Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
402 authors
- Xu, Bin
- On User Capacity Optimization Strategy of Server Computing Based Desktop Cloud
- Xu, Da-wei
- Antivirus in the Network Cloud
- Xu, Dong
- The platform design of the cloud instructional resources based on the Hadoop framework
- Xu, Min
- The Design and Realization of the Test Scheme OpenVPN, Based on Message Simulation
- Xu, Rui
- A Real-Time Authentication Method Based on Cursor-hidden Scene
- Xuan, Liu
- The SLA Framework Based on Cloud Computing
- Yan, Niu
- A3: Automatic Analysis of Android Malware
- Yan, Niu
- Detecting Spam on Sina Weibo
- Yan, Ren
- The Secrets of Skype Login
- Yan, Ren
- Detecting Spam on Sina Weibo
- Yan, Zhu
- Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper
- Yan, Zhu
- Optimal Analysis of Joint Masked-Beamforming in Secure Wireless Communication
- Yan, Zhu
- Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination
- Yan-Ping, Wu
- Research on the Model for Cloud Security Based on SLA
- Yang, Hong
- A Cloud-based China s Landslide Disaster Database (CCLDD) Development and Analysis
- Yang, Yatao
- Improved Homomorphic String Bits Encryption Public-key Cryptosystem based on LWE
- Yanjun, Li
- Integral Attacks on Feistel-SP Structure Block Cipher
- Yanwei, Chang
- Multi-Sub-Swarm PSO Classifier Design and Rule Extraction
- Yao, Qin
- Hospital information system integration based on cloud computing
- Yash, Gupta
- Bivariate Classification of Malware in JavaScript using Dynamic Analysis
- Ye, Xiong
- An Improved Scheme for Range Queries on Encrypted Data
- Yi, Guo
- Optimizing Live Migration of Virtual Machines with Context Based Prediction Algorithm
- Yi, Liu
- Emergency-cloud a new idea about the construction of emergency platform in
- Yi-Hsuan, Chen
- A Virtualized Bandwidth Resource Allocation Scheme To Improve the Transmission Performance in Cloud Computing
- Yibo, Xue
- A3: Automatic Analysis of Android Malware
- Yibo, Xue
- The Secrets of Skype Login
- Yibo, Xue
- The Mechanism of Tencent QQ Video Communication
- Yibo, Xue
- Detecting Spam on Sina Weibo
- Yibo, Xue
- Online Community Perceiving Method on Social Network
- Yibo, Xue
- TCPI: A Novel Method of Encrypted Page Identification
- Yida, Fan
- Research on Hybrid Scheduling Mechanism based on SOA and Cloud Computing
- Yijie, Wu
- Research on the access and security Technology of Radio-on-Fiber in Power Communication
- Yiming, Wang
- A Detecting and Defending Method of Wormhole Attack Based on Time Ruler
- Ying, Qian
- Cloud Server with OpenFlow: Load Balancing
- Yingcai, Ma
- Detecting Spam on Sina Weibo
- Yingdan, Shang
- Data Deduplication in Cloud Computing Systems
- Yingjie, Yang
- A New Dynamic Trust Approach for Cloud Computing
- Yinxia, Fu
- Performance Modeling for Helper Thread on Shared Cache CMPs
- Yiran, Jin
- Vulnerability Mining Techniques in Android Platform
- Yiwen, Liang
- Mimicking User Keystrokes to Detect Keyloggers with Dendritic Cell Algorithm
- Yong, Cui
- Optimizing Live Migration of Virtual Machines with Context Based Prediction Algorithm
- Yonghua, Tan
- On the period factor of quasigroups
- Yongkai, Zhou
- Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper
- Yongkai, Zhou
- Optimal Analysis of Joint Masked-Beamforming in Secure Wireless Communication
- Yongkai, Zhou
- Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination
- Yu, Cun-jiang
- Antivirus in the Network Cloud
- Yuanyuan, Bao
- Online Community Perceiving Method on Social Network
- Yueshan, Xiong
- A Network Registration Model with Hidden Real Name
- Yufei, Wang
- Review of Aircraft Aerodynamic Force Parameters Identification based on the Intelligent Algorithm
- Yufei, Wang
- The digital library cloud storage based on Hadoop
- Yun, Wu
- VMPmonitor: An Efficient Modularity Approach for Hidden Process Detection
- Yun, Ye
- Analysis of Privacy Preserving for Big Data in the Environment of Power Systems
- Yunqing, Xu
- On the period factor of quasigroups
- Yunqing, Xu
- Cryptographic classification of quasigroups of order 4
- Yunshan, Tang
- OPC:An Effective Memory Computing Solution of Big Data For PC
- Yunyan, Song
- Cloud Storage Retrievability Based On Third Party Audit
- Yusong, Lin
- Optimizing Live Migration of Virtual Machines with Context Based Prediction Algorithm
- Zejun, Wu
- A Design and Application of Tilt Angle Algorithm Based on the 3-axis Acceleration Sensor
- Zhang, Bo
- Study on Similarity Compute and File Filtering Based on Cloud Computing Method
- Zhang, Hui-min
- The Research and Design of Cloud Computing Framework Model Based on SOA
- Zhang, Jianjun
- Identity-based Remote Authentication and Key Agreement Protocol with Anonymity
- Zhang, Lin
- Application of An Improved DBSCAN Algorithm in Web Text Mining
- Zhang, Tao
- Data Replica Placement in Cloud Storage System
- Zhang, Wei-wei
- Detecting Machine Generated Domain Names Based on Morpheme Features
- Zhang, Xiao-wu
- Application of Cloud Manufacturing based on the principle of Process-Aware Information System
- Zhang, Xiaoxin
- The platform design of the cloud instructional resources based on the Hadoop framework
- Zhang, Yundu
- An Improved Multimedia Conference System with Load Balance
- Zhanming, Wan
- A Cloud-based China s Landslide Disaster Database (CCLDD) Development and Analysis
- Zhao, Xibin
- Reliability Modeling of Working-Table Production Oriented MANET
- Zhao, Zhifeng
- Reliability Modeling of Working-Table Production Oriented MANET
- Zhaoguo, Wang
- A3: Automatic Analysis of Android Malware
- Zhaolong, Liu
- A method for designing Hash function based on chaotic neural network
- Zhen-jiang, Zhang
- Design of a Wireless Networks Detection and Management System Based on a Mobile Terminal
- Zheng, Nong
- Design of Web Course Based on Cloud Computing
- Zhenhai, Xiong
- MIC Acceleration of Saliency Detection Algorithm
- Zhenjiang, Qian
- Design and Implementation of Data Encryption in Cloud based on HDFS
- Zhenlong, Yuan
- The Mechanism of Tencent QQ Video Communication
- Zhenlong, Yuan
- TCPI: A Novel Method of Encrypted Page Identification
- Zhi, Xue
- Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper
- Zhi, Xue
- Optimal Analysis of Joint Masked-Beamforming in Secure Wireless Communication
- Zhi, Xue
- Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination
- Zhi, Yang
- OPC:An Effective Memory Computing Solution of Big Data For PC
- Zhihao, Shang
- Research on the Performance of Encryption Techniques for High-Bandwidth Multicast Video Streaming
- Zhiling, He
- An Efficient Scheme of Multi-user Searchable Encryption with Keyword in Cloud Storage
- Zhimin, Gu
- Performance Modeling for Helper Thread on Shared Cache CMPs
- Zhiqiang, Hu
- Short-term Load forecasting by a new hybrid model
- Zhiwei, Jian
- A Cloud-based China s Landslide Disaster Database (CCLDD) Development and Analysis
- Zhiyao, Hu
- OPC:An Effective Memory Computing Solution of Big Data For PC
- Zhiyi, Zhang
- Delay-Sensitive Transmission Scheme for VM based Networks in Cloud Computing Data Center
- Zhiying, Wang
- TEM: A Novel Measurement Method for Java Applications on demand in Cloud Computing
- Zhiyong, Liu
- The Architectural Based Interception and Identification of System Call Instruction within VMM
- Zhong, Cheng
- Reliability Modeling of Working-Table Production Oriented MANET
- Zhong, Yu
- Study of Cloud Computing Security System Based on Rotational Stations
- Zhonghan, Cheng
- Design and Implementation of Data Encryption in Cloud based on HDFS
- Zhongxue, Yang
- A New Dynamic Trust Approach for Cloud Computing
- Zhongyuan, Qin
- Cloud Storage Retrievability Based On Third Party Audit
- Zhou, Tian-shu
- De-identification of free-text medical records in health information exchange
- Zhou, Xueguang
- Design and Implementation of the Monitoring System for Critical Documents
- Zhou, Zhou
- Defending Against SYN Flood Attack under Asymmetric Routing Environment
- Zhu, Li-peng
- The Design and Realization of the Test Scheme OpenVPN, Based on Message Simulation