Accepted Papers
Sub Num | Title | 32 | New Pseudorandom Number Generators From Block Ciphers | 45 | SRAM: A State-Aware Risk Assessment Model for Intrusion Response | 50 | Zero-determinant Strategy for Cooperation Enforcement in Crowdsourcing | 51 | Attribute-Based Encryption with Multi-Keyword Search | 54 | An Expressive Hidden Access Policy CP-ABE | 56 | Mining Users’ Important Locations and Semantics on Cellular Network Data | 58 | Learning Automata based Approach for Influence Maximization Problem on Social Networks | 69 | A sensitive information protection scheme in Named Data Networking using attribute-based ring-signcryption | 70 | A New Access Control System Based on CP-ABE in Named Data Networking | 74 | A Conditional Probability Coputation Method for Vulnerability Exploitation Based on CVSS | 75 | A Personalized Next-song Recommendation System using Community Detection and Markov Model | 76 | Ensemble of Time-Invariant Convolutional LDPC Codes with Moderate Rates | 83 | Saving energy on processor micro-architecture level for big data stream mobile computing | 92 | ITM-LB: An Improved Traffic Matrix-Based Load Balancing Routing Algorithm | 97 | A Multi-Modal Hashing Learning Framework for Automatic Image Annotation | 101 | A Method Of Emotional Analysis Of Movie Based On Convolution Neural Network And Bi-directional LSTM RNN | 108 | Research On Classification Method Of High-Dimensional Class-Imbalanced Data Sets Base On SVM | 110 | SDS2: Secure Data-Sharing Scheme for Crowd Owners in Public Cloud Service | 116 | Outsourced Privacy-Preserving C4.5 Algorithm on Arbitrarily Partitioned Databases | 117 | On Study of Physical-Layer Attack Detection for Large Volumes of Data | 122 | A Secure NFC-based User Authentication Scheme In The IOT Era | 125 | A Framework to Construct Knowledge Base for Cyber Security | 127 | FgDetector: A Novel Method For Fine-grained Android Malware Detection | 130 | Spatio - temporal Distribution pattern of cable car passenger flow in Pan-holidays: A case study of Huangshan Scenic Area | 131 | IBF: Interval-Based Fingerprinting for Secret Access Control and Flow Monitoring | 134 | Mining Similarity-Aware Distinguishing Sequential Patterns from Biomedical Sequences | 137 | A Remote Data Integrity Checking Scheme for Big Data Storage | 140 | DPLK-means: A novel Differential Privacy K-means Mechanism | 150 | Analysis of Android malware family characteristic based on isomorphism of sensitive API call graph | 153 | An approximate approach to frequent itemset mining | 161 | A survey on data cleaning methods in cyberspace | 177 | Research on Online Learning of Radar Emitter Recognition Based on Hull Vector | 180 | Efficient ,Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing | 184 | Proof of Shared Ownership for Secure Deduplication in Cyberspace | 187 | A New Approach for Imbalanced Data Classification Based on Minimize Loss Learning | 189 | Building Endgame Dataset to Improve Opponent Modeling Approach | 195 | A Network Coordinate System Constructing Algorithm Based on Optimal Neighbor Nodes | 204 | Cloud-based Lightweight RFID Mutual Authentication Protocol | 205 | Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage | 207 | Semi-supervised collective matrix factorization for topic detection and document clustering | 208 | A Novel Contributory Cross-domain Group Password-based Authenticated Key Exchange Protocol with Adaptive Security | 209 | Cyberspace-Oriented Access Control: Model and Policies | 214 | Extracting Sift Keypoints In DCT Domain | 217 | EMMBTT: A Novel Event Evolution Model Based on TF×IEF and TDC in Tracking News Streams | 223 | ISLUS: An Immediate and Safe Live Update System for C Program | 236 | A Fully Secure Verifiable and Outsourced Decryption Ranked Searchable Encryption Scheme Supporting Synonym Query | 237 | A Multilevel Secure Access Control Policy for Distributed Systems | 242 | Predicting the Popularity of News Based on Competitive Matrix | 244 | A Reputation-Based Resilient and Recoverable P2P Botnet | 249 | Adaptive Text Steganography by Exploring Statistical and Linguistical Distortion |
---|