Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

    Networks composed of devices, which having short-range wireless communications capabilities and carried by people, is a major application scenarios in opportunistic network, whose nodes movement has the charac...

    Junhai Zhou, Yapin Lin, Siwang Zhou, Qin Liu in Security, Privacy and Anonymity in Computa… (2016)

  2. No Access

    Chapter and Conference Paper

    A Software Detection Mechanism Based on SMM in Network Computing

    To guarantee the network computing system security, the effective method is illegal or malicious software detection. Most of the former researches implement it on OS kernel or hypervisor level. However, if the...

    Lei Zhou, Yang Shu, Guojun Wang in Security, Privacy and Anonymity in Computa… (2016)

  3. No Access

    Chapter and Conference Paper

    On Robustness in Multilayer Interdependent Networks

    Critical Infrastructures like power and communication networks are highly interdependent on each other for their full functionality. Many significant research have been pursued to model the interdependency and...

    Joydeep Banerjee, Chenyang Zhou, Arun Das in Critical Information Infrastructures Secur… (2016)

  4. Chapter and Conference Paper

    Context-Aware Location Management of Groups of Devices in 5G Networks

    Location Management (LM) is an important function of mobile cellular networks that enables network to locate the users. Mechanisms applicable in legacy systems are not able to cope with the vast increase of de...

    Konstantinos Chatzikokolakis in Management and Security in the Age of Hype… (2016)

  5. No Access

    Chapter and Conference Paper

    Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization

    A diversity of indoor localization techniques have become accurate and ready to use. A client first measures its location characteristics, and then calculates its location with the information provided by the ...

    Tao Zhang, Sherman S. M. Chow, Zhe Zhou in Advances in Information and Computer Secur… (2016)

  6. No Access

    Chapter and Conference Paper

    Dynamics on Linear Influence Network Games Under Stochastic Environments

    A linear influence network is a broadly applicable conceptual framework in risk management. It has important applications in computer and network security. Prior work on linear influence networks targeting tho...

    Zhengyuan Zhou, Nicholas Bambos, Peter Glynn in Decision and Game Theory for Security (2016)

  7. No Access

    Chapter and Conference Paper

    Blender: Self-randomizing Address Space Layout for Android Apps

    In this paper, we first demonstrate that the newly introduced Android RunTime (ART) in latest Android versions (Android 5.0 or above) exposes a new attack surface, namely, the “return-to-art” (ret2art) attack....

    Mingshen Sun, John C. S. Lui, Ya** Zhou in Research in Attacks, Intrusions, and Defenses (2016)

  8. No Access

    Chapter and Conference Paper

    Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis

    JavaScript exploits impose a severe threat to computer security. Once a zero-day exploit is captured, it is critical to quickly pinpoint the JavaScript statements that uniquely characterize the exploit and the...

    Xunchao Hu, Aravind Prakash, **ghan Wang in Research in Attacks, Intrusions, and Defen… (2016)

  9. No Access

    Chapter and Conference Paper

    Multi-Constrained Multi-Path Routing for Server-Centric Data Center Networks

    Server-centric data center architecture has been proposed to provide high throughput, scalable construction and error tolerance with commodity servers and switches for cloud data centers. To fully utilize thos...

    Kun Qian, HuanZhao Wang, ChengChen Hu, Che Zhang in Frontiers in Internet Technologies (2015)

  10. No Access

    Chapter and Conference Paper

    Analysis on Chinese Microblog Sentiment Based on Syntax Parsing and Support Vector Machine

    Analysis on microblog sentiment is very important for microblog monitoring and guidance of public opinion. According to the problem that precision of Chinese microblog sentiment analysis was low, this paper pr...

    Ziyan Su, Bin Zhou, Ai** Li, Yi Han in Web Technologies and Applications (2014)

  11. No Access

    Chapter and Conference Paper

    Enhanced Sample Selection for SVM on Face Recognition

    For SVMs, large training samples will lead to high computing complexity of convex quadratic programming, even difficulty in running. Sample selection as a preprocessor of classification can greatly reduce the ...

    **aofei Zhou, Wenhan Jiang, Jianlong Tan in Web Technologies and Applications (2014)

  12. No Access

    Chapter and Conference Paper

    More Anonymity through Trust Degree in Trust-Based Onion Routing

    Trust-based onion routing employs users’ own trust to circumvent compromised onion routers. However, it runs a high risk of being deanonymized by the inference attack based on a priori trust relationship. In t...

    Peng Zhou, **apu Luo, Rocky K. C. Chang in Security and Privacy in Communication Networks (2013)

  13. No Access

    Chapter and Conference Paper

    A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation

    Direct Anonymous Attestation (DAA) is a cryptographic scheme which enables the remote authentication of a trusted platform whilst preserving privacy under the user’s control. In term of construction of DAA, du...

    **aohan Yue, Fucai Zhou in Frontiers in Internet Technologies (2013)

  14. No Access

    Book and Conference Proceedings

    Cyberspace Safety and Security

    4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings

    Yang **ang, Javier Lopez, C.-C. Jay Kuo in Lecture Notes in Computer Science (2012)

  15. No Access

    Chapter and Conference Paper

    Design and Implementation of the Online Shop** System

    In today’s society, online shop** has adapted to the fast-paced lifestyle, making ccustomers enjoy the convenience of choosing and buying their favorite products at home. This system is based on MVC architec...

    Guoyong Zhao, Zhiyu Zhou in Web Information Systems and Mining (2012)

  16. No Access

    Chapter and Conference Paper

    Service Lifecycle Management in Distributed JBI Environment

    Enterprise Service Bus is widely-used, flexible, SOA-based infrastructure. Lifecycle management is a necessity for component reusing, maintenance, monitoring, as well as service governance. But existing approa...

    Ben Wang, **ngshe Zhou, Gang Yang, Yunfeng Lou in Web Information Systems and Mining (2012)

  17. No Access

    Chapter and Conference Paper

    System Development of Residence Property Management Based on WEB

    In order to making owner’ life convenience and property management standardized, the B/S structure MVC model and SSI frame etc. are employed. System of residence property management based on WEB is empoldered ...

    Hanbin Cui, Zhiyu Zhou in Web Information Systems and Mining (2012)

  18. No Access

    Chapter and Conference Paper

    Metadata Management of Context Resources in Context-Aware Middleware System

    Metadata is the data about data. With the development of information technologies, it is realized that metadata is of great importance in discovery, identification, localization and access of resources. For th...

    Rong Tan, Junzhong Gu, Zhou Zhong, Peng Chen in Web Information Systems and Mining (2012)

  19. No Access

    Chapter and Conference Paper

    Graded BDI Models for Agent Architectures Based on Łukasiewicz Logic and Propositional Dynamic Logic

    In the recent past, the most influential theories with respect to agent technology are the Belief-Desire-Intention (BDI) model. This paper not only expands past achievements but also makes novel proposals. It ...

    **aojun Zhang, Min Jiang, Changle Zhou, Yijiang Hao in Web Information Systems and Mining (2012)

  20. No Access

    Chapter and Conference Paper

    A Novel Identity-Based Key Management and Encryption Scheme for Distributed System

    The paper proposes a Distributed Identity-Based Encryption (DIBE) scheme. The DIBE scheme extends the traditional IBE to a distributed system which consists of some homogenous or heterogeneous subsystems. Each...

    Geng Yang, Qiang Zhou, **aolong Xu, Jian Xu in Cyberspace Safety and Security (2012)

previous disabled Page of 2