default search action
4th ICCCS 2018: Haikou, China
- Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II. Lecture Notes in Computer Science 11064, Springer 2018, ISBN 978-3-030-00008-0
Cloud Computing
- Mohan Li, Yanbin Sun, Le Wang, Hui Lu:
Quality-Aware Query Based on Relative Source Quality. 3-8 - Wan Li, Fenling Feng:
Railway Passenger Volume Forecast Based on Web Search Terms and Adversarial Nets. 9-20 - Zhiqiang Zhu, Jin Wu, Lei Sun, Ruiyu Dou:
RCS: Hybrid Co-scheduling Optimization in Virtualized System. 21-32 - Hongbin Wang, Ming He, Lianke Zhou, Zijin Li, Haomin Zhan, Rang Wang:
Remove-Duplicate Algorithm Based on Meta Search Result. 33-44 - Fuli Chen, Rui Fan, Bifeng Guo, Fuyu Ma, Weitao He:
Research into Effects of Shrimp Aquaculture by Extensible Mind Mapping. 45-58 - Runzhe Tao, Yonghong Zhang, Lihua Wang, Xiaoping Zhao:
Research of Tool State Recognition Based on CEEMD-WPT. 59-70 - Yanning Cao, Xiaoshu Zhang:
Research on Data Mining Method for Breast Cancer Case Data. 71-78 - Fei Gui, Yao-jie Chen, Ya-ting Xue:
Research on Flame Generation Method Based on Particle System and Texture Mapping. 79-89 - Lin Zhang, Ruili Zhao, Mengxing Huang, Zhonghua Liu, Jieren Cheng, Yu Zhang:
Research on Indirect Location Technology of Ground Target Based on Scene Matching. 90-104 - Xue Wang, Pingzeng Liu, Xuefei Liu:
Research on Key Climatic Factors of Desert Based on Big Data. 105-113 - Jieli Sun, Zhiqing Zhu, Yanpiao Zhang, Yanxia Zhao, Yao Zhai:
Research on Personalized Recommendation Case Base and Data Source Based on Case-Based Reasoning. 114-123 - Bin Ma, Yecheng Sun:
Research on Real-Time Monitoring of Human Body Temperature Based on Fiber Bragg Grating Sensing Technology. 124-133 - Yaosheng Shen, Ding Wang, Ping Wang:
Revisiting Anonymous Two-Factor Authentication Schemes for Cloud Computing. 134-146 - Junbao Zhang, Guohua Liu, Zhao Chen:
Serialization of Lifecycles in ACBP Model as Regular Expressions. 147-156 - Hongbin Wang, Guisheng Yin, Lianke Zhou, Yupeng Zhang, Zhen Cao:
Social Networks Node Mining Algorithm of Based on Greedy Subgraph. 157-168 - Jianbiao Huang, Linli Tao:
Study on Cloud Logistics Distribution Model of Agricultural Products. 169-181 - Jie Zhang, Yongsheng Zhang, Xiaolong Wu, Guoyun Li:
Teaching Video Recommendation Based on Student Evaluation. 182-190 - Yixuan Chai, Guohua Liu, Zhao Chen, Feng Li, Yue Li, Esther Astaewwa Effah:
A Temporal Collaborative Filtering Algorithm Based on Purchase Cycle. 191-201 - Dan Yang, Tiezheng Nie, Jing Zhang:
Temporal Evolution Data Model for Heterogeneous Entities: Modeling with Temporal and Evolution Information. 202-211 - Zhenjia Chen, Yonghui Zhang, Xia Guo:
The Application of Distributed Database on Spectrum Big Data. 212-222 - Junhua Xi, Kouquan Zheng:
The Benchmark Performance Testing Method for Cluster Heterogeneous Network Based on STC Platform. 223-231 - Qingyu Meng, Huanhuan Zhang, Mingquan Zhou, Shifeng Zhao, Pengbo Zhou:
The Classification of Traditional Chinese Painting Based on CNN. 232-241 - Yanchao Guo, Linfeng Wei, Jianzhu Lu:
The Design and Implementation of a Backup and Disaster Recovery System for vSphere Data Center Based on Swift Cloud Storage. 242-253 - Yu-xiang Wang, Qi Wang, Zhi-feng Zhou:
The Handoff Mechanism Based on Mobile Location Prediction. 254-264 - Tiantian Tan, Baosheng Wang, Zhou Xu, Yong Tang:
The New Progress in the Research of Binary Vulnerability Analysis. 265-276 - Tiantian Tan, Baosheng Wang, Zhou Xu, Yong Tang:
The New Progress in the Research of Binary Vulnerability Exploits. 277-286 - Shan Huang, Ming Li, Hao Chen:
The Quasi-circular Mapping Visualization Based on Extending and Reordering Dimensions for Visual Clustering Analysis. 287-299 - Hui Lu, Xiang Cui, Le Wang, Yu Jiang, Meng Cui:
The Research on Security Audit for Information System Classified Protection. 300-308 - Gen Li, Kejie Wen, Yaxuan Wu, Baili Zhang:
Topk Service Composition Algorithm Based on Optimal QoS. 309-321 - Lihua Zhao, Minghui Du, Weibao Lei, Lin Chen, Lei Yang:
Towards Multi-task Fair Sharing for Multi-resource Allocation in Cloud Computing. 322-333 - Shuyan Yu:
Towards the Cloud Computing from Services to Securities and Challenges. 334-343 - Chao Zhang, Junmei Wang, Pingzeng Liu, Wanming Ren, Weijie Chen, Yanyan Wang:
Traffic Accident Time Series Analysis. 344-356 - Yuhang Wang, Hongli Zhang, Shen Su:
VAT: A Velocity-Aware Trajectory Privacy Preservation Scheme for IoT Searching. 357-365 - Pai Liu, Fenlin Liu, Daofu Gong:
Video Quality Assessment Algorithm Based on Persistence-of-Vision Effect. 366-376 - Qin Liu, Tinghuai Ma, Jian Li, Wenhai Shen:
Workflow Task Scheduling Algorithm Based on IFCM and IACO. 377-388 - Dingcheng Wang, Yiyi Lu, Beijing Chen, Liming Chen:
Research on Intuitionistic Fuzzy Multiple Output Least Squares Support Vector Regression. 389-398
Cloud Security
- Liming Zuo, Mengli Zhang, Tingting Zhang, Kaiyu Hu:
A Blind Signature Scheme with Disclaimer Contract in the Standard Model. 401-412 - Haiyong Wang, Yao Peng:
A CP-ABE Access Control Scheme Based on Proxy Re-encryption in Cloud Storage. 413-425 - Xiaoming Zhang, Zhanfeng Wang, Xianglin Wei, Zihan Zhuo, Chao Hu:
A Delay Step Based Geolocation Data Verification Method. 426-438 - Junquan Yang, Song Liu, Wenwei Tao, Chao Hu:
A Distributed Security Feature Selection Algorithm Based on K-means in Power Grid System. 439-449 - Yang Su, Wenzhe Zhang, Wenwei Tao, Zhizhong Qiao:
A Network Illegal Access Detection Method Based on PSO-SVM Algorithm in Power Monitoring System. 450-459 - Hongrun Zhang, Bin Li, Shunquan Tan:
A New Steganographic Distortion Function with Explicit Considerations of Modification Interactions. 460-471 - Luhui Yang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Zhaozhi Yan, Yuguang Zou, Wenchao Huang:
A Novel Detection Method for Word-Based DGA. 472-483 - Cheng Guo, Pengxu Tian, Yingmo Jie, Xinyu Tang:
A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners. 484-495 - Qi Wang, Dehua Zhou, Quanlong Guan, Yanling Li, Jimian Yang:
A Privacy-Preserving Classifier in Statistic Pattern Recognition. 496-507 - Tong Xiao, Jingbing Li, Jing Liu, Jieren Cheng, Uzair Aslam Bhatti:
A Robust Algorithm of Encrypted Face Recognition Based on DWT-DCT and Tent Map. 508-518 - Wei Luo, Wenping Ma:
A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage. 519-530 - Mengmeng Yao, Dongsheng Zhou, Rui Deng, Mingda Liu:
A Security Protocol for Access to Sensitive Data in Trusted Cloud Server. 531-542 - Chunxia Liu, Youyu Chen, Shu Tong, Wangdong Jiang, Guang Sun:
A Study on Revenue Distribution of Information Sharing in the C2M Supply Chain. 543-552 - Xin Lu, Lifeng Cao, Xuehui Du, Zhiyan Hu:
A Tag-Based Protection Method for Multi-tenant Data Security. 553-565 - Zhongxu Yin, Zhufeng Li, Yan Cao:
A Web Application Runtime Application Self-protection Scheme against Script Injection Attacks. 566-577 - Huirui Han, Mengxing Huang, Yu Zhang, Uzair Aslam Bhatti:
An Architecture of Secure Health Information Storage System Based on Blockchain Technology. 578-588 - Xiaofeng Ma, Xiaofeng Song, Chao Fan, Xi Wang:
An Evolutionary Algorithm Based on Multi-view and Prior Information for Community Detection. 589-600 - Ping Lin, Tao Li, Xiaojie Liu, Hui Zhao, Jin Yang, Fangdong Zhu:
An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets. 601-611 - Yaoyao Shang, Shuangmao Yang, Wei Wang:
Botnet Detection with Hybrid Analysis on Flow Based and Graph Based Features of Network Traffic. 612-621 - Zheng Zhao, Tao Shang, Jianwei Liu, Zhengyu Guan:
Clustering Algorithm for Privacy Preservation on MapReduce. 622-632 - Yongjun Ren, Linhui Kong, Yepeng Liu, Jin Wang:
Consistency Guarantee Method of Electronic Record Based on Blockchain in Cloud Storage. 633-642 - Ting Dong, Song-Ya Ma, Pei Zhang:
Controlled Remote Preparation of an Arbitrary Two-Qubit State via the Brown State Under the Noisy Environment. 643-653 - Ruizhi Zhang, Jieren Cheng, Xiangyan Tang, Qiang Liu, Xiangfeng He:
DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm. 654-669 - Xiaohui Yang, Yue Yu:
DDoS Attacks Detection and Traceback Method Based on Flow Entropy Algorithm and MPLS Principle. 670-683 - Bangguo Li, Pingzeng Liu, Xiaotong Wu, Xue Wang, Rui Zhao:
Design and Application of Agricultural Product Traceability Management Platform. 684-693 - Bangguo Li, Pingzeng Liu, Xiaotong Wu, Jianyong Zhang:
Design and Implementation of the Product Quality Traceability System for Winter Jujube. 694-705 - Ting Xiao, Yongfeng Huang:
Design and Implementation of Web System Based on Blockchain. 706-717 - Boyi Liu, Xiangyan Tang, Jieren Cheng, Jiquan Chen:
Design and Verification of a Security Policy to Defense DDoS Attack for Cloud Robot. 718-730 - Hongbin Zhang, Pengcheng Ma, Meihua Wang:
Detecting Inconsistency and Incompleteness in Access Control Policies. 731-739
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.