


default search action
3. ICCCS 2017: Nanjing, China
- Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino:

Cloud Computing and Security - Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I. Lecture Notes in Computer Science 10602, Springer 2017, ISBN 978-3-319-68504-5
Information Hiding
- Fei Peng

, Shuai-ping Wang, Gang Luo, Min Long:
Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling. 3-15 - Huimin Luo, Jiabin Yuan, Wenjing Dai:

A New Universal Quantum Gates and Its Simulation on GPGPU. 16-27 - Yanli Chen, Hongxia Wang, Hanzhou Wu

:
Data Hiding-Based Video Error Concealment Method Using Compressed Sensing. 28-38 - Shuang Yu, Jian Li, Jinwei Wang:

A Novel Robust Reversible Watermarking Scheme Based on IWT. 39-48 - Yi Puyang, Zhaoxia Yin, Guorui Feng, Andrew K. Abel:

An Improved Reversible Information Hiding Scheme Based on AMBTC Compressed Images. 49-60 - Yong Liu, Hong-Xia Wang, Han-Zhou Wu

, Yi Chen
:
An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points. 61-73 - Yingbo Yu, Xin Liao

:
Improved CMD Adaptive Image Steganography Method. 74-84 - Zhen Li, Jiabin Yuan:

Quantum Computer Simulation on GPU Cluster Incorporating Data Locality. 85-97 - Jianfeng Lu, Peng Gao, Shanqing Zhang, Li Li, Wenqiang Yuan, Qili Zhou:

Tampering Detection in Oral History Video Using Watermarking. 98-109 - Yafei Yuan, Wei Lu, Bingwen Feng, Jian Weng

:
Steganalysis with CNN Using Multi-channels Filtered Residuals. 110-120 - Jianjun Zhang, Yicheng Xie, Lucai Wang, HaiJun Lin:

Coverless Text Information Hiding Method Using the Frequent Words Distance. 121-132 - Chun-Xing Wang, Teng Zhang, Wenbo Wan, Jiande Sun, Jing Li, Meiling Xu:

Improved STDM Watermarking Using Semantic Information-Based JND Model. 133-142 - Shujiang Xu, Lianhai Wang, Guangqi Liu, Xiaohui Han, Dawei Zhao, Lijuan Xu:

The Categories of Quantum Information Hiding Protocol. 143-152 - Conghua Liu, Gang Luo, Zuwei Tian:

Coverless Information Hiding Technology Research Based on News Aggregation. 153-163
Cloud Computing
- Tianmu Li, Leiming Yan:

SIEM Based on Big Data Analysis. 167-175 - Hongjie Zhang

, Guansheng Shu, Shasha Liao, Xi Fu, Jing Li:
Workload-Aware VM Consolidation in Cloud Based on Max-Min Ant System. 176-188 - Longchang Zhang, Yanhong Yang, Decai Sun:

Parallel Service Selection Method Based on Adaptive Cloud Model for Mobile Application. 189-200 - Jun-Qing Li, Yuyan Han, Cun-gang Wang:

A Hybrid Artificial Bee Colony Algorithm to Solve Multi-objective Hybrid Flowshop in Cloud Computing Systems. 201-213 - Guoping Du, Wenbin Yao, Dongbin Wang, Xiaole Wen:

A Group-Based Replica Consistency Schema for Cloud Storage. 214-225 - Zhe Zheng, Kun Xie, Shiming He, Jun Deng:

A Multi-objective Optimization Scheduling Method Based on the Improved Differential Evolution Algorithm in Cloud Computing. 226-238 - Muzhou Xiong, Haixin Liu, Deze Zeng:

A Network Calculus Analysis for the Baseband Processing Capacity in Cloud Radio Access Network. 239-250 - Yubing Mao, Zhengyou Xia:

Live Migration Among CloudBased on MOOSE Address. 251-261 - Yuanyuan Zhang, Jinbo Xiong, Mingwei Lin

, Lili Wang, Xuan Li:
Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications. 262-274 - Jieren Cheng, Kuanqi Cai

, Boyi Liu, Xiangyan Tang:
Design and Test of the Intelligent Rubber Tapping Technology Evaluation Equipment Based on Cloud Model. 275-287 - Kyle Morton, Yanzhen Qu, Marilyn Carroll:

An Affective Computing and Fuzzy Logic Framework to Recognize Affect for Cloud-based E-Learning Environment Using Emoticons. 288-299 - Micheal Ernest Taylor, Jian Shen

:
Cloud Management Systems and Virtual Desktop Infrastructure Load Balancing Algorithms - A Survey. 300-309
IoT Applications
- Irfan Dwiguna Sumitra

, Rongtao Hou, Sri Supatmi
:
Design and Deployment of Wireless Sensor Networks for Flood Detection in Indonesia. 313-325 - Xin Su, Xuchong Liu, Jiuchuan Lin, Yu Tong:

An Android App Recommendation Approach by Merging Network Traffic Cost. 326-338 - Qi Liu, Weixin Bu, Kai Zhang, Xiaodong Liu, Nigel Linge:

A Virtual Grid-Based Routing Protocol for Mobile Sink-Based WSNs. 339-348 - Yating Hou, Feng Xu, Ruilin Ding:

Low-Energy Security-Enhanced Routing Protocol Based on DBSCAN Partition. 349-360 - Xiaodong Liu, Qi Liu:

Power Consuming Activity Recognition in Home Environment. 361-372 - Yating Hou, Feng Xu, Mingming Su, Kaibo Yu:

A Pre-partition Based Uneven Clustering Multi-hop Routing Protocol. 373-384 - Jinxia Dou, Wenbin Yao, Dongbin Wang:

A Credibility Evaluation Method in Opportunistic Networks. 385-397 - Kondwani M. Kamoto, Qi Liu, Xiaodong Liu:

Unsupervised Energy Disaggregation of Home Appliances. 398-409 - Yang Guo, Zheng Xiao, Hui Chen, Ling Huang:

Planar-Based Visual Positioning for a Mobile Robot with Monocular Vision. 410-421 - Zichun Wang, Meng Feng, Tiantian Miao, Wei Jiang

, Jian Shen
:
Energy Efficient MAC Protocol for Wireless Sensor Networks: A Survey. 422-429 - Jin Wang

, Chunwei Ju, Huan Ji, Geumran Youn, Jeong-Uk Kim:
A Particle Swarm Optimization and Mutation Operator Based Node Deployment Strategy for WSNs. 430-437 - Zhi Zhao, Peng Pin, Weiyu Yu:

A Distributed Sparse Signal Reconstruction Algorithm in Wireless Sensor Network. 438-449 - Xiaodong Liu, Qi Liu:

An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. 450-459 - Xiaoxiao Guan, Xiangping Zhai

, Jiabin Yuan, Hu Liu:
Energy-Efficient Power Control and Resource Allocation for D2D Communications in Underlaying Cellular Networks. 460-471 - Shih-Yun Huang, Chen-Chi Liao, Yao-Chung Chang, Han-Chieh Chao

:
Virtual Machine Placement Based on Metaheuristic for IoT Cloud. 472-482 - Long Cheng, Yuchao Shao, Yan Wang:

A Novel Kalman Filter Based NLOS Localization Method for Wireless Sensor Networks. 483-494 - Xiaoyong Yan, Zhong Yang, Yu Liu, Zhong Su, Huijun Li:

An Improved Localization Algorithm for Anisotropic Sensor Networks. 495-507 - Zhihua Diao, Chunying Diao, Xiaoliang Qian, Yuanyuan Wu:

Further Results on Finite-Time Stability of Switched Static Neural Networks. 508-518 - Yangyang Li, Xiaoju Hou, Licheng Jiao

, Yu Xue:
An Improved Artificial Immune Network Based on the Secondary Immune Mechanism for Data Clustering. 519-530 - Haichao Guan, Huakang Li, Guozi Sun:

Analysis of User's Abnormal Behavior Based on Behavior Sequence in Enterprise Network. 531-541 - Yunqi Dou, Chuangui Ma, Yanbin Li, Fushan Wei:

An Efficient Speeding up Algorithm of Frobenius Based Scalar Multiplication on Koblitz Curves for Cloud Computing. 542-551 - Qingling Wang

:
Consensus of Multi-agent Systems with State Constraints. 552-560

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














