| 1. |
Resolving Multi-Party Privacy Conflicts in Social Media |
 |
 |
| 2. |
SecRBAC: Secure data in the Clouds |
 |
 |
| 3. |
Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data |
 |
 |
| 4. |
Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud |
 |
 |
| 5. |
Two-Factor Data Security Protection Mechanism for Cloud Storage System |
 |
 |
| 6. |
Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage |
 |
 |
| 7. |
Crowd sourcing based Description of Urban Emergency Events using Social Media Big Data |
 |
 |
| 8. |
Providing User Security Guarantees in Public Infrastructure Clouds |
 |
 |
| 9. |
Model-Driven Development Patterns for Mobile Services in Cloud of Things |
 |
 |
| 10. |
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
 |
 |
| 11. |
A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds |
 |
 |
| 12. |
Video Stream Analysis in Clouds: An Object Detection and Classification Framework for High Performance Video Analytics |
 |
 |
| 13. |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
 |
 |
| 14. |
Follow-Me Cloud: When Cloud Services Follow Mobile Users |
 |
 |
| 15. |
EPAS: A Sampling Based Similarity Identification Algorithm for the Cloud |
 |
 |
| 16. |
Energy-efficient Adaptive Resource Management for Real-time Vehicular Cloud Services |
 |
 |
| 17. |
Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud
|
 |
 |
| 18. |
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing |
 |
 |
| 19. |
Auditing a Cloud Provider’s Compliance With Data Backup Requirements: A Game Theoretical Analysis |
 |
 |
| 20. |
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates |
 |
 |
| 21. |
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing |
 |
 |
| 22. |
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud |
 |
 |
| 23. |
Improving Construction of Conditional Probability Tables for Ranked Nodes in Bayesian Networks |
 |
 |
| 24. |
K-Subspaces Quantization for Approximate Nearest Neighbor Search |
 |
 |
| 25. |
Mining User-Aware Rare Sequential Topic Patterns in Document Streams |
 |
 |
| 26. |
Personalized Influential Topic Search via Social Network Summarization |
 |
 |
| 27. |
Resolving Multi-Party Privacy Conflicts in Social Media |
 |
 |
| 28. |
User Preference Learning for Online Social Recommendation |
 |
 |
| 29. |
Unsupervised Visual Hashing with Semantic Assistant for Content-based Image Retrieval |
 |
 |
| 30. |
Microblogging Content Propagation Modeling Using Topic-specific Behavioral Factors |
 |
 |
| 31. |
Mining Health Examination Records — A Graph-based Approach |
 |
 |
| 32. |
Aggregating Crowd sourced Quantitative Claims: Additive and Multiplicative Mode |
 |
 |
| 33. |
Task Assignment on Multi-Skill Oriented Spatial Crowdsourcing |
 |
 |
| 34. |
Fast and accurate mining the community structure: integrating center locating and membership optimization |
 |
 |
| 35. |
Toward Optimal Feature Selection in Naive Bayes for Text Categorization |
 |
 |
| 36. |
K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis |
 |
 |
| 37. |
Learning Mixtures of Markov Chains from Aggregate Data with Structural Constraints |
 |
 |
| 38. |
Conflict-Aware Weighted Bipartite B-Matching and Its Application to E-Commerce |
 |
 |
| 39. |
Clustering Data Streams Based on Shared Density between Micro-Clusters |
 |
 |
| 40. |
Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases |
 |
 |
| 41. |
Entropy Optimized Feature-Based Bag-of-Words Representation for Information Retrieval |
 |
 |
| 42. |
Analytic Queries over Geospatial Time-Series Data Using Distributed Hash Tables |
 |
 |
| 43. |
Efficient R-Tree Based Indexing Scheme for Server-Centric Cloud Storage System |
 |
 |
| 44. |
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy |
 |
 |
| 45. |
RSkNN: kNN Search on Road Networks by Incorporating Social Influence |
 |
 |
| 46. |
A Bayesian Classification Approach Using Class-Specific Features for Text Categorization |
 |
 |
| 47. |
Prefix-adaptive and Time-sensitive Personalized Query Auto Completion |
 |
 |
| 48. |
Private Over-threshold Aggregation Protocols over Distributed Databases |
 |
 |
| 49. |
Multilabel Classification via Co-evolutionary Multilabel Hypernetwork |
 |
 |
| 50. |
SPIRIT: A Tree Kernel-based Method for Topic Person Interaction Detection |
 |
 |
| 51. |
Online Subgraph Skyline Analysis over Knowledge Graphs |
 |
 |
| 52. |
Set Matching Measures for External Cluster Validity |
 |
 |
| 53. |
Scalable Semi-Supervised Learning by Efficient Anchor Graph Regularization |
 |
 |
| 54. |
Using Hashtag Graph-Based Topic Model to Connect Semantically-Related Words Without Co-Occurrence in Microblogs |
 |
 |
| 55. |
Proxies for Shortest Path and Distance Queries |
 |
 |
| 56. |
ATD: Anomalous Topic Discovery in High Dimensional Discrete Data |
 |
 |
| 57. |
Improving Collaborative Recommendation via User-Item Subgroups |
 |
 |
| 58. |
Data-Driven Soft Decoding of Compressed Images in Dual Transform-Pixel Domain |
 |
 |
| 59. |
A Diffusion and Clustering-Based Approach for Finding Coherent Motions and Understanding Crowd Scenes |
 |
 |
| 60. |
Automatic Design of Color Filter Arrays in the Frequency Domain |
 |
 |
| 61. |
CASAIR: Content and Shape-Aware Image Retargeting and Its Applications |
 |
 |
| 62. |
Image Segmentation Using Parametric Contours With Free Endpoints |
 |
 |
| 63. |
Texture Classification Using Dense Micro-Block Difference |
 |
 |
| 64. |
Statistical Performance Analysis of a Fast Super-Resolution Technique Using Noisy Translations |
 |
 |
| 65. |
Learning Iteration-wise Generalized Shrinkage–Thresholding Operators for Blind Deconvolution |
 |
 |
| 66. |
Double-Tip Artifact Removal From Atomic Force Microscopy Images |
 |
 |
| 67. |
Weakly Supervised Fine-Grained Categorization With Part-Based Image Representation |
 |
 |
| 68. |
A Diffusion and Clustering-Based Approach for Finding Coherent Motions and Understanding Crowd Scenes |
 |
 |
| 69. |
Robust Visual Tracking via Convolutional Networks Without Training |
 |
 |
| 70. |
Distributed and Fair Beaconing Rate Adaptation for Congestion Control in Vehicular Networks |
 |
 |
| 71. |
Unlicensed Spectra Fusion and Interference Coordination for LTE Systems |
 |
 |
| 72. |
A Super process With Upper Confidence Bounds for Cooperative Spectrum Sharing |
 |
 |
| 73. |
Fair Congestion Control in Vehicular Networks with Beaconing Rate Adaptation at Multiple Transmit Powers |
 |
 |
| 74. |
Minimizing Radio Resource Usage for Machine-to-Machine Communications through Data-Centric Clustering |
 |
 |
| 75. |
An Optimization Framework for Mobile Data Collection in Energy-Harvesting Wireless Sensor Networks |
 |
 |
| 76. |
A Super process With Upper Confidence Bounds for Cooperative Spectrum Sharing |
 |
 |
| 77. |
On the vulnerabilities of Voronoi-based approaches to mobile sensor deployment |
 |
 |
| 78. |
Aspect-Level Influence Discovery from Graphs |
 |
 |
| 79. |
Service Rating Prediction by Exploring Social Mobile Users’ Geographic Locations |
 |
 |
| 80. |
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage |
 |
 |
| 81. |
Shadow Attacks based on Password Reuses: A Quantitative Empirical View |
 |
 |
| 82. |
Internet-based Indoor Navigation Services |
 |
 |
| 83. |
Risk Assessment in a Sensor Cloud Framework Using Attack Graphs |
 |
 |
| 84. |
Social media interaction and analytics for enhanced educational experiences |
 |
 |
| 85. |
Tools Enabling Online Contributions by Older Adults |
 |
 |
| 86. |
Energy-Aware Bio-signal Compressed Sensing Reconstruction on the WBSN-gateway |
 |
 |
| 87. |
Indoor Pedestrian Tracking by On-Body Multiple Receivers |
 |
 |
| 88. |
State Estimation Oriented Wireless Transmission for Ubiquitous Monitoring in Industrial Cyber-Physical Systems |
 |
 |
| 89. |
Joint Channel Access and Sampling Rate Control in Energy Harvesting Cognitive Radio Sensor Networks |
 |
 |
| 90. |
Cryptanalysis of a Privacy-Preserving Aggregation Protocol |
 |
 |
| 91. |
Knowledge Connectivity Requirements for Solving Byzantine Consensus with Unknown Participants |
 |
 |
| 92. |
Immutable Authentication and Integrity Schemes for Outsourced Databases |
 |
 |
| 93. |
GeTrust: A guarantee-based trust model in Chord-based P2P networks |
 |
 |
| 94. |
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks |
 |
 |
| 95. |
Efficient Anonymous Message Submission |
 |
 |
| 96. |
Understanding Practical Tradeoffs in HPC Checkpoint-Scheduling Policies |
 |
 |
| 97. |
Rumor Source Identification in Social Networks with Time-varying Topology |
 |
 |
| 98. |
Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions |
 |
 |
| 99. |
Shadow Attacks based on Password Reuses: A Quantitative Empirical View |
 |
 |
| 100. |
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention |
 |
 |
| 101. |
Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis |
 |
 |