


default search action
4th ICCCS 2018: Haikou, China
- Xingming Sun, Zhaoqing Pan, Elisa Bertino:

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part IV. Lecture Notes in Computer Science 11066, Springer 2018, ISBN 978-3-030-00014-1
Encryption
- Zhicheng Zhao, Yaqun Zhao, Fengmei Liu:

The Research of Cryptosystem Recognition Based on Randomness Test's Return Value. 3-15 - Xi Chen, Yun Liu, Yong Li, Changlu Lin:

Threshold Proxy Re-encryption and Its Application in Blockchain. 16-25 - Liping Zhao, Xiaoni Du, Chenhuang Wu:

Trace Representation of the Sequences Derived from Polynomial Quotient. 26-37 - Hui-Ran Li, Mingxing Luo, Hong Lai:

Unified Quantum No-Go Theorems of Pure States. 38-47 - Mingda Liu

, Jing Shang
, Peng Liu
, Yijuan Shi
, Mian Wang
:
VideoChain: Trusted Video Surveillance Based on Blockchain for Campus. 48-58
Information Hiding
- Jun Wang

, Wenbo Wan, Mingsheng Zhang, Liming Zou, Jiande Sun:
A Blind Quantization Watermarking Scheme for Screen Content Image. 61-71 - Jin Shi, Li Zhang, Shuijun Yin, Weiwei Liu, Jiangtao Zhai, Guangjie Liu, Yuewei Dai:

A Comprehensive Analysis of Interval Based Network Flow Watermarking. 72-84 - Yazhou Kong

, Liancheng Zhang, Zhenxing Wang
, Yi Guo, Wen Guo:
A Covert Communication Model Based on IPv6 Multicast. 85-98 - Yi Chen, Hongxia Wang, Hanzhou Wu, Yanli Chen, Yong Liu:

A Data Hiding Scheme with High Quality for H.264/AVC Video Streams. 99-110 - Yitong Meng, Jinlong Fei, Yan Chen, Yuefei Zhu:

A Domain Name Model of Anonymous Network Hidden Service. 111-122 - Quansheng Gao

, Kaixi Wang
:
A Layered Steganography Model Based on User Interactions. 123-134 - Bin Ma, Xiaoyu Wang, Bing Li, Yunqing Shi:

A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hiding. 135-146 - Niandong Liao, Caixia Sun, Lingyun Xiang, Feng Li:

A Multiple Watermarking Scheme for Content Authentication of OOXML Format Documents. 147-159 - Li Li, Xin Li, Tong Qiao, Xiaoyu Xu, Shanqing Zhang, Chin-Chen Chang:

A Novel Framework of Robust Video Watermarking Based on Statistical Model. 160-172 - Jielin Jiang, Yan Cui, Yadang Chen, Guangwei Gao:

A Novel Nonlocal Low Rank Technique for Fabric Defect Detection. 173-182 - Xianglei Hu, Haishan Chen, Jiangqun Ni, Wenkang Su

:
A Novel Steganography Scheme Based on Asymmetric Embedding Model. 183-194 - Shiqin Liu

, Minjun Zhao
, Jixin Ma
, Jiangyuan Yao, Yucong Duan
, Xiaoyi Zhou
:
A Novel Watermarking Technology Based on Posterior Probability SVM and Improved GA. 195-207 - Minjun Zhao

, Shiqin Liu
, Chunjie Cao
, Jiangyuan Yao, Xiaoyi Zhou
:
A Secure Blind Watermarking Scheme Based on Dual Frequency Domains and Ergodic Matrix. 208-220 - Xiang Wang, Tianze Shu, Min Xie, Qingqi Pei:

Adaptive Robust Reversible Watermarking Scheme. 221-230 - Fang Cao, Yalei Zhang, Bowen An, Heng Yao, Zhenjun Tang:

An Improved Reversible Data Hiding Scheme with Large Payload Based on Image Local-Complexity. 231-241 - Guojiang Xin, Xitong Qi, Changsong Ding:

An Improved Tamper Detection and Location Scheme for DOCX Format Documents. 242-251 - Wen-chao Xie, Yi-yuan Yang, Zhaohong Li, Jin-wei Wang, Min Zhang:

An Information Hiding Algorithm for HEVC Videos Based on PU Partitioning Modes. 252-264 - Shiyu Li, Dengpan Ye, Shunzhi Jiang, Changrui Liu, Xiaoguang Niu, Xiangyang Luo:

Attack on Deep Steganalysis Neural Networks. 265-276 - Yiyuan Liang, Wei Zhang, Kehua Yang:

Attention-Based Chinese Word Embedding. 277-287 - Huanhuan Hu, Xin Zuo, Weiming Zhang, Nenghai Yu:

Covert Communication by Exploring Statistical and Linguistical Distortion in Text. 288-301 - Jielin Jiang, Yan Cui, Zilong Jin, Chunnian Fan:

Fast Three-Phase Fabric Defect Detection. 302-312 - Yifeng Sun, Xiaoyu Xu, Haitao Song, Guangming Tang, Shunxiang Yang:

Improving Testing Accuracy of Convolutional Neural Network for Steganalysis Using Segmented Subimages. 313-323 - Xiaoming Zhang, Qian Qiang, Weisheng Wang, Zhanfeng Wang, Xianglin Wei:

IPFRA: An Online Protocol Reverse Analysis Mechanism. 324-333 - Jialing Liu, Jingbing Li, Jing Chen, Xiangxi Zou, Jieren Cheng, Jing Liu

:
Medical Image Watermarking Based on SIFT-DCT Perceptual Hashing. 334-345 - Guangxin Fu, Qingbao Li, Zhifeng Chen, Guangyu Zeng, Juanjuan Gu:

Network Storage Covert Channel Detection Based on Data Joint Analysis. 346-357 - Xiaoli He, Hong Jiang, Yu Song, He Xiao:

Optimal Resource Allocation for Underlay Cognitive Radio Networks. 358-371 - Yi Puyang, Zhaoxia Yin, Xinpeng Zhang:

Reversible Data Embedding and Scrambling Method Based on JPEG Images. 372-381 - Dong Li, Yingnan Zhang, Ke Niu, Xiaoyuan Yang:

Reversible Data Hiding for Video. 382-391 - Sijin Cheng, Fangjun Huang:

Reversible Data Hiding in JPEG Images Based on Two-Dimensional Histogram Modification. 392-403 - Hanzhou Wu

, Wei Wang
, Jing Dong, Yanli Chen, Hongxia Wang, Songyang Wu:
Reversible Embedding to Covers Full of Boundaries. 404-415 - Yue Li, Hong-Xia Wang:

Robust H.264/AVC Video Watermarking Without Intra Distortion Drift. 416-427 - Zhenxing Qian

, Lin Pan, Sheng Li, Xinpeng Zhang:
Steganography by Constructing Marbling Texture. 428-439 - Yi Puyang, Zhenxing Qian

, Zhaoxia Yin, Xinpeng Zhang:
Style Transferring Based Data Hiding for Color Images. 440-449 - Zhiqiang Li, Gaoman Zhang, Wei Zhang, Hanwu Chen, Marek A. Perkowski:

Synthesis of Quantum Barrel Shifters. 450-462 - Yi Long, Yuling Liu:

Text Coverless Information Hiding Based on Word2vec. 463-472 - Jianjun Zhang, Yicheng Xie, Jun Shen, Lucai Wang, HaiJun Lin:

Text Information Hiding Method Using the Custom Components. 473-484 - Xin Zuo, Huanhuan Hu, Weiming Zhang, Nenghai Yu:

Text Semantic Steganalysis Based on Word Embedding. 485-495 - Ruowu Wu, Sen Wang, Hui Han, Xiang Chen, Xuhong Yin, Yun Lin

:
The Assessment Research of Communication Jamming Effect Based on Grey Relational Analysis. 496-505 - Shilin Li, Jing Wu, Taoyun Zhou, Dengzhun Wang, Zhuolin Gao:

The Phase and Amplitude Errors Frequency Dependence in L-Band Aperture Synthesis Radiometer Using External Noise Sources. 506-517 - Xu Yang, Yongbin Zhao, Ranran Li, Fengfeng Li, Xiaolin Qi:

Tracing System of Meat Supply Based on RFID and Two-Dimensional Code Technology. 518-527
IOT Security
- Jianming Cui, Rongquan Sui, Xiaojun Zhang, Hengzhong Li, Ning Cao:

A Biometrics-Based Remote User Authentication Scheme Using Smart Cards. 531-542 - Liangbo Xie, Wei Nie, Xiaolong Yang, Yong Wang, Mu Zhou:

A BLF Generation Scheme with Clock Variance-Tolerance for Baseband Processor of EPC Gen2 UHF RFID Tag. 543-552 - Kun Yang, Mingzhe Liu

, Yaming Yang, Xin Jiang:
A Design of Mobile Phone Privacy Protection Based on Block Chain. 553-562 - Langping Tang, Yuren Zhou, Zefeng Chen:

A Dominance-Based Constrained Optimization Evolutionary Algorithm for the 4-th Tensor Power Problem of Matrix Multiplication. 563-575 - Donghui Li, Cong Shen

, Xiaopeng Dai, Haiwen Chen:
A Kind of Agricultural Content Networking Information Fusion Method Based on Ontology. 576-588 - Zhongmiao Kang, Wenting Jiang, Yan Chen:

A Lightweight Graph-Based Model for Inter-networking Access Control. 589-597 - Jinlong Chen, Mengke Jiang, Kun Xie, Zhen Guo, Hang Pan, Xianjun Chen:

A Method for Energy Consumption Audit and Intelligent Decision of Green Buildings. 598-607 - Yang Yang, Xiang yang Gong, Xuesong Qiu, Zhipeng Gao, Haitao Yu:

A Mixed Mobile Charging Strategy in Rechargeable Wireless Sensor Networks. 608-621 - Sohaib Manzoor, Xiaojun Hei, Wenqing Cheng:

A Multi-controller Load Balancing Strategy for Software Defined WiFi Networks. 622-633 - Rongzhen Bian, Mingfu Xue, Jian Wang:

A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis. 634-646 - Ye Zhou, Jiabin Yuan, Xuwei Tang:

A Novel Part-Based Model for Fine-Grained Vehicle Recognition. 647-658 - Zhe Wang

, Weidong Yi, Yongrui Chen, Ming Li:
A Novel Photovoltaic Cell Simulator for Green Internet of Things. 659-670 - Andy Wang, Chen Wang, Meng Bi, Jian Xu

:
A Review of Privacy-Preserving Machine Learning Classification. 671-682 - Xiaodong Liu, Qi Liu, Yanyun Zou, Guizhi Wang:

A Self-organizing LSTM-Based Approach to PM2.5 Forecast. 683-693 - Jianming Cui, Chen Chen, Xiaojun Zhang, Yihui Liu, Ning Cao:

A Three-Factor Remote Authentication Scheme for Multi-server Environment. 694-705 - Xiaoliang Wang, Jianming Jiang, Baowei Wang, Zhihua Xia

:
A VANET Anonymous Authentication Mechanism for Multi-level Application Scenarios. 706-717

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














