Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
402 authors
- Huiba, Li
- Data Deduplication in Cloud Computing Systems
- I-Te, Chen
- Rounding error type random number generator designed by subspace projection
- Jengnan, Tzeng
- Rounding error type random number generator designed by subspace projection
- Jer-Ming, Tsai
- Rounding error type random number generator designed by subspace projection
- Ji, Lu
- Delay-Sensitive Transmission Scheme for VM based Networks in Cloud Computing Data Center
- Jia, Tao
- Research on the access and security Technology of Radio-on-Fiber in Power Communication
- Jiacun, Xu
- Review of Aircraft Aerodynamic Force Parameters Identification based on the Intelligent Algorithm
- Jiahai, Yang
- Deployment and Performance Evaluation of Virtual Network based on OpenStack
- Jianfeng, Lu
- A RESTful Web Service for Information Platform of Intelligent Transportation
- Jianfeng, Lu
- Research and application of the location information in the intelligent transportation
- Jiang, Cuiqing
- Dependability Modelling and Evaluation of Cyber-Physical Systems: A Model-Driven Perspective
- Jiangchun, Ren
- TEM: A Novel Measurement Method for Java Applications on demand in Cloud Computing
- Jianjian, Jiang
- Research on Longest Backward Segmentation for Context
- Jianjun, Tan
- Decode-and-forward plus cooperative jamming based cooperation for wireless physical layer security
- Jianxi, Tao
- Defending Against SYN Flood Attack under Asymmetric Routing Environment
- Jiaolian, Fan
- Research on the Application and Development of Next-Generation Semantic Web in Cloud Environment
- Jie, Huang
- Cloud Storage Retrievability Based On Third Party Audit
- Jie, Huang
- A Lightweight Inter-domain Direct Anonymous Attestation Scheme for Machine-to-Machine Networks
- Jing, Feng
- A method based on compressive sensing to detect community structure using deep belief network
- Jing, Li
- Dynamic Constraint Definition Method in Cloud Databases
- Jing, Nie
- The Feasibility Study of Building Sharing, Premium Teaching Repository Based on Cloud Computing
- Jing, Wei
- IPv6 marked packets preprocessing scheme research based on Hash table
- Jing, Wu
- Security and Strategies in Air Logistics Based on Cloud Computing
- Jingchi, Jiang
- Online Community Perceiving Method on Social Network
- Johanna, Virkki
- A Lightweight Inter-domain Direct Anonymous Attestation Scheme for Machine-to-Machine Networks
- Ju, Lei
- Research on Authentication Method for Virtual Desktop System based on CPK
- Juan, Wang
- A Trusted VM-vTPM Live Migration Protocol in Clouds
- Jubo, Zhao
- Space Target Identification based on RBF Neural Network Ensembles
- Jun, Fu
- Mimicking User Keystrokes to Detect Keyloggers with Dendritic Cell Algorithm
- Jun, He
- A QoS-based service composition optimization method
- Junfang, Wang
- Delay-Sensitive Transmission Scheme for VM based Networks in Cloud Computing Data Center
- Junhan, Wang
- Research and application of the location information in the intelligent transportation
- Kai, Lu
- MIC Acceleration of Saliency Detection Algorithm
- Kan, Chen
- A Network Registration Model with Hidden Real Name
- Kirandeep, Kaur
- Security Vulnerabilities in SAML based Single Sign-On Authentication in Cloud
- Kun, Huang
- The Research on Information Collection and Retrieval Technology of Big Data based Cloud Computing
- Kun, Huang
- The Applied Research on the Virtualization Technology in Cloud Computing
- LI, Ying
- The Application of Cloud Computing in Large-Scale Statistic
- Lanfang, Ren
- Architectural Support for Lease-Regulated Secret Data
- Lei, Xia
- Design of a Wireless Networks Detection and Management System Based on a Mobile Terminal
- Lei, Zhang
- Integral Attacks on Feistel-SP Structure Block Cipher
- Li, Jing-song
- De-identification of free-text medical records in health information exchange
- Li, Jing-song
- Hospital information system integration based on cloud computing
- Li, Liu
- CRYPTO AS A SERVICE
- Li, Peng-fei
- De-identification of free-text medical records in health information exchange
- Li, Qinqian
- Application of An Improved DBSCAN Algorithm in Web Text Mining
- Li, Zhou
- Defending Against SYN Flood Attack under Asymmetric Routing Environment
- Li, Zichen
- Improved Homomorphic String Bits Encryption Public-key Cryptosystem based on LWE
- Li-Ren, Yang
- Implementation of Cloud Platform to Improve Project Performance
- Liang, Chen
- A QoS-based service composition optimization method
- Liang, Chen
- A replica pre-placement strategy based on correlation analysis in cloud environment
- Liang, Pang
- Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper
- Liang, Pang
- Optimal Analysis of Joint Masked-Beamforming in Secure Wireless Communication
- Liang, Pang
- Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination
- Liang, Tao
- Research on Hybrid Scheduling Mechanism based on SOA and Cloud Computing
- Liangliang, Zhang
- A method based on compressive sensing to detect community structure using deep belief network
- Lihua, Li
- Emergency-cloud a new idea about the construction of emergency platform in
- Lijuan, Zhang
- The Strategy of Classification Mining Based on Cloud Computing
- Lili, Zhang
- Intuitionistic Fuzzy Multiple Model Tracking Algorithm for Manoeuvring Target
- Lili, Zhang
- Intuitionistic Fuzzy Neural Networks based on Extended Kalman Filter Training algorithm
- Ling, Ye
- A replica pre-placement strategy based on correlation analysis in cloud environment
- Linpeng, Huang
- A Mechanism for Dependability Processing of Information Flow in Cloud Computing
- Liping, Wu
- Short-term Load forecasting by a new hybrid model
- Liquan, Chen
- A Lightweight Inter-domain Direct Anonymous Attestation Scheme for Machine-to-Machine Networks
- Liting, Zhang
- Integral Attacks on Feistel-SP Structure Block Cipher
- Liu, Jiehui
- Digital image watermarking in power system security
- Liu, Qian
- Detecting Machine Generated Domain Names Based on Morpheme Features
- Liu, QiaoYu
- Research on Authentication Method for Virtual Desktop System based on CPK
- Liu, Shixi
- Dependability Modelling and Evaluation of Cyber-Physical Systems: A Model-Driven Perspective
- Liyao, Li
- Deployment and Performance Evaluation of Virtual Network based on OpenStack
- Lu, Yiqin
- Study of Cloud Computing Security System Based on Rotational Stations
- Lujie, Wang
- A Detecting and Defending Method of Wormhole Attack Based on Time Ruler
- Luoshi, Zhang
- A3: Automatic Analysis of Android Malware
- Luxi, Chen
- A Mechanism for Dependability Processing of Information Flow in Cloud Computing
- Ma, Ping
- Application of Cloud Manufacturing based on the principle of Process-Aware Information System
- Ma, Yuanyuan
- Study on Similarity Compute and File Filtering Based on Cloud Computing Method
- Medhat, A. Tawfeek
- An Ant Algorithm for Cloud Task Scheduling
- Mei-kui, Zhang
- Design of a Wireless Networks Detection and Management System Based on a Mobile Terminal
- Meng, Wu
- OPC:An Effective Memory Computing Solution of Big Data For PC
- Mengxing, Huang
- A Strategy of Dynamic Replica Creation in Cloud Storage
- Mengzhen, Wang
- CRYPTO AS A SERVICE
- Min, Cai
- Performance Modeling for Helper Thread on Shared Cache CMPs
- Min, Liu
- A RESTful Web Service for Information Platform of Intelligent Transportation
- Ming, Wu
- A RESTful Web Service for Information Platform of Intelligent Transportation
- Ming, Zhao
- Security and Strategies in Air Logistics Based on Cloud Computing
- Ming-zhen, Li
- IPv6 marked packets preprocessing scheme research based on Hash table
- Mingjiang, Wang
- A Design and Application of Tilt Angle Algorithm Based on the 3-axis Acceleration Sensor
- Na, Li
- Adaptive Watermarking Algorithm for Digital Image Based on Discrete Cosine Transform
- Ning, Li
- Delay-Sensitive Transmission Scheme for VM based Networks in Cloud Computing Data Center
- PeiJiao, Gong
- Research of Replica Replacement Strategy Oriented Cloud Storage
- Peidong, Zhu
- A Network Registration Model with Hidden Real Name
- Peng, Lei
- A method for designing Hash function based on chaotic neural network
- Peng, Lin
- The Design and Realization of the Test Scheme OpenVPN, Based on Message Simulation
- Peng, Wang
- A QoS-based service composition optimization method
- Peng, Zou
- A QoS-based service composition optimization method
- Ping, Li
- VMPmonitor: An Efficient Modularity Approach for Hidden Process Detection
- Po, Qi
- The Secrets of Skype Login
- Pu, Yiguo
- A Real-Time Authentication Method Based on Cursor-hidden Scene
- Puhan, Zhang
- Access Control Framework for Android System
- Qi, Wen
- Research on Hybrid Scheduling Mechanism based on SOA and Cloud Computing