Proceedings of the International Conference on Computer Networks and Communication Technology (CNCT 2016)

+ Advanced search
118 articles
Proceedings Article

Research on Vehicle Classification Algorithm Based on Information Fusion of Dual Reluctance Sensor

Xu LEI, Shuai WANG, Li-wang MA, Rong HE
In view of some errors existing in the vehicle detection system of single sensor node, a vehicle detection algorithm based on dual sensor information fusion for vehicle classification is proposed. The single sensor signal is detected by double threshold method, then matching the vehicle information detected...
Proceedings Article

Authoring of Personalized Web Page from Heterogeneous Web Pages by Content Extraction and Integration

Wei-gang LI, Ke SUN, Shuo-chen WANG
Authoring of personalized Web page by integrating heterogeneous Web page elements from different sites is a challenging task in Web 2.0 applications. An approach to extract various of partitions or elements, which can be the basic HTML elements, CSS definitions, JavaScript source code, etc, from different...
Proceedings Article

A Dynamic Load Balancing Method for Reducing Migrations in DVE Systems

Wei ZHANG, Hang-jun ZHOU, Zhao-ning ZHANG
Adopting multi-server infrastructure is an important way to improve the scalability of distributed virtual environment (DVE) system. Under this infrastructure, maintaining balanced load among multiple servers is of crucial to keep system usability. Existing load balancing methods mainly focus on the...
Proceedings Article

A New Generalized Assignment Problem Model and Its Method

Sheng XIONG, Yu-qi YANG, Ming-fang NI
The assignment problem generally assumes that one person undertakes one task and one task must be accomplished by only one person. However, a real task usually calls for more than one person. In some cases, those persons are required to work at the same time, if so, the classical assignment model will...
Proceedings Article

A Secure Message Transmission Scheme in an Extended Network of Crossed Cubes

Bao-lei CHENG, Ting PAN, Jian-xi FAN, Jing-ya ZHOU, Zhao LIU
Secure message transmission schemes in interconnection networks can be achieved by constructing multiple vertex-disjoint paths or independent spanning trees. The extended network of crossed cube (ECC for short) has the advantages such as easy to be deployed and low ratio between number of vertices and...
Proceedings Article

Mining Cross Site Scripting Vulnerabilities Based on HTML5 in Email Systems

Jian-zhong ZHANG, Ao CHAI
Cross-site scripting attacks has always been one of the most common attacks to the front-end network applications. With the popularity of HTML5, the security of Email systems is facing new challenges. In this paper, we propose a new approach which utilizes HTML5 new tags and new attributes to construct...
Proceedings Article

Research on the Cyberspace Security Evaluation Model of Smart City based on the Big Data Analysis Technology

Yuan TAO, Yu-xiang ZHANG, Ming LI, Wen-rui MA
In order to evaluate the cyberspace security of smart city, a new cyberspace security evaluation model of smart city is proposed, which is based on the big data and the classified protection technology. The key performance indicator and analysis algorithm is provided to quantify the cyberspace security...
Proceedings Article

Design and Implementation of a Security Control Architecture for Software-Defined NetworkingDesign and Implementation of a Security Control Architecture for Software-Defined Networking

Tie-jun LIU, Zhao-wen LIN, Jie XU
Compared with traditional networking, Software-Defined Networking (SDN) enables to solve the scalability, flexibility and other aspects of the problems. However, there still have some questions about previous relevant works for security control. Thus, in this paper, we analyze the new challenges and...
Proceedings Article

Authentication of Voters using the Domain Driven Design (DDD) Architecture for Electronic Voting Systems

Md. Abdul Based, Md. Mahabub Al Hasan, Md. Mazidul Islam
The primary goal of each voting system is to ensure that only the eligible voters should be able to cast their ballots to the respective candidates. Therefore, electronic voting systems need to provide a transparent and trusted authentication process. Traditional paper-based voting schemes involve manual...
Proceedings Article

Trusted Software Monitoring Research Based on Dynamic Proxy

Cai-mao LI, Shao-fan CHEN, Han-wei WU, Jing CHEN
This paper studied how to monitor trusted software behavior based on dynamic proxy. First, it analyzed the dynamic proxy mechanism, putted forward the dynamic proxy monitor model, then researched how to weave the interceptor code in software monitor based on dynamic proxy, showed the weaving process...
Proceedings Article

Review of XSS Attack and Detection on Web Applications

Wen-bing ZHAO, Dan WANG, Zhi-ming DING
Aiming at the difficulties to prevent Web applications to be maliciously injected which are increased by all kinds of dynamic Web technologies applied, concentrate on XSS attack, this paper reviews the research progresses of Web application injection vulnerabilities detection in recent years. It summarizes...
Proceedings Article

A Simple Deniable Authentication Protocol Based on Quantum Key Distribution

Chen-hui JIN, Zhi-yong LI, Su-hua LIAO
A deniable authentication protocol enables a receiver to identify the true source of given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. Recently, Shi et al. proposed a quantum deniable authentication...
Proceedings Article

Research on Optimization of Feature Extracting Based on PD Fingerprints in Pattern Recognition

Wei LI, Lei SHI, Hong-Jing LIU, Huan XIE, Yuan GUI, Dian-Chun ZHENG, Pei-Jing HOU
In order to investigate the effect of feature extraction on pattern classification for partial discharge (PD) signals appearing potential insulating failures in high voltage apparatus while operation, the PD-fingerprints acquired by Hipotronics DDX-7000 digital PD detector are taken as database and method...
Proceedings Article

Speaker Authentication Method Based on Quantum Tunnelling Effect

Liang HUANG, Ping PAN, Chao ZHOU
Speaker authentication is a key problem in the speaker recognition system which has a direct impact on the recognition rate. Classic authentication method is hard to get accurate recognition. This paper puts forward a speaker authentication method based on the quantum tunnel theory, on the basis of analyzing...
Proceedings Article

Multi-Scale Convolutional Network for Person Re-identification

Qiong WU
In the last several years, methods with learning procedure held the state-of-the-art results for person re-identification (re-id) problem, especially the metric learning algorithm. Recently, with the success of deep learning methods on many computer vision tasks, researchers started to put their focuses...
Proceedings Article

A New Approach to Detect User Collusion Behavior in Online QA System

Zhen-hui ZHU, Zhi YANG, Ya-fei DAI
Sybils and Sybil attacks are problems born with social networks. In online QA application Afanti, Sybil users collude with each other to mimic normal users and lower the possibility to be detected. In this paper, we stated this phenomenon and put forward a new approach that can detect user collusion...
Proceedings Article

TOSEC: A TCP/IP Offload based Virtual Network Security Framework in NFV Environment

Hong-wei TANG, Sheng-zhong FENG, Xiao-fang ZHAO
There are two significant problems on NFV based virtual network security solution. One is that the traditional subnet-centered architecture cannot prevent insider attacks between virtual machines in the same subnet. The other is the performance degradation due to virtualization. Motivated by the above...
Proceedings Article

A Novel Certificateless Aggregate Signature Scheme without Bilinear Pairings

Xiao TIAN
Most of the aggregate signature schemes are based on identity public cryptosystem that these identity-based aggregate signatures have certificate management and key escrow problems. And most of these schemes use the bilinear pairings and efficiency is not high. A novel aggregate signature scheme (CLAS-BP)...