default search action
2nd BigDataSecurity/HPSC/IDS 2017: Beijing, China
- 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), Beijing, China, May 26-28, 2017. IEEE 2017, ISBN 978-1-5090-6296-6
- Samuel S. Wu, Shigang Chen, Abhishek Bhattacharjee, Ying He:
Collusion Resistant Multi-Matrix Masking for Privacy-Preserving Data Collection. 1-7 - Yoji Yamato:
Experiments of Posture Estimation on Vehicles Using Wearable Acceleration Sensors. 14-17 - Jinan Sun, Kefeng Pan, Xuefeng Chen, Junfu Zhang:
Security Patterns from Intelligent Data: A Map of Software Vulnerability Analysis. 18-25 - Hanlin Liu, Jingju Liu, RongGui Hu, Xuehu Yan, Song Wan:
Adaptive Audio Steganography Scheme Based on Wavelet Packet Energy. 26-31 - Wanmeng Ding, Kesheng Liu, Lintao Liu, Xuehu Yan:
Participants Increasing for Shamir's Polynomial-Based Secret Image Sharing Scheme. 32-36 - Wenting Li, Qianchen Gu, Yiming Zhao, Ping Wang:
Breaking Two Remote User Authentication Systems for Mobile Devices. 37-42 - Ruilan Yang, Xuejun Yu:
Research on Building the Credibility Evaluation's Indicator System of Cloud End User's Behavior. 43-47 - Ting Bao, Zhangqin Huang, Da Li:
Data Loss and Reconstruction for Wireless Environmental Sensor Networks. 48-52 - Sun-Kyung Hong, Hajin Kim, Sanghun Lee, Yang-Sae Moon:
Secure Multiparty Computation of Chi-Square Test Statistics and Contingency Coefficients. 53-56 - Linqing Yang, Shun Li, Wei Chen, Kai Lei, Tengjiao Wang:
PBI: A Path-Based Bitmap Index for Efficient Process Analysis in Cloud Computing Environment. 57-62 - Sakchan Luangmaneerote, Ed Zaluska, Leslie Carr:
Inhibiting Browser Fingerprinting and Tracking. 63-68 - Weiwei Chen, Fangang Kong, Feng Mei, Guiqin Yuan, Bo Li:
A Novel Unsupervised Anomaly Detection Approach for Intrusion Detection System. 69-73 - Fengtao Huang, Hao Li, Zhihao Yuan, Xian Li:
An Application Deployment Approach Based on Hybrid Cloud. 74-79 - Shouming Chen, Yang Qian, Xiaoyu Zang, Rui Peng:
A Proxy Based Connection Mechanism for Hybrid Cloud Virtual Network. 80-85 - Xuehu Yan, Yuliang Lu, Yuxin Chen, Canju Lu, Benmu Zhu, Qinglei Liao:
Secret Image Sharing Based on Error-Correcting Codes. 86-89 - Boyu Hou, Yong Shi, Kai Qian, Lixin Tao:
Towards Analyzing MongoDB NoSQL Security and Designing Injection Defense Solution. 90-95 - Kun Liang, Yujun Li, Jinghong Duan, Yiming Wang:
Research of XML-Based Web Report System. 96-100 - Keke Gai, Meikang Qiu:
An Optimal Fully Homomorphic Encryption Scheme. 101-106 - Yu Huang, Juntao Li, Wenhui Hu, Xueyang Liu:
Research on a Simulation Period Reference Model and Its General Description Language. 107-111 - Yahya E. A. Al-Salhi, Songfeng Lu:
New Steganography Scheme to Conceal a Large Amount of Secret Messages Using an Improved-AMBTC Algorithm Based on Hybrid Adaptive Neural Networks. 112-121 - Zhao Jing, Chen Ming:
Under the Vision of the Big Data: The Internal Causes of Economic Transformation. 122-126 - Xin Sun, Zixiang Wang, Bang Lv, Jing Ou:
A Review on Behavior-Based Detection for Network Threats. 127-132 - Wenhui Hu, Yu Huang, Xueyang Liu, Chen Xu:
Study on REST API Test Model Supporting Web Service Integration. 133-138 - Shanjing Yang, Xiaoyong Liao, Jianlin Hu, Weiqing Huang:
Recognition of Information Leakage of Computer via Conducted Emanations on the Power Line. 139-144 - Zhe Diao, Qinghong Wang, Naizheng Su, Yuhan Zhang:
Study on Data Security Policy Based on Cloud Storage. 145-149 - Yuxin Jing, Hanpin Wang, Yu Huang, Lei Zhang, Yongzhi Cao:
Towards Formalizing of MapReduce. 150-155 - Mete Kart, Ensar Gul, Murat Ture:
Design of an Event Based Multi Processors Communication System. 156-159 - Jie Yu, Guangming Liu, Wenrui Dong, Xiaoyong Li:
Using Locality-Enhanced Distributed Memory Cache to Accelerate Applications on High Performance Computers. 160-166 - Yangxin Lin, Ping Wang, Meng Ma:
Intelligent Transportation System(ITS): Concept, Challenge and Opportunity. 167-172 - Yongqiang Gao, Lei Yu:
A Power and Performance Aware Routing Algorithm for Fat Tree Networks. 173-178 - Jun Wu, Xu-Jia Hong:
Energy-Efficient Task Scheduling and Synchronization for Multicore Real-Time Systems. 179-184 - Siwoon Son, Dasol Kim, Myeong-Seon Gil, Yang-Sae Moon:
A Storm-Based Tag Cloud Platform for Multiple SNS Users. 185-189 - Meng Ma, Weilan Lin, Disheng Pan, Ping Wang, Yuchen Zhou, Xiaoxing Liang:
Data and Decision Intelligence for Internet of Things: Putting Human in the Loop. 190-195 - Xi Liu, Xiaolu Zhang, Qianna Cui, Weidong Li:
Implementation of Ant Colony Optimization Combined with Tabu Search for Multi-resource Fair Allocation in Heterogeneous Cloud Computing. 196-201 - Biao Wang, Ding Wang:
A Process Model for XBRL Taxonomy Development. 202-206 - Qiao Chu, Lin Cui, Yuxiang Zhang:
Joint Computing and Storage Resource Allocation Based on Stable Matching in Data Centers. 207-212 - Jun Wu, Shou-Liang Sun:
A Dynamic Memory Allocation Approach for Virtualization Platforms. 213-218 - Jing Liu, Ping Wang, Jinlong Lin, Chao-Hsien Chu:
Model Based Energy Consumption Analysis of Wireless Cyber Physical Systems. 219-224 - Hua Zheng, Xi Zhang:
Optimizing Task Assignment with Minimum Cost on Heterogeneous Embedded Multicore Systems Considering Time Constraint. 225-230 - Richard Bassous, Huirong Fu, Ye Zhu:
Ambiguous Multi-symmetric Cryptography Proof of Concept and Experiments. 231-236 - Abdulrahman Alzahrani, Ali Alqazzaz, Ye Zhu, Huirong Fu, Nabil Almashfi:
Web Application Security Tools Analysis. 237-242 - George P. Corser, Abdelnasser Banihani, Johnathan Cox, Risalatul Hoque, Huirong Fu, Ye Zhu:
Location Privacy, Application Overhead and Congestion in VANET Location Based Services. 243-248 - Wei Kang, Shun Li, Wei Chen, Kai Lei, Tengjiao Wang:
Online Map-Matching Algorithm Using Object Motion Laws. 249-254 - Xiao Zhang, Xiaorong Wang, Wei Chen, Jie Tao, Weijing Huang, Tengjiao Wang:
A Taxi Gap Prediction Method via Double Ensemble Gradient Boosting Decision Tree. 255-260 - Chen Zhuge, Risto Vaarandi:
Efficient Event Log Mining with LogClusterC. 261-266 - Wei Xin, Tao Zhang, Chengjian Hu, Cong Tang, Chao Liu, Zhong Chen:
On Scaling and Accelerating Decentralized Private Blockchains. 267-271 - Shun Li, Biao Wang:
A Method for Hybrid Bayesian Network Structure Learning from Massive Data Using MapReduce. 272-276 - Yixuan Zhu, Zhixiong Chen:
RealID: Building A Secure Anonymous Yet Transparent Immutable ID Service. 277-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.