default search action
CyberC 2017: Nanjing, China
- 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2017, Nanjing, China, October 12-14, 2017. IEEE 2017, ISBN 978-1-5386-2209-4
Security, Privacy, and Protection
- Xin Hu, Gang Wang, Hongtao Qin, Runnian Ma:
SIRS Model and Stability Based on Open Cyber Ecosystem. 1-4 - Yingying Huangfu, Liang Zhou, Chenming Yang:
Routing the Cyber-Attack Path with the Bayesian Network Deducing Approach. 5-10 - Li-Xin Li, Yong-Shan Ding, Jia-Yan Wang:
Differential Privacy Data Protection Method Based on Clustering. 11-16 - Jin Han, Rongcai Zhao, Zhen Shan, Fudong Liu, Bingling Zhao, Xi Meng, Hongyan Wang:
Analyzing and Recognizing Android Malware via Semantic-Based Malware Gene. 17-20 - Hao Zeng, Baosheng Wang, Wenping Deng, Xianming Gao:
CENTRA: CENtrally Trusted Routing vAlidation for IGP. 21-24 - Xiangyu Liu, Qiuyang Li, Sonali Chandel:
Social Engineering and Insider Threats. 25-34 - Yajuan Shi, Chunhui Piao, Li-Juan Zheng:
Differential-Privacy-Based Correlation Analysis in Railway Freight Service Applications. 35-39 - Rishabh Dudheria:
Evaluating Features and Effectiveness of Secure QR Code Scanners. 40-49 - Wenyan Liu, Fucai Chen, Hongchao Hu, Guozhen Cheng, Shumin Huo, Hao Liang:
A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture. 50-53 - Jingwen Wang, Jie Yang, Fen Guo, Huaqing Min:
Resist the Database Intrusion Caused by Functional Dependency. 54-57 - Vahid Amin Ghafari, Honggang Hu:
A New Chosen IV Statistical Attack on Grain-128a Cipher. 58-62
Networking, Protocol, and Performance
- Yuanyi Zhao:
Performance Analysis of Turbo Code and Trellis BICM-ID on PNC over Impulsive Channel. 63-71 - Xiaojun Xiao, Wanming Luo:
An IPv6-based Load Balancing Strategy for Ecological Monitoring Network. 72-79 - Xiaojun Xiao, Wanming Luo:
6LoWPAN Hierarchical Cluster Routing Protocol. 80-83 - Xiang Gao, Guanghui Li:
Design and Implementation of the Prototype of High-Available Distributed Communication System. 84-88 - Lanhua Xiang, Hongbin Chen:
Energy-Efficient and Fair Power Allocation Approach for NOMA in Ultra-Dense Heterogeneous Networks. 89-94 - Xinyu Wu, Bin Wu, Bai Wang:
P&D Graph Cube: Model and Parallel Materialization for Multidimensional Heterogeneous Network. 95-104 - Hao Zeng, Baosheng Wang, Wenping Deng, Weiqi Zhang:
Measurement and Evaluation for Docker Container Networking. 105-108 - Hao Zeng, Xianming Gao, Baosheng Wang:
POPBrick: A High-Elasticity, Reconfigurable Network Infrastructure to Support POP Applications. 109-112 - Weiwei Zhang, Jiafeng He, Guowang Gao, Lili Ren, Shenxuan Jing:
Time-Domain Greedy Heuristic Approximation Algorithm for Multi-channel Assignment in Wireless Mesh Network. 113-117
Images, Video, Positioning, and Systems
- Masoud Attarifar, Mohammadamin Baniasadi:
JPEG Image Security by Block Size Estimation and Quality Factor Classification. 118-121 - Lian Zhao, Yingzhou Zhang, Xing Wang, Xinghao Chen:
Image Hiding Algorithm Based on Secure Steganography Mechanism. 122-129 - Zhenghua Shu, Guodong Liu, Zhihua Xie:
Real Time Target Tracking Scale Adaptive Based on LBP Operator and Nonlinear Meanshift. 130-133 - Xiaolong Xu, Licheng Lin:
Geomagnetic Fingerprint Maps for Indoor Positioning. 134-141 - Xiaokun Wu, Yongfeng Huang:
SigRA: A New Similarity Computation Method in Recommendation System. 148-154 - Xing Wang, Yingzhou Zhang, Lian Zhao, Xinghao Chen:
Dead Code Detection Method Based on Program Slicing. 155-158
Big Data and Data Analytics
- Yiwei Xu, Yonggen Gu, Duc Minh Quan Do, Hongtianchen Xie, Lunke Qing:
A Faster without Scarifying Accuracy Online Decomposition Approach for Higher-Order Tensors. 159-166 - Yangjun Chen, Yujia Wu:
Searching BWT against Pattern Matching Machine to Find Multiple String Matches. 167-176 - Jinbing Ha, Yunping Yu:
Fault Data Diagnosis of Energy Consumption Equipment for Urban Rail Transit Based on ART2 Model. 177-181 - Taihao Li, Jianshe Zhou, Naren Tuya, Cuifen Du, Zhiqiang Chen, Shupeng Liu:
Recognize Facial Expression Using Active Appearance Model and Neural Network. 182-185 - Feng Liu, Jun Zhang, Erzhou Zhu:
Test-Suite Reduction Based on K-Medoids Clustering Algorithm. 186-192 - Peng Sun, Lihua Wang, Qianchen Xia:
The Keyword Extraction of Chinese Medical Web Page Based on WF-TF-IDF Algorithm. 193-198 - Po Yang, Xuebin Ma:
Selection Strategy of Nodes with the Greatest Influence on Community Structure. 199-205 - Jinhong Liu, Juan Yang:
Multi-label Classification Using Random Walk with Restart. 206-212 - Jiake Ni, WeiTao Weng, Jiayu Chen, Kai Lei:
Internet Traffic Analysis Using Community Detection and Apache Spark. 213-219
Cloud Computing and System Implementation
- Qingfeng Du, Yue Tian, Tiandi Xie, Kanglin Yin, Juan Qiu:
A Method of Building Fault Repository for Cloud Infrastructure. 220-228 - Lei Sun, Hang Su, Zhiqiang Zhu, Zuohui Li:
A Novel Attribute Based Keyword Search Scheme for Mobile Cloud Storage. 229-234 - Jianhong Zhang, Hao Xiao:
Public Auditing Scheme of Dynamic Data Sharing Suiting for Cloud-Based EHR System. 235-243 - Amara Naseer, Zhiqui Huang, Awais Ali:
Cloud Computing Security Threats and Attacks with Their Mitigation Techniques. 244-251 - Zhichao Song, Xiangyu Bai, Haodong Bian:
Implementation of Subject Recommendation and Practice System for Mobile Terminal Users. 252-257 - Qingfeng Du, Huan Li, Kanglin Yin, Juan Qiu:
VM Reliability Modeling and Analysis for IaaS Could. 258-265 - Liang Cao, Yufeng Wang, Qun Jin, Jianhua Ma:
ActiRecognizer: Design and Implementation of a Real-Time Human Activity Recognition System. 266-271
Machine Learning and Analytics
- Xi Meng, Zhen Shan, Fudong Liu, Bingling Zhao, Jin Han, Hongyan Wang, Jing Wang:
MCSMGS: Malware Classification Model Based on Deep Learning. 272-275 - Yingjie Meng, Huiran Liu, Tong Shang, Xiaoyu Teng:
A Zero-Watermarking Scheme for Prose Writings. 276-282 - Xiaolong Xu, Wen Chen:
Implementation and Performance Optimization of Dynamic Random Forest. 283-289 - Lihua Wang, Zijun Zhou:
Congestion Prediction for Urban Areas by Spatiotemporal Data Mining. 290-297 - Xia Liu, Xia Huang, Lei Chen, Zhao Qiu, Mingrui Chen:
Improving the Forecasting Accuracy of Civil Aviation Passengers Based on Machine Learning Models. 298-304 - Jun Gu, Bin Gao, Yuanpeng Chen, Long Jiang, Zhao Gao, Xiaole Ma, Yong Ma, Wai Lok Woo:
Wearable Social Sensing and Its Application in Anxiety Assesment. 305-308 - Juan Qiu, Qingfeng Du, Wei Wang, Kanglin Yin, Changsheng Lin, Chongshu Qian:
Topic Crawler for OpenStack QA Knowledge Base. 309-317 - Dongchen Miao, Fei Lang:
A Recommendation System Based on Text Mining. 318-321 - Sunyan Gu, Fei Lang:
A Chinese Text Corrector Based on Seq2Seq Model. 322-325 - Xiu Yin, Yingzhou Zhang, Xinghao Chen:
A Binary-Classification Method Based on Dictionary Learning and ADMM for Network Intrusion Detection. 326-333
Internet of Things and RFID Sensors
- Wenjing Sun, Song Jin, Ruide Li, Yangyang Li, Qianru Yang, Ning Cao:
Research on Correlation Models Between QoS and Application Layer QoE in IoT-NDN Environment. 334-337 - Sanju Lokuhitige, Suzana Brown:
Forecasting Maturity of IoT Technologies in Top 5 Countries Using Bibliometrics and Patent Analysis. 338-341 - Junshe Wang, Han Wang, Hongbin Zhang, Ning Cao:
Trust and Attribute-Based Dynamic Access Control Model for Internet of Things. 342-345 - Zhiqing Zhang, Hideya Ochiai, Hiroshi Esaki:
An IoT Application-Layer Protocol Modem: A Case Study on Interfacing IEEE 1888 with AT Commands. 346-349 - Huiyang Sun, Hongjun Li, Yuanyuan Zhang, Wanmin Zhang:
A Study on Smart Monitoring and Management of Track Running Self-Testing System Based on Internet of Things. 350-353 - Jie Wan, Xiang Gu, Liang Chen, Jin Wang:
Internet of Things for Ambient Assisted Living: Challenges and Future Opportunities. 354-357 - Wenjin Yu, Yixiang Jiang:
Mobile RFID Mutual Authentication Protocol Based on Hash Function. 358-361
Network and Smart Sensor Networks
- Alexander S. Basan, Elena Basan, Oleg B. Makarevich:
A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor Networks. 369-372 - Haitao Zhao, Kaiqiang Gao, Mengkang Zhang, Dapeng Li, Hongbo Zhu:
A Demand-Aware Transmission Optimization Control Scheme Based on Multichannel Coordination. 373-377 - Junyan Ma, Jin Wang, Te Zhang:
A Survey of Recent Achievements for Wireless Sensor Networks Testbeds. 378-381 - Na Dang, Xiangyu Bai, Haodong Bian:
Content Delivery Routing Strategy Based on Energy Constraint in MDTN-CCN Integrated Network. 382-390 - Chunqiang Liu, Haijie Pang, Ning Cao:
Research on Time Synchronization Technology of Wireless Sensor Network. 391-394 - Yufang Huang, Yi Lin, Rongzhen Miao:
An Auxiliary Blind Guide System Based on Multi-sensor Data Fusion. 395-398 - Ning Cao, Yuanyuan Zhang, Yan Li, Bin Xue, Hua Yu, Yingying Wang, Yuyan Shen, Na Li:
Analysis of the Approach to Predict Different Routing Protocols in WSNs. 399-402 - Yi-Wei Deng, Cheng Zhong, Jun Yu, Sujie Shao, Xuesong Qiu:
An Energy-Saving Clustering Strategy of Hybrid Network of Sensors and Mobile CR Nodes. 403-411 - Qi Xie, Qiang Wang, Ning Cao, Shuqing Gao, Guang Liang, Tong Zhang, Yanbing Chen, Yi Zhai, Na Li:
A Survey of Wireless Sensor Technique Applications for Medical Care. 412-415 - Mario E. Rivero-Angeles, Gerardo Rubino:
Transmission Probability Strategies for Cluster-Based Event-Driven Wireless Sensor Networks. 416-419 - Anwar Ahmed Khan, Mohammad Shoaib Jamal, Shama Siddiqui:
Dynamic Duty-Cycle Control for Wireless Sensor Networks Using Artificial Neural Network (ANN). 420-424 - Shama Siddiqui, Anwar Ahmed Khan, Sayeed Ghani:
DPR-MAC: Dynamic Polling for Rare Events in Wireless Sensor Networks. 425-428
Wireless Communications
- Zhen Wang, Hai Qin, Yu Gong, Bo Liu:
Implementation and Verification of a High-Throughput Reconfigurable MIMO Detector. 429-432 - ZhanZhen Wei, Feng Wang, Zhaobin Li:
Loop-Free Forwarding in Hierarchical Location-Based Routing. 433-436 - Shun-Ping Chen, Jens Gebert:
Investigations of 5G Multiple Radio Access Technology Performance and Resource Selection Behavior. 437-444 - Tao Ma:
A Bit Sampled Wake-Up Receiver with Logarithmic Detector Architecture. 445-449 - Weifeng Lu, Weijun Lin, Lijun Yang, Siguang Chen:
A Heuristic D2D Communication Mode Selection Algorithm. 450-453 - Zukui Wang, Liusheng Huang, Wei Yang, Zhiqiang He:
A Classifier Method for Detection of Covert Channels over LTE. 454-460 - Guihua Kang, Kaiyue Xu, Hongbo Kang, Kun-Bei Pan:
The Limited Feedback Precoding Based on the Triplex Codebooks. 461-465 - Laning Ma, Zhonghua Liang, Danli Liu:
Performance of Polarized Channel Coding in TRPC-UWB Communication Systems. 466-470 - Tingting Jia, Caihong Li, Anping He:
Modeling and Verification of Circuit with Stable-Event. 471-475 - Weiwei Zhang, Jiafeng He, Guowang Gao, Lili Ren, Shenxuan Jing:
Multi-channel Allocation Algorithm Based on AODV Protocol in Wireless Mesh Networks. 476-481
SDN and Resource
- Kun Li, Qinghai Ou, Hong Chen, Baoping Zou:
Controller Cluster-Based Interconnecting for Multi-domain SDN Networks. 482-485 - Jianhui Zhang, Tao Hu, Wei Zhao, Dan Qiao:
DDS: Distributed Decision Strategy Based on Switch Migration towards SDN Control Plane. 486-493 - Gang Zhang, Xiaofeng Qiu, Wei Chang:
Scheduling of Security Resources in Software Defined Security Architecture. 494-503 - Xiaolong Xu, Liuyun Hu:
A Software Defined Security Scheme Based on SDN Environment. 504-512 - Yuhua Xu, Zhe Sun, Zhixin Sun:
SDN-based Architecture for Big Data Network. 513-516 - Xiaoyong Lin, Pengwei Yin, Yun Xia, Yang Yu, Tingting Qiu, Xiaoming Wang, Lixiang Li:
MPLB: A Load Balance Scheme of Joint Resource Scheduling in Heterogeneous Wireless Network. 517-524
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.