Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Huazhong University of Science and Technology(Nature Science)
1671-4512
2016 Issue 3
Ajax Web automatic testing model based on simulation of users
Wang Lina;Li Huai;Zhao Lei;School of Computer;Wuhan University;
..............page:1-5
Anomaly detection approach for drive-by-download attacks
Ma Hongliang;Wang Wei;Han Zhen;School of Computer and Information Technology;Beijing Jiaotong University;School of Information Science and Technology;Shihezi University;
..............page:6-11
Remote attestation for vehicular cloud based on trusted computing
Zhang Wenbo;Bao Zhenshan;Zhang Jianbiao;Zhan Jing;College of Computer Science;Beijing University of Technology;Beijing Municipal Key Lab of Trusted Computing;
..............page:12-16
Lightweight threat awareness system based on combination of host and cloud analysis
Peng Guojun;Wang Taige;Liu Yan;Zhang Huanguo;aKey Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education;Wuhan University;School of Computer School;Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education;Wuhan University;Baidu Online Network Technology Co.Ltd.;
..............page:17-21+27
Service recommendation based on trustworthy community under big data environments
Wang Haiyan;Jin Weisheng;School of Computer Science and Technology;Nanjing University of Posts and Telecommunications;
..............page:22-27
Code virtualized protection system with instruction set randomization
Tang Zhanyong;Li Guanghui;Fang Dingyi;Chen Xiaojiang;School of Information Science and Technology;Northwest University;NWU-Irdeto IoT &Info-Sec Joint Lab;Northwest University;
..............page:28-33
Virtualization-based monitoring of untrusted extensions execution
Chen Xingshu;Zhao Dandan;Li Hui;Zhang Lei;Cyberecurity Research Institute;School of Computing;Sichuan University;
..............page:34-38
Memory corruption exploit diagnosis based on field integrity
Ren Yanzhen;Li Changjun;Liu Ziwei;Wang Lina;Key Laboratory of Aerospace Information Security and Trust Computing;Ministry of Education;Wuhan University;School of Computer;Wuhan University;
..............page:39-43
Design and implementation of trusted enhanced TLS protocol
Xu Zhen;Chen Lu;Yu Aimin;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:44-48
Security service access method for virtual network
Chen Xingshu;Hu Liang;Chen Guangrui;Chen Lin;College of Computer Science;Sichuan University;
..............page:49-54
Semantics-based binary code automated de-obfuscation approach
Guo Jun;Wang Lei;Tang Zhanyong;Fang Dingyi;Department of Computer Science and Technology;Northwest University;NWU-Irdeto Network-Information Security Joint Laboratory;Northwest University;
..............page:55-59
Anti-obfuscation method for detecting similarity of Android application
Wang Zhaoguo;Li Chenglong;Guan Yi;Xue Yibo;School of Computer Science and Technology;Harbin Institute of Technology;National Computer Network Emergency Response Technical Team;Coordination Center of China;Tsinghua National Laboratory for Information Science and Technology;Tsinghua University;
..............page:60-64+76
Software tamper proofing based on process-level virtual machine
Tang Zhanyong;Hao Zhaohui;Fang Dingyi;Chen Xiaojiang;College of Information Science and Technology;Northwest University;
..............page:65-70
New multivariate encryption scheme with low rank error-correcting codes
Han Yiliang;Lan Jinjia;Yang Xiaoyuan;Wang Jingjing;Department of Electronic Technology;Engineering University of Armed Police Force;College of Information Science and Technology;Northwestern University;
..............page:71-76
Multiple-replica auditing in clouds using Shamir secret sharing
Tian Hui;Chen Yuxiang;Huang Yongfeng;Lu Jing;College of Computer Science and Technology;Huaqiao University;Department of Electronic Engineering;Tsinghua University;Network Technology Center;Huaqiao University;
..............page:77-82
C-TNC:trusted cloud access protocol for Openstack
Zhao Bo;Zhu Xiangyu;Xiang Shuang;Yang Bing;Computer School;Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education;Wuhan University;
..............page:83-88
Novel video steganographic algorithm based on modifying singular value combining with improved matrix encoding
Zhang Yingnan;Zhang Minqing;Luo Peng;Electronic Technology Department;Engineering University of the PAP;Network and Information Security Key Laboratory of PAP;Engineering University of the PAP;
..............page:89-93
Multi-tenancy access control model for IaaS cloud
Shi Wenchang;Wang Zhiyu;Huang Ying;School of Information;Renmin University of China;
..............page:94-98
Differential privacy two-dimensional data partitioning publication algorithm based on quad-tree
Wu Yingjie;Lu Qing;Cai Jianping;Wang Xiaodong;College of Mathematics and Computer Science;Fuzhou University;
..............page:99-104
Trusted cloud execution environment based on trust extension
Ji Xiangmin;Zhao Bo;Chen Lu;Xiang Shuang;Computer School;Wuhan University;College of Computer and Information Sciences;Fujian Agriculture and Forestry University;Department of Information Security;Naval University of Engineering;
..............page:105-109
Collusion resistant identity based proxy re-encryption scheme on lattices
Wu Liqiang;Yang Xiaoyuan;Zhang Minqing;Wang Xu′an;Key Laboratory of Cryptography and Information Security under the Chinese Armed Police Force;Engineering University of the Armed Police Force;Key Laboratory of Network and Information Security;Ministry of Education;Xidian University;
..............page:110-115
Aerodynamic parameters online identification method based on PSO
Wang Yongji;Liu Sha;Liu Lei;Wei Xing;School of Automation;Huazhong University of Science and Technology;
..............page:116-120
UAV cooperative task allocation based on multi-objective MQABC algorithm
Zhao Hui;Li Mudong;Han Tong;Huang Hanqiao;Department of Aeronautics and Astronautics Engineering;Air Force Engineering University;
..............page:121-126
Control method using auto-tuning PI and fuzzy logic compensator
Liu Feng;Shen Anwen;Luo Xin;Xu Jinbang;School of Automation;Huazhong University of Science and Technology;
..............page:127-132