Proceedings of the The 1st International Workshop on Cloud Computing and Information Security

402 authors
Qi, Xue
Multi-Attribute Decision-Making Based Trusted Multipath Routing in Mobile Ad Hoc Networks
Qianjin, Tang
Video Structured Description System with Private Cloud
Qin, Jiancheng
Study of Cloud Computing Security System Based on Rotational Stations
Qin, Pu
A method for designing Hash function based on chaotic neural network
Qing, Li
Multi-Attribute Decision-Making Based Trusted Multipath Routing in Mobile Ad Hoc Networks
Qingkuan, Dong
Multi-Attribute Decision-Making Based Trusted Multipath Routing in Mobile Ad Hoc Networks
Qingyun, Liu
Defending Against SYN Flood Attack under Asymmetric Routing Environment
Qunfang, Zhang
Cloud Storage Retrievability Based On Third Party Audit
Renhou, Zhao
Intuitionistic Fuzzy Multiple Model Tracking Algorithm for Manoeuvring Target
Renhou, Zhao
Intuitionistic Fuzzy Neural Networks based on Extended Kalman Filter Training algorithm
Reza, Sahandi
Migration to Cloud Computing- The Impact on IT Management and Security
Rong, Chen
A Detecting and Defending Method of Wormhole Attack Based on Time Ruler
Rong, Li
Research of Replica Replacement Strategy Oriented Cloud Storage
Rong, Yang
Defending Against SYN Flood Attack under Asymmetric Routing Environment
Rui, Jiang
A Group Based Identity Anonymity and Secure Cloud Storage Scheme
Rujing, Wang
VMPmonitor: An Efficient Modularity Approach for Hidden Process Detection
Runzhi, Li
Optimizing Live Migration of Virtual Machines with Context Based Prediction Algorithm
SUN, Hongfeng
The Application of Cloud Computing in Large-Scale Statistic
SUN, Xiuli
The Application of Cloud Computing in Large-Scale Statistic
Sanjeev, Sofat
Bivariate Classification of Malware in JavaScript using Dynamic Analysis
Sanpeng, Wei
A Strategy of Dynamic Replica Creation in Cloud Storage
Shang, Yanlei
An Improved Multimedia Conference System with Load Balance
Shanxi, Li
Research on the Performance of Encryption Techniques for High-Bandwidth Multicast Video Streaming
Shaochun, Wu
A replica pre-placement strategy based on correlation analysis in cloud environment
Shaoka, Zhao
Deployment and Performance Evaluation of Virtual Network based on OpenStack
Shen, Ge
Review of Aircraft Aerodynamic Force Parameters Identification based on the Intelligent Algorithm
Shen, Ge
The digital library cloud storage based on Hadoop
Shen, Jia jie
Based on PSO cloud computing service discovering
Shen, Jiajie
Based on PSO cloud computing server points location searching
Sheng, Chen
A Cloud-based China s Landslide Disaster Database (CCLDD) Development and Analysis
Sheng, Xu
Research on the access and security Technology of Radio-on-Fiber in Power Communication
Shi-Zhong, Bai
A new SS-closedness in L-topological spaces
Shin-Jer, Yang
A Virtualized Bandwidth Resource Allocation Scheme To Improve the Transmission Performance in Cloud Computing
Shiping, Chen
The Study of Improved FP-Growth Algorithm in MapReduce
Shuanglin, Huang
Decode-and-forward plus cooperative jamming based cooperation for wireless physical layer security
Shuguang, Qi
Study on Cloud Computing Data Center Infrastructure Best Practices
Shuguang, Zhao
The Strategy of Classification Mining Based on Cloud Computing
Shuxiao, Huang
Deployment and Performance Evaluation of Virtual Network based on OpenStack
Songling, Huang
Future trend of integrating instrumentation into the cloud
Songzhu, Mei
TEM: A Novel Measurement Method for Java Applications on demand in Cloud Computing
Sun, Zhanquan
A Parallel Clustering Method Study Based on MapReduce
Surya Prateek, Surampalli
Cloud Server with OpenFlow: Load Balancing
Swee-Huay, Heng
PeANFIS-FARM Framework in Defending against Web Service Attacks
Tao, Guo
Access Control Framework for Android System
Tao, Zhang
Analysis of Privacy Preserving for Big Data in the Environment of Power Systems
Tao-Ku, Chang
A Secure Mobile Payment Model
Tian, Lixin
Reliability Modeling of Working-Table Production Oriented MANET
WU, Qiwu
Identity-based Remote Authentication and Key Agreement Protocol with Anonymity
WU, Xiao-ping
Active Defense strategies selection for network mixed malicious action
Wan, Yimin
On User Capacity Optimization Strategy of Server Computing Based Desktop Cloud
Wang, Xi
Digital image watermarking in power system security
Wang, Ying
Application of An Improved DBSCAN Algorithm in Web Text Mining
Wang, Ying
Digital image watermarking in power system security
Wang, Yu
Hospital information system integration based on cloud computing
Wang, Yufei
Study on Similarity Compute and File Filtering Based on Cloud Computing Method
Wanqing, Chi
MIC Acceleration of Saliency Detection Algorithm
Wei, Huiqin
The platform design of the cloud instructional resources based on the Hadoop framework
Wei, Xia
TCPI: A Novel Method of Encrypted Page Identification
Wei, Yang
Defending Against SYN Flood Attack under Asymmetric Routing Environment
Wei, Yang
Analysis of Privacy Preserving for Big Data in the Environment of Power Systems
Wei, Zhang
Vulnerability Mining Techniques in Android Platform
Wei, Zhao
Future trend of integrating instrumentation into the cloud
Wei, Zicheng
A Real-Time Authentication Method Based on Cursor-hidden Scene
Wei-min, Lin
Analysis of Privacy Preserving for Big Data in the Environment of Power Systems
Weichun, Huang
Research on Longest Backward Segmentation for Context
Weiwei, Sun
A Cloud-based China s Landslide Disaster Database (CCLDD) Development and Analysis
Weiyue, Li
A Cloud-based China s Landslide Disaster Database (CCLDD) Development and Analysis
Wenbo, Chen
Research on the Performance of Encryption Techniques for High-Bandwidth Multicast Video Streaming
Wenchuan, Yang
Research of a MapReduce Communication Data Stream Processing Model
Wenjun, Luo
An Efficient Scheme of Multi-user Searchable Encryption with Keyword in Cloud Storage
Wenling, Wu
Integral Attacks on Feistel-SP Structure Block Cipher
Wenqing, Liu
Vulnerability Mining Techniques in Android Platform
Wenrui, Li
A New Dynamic Trust Approach for Cloud Computing
Xi, Yu
Intelligent Resources Dispatching System of Urban Emergency Based on SOA and Cloud Computing
Xiang, Shuai
A replica pre-placement strategy based on correlation analysis in cloud environment
Xiang, Yang-xia
The Research and Design of Cloud Computing Framework Model Based on SOA
Xianglong, Ye
A Strategy of Dynamic Replica Creation in Cloud Storage
Xianzhen, Wu
A Design and Application of Tilt Angle Algorithm Based on the 3-axis Acceleration Sensor
Xiao, Chen
Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper
Xiao, Chen
Optimal Analysis of Joint Masked-Beamforming in Secure Wireless Communication
Xiao, Chen
Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination
Xiao, Ling
Deployment and Performance Evaluation of Virtual Network based on OpenStack
Xiao, Wu
A3: Automatic Analysis of Android Malware
XiaoBo, Cao
Design Task Modeling and Task Allocation Method Research Based Multi-granularity Space in Distributed Network Environment
Xiaoguang, Zhou
Intuitionistic Fuzzy Multiple Model Tracking Algorithm for Manoeuvring Target
Xiaoguang, Zhou
Intuitionistic Fuzzy Neural Networks based on Extended Kalman Filter Training algorithm
Xiaolin, Qin
A New Dynamic Trust Approach for Cloud Computing
Xiaolong, Wang
A QoS-based service composition optimization method
Xiaoping, Wang
MIC Acceleration of Saliency Detection Algorithm
Xiaoxian, Chen
The Mechanism of Tencent QQ Video Communication
Xie, Ping
Application of An Improved DBSCAN Algorithm in Web Text Mining
Xie, Ping
Digital image watermarking in power system security
Xingling, Wang
Research on Hybrid Scheduling Mechanism based on SOA and Cloud Computing
Xinguo, Zou
Adaptive Watermarking Algorithm for Digital Image Based on Discrete Cosine Transform
Xinxing, Yin
Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper
Xinxing, Yin
Optimal Analysis of Joint Masked-Beamforming in Secure Wireless Communication
Xinxing, Yin
Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination
Xiongwei, Zhang
A method based on compressive sensing to detect community structure using deep belief network
Xiumin, Shang
Intuitionistic Fuzzy Neural Networks based on Extended Kalman Filter Training algorithm
Xiuqing, Lu
Dynamic Constraint Definition Method in Cloud Databases