Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
402 authors
- Qi, Xue
- Multi-Attribute Decision-Making Based Trusted Multipath Routing in Mobile Ad Hoc Networks
- Qianjin, Tang
- Video Structured Description System with Private Cloud
- Qin, Jiancheng
- Study of Cloud Computing Security System Based on Rotational Stations
- Qin, Pu
- A method for designing Hash function based on chaotic neural network
- Qing, Li
- Multi-Attribute Decision-Making Based Trusted Multipath Routing in Mobile Ad Hoc Networks
- Qingkuan, Dong
- Multi-Attribute Decision-Making Based Trusted Multipath Routing in Mobile Ad Hoc Networks
- Qingyun, Liu
- Defending Against SYN Flood Attack under Asymmetric Routing Environment
- Qunfang, Zhang
- Cloud Storage Retrievability Based On Third Party Audit
- Renhou, Zhao
- Intuitionistic Fuzzy Multiple Model Tracking Algorithm for Manoeuvring Target
- Renhou, Zhao
- Intuitionistic Fuzzy Neural Networks based on Extended Kalman Filter Training algorithm
- Reza, Sahandi
- Migration to Cloud Computing- The Impact on IT Management and Security
- Rong, Chen
- A Detecting and Defending Method of Wormhole Attack Based on Time Ruler
- Rong, Li
- Research of Replica Replacement Strategy Oriented Cloud Storage
- Rong, Yang
- Defending Against SYN Flood Attack under Asymmetric Routing Environment
- Rui, Jiang
- A Group Based Identity Anonymity and Secure Cloud Storage Scheme
- Rujing, Wang
- VMPmonitor: An Efficient Modularity Approach for Hidden Process Detection
- Runzhi, Li
- Optimizing Live Migration of Virtual Machines with Context Based Prediction Algorithm
- SUN, Hongfeng
- The Application of Cloud Computing in Large-Scale Statistic
- SUN, Xiuli
- The Application of Cloud Computing in Large-Scale Statistic
- Sanjeev, Sofat
- Bivariate Classification of Malware in JavaScript using Dynamic Analysis
- Sanpeng, Wei
- A Strategy of Dynamic Replica Creation in Cloud Storage
- Shang, Yanlei
- An Improved Multimedia Conference System with Load Balance
- Shanxi, Li
- Research on the Performance of Encryption Techniques for High-Bandwidth Multicast Video Streaming
- Shaochun, Wu
- A replica pre-placement strategy based on correlation analysis in cloud environment
- Shaoka, Zhao
- Deployment and Performance Evaluation of Virtual Network based on OpenStack
- Shen, Ge
- Review of Aircraft Aerodynamic Force Parameters Identification based on the Intelligent Algorithm
- Shen, Ge
- The digital library cloud storage based on Hadoop
- Shen, Jia jie
- Based on PSO cloud computing service discovering
- Shen, Jiajie
- Based on PSO cloud computing server points location searching
- Sheng, Chen
- A Cloud-based China s Landslide Disaster Database (CCLDD) Development and Analysis
- Sheng, Xu
- Research on the access and security Technology of Radio-on-Fiber in Power Communication
- Shi-Zhong, Bai
- A new SS-closedness in L-topological spaces
- Shin-Jer, Yang
- A Virtualized Bandwidth Resource Allocation Scheme To Improve the Transmission Performance in Cloud Computing
- Shiping, Chen
- The Study of Improved FP-Growth Algorithm in MapReduce
- Shuanglin, Huang
- Decode-and-forward plus cooperative jamming based cooperation for wireless physical layer security
- Shuguang, Qi
- Study on Cloud Computing Data Center Infrastructure Best Practices
- Shuguang, Zhao
- The Strategy of Classification Mining Based on Cloud Computing
- Shuxiao, Huang
- Deployment and Performance Evaluation of Virtual Network based on OpenStack
- Songling, Huang
- Future trend of integrating instrumentation into the cloud
- Songzhu, Mei
- TEM: A Novel Measurement Method for Java Applications on demand in Cloud Computing
- Sun, Zhanquan
- A Parallel Clustering Method Study Based on MapReduce
- Surya Prateek, Surampalli
- Cloud Server with OpenFlow: Load Balancing
- Swee-Huay, Heng
- PeANFIS-FARM Framework in Defending against Web Service Attacks
- Tao, Guo
- Access Control Framework for Android System
- Tao, Zhang
- Analysis of Privacy Preserving for Big Data in the Environment of Power Systems
- Tao-Ku, Chang
- A Secure Mobile Payment Model
- Tian, Lixin
- Reliability Modeling of Working-Table Production Oriented MANET
- WU, Qiwu
- Identity-based Remote Authentication and Key Agreement Protocol with Anonymity
- WU, Xiao-ping
- Active Defense strategies selection for network mixed malicious action
- Wan, Yimin
- On User Capacity Optimization Strategy of Server Computing Based Desktop Cloud
- Wang, Xi
- Digital image watermarking in power system security
- Wang, Ying
- Application of An Improved DBSCAN Algorithm in Web Text Mining
- Wang, Ying
- Digital image watermarking in power system security
- Wang, Yu
- Hospital information system integration based on cloud computing
- Wang, Yufei
- Study on Similarity Compute and File Filtering Based on Cloud Computing Method
- Wanqing, Chi
- MIC Acceleration of Saliency Detection Algorithm
- Wei, Huiqin
- The platform design of the cloud instructional resources based on the Hadoop framework
- Wei, Xia
- TCPI: A Novel Method of Encrypted Page Identification
- Wei, Yang
- Defending Against SYN Flood Attack under Asymmetric Routing Environment
- Wei, Yang
- Analysis of Privacy Preserving for Big Data in the Environment of Power Systems
- Wei, Zhang
- Vulnerability Mining Techniques in Android Platform
- Wei, Zhao
- Future trend of integrating instrumentation into the cloud
- Wei, Zicheng
- A Real-Time Authentication Method Based on Cursor-hidden Scene
- Wei-min, Lin
- Analysis of Privacy Preserving for Big Data in the Environment of Power Systems
- Weichun, Huang
- Research on Longest Backward Segmentation for Context
- Weiwei, Sun
- A Cloud-based China s Landslide Disaster Database (CCLDD) Development and Analysis
- Weiyue, Li
- A Cloud-based China s Landslide Disaster Database (CCLDD) Development and Analysis
- Wenbo, Chen
- Research on the Performance of Encryption Techniques for High-Bandwidth Multicast Video Streaming
- Wenchuan, Yang
- Research of a MapReduce Communication Data Stream Processing Model
- Wenjun, Luo
- An Efficient Scheme of Multi-user Searchable Encryption with Keyword in Cloud Storage
- Wenling, Wu
- Integral Attacks on Feistel-SP Structure Block Cipher
- Wenqing, Liu
- Vulnerability Mining Techniques in Android Platform
- Wenrui, Li
- A New Dynamic Trust Approach for Cloud Computing
- Xi, Yu
- Intelligent Resources Dispatching System of Urban Emergency Based on SOA and Cloud Computing
- Xiang, Shuai
- A replica pre-placement strategy based on correlation analysis in cloud environment
- Xiang, Yang-xia
- The Research and Design of Cloud Computing Framework Model Based on SOA
- Xianglong, Ye
- A Strategy of Dynamic Replica Creation in Cloud Storage
- Xianzhen, Wu
- A Design and Application of Tilt Angle Algorithm Based on the 3-axis Acceleration Sensor
- Xiao, Chen
- Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper
- Xiao, Chen
- Optimal Analysis of Joint Masked-Beamforming in Secure Wireless Communication
- Xiao, Chen
- Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination
- Xiao, Ling
- Deployment and Performance Evaluation of Virtual Network based on OpenStack
- Xiao, Wu
- A3: Automatic Analysis of Android Malware
- XiaoBo, Cao
- Design Task Modeling and Task Allocation Method Research Based Multi-granularity Space in Distributed Network Environment
- Xiaoguang, Zhou
- Intuitionistic Fuzzy Multiple Model Tracking Algorithm for Manoeuvring Target
- Xiaoguang, Zhou
- Intuitionistic Fuzzy Neural Networks based on Extended Kalman Filter Training algorithm
- Xiaolin, Qin
- A New Dynamic Trust Approach for Cloud Computing
- Xiaolong, Wang
- A QoS-based service composition optimization method
- Xiaoping, Wang
- MIC Acceleration of Saliency Detection Algorithm
- Xiaoxian, Chen
- The Mechanism of Tencent QQ Video Communication
- Xie, Ping
- Application of An Improved DBSCAN Algorithm in Web Text Mining
- Xie, Ping
- Digital image watermarking in power system security
- Xingling, Wang
- Research on Hybrid Scheduling Mechanism based on SOA and Cloud Computing
- Xinguo, Zou
- Adaptive Watermarking Algorithm for Digital Image Based on Discrete Cosine Transform
- Xinxing, Yin
- Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper
- Xinxing, Yin
- Optimal Analysis of Joint Masked-Beamforming in Secure Wireless Communication
- Xinxing, Yin
- Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination
- Xiongwei, Zhang
- A method based on compressive sensing to detect community structure using deep belief network
- Xiumin, Shang
- Intuitionistic Fuzzy Neural Networks based on Extended Kalman Filter Training algorithm
- Xiuqing, Lu
- Dynamic Constraint Definition Method in Cloud Databases