A Novel Attribute Based Keyword Search Scheme for Mobile Cloud Storage (English)
- New search for: Lei, Sun
- New search for: Hang, Su
- New search for: Zhiqiang, Zhu
- New search for: Zuohui, Li
- New search for: Lei, Sun
- New search for: Hang, Su
- New search for: Zhiqiang, Zhu
- New search for: Zuohui, Li
In:
2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
;
229-234
;
2017
-
ISBN:
- Conference paper / Electronic Resource
-
Title:A Novel Attribute Based Keyword Search Scheme for Mobile Cloud Storage
-
Contributors:
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2017-10-01
-
Size:348708 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
SIRS Model and Stability Based on Open Cyber EcosystemHu, Xin / Wang, Gang / Qin, Hongtao / Ma, Runnian et al. | 2017
- 5
-
Routing the Cyber-Attack Path with the Bayesian Network Deducing ApproachHuangfu, Yingying / Zhou, Liang / Yang, Chenming et al. | 2017
- 11
-
Differential Privacy Data Protection Method Based on ClusteringLi-Xin, Li / Yong-Shan, Ding / Jia-Yan, Wang et al. | 2017
- 17
-
Analyzing and Recognizing Android Malware via Semantic-Based Malware GeneJin, Han / Rongcai, Zhao / Zhen, Shan / Fudong, Liu / Bingling, Zhao / Xi, Meng / Hongyan, Wang et al. | 2017
- 21
-
CENTRA: CENtrally Trusted Routing vAlidation for IGPZeng, Hao / Wang, Baosheng / Deng, Wenping / Gao, Xianming et al. | 2017
- 25
-
Social Engineering and Insider ThreatsXiangyu, Liu / Qiuyang, Li / Chandel, Sonali et al. | 2017
- 35
-
Differential-Privacy-Based Correlation Analysis in Railway Freight Service ApplicationsShi, Yajuan / Piao, Chunhui / Zheng, Lijuan et al. | 2017
- 40
-
Evaluating Features and Effectiveness of Secure QR Code ScannersDudheria, Rishabh et al. | 2017
- 50
-
A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense ArchitectureLiu, Wenyan / Chen, Fucai / Hu, Hongchao / Cheng, Guozhen / Huo, Shumin / Liang, Hao et al. | 2017
- 54
-
Resist the Database Intrusion Caused by Functional DependencyWang, Jingwen / Yang, Jie / Guo, Fen / Min, Huaqing et al. | 2017
- 58
-
A New Chosen IV Statistical Attack on Grain-128a CipherGhafari, Vahid Amin / Hu, Honggang et al. | 2017
- 63
-
Performance Analysis of Turbo Code and Trellis BICM-ID on PNC over Impulsive ChannelZhao, Yuanyi et al. | 2017
- 72
-
An IPv6-based Load Balancing Strategy for Ecological Monitoring NetworkXiao, Xiaojun / Luo, Wanming et al. | 2017
- 80
-
6LoWPAN Hierarchical Cluster Routing ProtocolXiao, Xiaojun / Luo, Wanming et al. | 2017
- 84
-
Design and Implementation of the Prototype of High-Available Distributed Communication SystemXiang, Gao / Guanghui, Li et al. | 2017
- 89
-
Energy-Efficient and Fair Power Allocation Approach for NOMA in Ultra-Dense Heterogeneous NetworksXiang, Lanhua / Chen, Hongbin et al. | 2017
- 95
-
P&D Graph Cube: Model and Parallel Materialization for Multidimensional Heterogeneous NetworkWu, Xinyu / Wu, Bin / Wang, Bai et al. | 2017
- 105
-
Measurement and Evaluation for Docker Container NetworkingZeng, Hao / Wang, Baosheng / Deng, Wenping / Zhang, Weiqi et al. | 2017
- 109
-
POPBrick: A High-Elasticity, Reconfigurable Network Infrastructure to Support POP ApplicationsZeng, Hao / Gao, Xianming / Wang, Baosheng et al. | 2017
- 113
-
Time-Domain Greedy Heuristic Approximation Algorithm for Multi-channel Assignment in Wireless Mesh NetworkWei-wei, Zhang / Jia-feng, He / Guo-wang, Gao / Li-li, Ren / ShenXuan-jing, et al. | 2017
- 118
-
JPEG Image Security by Block Size Estimation and Quality Factor ClassificationAttarifar, Masoud / Baniasadi, Mohammadamin et al. | 2017
- 122
-
Image Hiding Algorithm Based on Secure Steganography MechanismZhao, Lian / Zhang, Yingzhou / Wang, Xing / Chen, Xinghao et al. | 2017
- 130
-
Real Time Target Tracking Scale Adaptive Based on LBP Operator and Nonlinear MeanshiftShu, Zhenghua / Liu, Guodong / Xie, Zhihua et al. | 2017
- 134
-
Geomagnetic Fingerprint Maps for Indoor PositioningXu, Xiaolong / Lin, Licheng et al. | 2017
- 148
-
SigRA: A New Similarity Computation Method in Recommendation SystemWu, Xiaokun / Huang, Yongfeng et al. | 2017
- 155
-
Dead Code Detection Method Based on Program SlicingWang, Xing / Zhang, Yingzhou / Zhao, Lian / Chen, Xinghao et al. | 2017
- 159
-
A Faster without Scarifying Accuracy Online Decomposition Approach for Higher-Order TensorsXu, Yiwei / Gu, Yonggen / Do, Duc Minh Quan / Xie, Hongtianchen / Qing, Lunke et al. | 2017
- 167
-
Searching BWT against Pattern Matching Machine to Find Multiple String MatchesChen, Yangjun / Wu, Yujia et al. | 2017
- 177
-
Fault Data Diagnosis of Energy Consumption Equipment for Urban Rail Transit Based on ART2 ModelJinbing, Ha / Yunping, Yu et al. | 2017
- 182
-
Recognize Facial Expression Using Active Appearance Model and Neural NetworkLi, Taihao / Zhou, Jianshe / Tuya, Naren / Du, Cuifen / Chen, Zhiqiang / Liu, Shupeng et al. | 2017
- 186
-
Test-Suite Reduction Based on K-Medoids Clustering AlgorithmLiu, Feng / Zhang, Jun / Zhu, Er-Zhou et al. | 2017
- 193
-
The Keyword Extraction of Chinese Medical Web Page Based on WF-TF-IDF AlgorithmSun, Peng / Wang, Lihua / Xia, Qianchen et al. | 2017
- 199
-
Selection Strategy of Nodes with the Greatest Influence on Community StructureYang, Po / Ma, Xuebin et al. | 2017
- 206
-
Multi-label Classification Using Random Walk with RestartLiu, Jinhong / Yang, Juan et al. | 2017
- 213
-
Internet Traffic Analysis Using Community Detection and Apache SparkNi, Jiake / Weng, Weitao / Chen, Jiayu / Lei, Kai et al. | 2017
- 220
-
A Method of Building Fault Repository for Cloud InfrastructureQingfeng, Du / Yue, Tian / Tiandi, Xie / Kanglin, Yin / Juan, Qiu et al. | 2017
- 229
-
A Novel Attribute Based Keyword Search Scheme for Mobile Cloud StorageLei, Sun / Hang, Su / Zhiqiang, Zhu / Zuohui, Li et al. | 2017
- 235
-
Public Auditing Scheme of Dynamic Data Sharing Suiting for Cloud-Based EHR SystemJianhong, Zhang / Hao, Xiao et al. | 2017
- 244
-
Cloud Computing Security Threats and Attacks with Their Mitigation TechniquesAmara, Naseer / Zhiqui, Huang / Ali, Awais et al. | 2017
- 252
-
Implementation of Subject Recommendation and Practice System for Mobile Terminal UsersSong, Zhichao / Bai, Xiangyu / Bian, Haodong et al. | 2017
- 258
-
VM Reliability Modeling and Analysis for IaaS CouldQingfeng, Du / Huan, Li / Kanglin, Yin / Juan, Qiu et al. | 2017
- 266
-
ActiRecognizer: Design and Implementation of a Real-Time Human Activity Recognition SystemCao, Liang / Wang, Yufeng / Jin, Qun / Ma, Jianhua et al. | 2017
- 272
-
MCSMGS: Malware Classification Model Based on Deep LearningMeng, Xi / Shan, Zhen / Liu, Fudong / Zhao, Bingling / Han, Jin / Wang, Hongyan / Wang, Jing et al. | 2017
- 276
-
A Zero-Watermarking Scheme for Prose WritingsYingjie, Meng / Huiran, Liu / Tong, Shang / Xiaoyu, Teng et al. | 2017
- 283
-
Implementation and Performance Optimization of Dynamic Random ForestXu, Xiaolong / Chen, Wen et al. | 2017
- 290
-
Congestion Prediction for Urban Areas by Spatiotemporal Data MiningWang, LiHua / Zhou, Zijun et al. | 2017
- 298
-
Improving the Forecasting Accuracy of Civil Aviation Passengers Based on Machine Learning ModelsLiu, Xia / Huang, Xia / Chen, Lei / Qiu, Zhao / Chen, Mingrui et al. | 2017
- 305
-
Wearable Social Sensing and Its Application in Anxiety AssesmentGu, Jun / Gao, Bin / Chen, Yuanpeng / Jiang, Long / Gao, Zhao / Ma, Xiaole / Ma, Yong / Woo, W. L. et al. | 2017
- 309
-
Topic Crawler for OpenStack QA Knowledge BaseQiu, Juan / Du, Qingfeng / Wang, Wei / Yin, Kanglin / Lin, ChangSheng / Qian, ChongShu et al. | 2017
- 318
-
A Recommendation System Based on Text MiningMiao, Dongchen / Lang, Fei et al. | 2017
- 322
-
A Chinese Text Corrector Based on Seq2Seq ModelGu, Sunyan / Lang, Fei et al. | 2017
- 326
-
A Binary-Classification Method Based on Dictionary Learning and ADMM for Network Intrusion DetectionYin, Xiu / Zhang, Yingzhou / Chen, Xinghao et al. | 2017
- 334
-
Research on Correlation Models Between QoS and Application Layer QoE in IoT-NDN EnvironmentSun, Wenjing / Jin, Song / Li, Ruide / Li, Yangyang / Yang, Qianru / Cao, Ning et al. | 2017
- 338
-
Forecasting Maturity of IoT Technologies in Top 5 Countries Using Bibliometrics and Patent AnalysisLokuhitige, Sanju / Brown, Suzana et al. | 2017
- 342
-
Trust and Attribute-Based Dynamic Access Control Model for Internet of ThingsWang, Junshe / Wang, Han / Zhang, Hongbin / Cao, Ning et al. | 2017
- 346
-
An IoT Application-Layer Protocol Modem: A Case Study on Interfacing IEEE 1888 with AT CommandsZhang, Zhiqing / Ochiai, Hideya / Esaki, Hiroshi et al. | 2017
- 350
-
A Study on Smart Monitoring and Management of Track Running Self-Testing System Based on Internet of ThingsSun, Huiyang / Li, Hongjun / Zhang, Yuanyuan / Zhang, Wanmin et al. | 2017
- 354
-
Internet of Things for Ambient Assisted Living: Challenges and Future OpportunitiesWan, Jie / Gu, Xiang / Chen, Liang / Wang, Jin et al. | 2017
- 358
-
Mobile RFID Mutual Authentication Protocol Based on Hash FunctionYu, Wenjin / Jiang, Yixiang et al. | 2017
- 369
-
A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor NetworksBasan, Alexander / Basan, Elena / Makarevich, Oleg et al. | 2017
- 373
-
A Demand-Aware Transmission Optimization Control Scheme Based on Multichannel CoordinationZhao, Haitao / Gao, Kaiqiang / Zhang, Mengkang / Li, Dapeng / Zhu, Hongbo et al. | 2017
- 378
-
A Survey of Recent Achievements for Wireless Sensor Networks TestbedsMa, Junyan / Wang, Jin / Zhang, Te et al. | 2017
- 382
-
Content Delivery Routing Strategy Based on Energy Constraint in MDTN-CCN Integrated NetworkDang, Na / Bai, Xiangyu / Bian, Haodong et al. | 2017
- 391
-
Research on Time Synchronization Technology of Wireless Sensor NetworkLiu, Chunqiang / Pang, Haijie / Cao, Ning et al. | 2017
- 395
-
An Auxiliary Blind Guide System Based on Multi-sensor Data FusionHuang, Yufang / Lin, Yi / Miao, Rongzhen et al. | 2017
- 399
-
Analysis of the Approach to Predict Different Routing Protocols in WSNsCao, Ning / Zhang, Yuanyuan / Li, Yan / Xue, Bin / Yu, Hua / Wang, Yingying / Shen, Yuyan / Li, Na et al. | 2017
- 403
-
An Energy-Saving Clustering Strategy of Hybrid Network of Sensors and Mobile CR NodesDeng, Yi-Wei / Zhong, Cheng / Yu, Jun / Shao, Su-Jie / Qiu, Xue-Song et al. | 2017
- 412
-
A Survey of Wireless Sensor Technique Applications for Medical CareXie, Qi / Wang, Qiang / Cao, Ning / Gao, Shuqing / Liang, Guang / Zhang, Tong / Chen, Yanbing / Zhai, Yi / Li, Na et al. | 2017
- 416
-
Transmission Probability Strategies for Cluster-Based Event-Driven Wireless Sensor NetworksRivero-Angeles, Mario E. / Rubino, Gerardo et al. | 2017
- 420
-
Dynamic Duty-Cycle Control for Wireless Sensor Networks Using Artificial Neural Network (ANN)Khan, Anwar Ahmed / Jamal, Mohammad Shoaib / Siddiqui, Shama et al. | 2017
- 425
-
DPR-MAC: Dynamic Polling for Rare Events in Wireless Sensor NetworksSiddiqui, Shama / Khan, Anwar Ahmed / Ghani, Sayeed et al. | 2017
- 429
-
Implementation and Verification of a High-Throughput Reconfigurable MIMO DetectorWang, Zhen / Qin, Hai / Gong, Yu / Liu, Bo et al. | 2017
- 433
-
Loop-Free Forwarding in Hierarchical Location-Based RoutingWei, ZhanZhen / Wang, Feng / Li, Zhaobin et al. | 2017
- 437
-
Investigations of 5G Multiple Radio Access Technology Performance and Resource Selection BehaviorChen, Shun-Ping / Gebert, Jens et al. | 2017
- 445
-
A Bit Sampled Wake-Up Receiver with Logarithmic Detector ArchitectureMa, Tao et al. | 2017
- 450
-
A Heuristic D2D Communication Mode Selection AlgorithmLu, Weifeng / Lin, Weijun / Yang, Lijun / Chen, Siguang et al. | 2017
- 454
-
A Classifier Method for Detection of Covert Channels over LTEWang, Zukui / Huang, Liusheng / Yang, Wei / He, Zhiqiang et al. | 2017
- 461
-
The Limited Feedback Precoding Based on the Triplex CodebooksKang, Guihua / Xu, Kaiyue / Kang, Hongbo / Pan, Kun-Bei et al. | 2017
- 466
-
Performance of Polarized Channel Coding in TRPC-UWB Communication SystemsMa, La'ning / Liang, Zhonghua / Liu, Danli et al. | 2017
- 471
-
Modeling and Verification of Circuit with Stable-EventJia, Tingting / Li, Caihong / He, Anping et al. | 2017
- 476
-
Multi-channel Allocation Algorithm Based on AODV Protocol in Wireless Mesh NetworksWei-wei, Zhang / Jia-feng, He / Guo-wang, Gao / Li-li, Ren / ShenXuan-jing, et al. | 2017
- 482
-
Controller Cluster-Based Interconnecting for Multi-domain SDN NetworksLi, Kun / Ou, Qinghai / Chen, Hong / Zou, Baoping et al. | 2017
- 486
-
DDS: Distributed Decision Strategy Based on Switch Migration towards SDN Control PlaneZhang, Jianhui / Hu, Tao / Zhao, Wei / Qiao, Dan et al. | 2017
- 494
-
Scheduling of Security Resources in Software Defined Security ArchitectureZhang, Gang / Qiu, Xiaofeng / Chang, Wei et al. | 2017
- 504
-
A Software Defined Security Scheme Based on SDN EnvironmentXu, Xiaolong / Hu, Liuyun et al. | 2017
- 513
-
SDN-based Architecture for Big Data NetworkXu, Yuhua / Sun, Zhe / Sun, Zhixin et al. | 2017
- 517
-
MPLB: A Load Balance Scheme of Joint Resource Scheduling in Heterogeneous Wireless NetworkLin, Xiaoyong / Yin, Pengwei / Xia, Yun / Yu, Yang / Qiu, Tingting / Wang, Xiaoming / Li, Lixiang et al. | 2017
- 525
-
Author index| 2017
- 530
-
[Publisher's information]| 2017
- c1
-
[Front cover]| 2017
- i
-
[Title page i]| 2017
- iii
-
[Title page iii]| 2017
- iv
-
[Copyright notice]| 2017
- v
-
Table of contents| 2017
- xiii
-
Introduction| 2017
- xiv
-
Message from Technical Program Chairs| 2017
- xix
-
Technical Program Committee| 2017
- xvi
-
Message from Steering Committee Chair| 2017
- xvii
-
Conference Organization| 2017
- xxi
-
Reviewers| 2017
- xxiv
-
Keynotes| 2017