EAI - Reinventing the governance and economy of research and innovation
The leading professional community for research career enhancement in the digital age

Accepted papers

  1. SE Dots: Sensitive and Extensible Framework for cross-region DDoS processing; Su, Li
  2. SPDS: A supervised private data sharing model based on blockchain technology; liu, zheli; Gao, Jiqiang; Sun, Mengyao; Yin, Mingxin; Guo, Xiaojie; Zhang, Jianzhong
  3. Research on Intelligent Network Linked Vehicle Information Security Risk Assessment; zhang, yanan; Han, Shengqiang
  4. Research on the construction of vehicle binary firmware vulnerability monitoring system; zhang, yanan;Han, Shengqiang
  5. Research on Information Security Test Evaluation Method Based on Intelligent Connected Vehicle; Zhang, Yanan; Han, Shengqiang
  6. A Trusted International Settlement Solution Based on Cross Check of CDRs; Ran, Peng; Su, Li
  7. Cryptanalysis of a public key cryptosystem based on data complexity under quantum environment; Jing, Zheng Jun; Gu, Chunsheng; Shi, Peizhong
  8. Review on identification and trust techniques compatible with eIDAS regulation; Mocanu, Stefan; Chiriac, Ana Maria; Lacatusu, Andrei; Dobrescu, Radu; Saru, Daniela
  9. A RBAC Model Based on Identity-Based Cryptosystem in Cloud Storage; Xu, Jian; Yu, Yanbo; Meng, Qingyu; Wu, Qiyu; Zhou, Fucai
  10. Blockchain-based Video Report and Trust Management in SDN-Enabled 5G-VANET; Xie, Lixia; Ding, Ying; Yang, Hongyu
  11. State Consistency Checking for Non Reentrant Function Based on Taint Assisted Symbol Execution; Yu, Bo; Yang, Qiang; Song, Congxi
  12. Network risk assessment based on improved MulVAL framework and HMM; Wang, Chundong; Li, Kongbo
  13. A Blockchain-based Digital Advertising Media Promotion System; Ding, Yong; Luo, Decun; Wang, Yujue; Xiang, Hengkui; Tang, Chenjun; Liu, Lingang; Zou, Xiuqing; Li, Shijie
  14. A semi-supervised method for classifying unknown protocols; Zhu, Peihao; Zhang, Shuzhuang; Luo, Hao; Wu, Zhigang
  15. Coordinated Web Scan Detection Based on Hierarchical Correlation; Yang, Jing; Wang, Liming; Xu, Zhen; Wang, Jigang; Tian, Tian
  16. Design of an Urban Waterlogging Monitoring System based on Internet of Things; Liu, Jiachen; Li, Wuyungerile; Bao, Yintu; Jia, Bing
  17. Design of ZigBee-based Energy Harvesting Wireless Sensor Network And Modeling of Solar Energy; liu, yingcong; Li, Wuyungerile; Meng, Baoyintu; Jia, Bing
  18. A Practical Group Signatures for Providing Privacy-Preserving Authentication with Revocation; Yue, Xiaohan; Xu, Jian; Chen, Bing; He, Yuan
  19. Zone based Lossy Image Compression using Discrete Wavelet and Discrete Cosine Transformations; Ahmad, Nafees; Iqbal, Khalid; Han, Lansheng; Iqbal, Naeem; Abid, Muhammad Adil
  20. BL-IDS:Detecting Web Attacks Using Bi-LSTM Model Based on Deep Learning; hao, saiyu; long, jun
  21. Privacy Preservation in Publishing Electronic Health Records Based on Perturbation; Yao, Lin; Wang, Xinyu; Chen, Zhenyu; Wu, Guowei
  22. A Posted Pricing Mechanism Based on Random Forest in Crowdsourcing Market; Jia, Bing; Zhang, Chuxuan; Hao, Lifei
  23. PJC: A multi-source method for identifying information dissemination in networks; Ding, Yong; Cui, Xiaoqing; Wang, Huiyong; Wang, Yujue
  24. vm-CFI: VM-Embedded Execution for Control-Flow Integrity; Cheng, Xiaoyang; Jia, Chunfu
  25. A privacy-preserving palmprint authentication scheme based on ElGamal; Ding, Yong; Wang, Huiyong; Gao, Zhiqiang; Wang, Yujue; Fan, Kefeng; Tang, Shijie
  26. Steganalysis of Adaptive Multiple-rate Speech Using Parity of Pitch-delay Value; Liu, Xiaokang; Tian, Hu; Liu, Jie; Li, Xiang; Lu, Jing
  27. Public Auditing of Log Integrity for Cloud Storage Systems via Blockchain; Wang, Jia; Peng, Fang; Tian, Hui; Chen, Wenqi; Lu, Jing
  28. Detection of Steganography in AMR Speech Based on Pulse Correlation and Multi-classifiers Combination; Liu, Jie; Tian, Hui; Liu, Xiaokang; Lu, Jing
  29. A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-serial Structure; Yang, Yijun; Wu, Liji; Yuan, Ye; Zhang, Xiangmin
  30. A Multi-Objective Service Selection Method Based on Artificial Fish Swarm for QoE Restrictions in the Internet of Things; Jia, Bing; Zhang, Chuxuan; Hao, Lifei
  31. Invulnerability Assessment of Cyber-Physics Systems for Blockchain Environment; Peng, Hao; Kan, Zhe; Zhao, Dandan; Zheng, zhonglong
  32. Security Assessment for Cascading Failures of Cyber-Physical Systems under Target attack Strategy; Peng, Hao; Kan, Zhe; Zhao, Dandan; Han, Jianmin
  33. Reliability Analysis of Coupled Cyber-Physical Systems under Different Network Types; Peng, Hao; Kan, Zhe; Zhao, Dandan; Han, Jianmin
  34. Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem; Cheng, Yage; Jia, Zhijuan; Gong, Bei; Wang, Lipeng; Lei, Yanfang
  35. A Reverse Auction Incentive Mechanism Based on Participant Behavior and Data Quality in Crowdsensing Networks; Jia, Bing; Zhou, Tao; Li, Wuyungerile
  36. A Blind signature scheme Applying on Electronic Payment Scene based on Quantum Secret Sharing; Zhang, Jia-Lei; Hu, Ming-Sheng; Gong, Bei; Jia, Zhi-Juan; Wang, Li-Peng
  37. Fog-enabled Smart Campus: Architecture and Challenges; Tang, Chaogang; Xia, Shixiong; Liu, Chong; Wei, Xianglin; Bao, Yu; Chen, Wei
  38. A New Signcryption Scheme Based on Elliptic Curves; Cui, Wenjun; Jia, Zhijuan; Hu, Mingsheng; Gong, Bei; Wang, Lipeng
  39. Design and Implementation of a Lightweight Intrusion Detection and Prevention System; wei, xiaogang
  40. An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform; Tang, Jianchao; Fu, Shaojing; Xu, Ming
  41. Design of an Improved Group Decision Making Medical Diagnosis Expert System based on Dynamic Knowledge Base; Zong, Na; Li, Wuyungerile; Li, Pengyu; Jia, Bing
  42. Gathering Pattern Mining Method based on Trajectory Data Stream; Xia, Ying; Diao, Lian; Zhang, Xu; Bae, Hae-young
  43. Privacy in Location-Based Services: Present Facts and Future Path; Sahnoune, Zakaria; Aïmeur, Esma
  44. SGX-based Security Indexing System; Kuiyuan, Fu; Yuanjing, Zhang; Jian, Xu
  45. An Ant Colony Optimization Fuzzy Clustering Task Scheduling Algorithm in Mobile Edge Computing; Liu, Jianwei; Wei, Xianglin; Wang, Tongxiang; Wang, Junwei
  46. Research on Multi Domain Based Access Control in Intelligent Connected Vehicle; Wang, kaiyu; Liu, nan; Xiu, Jiapeng; yang, zhengqiu
  47. Optional Parameter Database Query System; Jia, Jingyu; Wu, Yuduo; Guo, Yue; Gao, Jiqiang; Peng, Jin; Ran, Peng; Li, Min; Liu, Zheli
  48. Anomaly Detection of Vehicle CAN Network based on Message Content; Chen, Pengyuan; Mo, Xiuliang; Wang, Chundong
  49. A Network Security Assessment Model Based on Hidden Markov Model and Attack Graph; Ye, Xin; Wang, Chundong
  50. Android malware detection based on sensitive permissions and APIs; Zhao, Chunhui; Wang, Chundong; Zheng, Wenbai
  51. Two-level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection; Wang, Chundong; Ye, Xin; Gong, Liangyi
  52. Travel Modes Recognition Method Based on Mobile Phone Signaling Data; Xia, Ying; Tang, Jie; Zhang, Xu; Bae, Hae-young
  53. Research on Network Intrusion Detection Method Based on Improved Convolutional Neural Network; Yang, Hongyu; Wang, Fengyan
  54. A one-way variable threshold proxy re-signature scheme for mobile internet; Lei, Yanfang; Hu, Mingsheng; Gong, Bei; Wang, Lipeng; Cheng, Yage
  55. Grid partition and agglomeration for bidirectional hierarchical clustering; wu, lei; chen, hechang; yu, xiangchun; yu, zhezhou; dou, ruiting; sun, chao
  56. FIREWORK: Fog orchestration for secure IoT networks; Vahabi, Maryam; Fotouhi, Hossein; Björkman, Mats
  57. An Optimized Static Propositional Function Model to Detect Software Vulnerability; Han, Lansheng; Zhou, Man; Wang, Ting; Fu, Cai; Zou, Deqing
  58. A Fixed point view: A Unified Clustering Framework and Hierarchical Distribution Network; Han, Lansheng; Zhou, Man
  59. Intrusion Detection Model for IoT Heterogeneous Perceptual Network Based on Game Theory; Zhou, Man; Han, Lansheng; Lu, Hongwei; Fu, Cai
  60. Quantum-Based Particle Swarm Clustering Algorithm  to Identify Collaborative Malicious Behaviour;  Zhou, Man; Han, Lansheng; Lu, Hongwei; Fu, Cai
  61. Throughput analysis of IEEE 802.11 wireless network under jamming attack; Wang, Tongxiang; Wei, Xianglin; Liu, JIanwei; Wang, Junwei
  62. A Novel Wireless Sensor Networks Malicious Node Detection Method; Yang, Hongyu; Zhang, Xugao; Cheng, Fang
  63. Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data; Zhang, Qi; Fu, Shaojing; Jia, Nan
  64. Privacy Disclosures Detection in Natural-Language Text Through Linguistically-motivated Artificial Neural Networks; Mehrpouyan, Hoda; Mehdy, Nuhil; Kenningto, Casey
  65. A graded reversible watermarking scheme for relational data; Hou, Ruitao; Xian, Hequn
  66. Research on Social Networks Publishing Method under Differential Privacy; Wang, Han; Li, Shuyu
  67. A Survey of Trusted Network Trust Evaluation Methods; Yin, Ansheng
  68. A non-repudiable dynamic provable data possession; Tian, FengJun; Guo, FangRui; Jing, Xuan
  69. FDSCD:Fast Deletion Scheme of Cloud Data; Tian, ChiYue; Shao, Tong; Li, Zhen
  70. Lightweight Secure Cloud Auditing Scheme for Shared Data Supporting Identity Privacy and Traceability;Tian, Junfeng; Jing, Xuan
  1. Research on Logistics Distribution Vehicle Scheduling Algorithm Based on Cloud Computing; Liu, Huwei
  2. Cloud Security Solution Based on Software Defined Network; Li, Zhaochan; Wang, Jinlong
  3. Research on drug regulation mode in the age of the Internet of things; Zhao, Yan; Liu, Hu Wei
  4. Application of Big Data Technology in JD; Shi, Ning; Fan, Xiani
  5. Research on Big Data Platform Security Strategy Based on Cloud Computing;    Niu, Xiaxia; Zhao, Yan
  6. ObliviSSE: a more secure searchable symmetric encryption with an efficient search; Lu, Hang
  7. CRM-ORAM: Practical Contention-Resistant Multi-User ORAM Without Trusted Center; Wang, Yiwei
  8. ShadowFPE: New Encrypted Web Application Solution based on Shadow DOM; Li, Weicai
EAI Institutional Members