


default search action
4th ICCCS 2018: Haikou, China
- Xingming Sun, Zhaoqing Pan, Elisa Bertino:

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part V. Lecture Notes in Computer Science 11067, Springer 2018, ISBN 978-3-030-00017-2
IOT Security
- Jing Xu, Hongyan Qian, Yanchao Zhao:

Accurate Moving Distance Estimation via Multi-modal Fusion from IMU Sensors and WiFi Signal. 3-15 - Cui Zhao, Han Ding, Kaiyan Cui, Fan Liang:

Accurate UHF Tag Authentication Using Near-Field Capabilities. 16-26 - Chenxin Wang, Shunyao Kang:

ADFL: An Improved Algorithm for American Fuzzy Lop in Fuzz Testing. 27-36 - Wentian Zheng, Lijun Yang, Meng Wu:

An Improved Distributed PCA-Based Outlier Detection in Wireless Sensor Network. 37-49 - Yuxia Zhang, Xin Zhang, Fengtong Wen:

An Improved IoT Notion-Based Authentication and Key Agreement Protocol for Heterogenous Ad Hoc Wireless Sensor Network. 50-62 - Xiaodong Liu, Qi Liu:

Appliance Recognition Based on Continuous Quadratic Programming. 63-72 - Yanhan Yang, Yaming Yang, Jinlian Chen, Mingzhe Liu

:
Application of BlockChain in Internet of Things. 73-82 - Chen Jin, Zeshui Xu

, Guizhi Wang:
Assessment of Haze Effects in Human Lives: A Case Study of Investigation in Nanjing. 83-93 - Gongbo Wang, Weiyu Dong, Rui Chang:

Association Analysis of Firmware Based on NoSQL Database. 94-105 - Dong-fen Li, Rui-Jin Wang, Daniel Adu-Gyamfi

, Jin-lian Chen, Ya-Ming Yang, Mingzhe Liu
:
Authentication of Quantum Dialogue Under Noise. 106-117 - Shengqian Ma, Fanchen Meng, Yanruixuan Ma, Jisong Su:

Automatic Integrated Exhaust Fan Based on AT89S51 Single Chip Microcomputer. 118-127 - Suying Li, Zhenzhou Ma, Peitao Han, Siyang Zhao, Peiying Guo, Hepeng Dai:

Bring Intelligence to Ports Based on Internet of Things. 128-137 - Shanliang Xue, Mengying Li, Peiru Yang:

Centroid Location Technology Based on Fuzzy Clustering and Data Consistency. 138-147 - Xing Zhang, Liang Zhou:

Classification of Car Scratch Types Based on Optimized BP Neural Network. 148-158 - Jianjing Cui, Jun Long, Erxue Min, Qiang Liu, Qian Li:

Comparative Study of CNN and RNN for Deep Learning Based Intrusion Detection System. 159-170 - Yajie Sun, Yanqing Yuan, Lihua Wang:

Composite Structure Health Monitoring Review Based on FBG Sensor. 171-179 - Wenting Jiang, Yan Chen, Yingqian Liao:

Correlation Analysis of Alarm Data Based on Fuzzy Rule in Power Network. 180-190 - Min Cui, Fengtong Mei, Qiangyi Li

, Qiangnan Li:
Coverage Holes Recovery Algorithm of Underwater Wireless Sensor Networks. 191-204 - Sunil Kr. Jha

, Parimala Paramasivam, Zhaoqing Pan, Jinwei Wang:
Decision Stump and StackingC-Based Hybrid Algorithm for Healthcare Data Classification. 205-216 - Ziqing Zhang, Pingzeng Liu:

Design and Development of Wheat Production Information Management System Based on Internet of Things. 217-227 - Chun-ling Jiang, Song Xue:

Design of Indoor LED Intelligent Dimming and Color Modulation System Based on Zigbee. 228-240 - Tianyou Chang, Qiang Wei, Wenwen Liu, Yangyang Geng:

Detecting PLC Program Malicious Behaviors Based on State Verification. 241-255 - Xiaopeng Li, Fei Xiao, Ling Li, Jiangjiang Shen, Fengchen Qian:

Detection Method of Hardware Trojan Based on Wavelet Noise Reduction and Neural Network. 256-265 - Ning Liu, Min Yang, Hang Zhang, Chen Yang, Yang Zhao, Jianchao Gan, Shibin Zhang:

Detection of Android Applications with Malicious Behavior Based on Sparse Bayesian Learning Algorithm. 266-275 - Yue Fu, Rong Du, Dagang Li

:
Distribution of CA-Role in Block-Chain Systems. 276-285 - Lingren Wang, Jingbing Li, Jieren Cheng, Uzair Aslam Bhatti, Qianning Dai:

DoS Attacks Intrusion Detection Algorithm Based on Support Vector Machine. 286-297 - Chunru Zhou, Min Lei, Kunchang Li, Li Xu, Wei Bi:

Dynamic-Enabled Defense Strategy Base on Improved CVSS for the Home Internet. 298-307 - Xiawei Jiang

, Weidong Yi, Yongrui Chen, Hao He:
Energy Efficient Smart Irrigation System Based on 6LoWPAN. 308-319 - Zhiqiang Ruan, Haibo Luo, Wenzhong Lin:

Enhancing Named-Based Caching in NDN. 320-330 - Jianyong Zhang, Pingzeng Liu, Xue Wang, Rui Zhao:

Farmland Intelligent Information Collection System Based on NB-IoT. 331-343 - Wenzao Li

, Bing Wan
, Zhan Wen
, Jianwei Liu, Yue Cao
, Tao Wu
, Jiliu Zhou
:
FRDV: A DTN Routing Based on Human Moving Status in Urban Environments. 344-355 - Bin Ma, Qi Li

:
High Speed Pharmaceutical Packaging Detection System Based on Genetic Algorithm and Memory Optimization. 356-368 - Kai Xue, Junyi Wang:

Identifying Influential Spreaders by Temporal Efficiency Centrality in Temporal Network. 369-383 - Yousheng Zhou, Chujun Wu:

Identifying Rumor Source of Online Social Networks in the SEIR Model. 384-394 - Liyang, Pingzeng Liu, Bangguo Li, Xueru Yu:

Intelligent Control System of Cucumber Production in the Greenhouse Based on Internet of Things. 395-406 - YuQun, Yan Zhang, Xiuli Wang, Baoquan Li:

Intelligent Poultry Environment Control System Based on Internet of Things. 407-417 - Lei Wang, Kunqin Li, Xianxiang Chen:

Internet of Things Security Analysis of Smart Campus. 418-428 - Hangyu Hu, Xuemeng Zhai, Mingda Wang, Guangmin Hu:

Linked-Behaviors Profiling in IoT Networks Using Network Connection Graphs (NCGs). 429-439 - Shaojun Yan, Haihua Liang, Xinpeng Zhang:

Location Privacy-Preserving Scheme Based on Multiple Virtual Maps. 440-452 - Shiyuan Zhang, Hui He, Zhi Wang, Mingze Gao, Jinsong Mao:

Low-Power Listen Based Driver Drowsiness Detection System Using Smartwatch. 453-464 - Hongyi Chen, Jinshu Su, Linbo Qiao, Yi Zhang, Qin Xin:

Malware Collusion Attack Against Machine Learning Based Methods: Issues and Countermeasures. 465-477 - Kondwani M. Kamoto

, Qi Liu:
Monitoring Home Energy Usage Using an Unsupervised NILM Algorithm Based on Entropy Index Constraints Competitive Agglomeration (EICCA). 478-490 - Xueli Hu, Qi Xi, Zhenxing Wang:

Monitoring of Root Privilege Escalation in Android Kernel. 491-503 - Shirui Huang, Hengwei Zhang

, Jindong Wang, Jianming Huang:
Network Defense Decision-Making Method Based on Stochastic Differential Game Model. 504-516 - Zhouwen Tan, Hongli Liu, Ziji Ma, Yun Cheng:

Noise Modeling and Analysis for Indoor Broadband Power Line Communication. 517-527 - Changchun Dong, Liang Zhou:

Optimization Algorithm for Freight Car Transportation Scheduling Optimization Based on Process Scheduling Optimization. 528-538 - Xingnan Li, Yi Cai, Wenhong Zhu:

Power Data Cleaning Method Based on Isolation Forest and LSTM Neural Network. 539-550 - Zhan Shi, Xingnan Li, Zhuo Su:

Power Missing Data Filling Based on Improved k-Means Algorithm and RBF Neural Network. 551-562 - Shujie Lu, Jia Yu, Ji Zhu:

Properties Emulation on TD-LTE Electric Power Wireless Private. 563-573 - Xi Li, Hanwu Chen, Zhihao Liu, Wenjie Liu, Mengke Xu:

Spatial Search for Two Marked Vertices on Hypercube by Continuous-Time Quantum Walk. 574-583 - Yixiang Jiang, Limei Fang:

Research and Application of Access Control Technology. 584-593 - Jianyong Zhang, Pingzeng Liu, Bangguo Li, Changqing Song:

Research and Implementation on the Traceability Equipment of the Whole Agricultural Industrial Chain. 594-605 - Ranran Li, Yongbin Zhao, Qing Xu, Xiaolin Qi:

Research of Subnetting Based on Huffman Coding. 606-616 - Zhaoyue Zhang, Jing Zhang, Sen Wang:

Research on Application of ATC Operation Security Based on Data Mining. 617-625 - Ning Wang, Yanyan Qin, Shuyang Guo:

Research on Application of Network Security Technology Based on Data Mining. 626-635 - Ke Jia, Xiaoming Ju, Hongbin Zhang:

Research on Big Data Fusion Method of Smart Grid in the Environment of Internet of Things. 636-647 - Qinghao Zeng, Renjun Tang, Xianjun Chen, Hang Pan, Jinlong Chen, Hui Zhou:

Research on Building Energy Consumption Acquisition System Based on Configuration. 648-657 - Jinhai Li, Yunlei Ma, Huisheng Zhu, Youshi He:

Research on Feedback Effects Between Perception of Internet Word of Mouth and Online Reviews Based on Dynamic Endogeneity. 658-669 - Li Jin, Li Li:

Research on Fire Image Detection Technology Base on RBF. 670-681 - Hongwei Zhu, Yajun Liu, Yingjiu Guo, Jing Jiang:

Research on Indoor Positioning Method Based on Visible Light Communication Technology. 682-690 - Xiao Long, Liang Zhou, Hongyuan Zheng:

Research on Real-Time Storage Technology of UAV Freight Stream Data. 691-700 - Chaoyi Liu, Lei Zhang, Lu Wang, Xiaolan Zhu, Xiaoying Wang:

Research on Syndrome Classification and Risk Factors Extraction of Tibetan Medicine Based on Clustering. 701-711 - Lin Hou, Laiwen Wei, Chen Wang, Andi Wang, Jian Xu

:
Research on Two-Factor Identity Authentication System Based on Smart Phone and User Password. 712-723 - Qin Zhou, Yaming Yang, Jinlian Chen, Mingzhe Liu

:
Review on Blockchain Application for Internet of Things. 724-733 - Ling-Ling Xia

, Bo Song, Liang Zhang:
Rumor Spreading Model Considering Rumor's Attraction in Heterogeneous Social Networks. 734-745

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














