},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PanM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PantangiXM16,
  author       = {Ajay Pantangi and
                  Kaiqi Xiong and
                  Mufaddal Makati},
  title        = {SECUPerf: End-to-End Security and Performance Assessment of Cloud
                  Services},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1747--1752},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0268},
  doi          = {10.1109/TRUSTCOM.2016.0268},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PantangiXM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Pattaranantakul16,
  author       = {Montida Pattaranantakul and
                  Ruan He and
                  Ahmed Meddahi and
                  Zonghua Zhang},
  title        = {SecMANO: Towards Network Functions Virtualization {(NFV)} Based Security
                  MANagement and Orchestration},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {598--605},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0115},
  doi          = {10.1109/TRUSTCOM.2016.0115},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Pattaranantakul16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PeiWCJGGZ16,
  author       = {Songwen Pei and
                  Jinkai Wang and
                  Wenyang Cui and
                  Linhua Jiang and
                  Tongsheng Geng and
                  Jean{-}Luc Gaudiot and
                  St{\'{e}}phane Zuckerman},
  title        = {Codelet Scheduling by Genetic Algorithm},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1492--1499},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0233},
  doi          = {10.1109/TRUSTCOM.2016.0233},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PeiWCJGGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PeiWMX16,
  author       = {Xiaoqiang Pei and
                  Yijie Wang and
                  Xingkong Ma and
                  Fangliang Xu},
  title        = {Pipelined Online Data Insertion for Erasure Codes in Distributed Storage
                  Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1159--1166},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0189},
  doi          = {10.1109/TRUSTCOM.2016.0189},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PeiWMX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PeiWYLP16,
  author       = {Xin Pei and
                  Yongjian Wang and
                  Wei Yao and
                  Jiuchuan Lin and
                  Ruxiang Peng},
  title        = {Security Enhanced Attribute Based Signcryption for Private Data Sharing
                  in Cloud},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {737--743},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0133},
  doi          = {10.1109/TRUSTCOM.2016.0133},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PeiWYLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PengCA16,
  author       = {Jian Peng and
                  Kim{-}Kwang Raymond Choo and
                  Helen Ashman},
  title        = {Astroturfing Detection in Social Media: Using Binary n-Gram Analysis
                  for Authorship Attribution},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {121--128},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0054},
  doi          = {10.1109/TRUSTCOM.2016.0054},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PengCA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PengY16,
  author       = {Hao Peng and
                  Mengzhuo You},
  title        = {The Health Care Fraud Detection Using the Pharmacopoeia Spectrum Tree
                  and Neural Network Analytic Contribution Hierarchy Process},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2006--2011},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0306},
  doi          = {10.1109/TRUSTCOM.2016.0306},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PengY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiaoY016,
  author       = {Yanchen Qiao and
                  Xiaochun Yun and
                  Yongzheng Zhang},
  title        = {How to Automatically Identify the Homology of Different Malware},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {929--936},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0158},
  doi          = {10.1109/TRUSTCOM.2016.0158},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiaoY016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiaoY016a,
  author       = {Yanchen Qiao and
                  Xiaochun Yun and
                  Yongzheng Zhang},
  title        = {Fast Reused Function Retrieval Method Based on Simhash and Inverted
                  Index},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {937--944},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0159},
  doi          = {10.1109/TRUSTCOM.2016.0159},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiaoY016a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiaoZXZH16,
  author       = {Hong Qiao and
                  Dafang Zhang and
                  Kun Xie and
                  Ji Zhang and
                  Shiming He},
  title        = {Power-Bandwidth Aware Cooperative Routing in Multi-radio Multi-channel
                  Wireless Network},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1342--1349},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0213},
  doi          = {10.1109/TRUSTCOM.2016.0213},
  timestamp    = {Wed, 18 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiaoZXZH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QinWLL16,
  author       = {Xiongpai Qin and
                  Bangguo Wang and
                  Ruchuan Lai and
                  Keqin Li},
  title        = {Improving Robustness of a {SVR} Based Algorithm Trading Model with
                  Carefully Crafted Features and a Diversified Portfolio},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1676--1683},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0257},
  doi          = {10.1109/TRUSTCOM.2016.0257},
  timestamp    = {Fri, 27 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QinWLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QinZL16,
  author       = {Haiyan Qin and
                  Yonglong Zhang and
                  Bin Li},
  title        = {pHSA: {A} Price Schedule for Heterogeneous Spectrum Auction},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2103--2108},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0323},
  doi          = {10.1109/TRUSTCOM.2016.0323},
  timestamp    = {Tue, 05 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QinZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QuYYXGX16,
  author       = {Hongyang Qu and
                  Zhiwen Yu and
                  Zhiyong Yu and
                  Huang Xu and
                  Bin Guo and
                  Xing Xie},
  title        = {What Is My Next Job: Predicting the Company Size and Position in Career
                  Changes},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1668--1675},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0256},
  doi          = {10.1109/TRUSTCOM.2016.0256},
  timestamp    = {Fri, 23 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QuYYXGX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RahmanBK16,
  author       = {Mohammad Shahriar Rahman and
                  Anirban Basu and
                  Shinsaku Kiyomoto},
  title        = {Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning
                  with Errors over Rings},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1759--1764},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0270},
  doi          = {10.1109/TRUSTCOM.2016.0270},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RahmanBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RahmanEK16,
  author       = {Mohammad Shahriar Rahman and
                  Keita Emura and
                  Shinsaku Kiyomoto},
  title        = {On the Leakage Resilient Cryptography in Game-Theoretic Settings},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1984--1989},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0303},
  doi          = {10.1109/TRUSTCOM.2016.0303},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RahmanEK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RaoWZ16,
  author       = {Qiang Rao and
                  Jianjun Wang and
                  Liming Zhang},
  title        = {Enhancing Source Camera Identification Based on Multiplicative Denoising
                  Filter},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {983--988},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0165},
  doi          = {10.1109/TRUSTCOM.2016.0165},
  timestamp    = {Tue, 14 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RaoWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RenJZLW16,
  author       = {Yongjian Ren and
                  Dailiang Jin and
                  Dongyu Zheng and
                  Lei Liu and
                  Xinjing Wei},
  title        = {An Analytical Model of Data Plane Performance Subject to Prioritized
                  Service},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1537--1542},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0239},
  doi          = {10.1109/TRUSTCOM.2016.0239},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RenJZLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RongWLWX16,
  author       = {Hong Rong and
                  Huimei Wang and
                  Jian Liu and
                  Wei Wu and
                  Ming Xian},
  title        = {Efficient Integrity Verification of Secure Outsourced kNN Computation
                  in Cloud Environments},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {236--243},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0069},
  doi          = {10.1109/TRUSTCOM.2016.0069},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RongWLWX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SaadaouiSB16,
  author       = {Amina Saadaoui and
                  Nihel Ben Youssef Ben Souayeh and
                  Adel Bouhoula},
  title        = {An Accurate FDD-Based Approach for Discovering Distributed Firewalls
                  Misconfigurations},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {552--559},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0109},
  doi          = {10.1109/TRUSTCOM.2016.0109},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SaadaouiSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SangL0X16,
  author       = {Yafei Sang and
                  Shicong Li and
                  Yongzheng Zhang and
                  Tao Xu},
  title        = {ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning
                  via Byte Embedding},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {284--291},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0075},
  doi          = {10.1109/TRUSTCOM.2016.0075},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SangL0X16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SarantinosBAA16,
  author       = {Nikolaos Sarantinos and
                  Chafika Benzaid and
                  Omar Arabiat and
                  Ameer Al{-}Nemrat},
  title        = {Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in
                  Identifying Similarities},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1782--1787},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0274},
  doi          = {10.1109/TRUSTCOM.2016.0274},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SarantinosBAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SasagawaOK16,
  author       = {Takashi Sasagawa and
                  Satoshi Ohzahata and
                  Toshihiko Kato},
  title        = {Suppressing Selfish Transmissions with Extending {NAV} Period and
                  Resetting {CW} of Access Point in Wireless {LAN}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1910--1916},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0292},
  doi          = {10.1109/TRUSTCOM.2016.0292},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SasagawaOK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ScoonK16,
  author       = {Craig Scoon and
                  Ryan K. L. Ko},
  title        = {The Data Privacy Matrix Project: Towards a Global Alignment of Data
                  Privacy Laws},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1998--2005},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0305},
  doi          = {10.1109/TRUSTCOM.2016.0305},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ScoonK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Serrano-PerezSC16,
  author       = {Jos{\'{e}} de Jes{\'{u}}s Serrano{-}P{\'{e}}rez and
                  Mois{\'{e}}s Salinas{-}Rosales and
                  Nareli Cruz Cort{\'{e}}s},
  title        = {Universal Steganography Detector Based on an Artificial Immune System
                  for {JPEG} Images},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1896--1903},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0290},
  doi          = {10.1109/TRUSTCOM.2016.0290},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Serrano-PerezSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShenXWG16,
  author       = {Chao Shen and
                  Haodi Xu and
                  Haijun Wang and
                  Xiaohong Guan},
  title        = {Handedness Recognition through Keystroke-Typing Behavior in Computer
                  Forensics Analysis},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1054--1060},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0175},
  doi          = {10.1109/TRUSTCOM.2016.0175},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShenXWG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShenZ16,
  author       = {Tong Shen and
                  Dafang Zhang},
  title        = {Rule Selector: {A} Novel Scalable Model for High-Performance Flow
                  Recognition},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1121--1128},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0184},
  doi          = {10.1109/TRUSTCOM.2016.0184},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShenZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShengGCWG16,
  author       = {Long Sheng and
                  Xiaoyun Guang and
                  Feng Chen and
                  Hui Wang and
                  Kang Gao},
  title        = {A Review on Complex Network Dynamics in Evolutionary Algorithm},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2221--2226},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0342},
  doi          = {10.1109/TRUSTCOM.2016.0342},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShengGCWG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShepherdAGLMASC16,
  author       = {Carlton Shepherd and
                  Ghada Arfaoui and
                  Iakovos Gurulian and
                  Robert P. Lee and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Damien Sauveron and
                  Emmanuel Conchon},
  title        = {Secure and Trusted Execution: Past, Present, and Future - {A} Critical
                  Review in the Context of the Internet of Things and Cyber-Physical
                  Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {168--177},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0060},
  doi          = {10.1109/TRUSTCOM.2016.0060},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShepherdAGLMASC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShinoharaKSS16,
  author       = {Ryoki Shinohara and
                  Takashi Kamimoto and
                  Kazuya Sato and
                  Hiroshi Shigeno},
  title        = {Cache Control Method Mitigating Packet Concentration of Router Caused
                  by Interest Flooding Attack},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {324--331},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0080},
  doi          = {10.1109/TRUSTCOM.2016.0080},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShinoharaKSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShuGDYH16,
  author       = {Peng Shu and
                  Rong Gu and
                  Qianhao Dong and
                  Chunfeng Yuan and
                  Yihua Huang},
  title        = {Accelerating Big Data Applications on Tiered Storage System with Various
                  Eviction Policies},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1350--1357},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0214},
  doi          = {10.1109/TRUSTCOM.2016.0214},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShuGDYH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShuLLL16,
  author       = {Jian Shu and
                  Weijie Lin and
                  Linlan Liu and
                  Xuyan Luo},
  title        = {Topology Prediction Mechanism for Pocket Switched Network Based on
                  Deep Belief Network},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1811--1817},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0278},
  doi          = {10.1109/TRUSTCOM.2016.0278},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShuLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SignorelloPG16,
  author       = {Salvatore Signorello and
                  Maria Rita Palattella and
                  Luigi Alfredo Grieco},
  title        = {Security Challenges in Future NDN-Enabled VANETs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1771--1775},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0272},
  doi          = {10.1109/TRUSTCOM.2016.0272},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SignorelloPG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SilvaMPL16,
  author       = {Jo{\~{a}}o A. Silva and
                  Ricardo Monteiro and
                  Herv{\'{e}} Paulino and
                  Jo{\~{a}}o M. Louren{\c{c}}o},
  title        = {Ephemeral Data Storage for Networks of Hand-Held Devices},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1106--1113},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0182},
  doi          = {10.1109/TRUSTCOM.2016.0182},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SilvaMPL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Stricot-Tarboton16,
  author       = {Shaun Stricot{-}Tarboton and
                  Sivadon Chaisiri and
                  Ryan K. L. Ko},
  title        = {Taxonomy of Man-in-the-Middle Attacks on {HTTPS}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {527--534},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0106},
  doi          = {10.1109/TRUSTCOM.2016.0106},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Stricot-Tarboton16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuFYS16,
  author       = {Mang Su and
                  Anmin Fu and
                  Yan Yu and
                  Guozhen Shi},
  title        = {Resource-centric Dynamic Access Control in Cloud},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1957--1962},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0299},
  doi          = {10.1109/TRUSTCOM.2016.0299},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuFYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuWWL16,
  author       = {Dan Su and
                  Wei Wang and
                  Xing Wang and
                  Jiqiang Liu},
  title        = {Anomadroid: Profiling Android Applications' Behaviors for Identifying
                  Unknown Malapps},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {691--698},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0127},
  doi          = {10.1109/TRUSTCOM.2016.0127},
  timestamp    = {Wed, 11 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuWWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuZLZ16,
  author       = {Xin Su and
                  Dafang Zhang and
                  Wenjia Li and
                  Kai Zhao},
  title        = {A Deep Learning Approach to Android Malware Feature Learning and Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {244--251},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0070},
  doi          = {10.1109/TRUSTCOM.2016.0070},
  timestamp    = {Tue, 24 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuZLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunLLL16,
  author       = {Yujie Sun and
                  Weijiang Liu and
                  Zhaobin Liu and
                  Chao Liu},
  title        = {Comparison of Five Packet-Sampling-Based Methods for Detecting Elephant
                  Flows},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2018--2023},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0308},
  doi          = {10.1109/TRUSTCOM.2016.0308},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunSDZH16,
  author       = {Degang Sun and
                  Jun Shi and
                  Xuejie Ding and
                  Meng Zhang and
                  Wei{-}qing Huang},
  title        = {Method for Detecting Information Leakage from Computer Display in
                  Electromagnetic Radiation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2041--2046},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0312},
  doi          = {10.1109/TRUSTCOM.2016.0312},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunSDZH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunSLW16,
  author       = {Qian Sun and
                  Qingni Shen and
                  Cong Li and
                  Zhonghai Wu},
  title        = {SeLance: Secure Load Balancing of Virtual Machines in Cloud},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {662--669},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0123},
  doi          = {10.1109/TRUSTCOM.2016.0123},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunSLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunSZC16,
  author       = {Shibin Sun and
                  Yuliang Shi and
                  Shidong Zhang and
                  Lizhen Cui},
  title        = {A Privacy Protection Mechanism for NoSql Database Based on Data Chunks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {829--836},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0145},
  doi          = {10.1109/TRUSTCOM.2016.0145},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunSZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TanY16,
  author       = {Yujuan Tan and
                  Zhichao Yan},
  title        = {Multi-objective Based Performance Evaluation of Deduplication Approaches},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1137--1144},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0186},
  doi          = {10.1109/TRUSTCOM.2016.0186},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TanY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangLJW16,
  author       = {Hongyan Tang and
                  Ying Li and
                  Tong Jia and
                  Zhonghai Wu},
  title        = {Evaluating Performance of Rescheduling Strategies in Cloud System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1559--1566},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0242},
  doi          = {10.1109/TRUSTCOM.2016.0242},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangLJW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TaubmannRR16,
  author       = {Benjamin Taubmann and
                  No{\"{e}}lle Rakotondravony and
                  Hans P. Reiser},
  title        = {CloudPhylactor: Harnessing Mandatory Access Control for Virtual Machine
                  Introspection in Cloud Data Centers},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {957--964},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0162},
  doi          = {10.1109/TRUSTCOM.2016.0162},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TaubmannRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TengCSB16,
  author       = {Yiping Teng and
                  Xiang Cheng and
                  Sen Su and
                  Rong Bi},
  title        = {Privacy-Preserving Top-k Nearest Keyword Search on Outsourced Graphs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {815--822},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0143},
  doi          = {10.1109/TRUSTCOM.2016.0143},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TengCSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TianQDL16,
  author       = {Jianbang Tian and
                  Zhuzhong Qian and
                  Mianxiong Dong and
                  Sanglu Lu},
  title        = {FairShare: Dynamic Max-Min Fairness Bandwidth Allocation in Datacenters},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1463--1470},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0229},
  doi          = {10.1109/TRUSTCOM.2016.0229},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TianQDL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TouatiHC16,
  author       = {Lyes Touati and
                  Hamed Hellaoui and
                  Yacine Challal},
  title        = {Threshold Yoking/Grouping Proofs Based on {CP-ABE} for IoT Applications},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {568--575},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0111},
  doi          = {10.1109/TRUSTCOM.2016.0111},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TouatiHC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TrojaB16,
  author       = {Erald Troja and
                  Spiridon Bakiras},
  title        = {Privacy-Preserving Location-Aware Mobile Advertisement},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {783--790},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0139},
  doi          = {10.1109/TRUSTCOM.2016.0139},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TrojaB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Tse16,
  author       = {Savio S. H. Tse},
  title        = {Bicriteria Load Balancing for Online Placement in Heterogeneous Servers
                  with Extreme Upper Bounds},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1319--1326},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0210},
  doi          = {10.1109/TRUSTCOM.2016.0210},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Tse16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TseWL16,
  author       = {Daniel Tse and
                  Lu Wang and
                  Yuxi Li},
  title        = {Mobility Management for Enterprises in {BYOD} Deployment},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {638--645},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0120},
  doi          = {10.1109/TRUSTCOM.2016.0120},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TseWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/UsmanJHN16,
  author       = {Muhammad Usman and
                  Mian Ahmad Jan and
                  Xiangjian He and
                  Priyadarsi Nanda},
  title        = {Data Sharing in Secure Multimedia Wireless Sensor Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {590--597},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0114},
  doi          = {10.1109/TRUSTCOM.2016.0114},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/UsmanJHN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangALLH16,
  author       = {Yaobin Wang and
                  Hong An and
                  Zhiqin Liu and
                  Ling Li and
                  Jun Huang},
  title        = {A Flexible Chip Multiprocessor Simulator Dedicated for Thread Level
                  Speculation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2127--2132},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0327},
  doi          = {10.1109/TRUSTCOM.2016.0327},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangALLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangCCZLW16,
  author       = {Hui Wang and
                  Xiaohe Chen and
                  Xinjian Chen and
                  Peilin Zang and
                  Yunqing Liu and
                  Lirong Wang},
  title        = {Fall Detection Based on {KPCA} and 3D {KPCA}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2187--2191},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0336},
  doi          = {10.1109/TRUSTCOM.2016.0336},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangCCZLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangJMH16,
  author       = {Ying Wang and
                  Yang Ju and
                  Tiantian Miao and
                  Rongxi He},
  title        = {Chunk-Based Resource Allocation with Fairness Consideration for Layered
                  Multicast Streaming in {OFDMA} Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2047--2051},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0313},
  doi          = {10.1109/TRUSTCOM.2016.0313},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangJMH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLDQ16,
  author       = {Jun Wang and
                  Zhiyang Li and
                  Yegang Du and
                  Wenyu Qu},
  title        = {Stacked Product Quantization for Nearest Neighbor Search on Large
                  Datasets},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1621--1627},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0250},
  doi          = {10.1109/TRUSTCOM.2016.0250},
  timestamp    = {Tue, 10 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLDQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLGQM16,
  author       = {Yuwei Wang and
                  Min Liu and
                  Bo Gao and
                  Chenchong Qin and
                  Cheng Ma},
  title        = {{I/O} Congestion-Aware Computing Resource Assignment and Scheduling
                  in Virtualized Cloud Environments},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1280--1287},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0205},
  doi          = {10.1109/TRUSTCOM.2016.0205},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLGQM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLLWC16,
  author       = {Shiqing Wang and
                  Yuanyuan Li and
                  Zhiyang Li and
                  Junfeng Wu and
                  Fengjuan Chen},
  title        = {Surveillance Methods of Running Condition of Chemical Equipments Based
                  on Skyline},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2246--2250},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0346},
  doi          = {10.1109/TRUSTCOM.2016.0346},
  timestamp    = {Mon, 28 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLLWC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLZX16,
  author       = {Changhai Wang and
                  Meng Li and
                  Jianzhong Zhang and
                  Yuwei Xu},
  title        = {A Model with Hierarchical Classifiers for Activity Recognition on
                  Mobile Devices},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1295--1301},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0207},
  doi          = {10.1109/TRUSTCOM.2016.0207},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangSSL16,
  author       = {Bo Wang and
                  Ying Song and
                  Yuzhong Sun and
                  Jun Liu},
  title        = {Improvements to Online Distributed Monitoring Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1093--1100},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0180},
  doi          = {10.1109/TRUSTCOM.2016.0180},
  timestamp    = {Fri, 10 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangSSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangSZ16,
  author       = {Shu{-}Yan Wang and
                  Jia{-}Ze Sun and
                  Ju Zhang},
  title        = {The Method of Generating Web Link Security Testing Scenario Based
                  on {UML} Diagram},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1831--1838},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0281},
  doi          = {10.1109/TRUSTCOM.2016.0281},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangW16,
  author       = {Jiequn Wang and
                  Lei Wang},
  title        = {A Novel Solution of Data Analysis in Modern Sports Education},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2269--2272},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0350},
  doi          = {10.1109/TRUSTCOM.2016.0350},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWCZ16,
  author       = {Yan Wang and
                  Lirong Wang and
                  Xiaohe Chen and
                  Wenliang Zhu},
  title        = {P Wave Detection and Delineation Based on Distances Transform},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2197--2201},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0338},
  doi          = {10.1109/TRUSTCOM.2016.0338},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWGM16,
  author       = {Liang Wang and
                  Weiping Wang and
                  Jingzi Gu and
                  Dan Meng},
  title        = {Delta-Generalization: High Accuracy Data Release for Privacy Preserving},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1861--1866},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0285},
  doi          = {10.1109/TRUSTCOM.2016.0285},
  timestamp    = {Thu, 13 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWHW16,
  author       = {Xueyi Wang and
                  Xingwei Wang and
                  Min Huang and
                  Zun Wang},
  title        = {Combinatorial Reverse Auction-Based Service Provision in Social Clouds},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2097--2102},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0322},
  doi          = {10.1109/TRUSTCOM.2016.0322},
  timestamp    = {Mon, 04 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangXHXH16,
  author       = {Caimei Wang and
                  Yan Xiong and
                  Wenchao Huang and
                  Huihua Xia and
                  Jianmeng Huang},
  title        = {Formal Analysis of Selective Disclosure Attribute-Based Credential
                  System in Applied Pi Calculus},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {42--49},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0044},
  doi          = {10.1109/TRUSTCOM.2016.0044},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangXHXH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangXZY16,
  author       = {Changhai Wang and
                  Yuwei Xu and
                  Jianzhong Zhang and
                  Wenping Yu},
  title        = {{SW-HMM:} {A} Method for Evaluating Confidence of Smartphone-Based
                  Activity Recognition},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2086--2091},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0320},
  doi          = {10.1109/TRUSTCOM.2016.0320},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangXZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangYHXLS16,
  author       = {Jie Wang and
                  Ce Yu and
                  Zhi Hong and
                  Jian Xiao and
                  Chen Li and
                  Jizhou Sun},
  title        = {Pattern Aware Cache Management for Efficient Subset Retrieving of
                  Astronomical Image Data},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1396--1403},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0220},
  doi          = {10.1109/TRUSTCOM.2016.0220},
  timestamp    = {Wed, 21 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangYHXLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangYTZH16,
  author       = {Xiaolei Wang and
                  Yuexiang Yang and
                  Chuan Tang and
                  Yingzhi Zeng and
                  Jie He},
  title        = {DroidContext: Identifying Malicious Mobile Privacy Leak Using Context},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {807--814},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0142},
  doi          = {10.1109/TRUSTCOM.2016.0142},
  timestamp    = {Tue, 20 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangYTZH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangYZLZ16,
  author       = {Ziyu Wang and
                  Jiahai Yang and
                  Shize Zhang and
                  Chenxi Li and
                  Hui Zhang},
  title        = {Automatic Model Selection for Anomaly Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {276--283},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0074},
  doi          = {10.1109/TRUSTCOM.2016.0074},
  timestamp    = {Sat, 20 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangYZLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZLW16,
  author       = {Shijia Wang and
                  Liang Zhou and
                  Yuanyuan Li and
                  Junfeng Wu},
  title        = {Parallel Monte Carlo Method with MapReduce for Option Pricing},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2116--2121},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0325},
  doi          = {10.1109/TRUSTCOM.2016.0325},
  timestamp    = {Mon, 28 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZWY16,
  author       = {Yu Wang and
                  Yuqing Zhang and
                  Kai Wang and
                  Jingbo Yan},
  title        = {Security Analysis and Vulnerability Detection of Gesture-Based Lock
                  in Android Applications},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {410--417},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0091},
  doi          = {10.1109/TRUSTCOM.2016.0091},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WeiJZZX16,
  author       = {Xiaochao Wei and
                  Han Jiang and
                  Chuan Zhao and
                  Minghao Zhao and
                  Qiuliang Xu},
  title        = {Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {418--425},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0092},
  doi          = {10.1109/TRUSTCOM.2016.0092},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WeiJZZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WeiPYLWM16,
  author       = {Yi Wei and
                  Li Pan and
                  Dong Yuan and
                  Shijun Liu and
                  Lei Wu and
                  Xiangxu Meng},
  title        = {A Distributed Game-Theoretic Approach for IaaS Service Trading in
                  an Auction-Based Cloud Market},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1543--1550},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0240},
  doi          = {10.1109/TRUSTCOM.2016.0240},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WeiPYLWM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WenDZJ16,
  author       = {Zilong Wen and
                  Weiqi Dai and
                  Deqing Zou and
                  Hai Jin},
  title        = {PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing
                  Infrastructures},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {683--690},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0126},
  doi          = {10.1109/TRUSTCOM.2016.0126},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WenDZJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WenY16,
  author       = {Juping Wen and
                  QingDan Yuan},
  title        = {Social Circles Discovery Based on Structural and Attribute Similarities},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1652--1659},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0254},
  doi          = {10.1109/TRUSTCOM.2016.0254},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WenY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WengL16,
  author       = {Wu{-}Xiang Weng and
                  Shou{-}Chih Lo},
  title        = {Fall Detection Based on Tilt Angle and Acceleration Variations},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1712--1717},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0262},
  doi          = {10.1109/TRUSTCOM.2016.0262},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WengL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WengLL16,
  author       = {Xu Weng and
                  Zhaobin Liu and
                  Zhiyang Li},
  title        = {An Efficient Influence Maximization Algorithm Considering Both Positive
                  and Negative Relationships},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1931--1936},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0295},
  doi          = {10.1109/TRUSTCOM.2016.0295},
  timestamp    = {Wed, 11 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WengLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WillKW16,
  author       = {Mark A. Will and
                  Ryan K. L. Ko and
                  Ian H. Witten},
  title        = {Privacy Preserving Computation by Fragmenting Individual Bits and
                  Distributing Gates},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {900--908},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0154},
  doi          = {10.1109/TRUSTCOM.2016.0154},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WillKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuHWX16,
  author       = {Genqiang Wu and
                  Yeping He and
                  JingZheng Wu and
                  Xianyao Xia},
  title        = {Inherit Differential Privacy in Distributed Setting: Multiparty Randomized
                  Function Computation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {921--928},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0157},
  doi          = {10.1109/TRUSTCOM.2016.0157},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuHWX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuHYSSZ16,
  author       = {Renke Wu and
                  Linpeng Huang and
                  Peng Yu and
                  Kai Shen and
                  Qiuwei Shi and
                  Haojie Zhou},
  title        = {Meta-Model Evolution with Self-Adaptation: An Empirical Development
                  Approach for Distributed Parallel Computing Framework},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2227--2234},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0343},
  doi          = {10.1109/TRUSTCOM.2016.0343},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuHYSSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuLLJ16,
  author       = {Jigang Wu and
                  Ningjing Liu and
                  Siew Kei Lam and
                  Guiyuan Jiang},
  title        = {Shortest Partial Path First Algorithm for Reconfigurable Processor
                  Array with Faults},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1198--1203},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0194},
  doi          = {10.1109/TRUSTCOM.2016.0194},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuLLJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuLWHL16,
  author       = {Jain{-}Shing Wu and
                  Yuh{-}Jye Lee and
                  Te{-}En Wei and
                  Chih{-}Hung Hsieh and
                  Chia{-}Min Lai},
  title        = {ChainSpot: Mining Service Logs for Cyber Security Threat Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1867--1874},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0286},
  doi          = {10.1109/TRUSTCOM.2016.0286},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuLWHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuWQJLXS16,
  author       = {Junfeng Wu and
                  Yitong Wan and
                  Wenyu Qu and
                  Changqing Ji and
                  Yuanyuan Li and
                  Peng Xiao and
                  Jianwei Sun},
  title        = {A Novel Image Retrieval Approach with Bag-of-Word Model and Gabor
                  Feature},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1706--1711},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0261},
  doi          = {10.1109/TRUSTCOM.2016.0261},
  timestamp    = {Mon, 28 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuWQJLXS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuXCZ16,
  author       = {Danye Wu and
                  Zhiwei Xu and
                  Bo Chen and
                  Yujun Zhang},
  title        = {What If Routers Are Malicious? Mitigating Content Poisoning Attack
                  in {NDN}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {481--488},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0100},
  doi          = {10.1109/TRUSTCOM.2016.0100},
  timestamp    = {Fri, 15 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuXCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuZL0W16,
  author       = {Huijun Wu and
                  Liming Zhu and
                  Kai Lu and
                  Gen Li and
                  Dongyao Wu},
  title        = {StageFS: {A} Parallel File System Optimizing Metadata Performance
                  for {SSD} Based Clusters},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2147--2152},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0330},
  doi          = {10.1109/TRUSTCOM.2016.0330},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuZL0W16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaWP16,
  author       = {Hui Xia and
                  Guodong Wang and
                  Zhenkuan Pan},
  title        = {Node Trust Prediction Framework in Mobile Ad Hoc Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {50--56},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0045},
  doi          = {10.1109/TRUSTCOM.2016.0045},
  timestamp    = {Fri, 06 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoAC16,
  author       = {Hannan Xiao and
                  Awatif Ali Alshehri and
                  Bruce Christianson},
  title        = {A Cloud-Based {RFID} Authentication Protocol with Insecure Communication
                  Channels},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {332--339},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0081},
  doi          = {10.1109/TRUSTCOM.2016.0081},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoAC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoCCWLWB16,
  author       = {Yajuan Xiao and
                  Shoufeng Cao and
                  Zhenzhong Cao and
                  Fengyu Wang and
                  Fengbo Lin and
                  Jiayan Wu and
                  Hancheng Bi},
  title        = {Matching Similar Functions in Different Versions of a Malware},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {252--259},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0071},
  doi          = {10.1109/TRUSTCOM.2016.0071},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoCCWLWB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoLQQY16,
  author       = {Peng Xiao and
                  Zhiyang Li and
                  Heng Qi and
                  Wenyu Qu and
                  Haisheng Yu},
  title        = {An Efficient DDoS Detection with Bloom Filter in {SDN}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0038},
  doi          = {10.1109/TRUSTCOM.2016.0038},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoLQQY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoWJM16,
  author       = {Peipei Xiao and
                  Yufeng Wang and
                  Qun Jin and
                  Jianhua Ma},
  title        = {A Privacy-Preserving Incentive Scheme for Advertisement Dissemination
                  in Vehicular Social Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1741--1746},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0267},
  doi          = {10.1109/TRUSTCOM.2016.0267},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoWJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoXLL16,
  author       = {Xiongren Xiao and
                  Guoqi Xie and
                  Renfa Li and
                  Keqin Li},
  title        = {Minimizing Schedule Length of Energy Consumption Constrained Parallel
                  Applications on Heterogeneous Distributed Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1471--1476},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0230},
  doi          = {10.1109/TRUSTCOM.2016.0230},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoXLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XieWL16,
  author       = {Yuanyuan Xie and
                  Jiang Wu and
                  Fengzhu Liu},
  title        = {A Hierarchic Hybrid Scheduling Algorithm for Static Task with Precedence
                  Constraints},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2079--2085},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0319},
  doi          = {10.1109/TRUSTCOM.2016.0319},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XieWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XieZLLG16,
  author       = {Tianyi Xie and
                  Yuanyuan Zhang and
                  Juanru Li and
                  Hui Liu and
                  Dawu Gu},
  title        = {New Exploit Methods against Ptmalloc of {GLIBC}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {646--653},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0121},
  doi          = {10.1109/TRUSTCOM.2016.0121},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XieZLLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuCCSZ16,
  author       = {Youjun Xu and
                  Xianglan Chen and
                  Zhinan Cheng and
                  Jiachen Song and
                  Yuxiang Zhang},
  title        = {Improving Energy Efficiency by Phase-Grained Migration for Asymmetric
                  Multicore},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1412--1419},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0222},
  doi          = {10.1109/TRUSTCOM.2016.0222},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuCCSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuFGSPSY16,
  author       = {Jingheng Xu and
                  Haohuan Fu and
                  Lin Gan and
                  Yu Song and
                  Hongbo Peng and
                  Wen Shi and
                  Guangwen Yang},
  title        = {Evaluating the {POWER8} Architecture through Optimizing Stencil-Based
                  Algorithms},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1374--1381},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0217},
  doi          = {10.1109/TRUSTCOM.2016.0217},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuFGSPSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuH16,
  author       = {Yuanchao Xu and
                  Zeyi Hou},
  title        = {NVM-Assisted Non-redundant Logging for Android Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1427--1433},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0224},
  doi          = {10.1109/TRUSTCOM.2016.0224},
  timestamp    = {Wed, 05 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuHYL16,
  author       = {Wen Xu and
                  Jiangqiang Hu and
                  Jianchuan Yin and
                  Ke Li},
  title        = {Ship Automatic Collision Avoidance by Altering Course Based on Ship
                  Dynamic Domain},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2024--2030},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0309},
  doi          = {10.1109/TRUSTCOM.2016.0309},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuHYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuLLQ16,
  author       = {Renhai Xu and
                  Wenxin Li and
                  Keqiu Li and
                  Heng Qi},
  title        = {Towards Application-Aware In-Network Bandwidth Management in Data
                  Centers},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2206--2212},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0340},
  doi          = {10.1109/TRUSTCOM.2016.0340},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuLLQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuLNCZ16,
  author       = {Shibo Xu and
                  Qingzhou Li and
                  Peng Ni and
                  Wensheng Cao and
                  Xianfeng Zhao},
  title        = {The Application of Ad-Hoc Network in Smart Container Tracking System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2068--2072},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0317},
  doi          = {10.1109/TRUSTCOM.2016.0317},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuLNCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuWLS16,
  author       = {Yemao Xu and
                  Jialong Wang and
                  Yanhong Liu and
                  Li Shen},
  title        = {Fast Task Submission in Software Thread Level Speculation Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2160--2166},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0332},
  doi          = {10.1109/TRUSTCOM.2016.0332},
  timestamp    = {Thu, 03 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuWLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuZY16,
  author       = {Zhikai Xu and
                  Hongli Zhang and
                  Xiang{-}Zhan Yu},
  title        = {Multiple Mix-Zones Deployment for Continuous Location Privacy Protection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {760--766},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0136},
  doi          = {10.1109/TRUSTCOM.2016.0136},
  timestamp    = {Sun, 19 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XueHZ16,
  author       = {Nian Xue and
                  Xin Huang and
                  Jie Zhang},
  title        = {S2Net: {A} Security Framework for Software Defined Intelligent Building
                  Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {654--661},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0122},
  doi          = {10.1109/TRUSTCOM.2016.0122},
  timestamp    = {Sat, 12 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XueHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangCWGX16,
  author       = {Liu Yang and
                  Xingmin Cui and
                  Changyuan Wang and
                  Shanqing Guo and
                  Xin{-}Shun Xu},
  title        = {Risk Analysis of Exposed Methods to JavaScript in Hybrid Apps},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {458--464},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0097},
  doi          = {10.1109/TRUSTCOM.2016.0097},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangCWGX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangHLYY16,
  author       = {Xinyu Yang and
                  Xiaofei He and
                  Jie Lin and
                  Wei Yu and
                  Qingyu Yang},
  title        = {A Game-Theoretic Model on Coalitional Attacks in Smart Grid},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {435--442},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0094},
  doi          = {10.1109/TRUSTCOM.2016.0094},
  timestamp    = {Tue, 14 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangHLYY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangJXHWZC16,
  author       = {Xiaoyan Yang and
                  Han Jiang and
                  Qiuliang Xu and
                  Mengbo Hou and
                  Xiaochao Wei and
                  Minghao Zhao and
                  Kim{-}Kwang Raymond Choo},
  title        = {A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated
                  Key Exchange Protocol},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {670--677},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0124},
  doi          = {10.1109/TRUSTCOM.2016.0124},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangJXHWZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangLLH16,
  author       = {Xu Yang and
                  Ting{-}Ting Lee and
                  Joseph K. Liu and
                  Xinyi Huang},
  title        = {Trust Enhancement over Range Search for Encrypted Data},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {66--73},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0047},
  doi          = {10.1109/TRUSTCOM.2016.0047},
  timestamp    = {Wed, 17 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangLLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangSYW16,
  author       = {Yan Yang and
                  Xingang Shi and
                  Xia Yin and
                  Zhiliang Wang},
  title        = {The Power of Prefix Hijackings in the Internet Hierarchy},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {228--235},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0068},
  doi          = {10.1109/TRUSTCOM.2016.0068},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangSYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangZLZ16,
  author       = {Xu Yang and
                  Yuexin Zhang and
                  Joseph K. Liu and
                  YaLi Zeng},
  title        = {A Trust and Privacy Preserving Handover Authentication Protocol for
                  Wireless Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {138--143},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0056},
  doi          = {10.1109/TRUSTCOM.2016.0056},
  timestamp    = {Tue, 30 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangZLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YiMLYW16,
  author       = {Zibo Yi and
                  Jun Ma and
                  Lei Luo and
                  Jie Yu and
                  Qingbo Wu},
  title        = {Improving JavaScript Malware Classifier's Security against Evasion
                  by Particle Swarm Optimization},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1734--1740},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0266},
  doi          = {10.1109/TRUSTCOM.2016.0266},
  timestamp    = {Wed, 22 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YiMLYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Yin0L16,
  author       = {Tao Yin and
                  Yongzheng Zhang and
                  Jia Li},
  title        = {AppBot: {A} Novel {P2P} Botnet Architecture Resistant to Graph-Based
                  Tracking},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {615--622},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0117},
  doi          = {10.1109/TRUSTCOM.2016.0117},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Yin0L16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuCZ16,
  author       = {Fajiang Yu and
                  Lie Chen and
                  Huanguo Zhang},
  title        = {Virtual {TPM} Dynamic Trust Extension Suitable for Frequent Migrations},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {57--65},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0046},
  doi          = {10.1109/TRUSTCOM.2016.0046},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuSWR16,
  author       = {Fangwen Yu and
                  Ming Su and
                  Gang Wang and
                  Mingming Ren},
  title        = {Error Decomposition Algorithm for Approximating the k-Error Linear
                  Complexity of Periodic Sequences},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {505--510},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0103},
  doi          = {10.1109/TRUSTCOM.2016.0103},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuSWR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZengLXZ16,
  author       = {Fanzi Zeng and
                  Jie Li and
                  Jisheng Xu and
                  Jing Zhong},
  title        = {A Trust-Based Cooperative Spectrum Sensing Scheme against {SSDF} Attack
                  in CRNs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1167--1173},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0190},
  doi          = {10.1109/TRUSTCOM.2016.0190},
  timestamp    = {Fri, 10 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZengLXZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZengWWCLW16,
  author       = {Juru Zeng and
                  Yuncheng Wu and
                  Yao Wu and
                  Hong Chen and
                  Cuiping Li and
                  Shan Wang},
  title        = {Energy-Efficient and Privacy-Preserving Range Query in Participatory
                  Sensing},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {876--883},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0151},
  doi          = {10.1109/TRUSTCOM.2016.0151},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZengWWCLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhang0QWL16,
  author       = {Wei Zhang and
                  Sheng Zhang and
                  Zhuzhong Qian and
                  Kaiyuan Wen and
                  Sanglu Lu},
  title        = {Virtual Network Deployment in Hybrid Data Center Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1256--1263},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0202},
  doi          = {10.1109/TRUSTCOM.2016.0202},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhang0QWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhang16,
  author       = {Jiliang Zhang},
  title        = {Combinational Logic Binding for {FPGA} System Security},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {216--223},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0066},
  doi          = {10.1109/TRUSTCOM.2016.0066},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhang16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangC16,
  author       = {Huirong Zhang and
                  Jianwen Cao},
  title        = {A Subgraph Preconditioning Algorithm for Large Linear Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2153--2159},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0331},
  doi          = {10.1109/TRUSTCOM.2016.0331},
  timestamp    = {Tue, 11 Feb 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangFCYZ16,
  author       = {Zheng Zhang and
                  Dan Feng and
                  Jianxi Chen and
                  Ya Yu and
                  Jing Zeng},
  title        = {The Design and Implementation of a Lightweight Management Framework
                  for Non-volatile Memory},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1551--1558},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0241},
  doi          = {10.1109/TRUSTCOM.2016.0241},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangFCYZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangHMYJ16,
  author       = {Yunan Zhang and
                  Qingjia Huang and
                  Xinjian Ma and
                  Zeming Yang and
                  Jianguo Jiang},
  title        = {Using Multi-features and Ensemble Learning Method for Imbalanced Malware
                  Classification},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {965--973},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0163},
  doi          = {10.1109/TRUSTCOM.2016.0163},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangHMYJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangJ016,
  author       = {Qian Zhang and
                  Ying Jiang and
                  Peng Wu},
  title        = {Modelling and Analysis of Network Security - An Algebraic Approach},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {308--315},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0078},
  doi          = {10.1109/TRUSTCOM.2016.0078},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangJ016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLHZ16,
  author       = {Jian Zhang and
                  Pin Liu and
                  Jianbiao He and
                  Yawei Zhang},
  title        = {A Hadoop Based Analysis and Detection Model for {IP} Spoofing Typed
                  DDoS Attack},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1976--1983},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0302},
  doi          = {10.1109/TRUSTCOM.2016.0302},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLLXC16,
  author       = {Shuai Zhang and
                  Lei Liu and
                  Hui Li and
                  Zongshui Xiao and
                  Lizhen Cui},
  title        = {MTPGraph: {A} Data-Driven Approach to Predict Medical Risk Based on
                  Temporal Profile Graph},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1174--1181},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0191},
  doi          = {10.1109/TRUSTCOM.2016.0191},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLLXC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLMC16,
  author       = {Puheng Zhang and
                  Chuang Lin and
                  Kun Meng and
                  Ying Chen},
  title        = {A Comprehensive Optimization for Performance, Energy Efficiency, and
                  Maintenance in Cloud Datacenters},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1264--1271},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0203},
  doi          = {10.1109/TRUSTCOM.2016.0203},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLW16,
  author       = {Shaobo Zhang and
                  Qin Liu and
                  Guojun Wang},
  title        = {Enhancing Location Privacy through User-Defined Grid in Location-Based
                  Services},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {730--736},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0132},
  doi          = {10.1109/TRUSTCOM.2016.0132},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLY16,
  author       = {Yong Zhang and
                  Bo Liu and
                  Fan Yang},
  title        = {Differential Evolution Based Selective Ensemble of Extreme Learning
                  Machine},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1327--1333},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0211},
  doi          = {10.1109/TRUSTCOM.2016.0211},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLYSC16,
  author       = {Xinwen Zhang and
                  Huakang Li and
                  Yitao Yang and
                  Guozi Sun and
                  Guangxuan Chen},
  title        = {{LIPPS:} Logistics Information Privacy Protection System Based on
                  Encrypted {QR} Code},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {996--1000},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0167},
  doi          = {10.1109/TRUSTCOM.2016.0167},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLYSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLZ16,
  author       = {Jiexin Zhang and
                  Xiaoxue Liu and
                  Peidong Zhu},
  title        = {Securing Power System State Estimation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {699--706},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0128},
  doi          = {10.1109/TRUSTCOM.2016.0128},
  timestamp    = {Tue, 01 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangPWL16,
  author       = {Jianyi Zhang and
                  Yang Pan and
                  Zhiqiang Wang and
                  Biao Liu},
  title        = {{URL} Based Gateway Side Phishing Detection Method},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {268--275},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0073},
  doi          = {10.1109/TRUSTCOM.2016.0073},
  timestamp    = {Mon, 06 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangPWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangTTLS16,
  author       = {Heng Zhang and
                  Ahmed Taha and
                  Rub{\'{e}}n Trapero and
                  Jesus Luna and
                  Neeraj Suri},
  title        = {{SENTRY:} {A} Novel Approach for Mitigating Application Layer DDoS
                  Threats},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {465--472},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0098},
  doi          = {10.1109/TRUSTCOM.2016.0098},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangTTLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangXJJ16,
  author       = {Guozhu Zhang and
                  Luning Xia and
                  Shijie Jia and
                  Yafei Ji},
  title        = {Identification of Cloned {HF} {RFID} Proximity Cards Based on {RF}
                  Fingerprinting},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {292--300},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0076},
  doi          = {10.1109/TRUSTCOM.2016.0076},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangXJJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangXZZ16,
  author       = {Yang Zhang and
                  Zuocheng Xing and
                  Li Zhou and
                  Chunsheng Zhu},
  title        = {Locality Protected Dynamic Cache Allocation Scheme on GPUs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1524--1530},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0237},
  doi          = {10.1109/TRUSTCOM.2016.0237},
  timestamp    = {Mon, 10 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangXZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangZW16,
  author       = {Qijia Zhang and
                  Fangjin Zhu and
                  Canhui Wang},
  title        = {An Enhanced Node Mapping Algorithm for {VNE} Problem Based on Path
                  Relevance},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1204--1209},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0195},
  doi          = {10.1109/TRUSTCOM.2016.0195},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoY16,
  author       = {Jian Zhao and
                  Jianchuan Yin},
  title        = {Study on the Control of Fractional-Order {PID} for Underwater Vehicle
                  Attitude Angle},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2035--2040},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0311},
  doi          = {10.1109/TRUSTCOM.2016.0311},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoZ16,
  author       = {Huan Zhao and
                  Xixiang Zhang},
  title        = {A Mobile Security-Related Behavior Prevention Model Based on Speech
                  Personality Traits},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1803--1810},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0277},
  doi          = {10.1109/TRUSTCOM.2016.0277},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhengJHLW16,
  author       = {Dongyu Zheng and
                  Dailiang Jin and
                  Yuanzhe Hao and
                  Lei Liu and
                  Xinjing Wei},
  title        = {Prediction of Consecutive Road Node Congestion Based on Queueing Model},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1531--1536},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0238},
  doi          = {10.1109/TRUSTCOM.2016.0238},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhengJHLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhengYSM16,
  author       = {Xianyi Zheng and
                  Lulu Yang and
                  Gang Shi and
                  Dan Meng},
  title        = {Secure Mobile Payment Employing Trusted Computing on TrustZone Enabled
                  Platforms},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1944--1950},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0297},
  doi          = {10.1109/TRUSTCOM.2016.0297},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhengYSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouCSL16,
  author       = {Kailai Zhou and
                  Hong Chen and
                  Hui Sun and
                  Cuiping Li},
  title        = {A Skew-Insensitive Hashing Sync and Construction Scheme for Many-Core
                  Coprocessors},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1334--1341},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0212},
  doi          = {10.1109/TRUSTCOM.2016.0212},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouCSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouCZZ16,
  author       = {Tianqi Zhou and
                  Bing Chen and
                  Chunsheng Zhu and
                  Xiangping Zhai},
  title        = {{TPAHS:} {A} Truthful and Profit Maximizing Double Auction for Heterogeneous
                  Spectrums},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {27--33},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0042},
  doi          = {10.1109/TRUSTCOM.2016.0042},
  timestamp    = {Wed, 16 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouCZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouLLW16,
  author       = {Lei Zhou and
                  Xiaowei Liu and
                  Qin Liu and
                  Guojun Wang},
  title        = {A Cleanroom Monitoring System for Network Computing Service Based
                  on Remote Attestation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {451--457},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0096},
  doi          = {10.1109/TRUSTCOM.2016.0096},
  timestamp    = {Mon, 23 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouLLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouSWOA16,
  author       = {Xinping Zhou and
                  Degang Sun and
                  Zhu Wang and
                  Changhai Ou and
                  Juan Ai},
  title        = {Double-Key Recovery Based Correlation Power Analysis},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1016--1022},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0170},
  doi          = {10.1109/TRUSTCOM.2016.0170},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouSWOA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouSY16,
  author       = {Bo Zhou and
                  Qi Shi and
                  Po Yang},
  title        = {A Survey on Quantitative Evaluation of Web Service Security},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {715--721},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0130},
  doi          = {10.1109/TRUSTCOM.2016.0130},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouWQHL16,
  author       = {Xiuwen Zhou and
                  Qianhong Wu and
                  Bo Qin and
                  Xinyi Huang and
                  Jianwei Liu},
  title        = {Distributed Bitcoin Account Management},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {105--112},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0052},
  doi          = {10.1109/TRUSTCOM.2016.0052},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouWQHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouXGC16,
  author       = {Jiang Zhou and
                  Wei Xie and
                  Qiang Gu and
                  Yong Chen},
  title        = {Hierarchical Consistent Hashing for Heterogeneous Object-Based Storage},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1597--1604},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0247},
  doi          = {10.1109/TRUSTCOM.2016.0247},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouXGC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouZJL16,
  author       = {Zhiwei Zhou and
                  Junwu Zhu and
                  Yi Jiang and
                  Bin Li},
  title        = {A Truthful Greedy Mechanism toward Resource Sharing for Cloudlets
                  in Mobile Cloud Computing},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1241--1247},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0200},
  doi          = {10.1109/TRUSTCOM.2016.0200},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouZJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouZXC16,
  author       = {Huibin Zhou and
                  Dafang Zhang and
                  Kun Xie and
                  Yuxiang Chen},
  title        = {Robust Spatio-temporal Tensor Recovery for Internet Traffic Data},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1404--1411},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0221},
  doi          = {10.1109/TRUSTCOM.2016.0221},
  timestamp    = {Wed, 18 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouZXC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuCWW16,
  author       = {Wenliang Zhu and
                  Xiaohe Chen and
                  Yan Wang and
                  Lirong Wang},
  title        = {The Survey of Low-Power Sleep Monitoring Algorithm Based on the Wrist
                  Movement Signal},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2192--2196},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0337},
  doi          = {10.1109/TRUSTCOM.2016.0337},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuCWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuCZWK16,
  author       = {Dali Zhu and
                  Junhuang Chen and
                  Yanfang Zhang and
                  Siye Wang and
                  Huafeng Kong},
  title        = {An Efficient Approach of Integrating {RFID} and Vision Techniques
                  in Object Surveillance System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1023--1029},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0171},
  doi          = {10.1109/TRUSTCOM.2016.0171},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuCZWK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuJL16,
  author       = {Liang Zhu and
                  Hai Jin and
                  Xiaofei Liao},
  title        = {A Tool to Detect Performance Problems of Multi-threaded Programs on
                  {NUMA} Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1145--1152},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0187},
  doi          = {10.1109/TRUSTCOM.2016.0187},
  timestamp    = {Wed, 23 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuLW16,
  author       = {Xiaoyu Zhu and
                  Qin Liu and
                  Guojun Wang},
  title        = {A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted
                  Data in Cloud Computing},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {845--851},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0147},
  doi          = {10.1109/TRUSTCOM.2016.0147},
  timestamp    = {Mon, 23 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuPLRF16,
  author       = {Dali Zhu and
                  Na Pang and
                  Gang Li and
                  Wenjing Rong and
                  Zheming Fan},
  title        = {WiN: Non-invasive Abnormal Activity Detection Leveraging Fine-Grained
                  WiFi Signals},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {744--751},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0134},
  doi          = {10.1109/TRUSTCOM.2016.0134},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuPLRF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuWXCW16,
  author       = {Hong Zhu and
                  Bin Wu and
                  Meiyi Xie and
                  Zongmin Cui and
                  Zongda Wu},
  title        = {Secure Shortest Path Search over Encrypted Graph Supporting Synonym
                  Query in Cloud Computing},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {497--504},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0102},
  doi          = {10.1109/TRUSTCOM.2016.0102},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuWXCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuYJSF16,
  author       = {Dali Zhu and
                  Ying Yang and
                  Hao Jin and
                  Jing Shao and
                  Weimiao Feng},
  title        = {Application of Modified {BLP} Model on Mobile Web Operating System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1818--1824},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0279},
  doi          = {10.1109/TRUSTCOM.2016.0279},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuYJSF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuangMC16,
  author       = {Yu Zhuang and
                  Yu Mao and
                  Xin Chen},
  title        = {A Limited-Iteration Bisecting K-Means for Fast Clustering Large Datasets},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2257--2262},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0348},
  doi          = {10.1109/TRUSTCOM.2016.0348},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuangMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZouLLZZX16,
  author       = {Lida Zou and
                  Qingzhong Li and
                  Hui Li and
                  Shidong Zhang and
                  Yongqing Zheng and
                  Zongshui Xiao},
  title        = {Penalty Cost Minimization for Multi-tenant Query Deadline Employing
                  Cache Optimization and Log Based Dispatching},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1248--1255},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0201},
  doi          = {10.1109/TRUSTCOM.2016.0201},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZouLLZZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZuoMYSL16,
  author       = {Cong Zuo and
                  James Macindoe and
                  Siyin Yang and
                  Ron Steinfeld and
                  Joseph K. Liu},
  title        = {Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {113--120},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0053},
  doi          = {10.1109/TRUSTCOM.2016.0053},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZuoMYSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZuoZ16,
  author       = {Liudong Zuo and
                  Mengxia Michelle Zhu},
  title        = {Improved Scheduling Algorithms for Single-Path Multiple Bandwidth
                  Reservation Requests},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1692--1699},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0259},
  doi          = {10.1109/TRUSTCOM.2016.0259},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZuoZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2016,
  title        = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7845250/proceeding},
  isbn         = {978-1-5090-3205-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}