202 Result(s)
-
Chapter and Conference Paper
Adaptive Firefly Algorithm with a Modified Attractiveness Strategy
The performance of firefly algorithm (FA) is seriously affected by its parameters. Recently, we proposed a new FA with adaptive control parameters (ApFA), in which the step factor is dynamically updated and th...
-
Chapter and Conference Paper
Conducting Correlated Laplace Mechanism for Differential Privacy
Recently, differential privacy achieves good trade-offs between data publishing and sensitive information hiding. But in data publishing for correlated data, the independent Laplace noise implemented in curren...
-
Chapter and Conference Paper
Newton Method for Interval Predictor Model with Sphere Parameter Set
In this paper, we study the construction of interval prediction model. After introducing the family of models and some basic information, we present the computational results for the construction of interval p...
-
Chapter and Conference Paper
A Credibility Evaluation Method in Opportunistic Networks
There are lots of misbehaving nodes in opportunistic networks which can cause severe performance downgrade. Those misbehaving nodes contains malicious nodes and selfish nodes. Selfish nodes don’t cooperate in ...
-
Chapter and Conference Paper
Server-Less Lightweight Authentication Protocol for RFID System
The design of secure authentication protocols for RFID system is still a great challenging problem. Many authentication protocols for RFID have been presented, but most have security flaws. We analyzes the sec...
-
Chapter and Conference Paper
A Particle Swarm Optimization and Mutation Operator Based Node Deployment Strategy for WSNs
Coverage control is one of the most critical issues for wireless sensor networks (WSNs), which is closely related to the sensor network performance. Generally, sensor nodes are randomly and massively deployed ...
-
Chapter and Conference Paper
Quantified Attribute Access Control Model for Cloud Storage Platform
Recently, cloud computing is the most domain studies in information technology. At the same time, the security of cloud computing becomes an important challenge. Existing access control models are poor on the ...
-
Chapter and Conference Paper
OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating
Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising technique to enable fine-grained access control for data storage and sharing. In CP-ABE, data are encrypted with an access policy on attribu...
-
Chapter and Conference Paper
Differential Direction Adaptive Based Reversible Information Hiding
In order to reversibly hide information in images with high capacity, an self-adaptive method is proposed in this paper by optimally selecting the differential direction. By dividing image into blocks, differe...
-
Chapter and Conference Paper
Area-Dividing Route Mutation in Moving Target Defense Based on SDN
To enhance mutation efficiency and proactively defend against denial of service attacks in moving target defense, we propose an effective and speedy multipath routing mutation approach called area-dividing ran...
-
Chapter and Conference Paper
Improved STDM Watermarking Using Semantic Information-Based JND Model
The perceptual just noticeable distortion (JND) model has attracted increasing attention in the field of the quantization-based watermarking framework. The JND model can provide a superior tradeoff between rob...
-
Chapter and Conference Paper
An Improved RFID Search Protocol
In this paper, we propose an improved scheme to solve the security risks of S-S’s scheme. In order to resist the replay attack, the improved protocol uses the pseudo identifier XOR to encrypt the random number...
-
Chapter and Conference Paper
Research on Cognitive Radio Spectrum Sensing Method Based on Information Geometry
Making using of the emerging information geometry theory, we analyze the statistical properties of wireless spectrum signals received by secondary users, and propose a cognitive radio spectrum sensing method b...
-
Chapter and Conference Paper
Cost Optimization for Time-Bounded Request Scheduling in Geo-Distributed Datacenters
To cope with the growing service requests, a large number of cloud services are deployed in geographically distributed datacenters for better performance. Currently, how to optimize the monetary expenditure s...
-
Chapter and Conference Paper
A Novel Robust Reversible Watermarking Scheme Based on IWT
This paper proposes a novel robust reversible data hiding scheme. This scheme is realized by two stages, which embed robust watermarks and fragile ones respectively. Firstly, the robust watermarks are embedded...
-
Chapter and Conference Paper
Workload-Aware Page-Level Flash Translation Layer for NAND Flash-Based Storage Systems
Demand-based flash translation layer is an efficient page-level flash translation layer, which can effectively reduce the RAM (Random Access Memory) footprint of NAND flash-based storage systems. However, this...
-
Chapter and Conference Paper
An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points
Region duplication is a commonly used operation in digital image processing. Since region duplication could be utilized to easily tamper the raw content by intentional attackers, it has become a very important...
-
Chapter and Conference Paper
Performance Measurement and Configuration Optimization of Virtual Machines Based on the Bayesian Network
It is significant to accurately measure the performance of virtual machines (VMs) and reasonably allocate resources according to users’ requirements for both users and cloud resource providers in IaaS cloud co...
-
Chapter and Conference Paper
Defenses Against Wormhole Attacks in Wireless Sensor Networks
Based on analyzing the characteristics of wormhole attacks in the wireless sensor networks, this paper proposes two kinds of defense strategies, which are based on monitoring neighbor node and node location in...
-
Chapter and Conference Paper
Machine Learning for Analyzing Malware
The Internet has become an indispensable part of people’s work and life. It provides favorable communication conditions for malwares. Therefore, malwares are endless and spread faster and become one of the mai...