Skip to main content

previous disabled Page of 11
and
  1. No Access

    Chapter and Conference Paper

    Adaptive Firefly Algorithm with a Modified Attractiveness Strategy

    The performance of firefly algorithm (FA) is seriously affected by its parameters. Recently, we proposed a new FA with adaptive control parameters (ApFA), in which the step factor is dynamically updated and th...

    Wenjun Wang, Hui Wang, Jia Zhao, Li Lv in Cloud Computing and Security (2017)

  2. No Access

    Chapter and Conference Paper

    Conducting Correlated Laplace Mechanism for Differential Privacy

    Recently, differential privacy achieves good trade-offs between data publishing and sensitive information hiding. But in data publishing for correlated data, the independent Laplace noise implemented in curren...

    Hao Wang, Zhengquan Xu, Lizhi **ong, Tao Wang in Cloud Computing and Security (2017)

  3. No Access

    Chapter and Conference Paper

    Newton Method for Interval Predictor Model with Sphere Parameter Set

    In this paper, we study the construction of interval prediction model. After introducing the family of models and some basic information, we present the computational results for the construction of interval p...

    Xuan **ao, Peng Wang, Jian-Hong Wang in Cloud Computing and Security (2017)

  4. No Access

    Chapter and Conference Paper

    A Credibility Evaluation Method in Opportunistic Networks

    There are lots of misbehaving nodes in opportunistic networks which can cause severe performance downgrade. Those misbehaving nodes contains malicious nodes and selfish nodes. Selfish nodes don’t cooperate in ...

    **xia Dou, Wenbin Yao, Dongbin Wang in Cloud Computing and Security (2017)

  5. No Access

    Chapter and Conference Paper

    Server-Less Lightweight Authentication Protocol for RFID System

    The design of secure authentication protocols for RFID system is still a great challenging problem. Many authentication protocols for RFID have been presented, but most have security flaws. We analyzes the sec...

    **g Li, Zhi** Zhou, ** Wang in Cloud Computing and Security (2017)

  6. No Access

    Chapter and Conference Paper

    A Particle Swarm Optimization and Mutation Operator Based Node Deployment Strategy for WSNs

    Coverage control is one of the most critical issues for wireless sensor networks (WSNs), which is closely related to the sensor network performance. Generally, sensor nodes are randomly and massively deployed ...

    ** Wang, Chunwei Ju, Huan Ji, Geumran Youn, Jeong-Uk Kim in Cloud Computing and Security (2017)

  7. No Access

    Chapter and Conference Paper

    Quantified Attribute Access Control Model for Cloud Storage Platform

    Recently, cloud computing is the most domain studies in information technology. At the same time, the security of cloud computing becomes an important challenge. Existing access control models are poor on the ...

    DongMin Li, **g Li, Sai Liu, Chao Wang in Cloud Computing and Security (2017)

  8. No Access

    Chapter and Conference Paper

    OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating

    Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising technique to enable fine-grained access control for data storage and sharing. In CP-ABE, data are encrypted with an access policy on attribu...

    Jialu Hao, Jian Liu, Hong Rong, Huimei Wang, Ming **an in Network and System Security (2017)

  9. No Access

    Chapter and Conference Paper

    Differential Direction Adaptive Based Reversible Information Hiding

    In order to reversibly hide information in images with high capacity, an self-adaptive method is proposed in this paper by optimally selecting the differential direction. By dividing image into blocks, differe...

    Feipeng Lin, Bo Wang, Yabin Li in Cloud Computing and Security (2017)

  10. No Access

    Chapter and Conference Paper

    Area-Dividing Route Mutation in Moving Target Defense Based on SDN

    To enhance mutation efficiency and proactively defend against denial of service attacks in moving target defense, we propose an effective and speedy multipath routing mutation approach called area-dividing ran...

    Huiting Tan, Chao**g Tang, Chen Zhang, Shaolei Wang in Network and System Security (2017)

  11. No Access

    Chapter and Conference Paper

    Improved STDM Watermarking Using Semantic Information-Based JND Model

    The perceptual just noticeable distortion (JND) model has attracted increasing attention in the field of the quantization-based watermarking framework. The JND model can provide a superior tradeoff between rob...

    Chunxing Wang, Teng Zhang, Wenbo Wan, Jiande Sun, **g Li in Cloud Computing and Security (2017)

  12. No Access

    Chapter and Conference Paper

    An Improved RFID Search Protocol

    In this paper, we propose an improved scheme to solve the security risks of S-S’s scheme. In order to resist the replay attack, the improved protocol uses the pseudo identifier XOR to encrypt the random number...

    ** Wang, Zhi** Zhou in Cloud Computing and Security (2017)

  13. No Access

    Chapter and Conference Paper

    Research on Cognitive Radio Spectrum Sensing Method Based on Information Geometry

    Making using of the emerging information geometry theory, we analyze the statistical properties of wireless spectrum signals received by secondary users, and propose a cognitive radio spectrum sensing method b...

    Qiang Chen, Pin Wan, Yonghua Wang, Jiangfan Li, Yirui **ao in Cloud Computing and Security (2017)

  14. No Access

    Chapter and Conference Paper

    Cost Optimization for Time-Bounded Request Scheduling in Geo-Distributed Datacenters

    To cope with the growing service requests, a large number of cloud services are deployed in geographically distributed datacenters for better performance. Currently, how to optimize the monetary expenditure s...

    **aohui Wei, Lanxin Li, **ngwang Wang, Yuanyuan Liu in Cloud Computing and Security (2017)

  15. No Access

    Chapter and Conference Paper

    A Novel Robust Reversible Watermarking Scheme Based on IWT

    This paper proposes a novel robust reversible data hiding scheme. This scheme is realized by two stages, which embed robust watermarks and fragile ones respectively. Firstly, the robust watermarks are embedded...

    Shuang Yu, Jian Li, **wei Wang in Cloud Computing and Security (2017)

  16. No Access

    Chapter and Conference Paper

    Workload-Aware Page-Level Flash Translation Layer for NAND Flash-Based Storage Systems

    Demand-based flash translation layer is an efficient page-level flash translation layer, which can effectively reduce the RAM (Random Access Memory) footprint of NAND flash-based storage systems. However, this...

    Huibing Wang, Mingwei Lin, **bo **ong, Li Lin in Cloud Computing and Security (2017)

  17. No Access

    Chapter and Conference Paper

    An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points

    Region duplication is a commonly used operation in digital image processing. Since region duplication could be utilized to easily tamper the raw content by intentional attackers, it has become a very important...

    Yong Liu, Hong-**a Wang, Han-Zhou Wu, Yi Chen in Cloud Computing and Security (2017)

  18. No Access

    Chapter and Conference Paper

    Performance Measurement and Configuration Optimization of Virtual Machines Based on the Bayesian Network

    It is significant to accurately measure the performance of virtual machines (VMs) and reasonably allocate resources according to users’ requirements for both users and cloud resource providers in IaaS cloud co...

    Jia Hao, Binbin Zhang, Kun Yue, Juan Wang, Hao Wu in Cloud Computing and Security (2017)

  19. No Access

    Chapter and Conference Paper

    Defenses Against Wormhole Attacks in Wireless Sensor Networks

    Based on analyzing the characteristics of wormhole attacks in the wireless sensor networks, this paper proposes two kinds of defense strategies, which are based on monitoring neighbor node and node location in...

    Rui Ma, Siyu Chen, Ke Ma, Changzhen Hu, **a**g Wang in Network and System Security (2017)

  20. No Access

    Chapter and Conference Paper

    Machine Learning for Analyzing Malware

    The Internet has become an indispensable part of people’s work and life. It provides favorable communication conditions for malwares. Therefore, malwares are endless and spread faster and become one of the mai...

    Yajie Dong, Zhenyan Liu, Yida Yan, Yong Wang, Tu Peng in Network and System Security (2017)

previous disabled Page of 11