![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
Bitcoin-like blockchains use a proof-of-work (PoW) mechanism, where security holds if the majority of the computing power is under the control of honest players. However, this assumption has been seriously cha...
-
Chapter and Conference Paper
Detection by Attack: Detecting Adversarial Samples by Undercover Attack
The safety of artificial intelligence systems has aroused great concern due to the vulnerability of deep neural networks. Studies show that malicious modifications to the inputs of a network classifier, can fo...
-
Chapter and Conference Paper
Identify Influentials Based on User Behavior Across Different Topics
With the rapid development of Internet technology and the widespread use of social networks in daily life, a large amount of information is propagated on the Web through various interactions among users. Resea...
-
Chapter and Conference Paper
Application of Fuzzy Analytic Hierarchy Process to Discuss the User’s Favor of Electric Bicycle Modeling
As a means of transportation, electric bicycle have characteristics of low pollution, low noise, energy saving and so on. In recent years, in addition to the increasing environmental awareness and the rising o...
-
Chapter and Conference Paper
Towards Computation Offloading in Edge Computing: A Survey
The explosive growth of massive data generation from Internet of Things in industrial, agricultural and scientific communities has led to a rapid increase in cloud data centers for data analytics. The ubiquito...
-
Chapter and Conference Paper
Diverse Demands Estimation and Ranking Based on User Behaviors
In the big data era, users can get massive information from the Internet, but the value density is very low. In order to help users find the information they need more quickly, this paper presents the mechani...
-
Chapter and Conference Paper
Virtual Reactors Towards the Exascale Supercomputing Era
Virtual reactor is an interplanetary research field, which leverages the leading supercomputers to provide a profound understanding of existing reactors and design guidance for future reactors. Virtual reactor...
-
Chapter and Conference Paper
Real-Time Estimation of Road Traffic Speeds from Cell-Based Vehicle Trajectories
This paper presents a novel approach for urban road networks to estimate traffic speeds using vehicle trajectories captured by detectors on transportation cells. By scanning and analyzing dynamic traffic strea...
-
Chapter and Conference Paper
Evaluating Response Delay of Multimodal Interface in Smart Device
Multimodal interface based on natural language processing (NLP) technology is becoming more and more popular. Many studies show that response delay is a key factor to evaluate multimodal interface performance ...
-
Chapter and Conference Paper
TaxiC: A Taxi Route Recommendation Method Based on Urban Traffic Charge Heat Map
A successful taxi route recommendation system is helpful to achieve a win-win situation for both increasing drivers’ income and improving passengers’ satisfaction. The critical problem in this system is how to...
-
Chapter and Conference Paper
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications
Modern smartphones expressed an exponential growth and have become a personal assistant in people’s daily lives, i.e., kee** connected with peers
-
Chapter and Conference Paper
Cryptographic Reverse Firewalls for Identity-Based Encryption
The Snowden revelations show that powerful attackers can compromise user’s machines to steal users’ private information. At the same time, many of the encryption schemes that are proven to be secure in Rando...
-
Chapter and Conference Paper
Statement Voting
The conventional (election) voting systems, e.g., representative democracy, have many limitations and often fail to serve the best interest of the people in a collective decision-making process. To address thi...
-
Chapter and Conference Paper
Nighthawk: Transparent System Introspection from Ring -3
During the past decade, virtualization-based (e.g., virtual machine introspection) and hardware-assisted approaches (e.g., x86 SMM and ARM TrustZone) have been used to defend against low-level malware such as ...
-
Chapter and Conference Paper
Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi
The increasing credit card consumption makes the security of keypad input become a problem that cannot be ignored. We propose a novel keystroke recognition system called WiKey. When the user enters the passwor...
-
Chapter and Conference Paper
SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control
Managing security in an RFID system is a complex activity considering that it is imperatively challenging to implement trust among tags and readers. There is always the chance that an unauthorized individual m...
-
Chapter and Conference Paper
A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords
Today’s computer users have to remember several passwords for each of their accounts. It is easily noticed that people may have difficulty in remembering multiple passwords, which result in a weak password sel...
-
Chapter and Conference Paper
Blender: Self-randomizing Address Space Layout for Android Apps
In this paper, we first demonstrate that the newly introduced Android RunTime (ART) in latest Android versions (Android 5.0 or above) exposes a new attack surface, namely, the “return-to-art” (ret2art) attack....
-
Chapter and Conference Paper
Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis
JavaScript exploits impose a severe threat to computer security. Once a zero-day exploit is captured, it is critical to quickly pinpoint the JavaScript statements that uniquely characterize the exploit and the...
-
Chapter and Conference Paper
Quantitative Model of Personnel Allocation Based on Information Entropy
In the field of the software project management, the distribution and organization of developers has always been a research focus. In a software project, it is of great importance to divide the modules and per...