Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely

    Bitcoin-like blockchains use a proof-of-work (PoW) mechanism, where security holds if the majority of the computing power is under the control of honest players. However, this assumption has been seriously cha...

    Tuyet Duong, Lei Fan, Jonathan Katz, Phuc Thai in Computer Security – ESORICS 2020 (2020)

  2. No Access

    Chapter and Conference Paper

    Detection by Attack: Detecting Adversarial Samples by Undercover Attack

    The safety of artificial intelligence systems has aroused great concern due to the vulnerability of deep neural networks. Studies show that malicious modifications to the inputs of a network classifier, can fo...

    Qifei Zhou, Rong Zhang, Bo Wu, Wei** Li, Tong Mo in Computer Security – ESORICS 2020 (2020)

  3. No Access

    Chapter and Conference Paper

    Identify Influentials Based on User Behavior Across Different Topics

    With the rapid development of Internet technology and the widespread use of social networks in daily life, a large amount of information is propagated on the Web through various interactions among users. Resea...

    Yong Quan, Yichen Song, Lu Deng, Yan Jia, Bin Zhou in Artificial Intelligence and Security (2019)

  4. No Access

    Chapter and Conference Paper

    Application of Fuzzy Analytic Hierarchy Process to Discuss the User’s Favor of Electric Bicycle Modeling

    As a means of transportation, electric bicycle have characteristics of low pollution, low noise, energy saving and so on. In recent years, in addition to the increasing environmental awareness and the rising o...

    Tianxiong Wang, Meiyu Zhou, Zhengyu Wang in HCI International 2019 - Posters (2019)

  5. No Access

    Chapter and Conference Paper

    Towards Computation Offloading in Edge Computing: A Survey

    The explosive growth of massive data generation from Internet of Things in industrial, agricultural and scientific communities has led to a rapid increase in cloud data centers for data analytics. The ubiquito...

    **aolan Cheng, **n Zhou, Congfeng Jiang in High-Performance Computing Applications in… (2019)

  6. No Access

    Chapter and Conference Paper

    Diverse Demands Estimation and Ranking Based on User Behaviors

    In the big data era, users can get massive information from the Internet, but the value density is very low. In order to help users find the information they need more quickly, this paper presents the mechani...

    Liandong Chen, Shigang Li, Chunbao Zhou in High-Performance Computing Applications in… (2019)

  7. No Access

    Chapter and Conference Paper

    Virtual Reactors Towards the Exascale Supercomputing Era

    Virtual reactor is an interplanetary research field, which leverages the leading supercomputers to provide a profound understanding of existing reactors and design guidance for future reactors. Virtual reactor...

    **anmeng Wang, Changjun Hu, Wen Yang in High-Performance Computing Applications in… (2019)

  8. No Access

    Chapter and Conference Paper

    Real-Time Estimation of Road Traffic Speeds from Cell-Based Vehicle Trajectories

    This paper presents a novel approach for urban road networks to estimate traffic speeds using vehicle trajectories captured by detectors on transportation cells. By scanning and analyzing dynamic traffic strea...

    **aoxiao Sun, Dong** Yu, Sai Liao in Service-Oriented Computing – ICSOC 2018 Wo… (2019)

  9. Chapter and Conference Paper

    Evaluating Response Delay of Multimodal Interface in Smart Device

    Multimodal interface based on natural language processing (NLP) technology is becoming more and more popular. Many studies show that response delay is a key factor to evaluate multimodal interface performance ...

    **antao Chen, Moli Zhou, Renzhen Wang in Design, User Experience, and Usability. Pr… (2019)

  10. No Access

    Chapter and Conference Paper

    TaxiC: A Taxi Route Recommendation Method Based on Urban Traffic Charge Heat Map

    A successful taxi route recommendation system is helpful to achieve a win-win situation for both increasing drivers’ income and improving passengers’ satisfaction. The critical problem in this system is how to...

    Yi**g Cheng, Qifeng Zhou in Service-Oriented Computing – ICSOC 2018 Workshops (2019)

  11. Chapter and Conference Paper

    SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications

    Modern smartphones expressed an exponential growth and have become a personal assistant in people’s daily lives, i.e., kee** connected with peers

    Weizhi Meng, Wenjuan Li, Lijun Jiang in ICT Systems Security and Privacy Protection (2019)

  12. No Access

    Chapter and Conference Paper

    Cryptographic Reverse Firewalls for Identity-Based Encryption

    The Snowden revelations show that powerful attackers can compromise user’s machines to steal users’ private information. At the same time, many of the encryption schemes that are proven to be secure in Rando...

    Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li in Frontiers in Cyber Security (2019)

  13. No Access

    Chapter and Conference Paper

    Statement Voting

    The conventional (election) voting systems, e.g., representative democracy, have many limitations and often fail to serve the best interest of the people in a collective decision-making process. To address thi...

    Bingsheng Zhang, Hong-Sheng Zhou in Financial Cryptography and Data Security (2019)

  14. No Access

    Chapter and Conference Paper

    Nighthawk: Transparent System Introspection from Ring -3

    During the past decade, virtualization-based (e.g., virtual machine introspection) and hardware-assisted approaches (e.g., x86 SMM and ARM TrustZone) have been used to defend against low-level malware such as ...

    Lei Zhou, Jidong **ao, Kevin Leach, Westley Weimer in Computer Security – ESORICS 2019 (2019)

  15. No Access

    Chapter and Conference Paper

    Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi

    The increasing credit card consumption makes the security of keypad input become a problem that cannot be ignored. We propose a novel keystroke recognition system called WiKey. When the user enters the passwor...

    Chen Yunfang, Zhu Yihong, Zhou Hao, Chen Wei, Zhang Wei in Network and System Security (2018)

  16. No Access

    Chapter and Conference Paper

    SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control

    Managing security in an RFID system is a complex activity considering that it is imperatively challenging to implement trust among tags and readers. There is always the chance that an unauthorized individual m...

    Ahmed Raad Al-Sudani, Wanlei Zhou, Sheng Wen in Network and System Security (2018)

  17. Chapter and Conference Paper

    A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords

    Today’s computer users have to remember several passwords for each of their accounts. It is easily noticed that people may have difficulty in remembering multiple passwords, which result in a weak password sel...

    Weizhi Meng, Wenjuan Li, Wang Hao Lee in Applied Cryptography and Network Security (2017)

  18. No Access

    Chapter and Conference Paper

    Blender: Self-randomizing Address Space Layout for Android Apps

    In this paper, we first demonstrate that the newly introduced Android RunTime (ART) in latest Android versions (Android 5.0 or above) exposes a new attack surface, namely, the “return-to-art” (ret2art) attack....

    Mingshen Sun, John C. S. Lui, Ya** Zhou in Research in Attacks, Intrusions, and Defenses (2016)

  19. No Access

    Chapter and Conference Paper

    Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis

    JavaScript exploits impose a severe threat to computer security. Once a zero-day exploit is captured, it is critical to quickly pinpoint the JavaScript statements that uniquely characterize the exploit and the...

    Xunchao Hu, Aravind Prakash, **ghan Wang in Research in Attacks, Intrusions, and Defen… (2016)

  20. No Access

    Chapter and Conference Paper

    Quantitative Model of Personnel Allocation Based on Information Entropy

    In the field of the software project management, the distribution and organization of developers has always been a research focus. In a software project, it is of great importance to divide the modules and per...

    Zhenli He, Hua Zhou, Zhihong Liang in Internet and Distributed Computing Systems (2013)

previous disabled Page of 2