


default search action
ICA3PP 2018: Guangzhou, China
- Jaideep Vaidya, Jin Li:

Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part IV. Lecture Notes in Computer Science 11337, Springer 2018, ISBN 978-3-030-05062-7
Internet of Things and Cloud Computing
- Yujie Huang, Quan Zhang, Yujie Cai, Ming-e Jing, Yibo Fan, Xiaoyang Zeng:

Dynamic Task Scheduler for Real Time Requirement in Cloud Computing System. 3-11 - Longchuan Yan, Wantao Liu, Yin Liu, Songlin Hu:

CGAN Based Cloud Computing Server Power Curve Generating. 12-20 - Pei-ming Guo, Jianping Wu:

One-Sided Communication in Coarray Fortran: Performance Tests on TH-1A. 21-33 - Rui Xu, Hui Li

, Huayu Zhang:
Reliable Content Delivery in Lossy Named Data Networks Based on Network Coding. 34-46 - Lanlan Dong

, Guanjun Liu
, Dongming Xiang
:
Verifying CTL with Unfoldings of Petri Nets. 47-61 - Swati Jain

, Priyanka Sharma, Jaina Bhoiwala, Sarthak Gupta, Pramit Dutta, Krishan Kumar Gotewal, Naveen Rastogi, Daniel Raju:
Deep Q-Learning for Navigation of Robotic Arm for Tokamak Inspection. 62-71 - Bin He, Jin Wang, Jingya Zhou, Kejie Lu, Lingzhi Li, Shukui Zhang:

The Design and Implementation of Random Linear Network Coding Based Distributed Storage System in Dynamic Networks. 72-82
Security and Privacy in Computing
- Siyi Lv, Yanyu Huang, Bo Li, Yu Wei, Zheli Liu, Joseph K. Liu, Dong Hoon Lee:

Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique. 85-97 - Zhe Chen, Chunfu Jia, Tongtong Lv, Tong Li:

Harden Tamper-Proofing to Combat MATE Attack. 98-108 - Anran Liu, Zhenxiang Chen, Shanshan Wang, Lizhi Peng, Chuan Zhao, Yuliang Shi:

A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic. 109-120 - Yu Zhang, Jiankang Chen:

A Scalable Pthreads-Compatible Thread Model for VM-Intensive Programs. 121-137 - Yueyue Zhou, Tao Xiang

, Xiaoguo Li:
Efficient and Privacy-Preserving Query on Outsourced Spherical Data. 138-152 - Jiayu Tan, Jian Wang:

Detecting Advanced Persistent Threats Based on Entropy and Support Vector Machine. 153-165 - Qun Li, Zhenxiang Chen, Qiben Yan

, Shanshan Wang, Kun Ma
, Yuliang Shi, Lizhen Cui:
MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion. 166-177 - Wei Shao, Hang Li, Mengqi Chen, Chunfu Jia, Chunbo Liu, Zhi Wang:

Identifying Bitcoin Users Using Deep Neural Network. 178-192 - Jing Lei, Qingqi Pei, Xuefeng Liu, Wenhai Sun

:
A Practical Privacy-Preserving Face Authentication Scheme with Revocability and Reusability. 193-203 - Zhili Chen, Xianyue Bao, Zuobin Ying

, Ximeng Liu, Hong Zhong:
Differentially Private Location Protection with Continuous Time Stamps for VANETs. 204-219 - Nabeil Eltayieb

, Rashad Elhabob
, Alzubair Hassan, Fagen Li:
Fine-Grained Attribute-Based Encryption Scheme Supporting Equality Test. 220-233 - Chundong Wang, Likun Zhu, Liangyi Gong, Zheli Liu, Xiu-liang Mo, Wenjun Yang, Min Li, Zhaoyang Li:

Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer. 234-248 - Wencong Han, Quanxin Zhang, Chongzhi Gao, Jingjing Hu, Fang Yan:

Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware. 249-259 - Jiajia Sun, Jinbao Gao, Yu-an Tan, Yu Zhang, Xiao Yu:

A Java Code Protection Scheme via Dynamic Recovering Runtime Instructions. 260-269 - Qiang Wang, Fucai Zhou, Su Peng, Zifeng Xu:

Verifiable Outsourced Computation with Full Delegation. 270-287 - Rang Zhou

, Xiaosong Zhang, Xiaofen Wang, Guowu Yang, Wanpeng Li
:
Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data. 288-302 - Mehdi Gheisari

, Guojun Wang, Shuhong Chen
, Hamidreza Ghorbani
:
IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking. 303-312 - Zhendong Wu

, Yihang Xia:
User Password Intelligence Enhancement by Dynamic Generation Based on Markov Model. 313-325 - Haojun Ai, Weiyi Huang, Yuhong Yang, Liang Liao:

The BLE Fingerprint Map Fast Construction Method for Indoor Localization. 326-340 - Ximing He, Sheng Ma, Wenjie Liu, Sijiang Fan, Libo Huang, Zhiying Wang, Zhanyong Zhou:

VISU: A Simple and Efficient Cache Coherence Protocol Based on Self-updating. 341-357 - Ao Yin, Chunkai Zhang, Zoe Lin Jiang, Yulin Wu, Xing Zhang, Keli Zhang, Xuan Wang:

PPLDEM: A Fast Anomaly Detection Algorithm with Privacy Preserving. 358-373 - Yulin Wu, Xuan Wang, Zoe Lin Jiang, Xuan Li, Jin Li, Siu-Ming Yiu, Zechao Liu, Hainan Zhao, Chunkai Zhang:

Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection. 374-388 - Chuxin Wu, Peng Zhang, Hongwei Liu, Zehong Chen, Zoe Lin Jiang:

An Efficient Multi-keyword Searchable Encryption Supporting Multi-user Access Control. 389-398 - Xu Li, Guojun Wang, Saqib Ali

, QiLin He:
Android Malware Detection Using Category-Based Permission Vectors. 399-414 - Wenli Sun, Zoe Lin Jiang, Jun Zhang, Siu-Ming Yiu, Yulin Wu, Hainan Zhao, Xuan Wang, Peng Zhang:

Outsourced Privacy Preserving SVM with Multiple Keys. 415-430 - Yujia Hu, Hang Shen

, Guangwei Bai, Tianjing Wang
:
Privacy-Preserving Task Allocation for Edge Computing Enhanced Mobile Crowdsensing. 431-446 - Zoe Lin Jiang, Ning Guo, Yabin Jin, Jiazhuo Lv, Yulin Wu, Yating Yu, Xuan Wang, Siu-Ming Yiu, Junbin Fang

:
Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing. 447-460 - Miaomiao Tian, Shibei Ye, Hong Zhong, Lingyan Wang, Fei Chen, Jie Cui:

Identity-Based Proofs of Storage with Enhanced Privacy. 461-480 - David Madsen, Wenjuan Li

, Weizhi Meng
, Yu Wang:
Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA. 481-494 - Mengdi Liu

, Guangquan Xu, Jun Zhang, Rajan Shankaran
, Gang Luo, Xi Zheng
, Zonghua Zhang:
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems. 495-510 - Dulin, Zhiwei Zhang, Shichong Tan, Jianfeng Wang

, Xiaoling Tao:
An Associated Deletion Scheme for Multi-copy in Cloud Storage. 511-526 - Jiaqing Dong, Kai Wang, Yongqiang Lyu, Libo Jiao, Hao Yin:

InterestFence: Countering Interest Flooding Attacks by Using Hash-Based Security Labels. 527-537 - Yingjie Gu, Xiaolin Gui, Pan Xu, Ruowei Gui, Yingliang Zhao, Wenjie Liu:

A Secure and Targeted Mobile Coupon Delivery Scheme Using Blockchain. 538-548 - Jianwei Liu, Jianhua Fan:

Access Delay Analysis in String Multi-hop Wireless Network Under Jamming Attack. 549-559 - Qingfeng Du, Tiandi Xie, Yu He:

Anomaly Detection and Diagnosis for Container-Based Microservices with Performance Monitoring. 560-572 - Wentao Tan

, Hong Wang, Lutong Wang, Xiaomei Yu:
Integrated Prediction Method for Mental Illness with Multimodal Sleep Function Indicators. 573-580 - Yinghui Zhang, Jiangfan Zhao, Dong Zheng, Kaixin Deng, Fangyuan Ren, Xiaokun Zheng:

Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing. 581-590 - Nanxi Chen

, Xiaobo Xu, Xuzhi Miao:
A Reputation Model for Third-Party Service Providers in Fog as a Service. 591-599 - Yanhua Zhang, Yong Gan, Yifeng Yin

, Huiwen Jia:
Attribute-Based VLR Group Signature Scheme from Lattices. 600-610 - Jinlong Wang, Jing Liu, Lijuan Zheng:

Construction of VMI Mode Supply Chain Management System Based on Block Chain. 611-616 - Tianyu Wang

, Zhiyong Zhang, Mengying Zhao, Ke Liu, Zhiping Jia, Jianping Yang, Yang Wu:
H2-RAID: A Novel Hybrid RAID Architecture Towards High Reliability. 617-627 - Binod Kumar Adhikari

, Wanli Zuo, Ramesh Maharjan, Lin Guo
:
Sensitive Data Detection Using NN and KNN from Big Data. 628-642 - Jiahao Liang, Lin You:

Secure Biometric Authentication Scheme Based on Chaotic Map. 643-653

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














