Proceedings of the The 1st International Workshop on Cloud Computing and Information Security

402 authors
Huiba, Li
Data Deduplication in Cloud Computing Systems
I-Te, Chen
Rounding error type random number generator designed by subspace projection
Jengnan, Tzeng
Rounding error type random number generator designed by subspace projection
Jer-Ming, Tsai
Rounding error type random number generator designed by subspace projection
Ji, Lu
Delay-Sensitive Transmission Scheme for VM based Networks in Cloud Computing Data Center
Jia, Tao
Research on the access and security Technology of Radio-on-Fiber in Power Communication
Jiacun, Xu
Review of Aircraft Aerodynamic Force Parameters Identification based on the Intelligent Algorithm
Jiahai, Yang
Deployment and Performance Evaluation of Virtual Network based on OpenStack
Jianfeng, Lu
A RESTful Web Service for Information Platform of Intelligent Transportation
Jianfeng, Lu
Research and application of the location information in the intelligent transportation
Jiang, Cuiqing
Dependability Modelling and Evaluation of Cyber-Physical Systems: A Model-Driven Perspective
Jiangchun, Ren
TEM: A Novel Measurement Method for Java Applications on demand in Cloud Computing
Jianjian, Jiang
Research on Longest Backward Segmentation for Context
Jianjun, Tan
Decode-and-forward plus cooperative jamming based cooperation for wireless physical layer security
Jianxi, Tao
Defending Against SYN Flood Attack under Asymmetric Routing Environment
Jiaolian, Fan
Research on the Application and Development of Next-Generation Semantic Web in Cloud Environment
Jie, Huang
Cloud Storage Retrievability Based On Third Party Audit
Jie, Huang
A Lightweight Inter-domain Direct Anonymous Attestation Scheme for Machine-to-Machine Networks
Jing, Feng
A method based on compressive sensing to detect community structure using deep belief network
Jing, Li
Dynamic Constraint Definition Method in Cloud Databases
Jing, Nie
The Feasibility Study of Building Sharing, Premium Teaching Repository Based on Cloud Computing
Jing, Wei
IPv6 marked packets preprocessing scheme research based on Hash table
Jing, Wu
Security and Strategies in Air Logistics Based on Cloud Computing
Jingchi, Jiang
Online Community Perceiving Method on Social Network
Johanna, Virkki
A Lightweight Inter-domain Direct Anonymous Attestation Scheme for Machine-to-Machine Networks
Ju, Lei
Research on Authentication Method for Virtual Desktop System based on CPK
Juan, Wang
A Trusted VM-vTPM Live Migration Protocol in Clouds
Jubo, Zhao
Space Target Identification based on RBF Neural Network Ensembles
Jun, Fu
Mimicking User Keystrokes to Detect Keyloggers with Dendritic Cell Algorithm
Jun, He
A QoS-based service composition optimization method
Junfang, Wang
Delay-Sensitive Transmission Scheme for VM based Networks in Cloud Computing Data Center
Junhan, Wang
Research and application of the location information in the intelligent transportation
Kai, Lu
MIC Acceleration of Saliency Detection Algorithm
Kan, Chen
A Network Registration Model with Hidden Real Name
Kirandeep, Kaur
Security Vulnerabilities in SAML based Single Sign-On Authentication in Cloud
Kun, Huang
The Research on Information Collection and Retrieval Technology of Big Data based Cloud Computing
Kun, Huang
The Applied Research on the Virtualization Technology in Cloud Computing
LI, Ying
The Application of Cloud Computing in Large-Scale Statistic
Lanfang, Ren
Architectural Support for Lease-Regulated Secret Data
Lei, Xia
Design of a Wireless Networks Detection and Management System Based on a Mobile Terminal
Lei, Zhang
Integral Attacks on Feistel-SP Structure Block Cipher
Li, Jing-song
De-identification of free-text medical records in health information exchange
Li, Jing-song
Hospital information system integration based on cloud computing
Li, Liu
CRYPTO AS A SERVICE
Li, Peng-fei
De-identification of free-text medical records in health information exchange
Li, Qinqian
Application of An Improved DBSCAN Algorithm in Web Text Mining
Li, Zhou
Defending Against SYN Flood Attack under Asymmetric Routing Environment
Li, Zichen
Improved Homomorphic String Bits Encryption Public-key Cryptosystem based on LWE
Li-Ren, Yang
Implementation of Cloud Platform to Improve Project Performance
Liang, Chen
A QoS-based service composition optimization method
Liang, Chen
A replica pre-placement strategy based on correlation analysis in cloud environment
Liang, Pang
Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper
Liang, Pang
Optimal Analysis of Joint Masked-Beamforming in Secure Wireless Communication
Liang, Pang
Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination
Liang, Tao
Research on Hybrid Scheduling Mechanism based on SOA and Cloud Computing
Liangliang, Zhang
A method based on compressive sensing to detect community structure using deep belief network
Lihua, Li
Emergency-cloud a new idea about the construction of emergency platform in
Lijuan, Zhang
The Strategy of Classification Mining Based on Cloud Computing
Lili, Zhang
Intuitionistic Fuzzy Multiple Model Tracking Algorithm for Manoeuvring Target
Lili, Zhang
Intuitionistic Fuzzy Neural Networks based on Extended Kalman Filter Training algorithm
Ling, Ye
A replica pre-placement strategy based on correlation analysis in cloud environment
Linpeng, Huang
A Mechanism for Dependability Processing of Information Flow in Cloud Computing
Liping, Wu
Short-term Load forecasting by a new hybrid model
Liquan, Chen
A Lightweight Inter-domain Direct Anonymous Attestation Scheme for Machine-to-Machine Networks
Liting, Zhang
Integral Attacks on Feistel-SP Structure Block Cipher
Liu, Jiehui
Digital image watermarking in power system security
Liu, Qian
Detecting Machine Generated Domain Names Based on Morpheme Features
Liu, QiaoYu
Research on Authentication Method for Virtual Desktop System based on CPK
Liu, Shixi
Dependability Modelling and Evaluation of Cyber-Physical Systems: A Model-Driven Perspective
Liyao, Li
Deployment and Performance Evaluation of Virtual Network based on OpenStack
Lu, Yiqin
Study of Cloud Computing Security System Based on Rotational Stations
Lujie, Wang
A Detecting and Defending Method of Wormhole Attack Based on Time Ruler
Luoshi, Zhang
A3: Automatic Analysis of Android Malware
Luxi, Chen
A Mechanism for Dependability Processing of Information Flow in Cloud Computing
Ma, Ping
Application of Cloud Manufacturing based on the principle of Process-Aware Information System
Ma, Yuanyuan
Study on Similarity Compute and File Filtering Based on Cloud Computing Method
Medhat, A. Tawfeek
An Ant Algorithm for Cloud Task Scheduling
Mei-kui, Zhang
Design of a Wireless Networks Detection and Management System Based on a Mobile Terminal
Meng, Wu
OPC:An Effective Memory Computing Solution of Big Data For PC
Mengxing, Huang
A Strategy of Dynamic Replica Creation in Cloud Storage
Mengzhen, Wang
CRYPTO AS A SERVICE
Min, Cai
Performance Modeling for Helper Thread on Shared Cache CMPs
Min, Liu
A RESTful Web Service for Information Platform of Intelligent Transportation
Ming, Wu
A RESTful Web Service for Information Platform of Intelligent Transportation
Ming, Zhao
Security and Strategies in Air Logistics Based on Cloud Computing
Ming-zhen, Li
IPv6 marked packets preprocessing scheme research based on Hash table
Mingjiang, Wang
A Design and Application of Tilt Angle Algorithm Based on the 3-axis Acceleration Sensor
Na, Li
Adaptive Watermarking Algorithm for Digital Image Based on Discrete Cosine Transform
Ning, Li
Delay-Sensitive Transmission Scheme for VM based Networks in Cloud Computing Data Center
PeiJiao, Gong
Research of Replica Replacement Strategy Oriented Cloud Storage
Peidong, Zhu
A Network Registration Model with Hidden Real Name
Peng, Lei
A method for designing Hash function based on chaotic neural network
Peng, Lin
The Design and Realization of the Test Scheme OpenVPN, Based on Message Simulation
Peng, Wang
A QoS-based service composition optimization method
Peng, Zou
A QoS-based service composition optimization method
Ping, Li
VMPmonitor: An Efficient Modularity Approach for Hidden Process Detection
Po, Qi
The Secrets of Skype Login
Pu, Yiguo
A Real-Time Authentication Method Based on Cursor-hidden Scene
Puhan, Zhang
Access Control Framework for Android System
Qi, Wen
Research on Hybrid Scheduling Mechanism based on SOA and Cloud Computing