Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2015 Issue 12
Research progress and trend of cyberspace big search
FANG Bin-xing;JIA Yan;LI Ai-ping;YIN Li-hua;School of Computer Science;Beijing University of Posts and Telecommunications;School of Computer Science;National University of Defense Technology;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:1-8
Research progress and development trend of online social network smart search
JIA Yan;GAN Liang;LI Ai-ping;XU Jing;School of Computer Science;National University of Defense Technology;
..............page:9-16
Entity-relation modeling and discovery for smart search
WANG X Sean;ZHENG Xiao-qing;XIAO Yang-hua;Shanghai Key Laboratory of Data Science;School of Computer Science;Fudan University;
..............page:17-27
Keyword search approach for knowledge base in ScholarSpace
LI He-han;MENG Xiao-feng;ZOU Lei;School of Information;Renmin University of China;Institute of Computer Science and Technology;Beijing University;
..............page:28-36
zhi xie
..............page:29-30
Data provision for IoT searches: an auction approach
YIN Li-hua;GUO Yun-chuan;ZHANG Hui-bing;Institute of Information Engineering;Chinese Academy of Sciences;Guangxi Key Lab of Trusted Software;Guilin University of Electronic Technology;
..............page:37-46
Combinatorial double auction-based allocation of retrieval tasks in Internet of Things
XU Zhi-kai;ZHANG Hong-li;YU Xiang-zhan;ZHOU Zhi-gang;Research Center of Computer Network and Information Security Technology;Harbin Institute of Technology;
..............page:47-56
Survey on the search of Internet of Things
GAO Yun-quan;LI Xiao-yong;FANG Bin-xing;Key Laboratory of Trustworthy Distributed Computing and Service;Ministry of Education;Beijing University of Posts and Telecommunications;School of Computer Science and Technology;Anhui University of Technology;
..............page:57-76
Exploratory search on big data
DU Xiao-yong;CHEN Jun;CHEN Yue-guo;MOE Key Laboratory of Data Engineering and Knowledge Engineering;Renmin University of China;School of Information;Renmin University of China;
..............page:77-88
Smart search in smart enterprise
CHEN Yang-bin;LI Qing;ZHUANG Yue-ting;Department of Computer Science;Multimedia Software Engineering Research Center;City University of HongKong;College of Computer Science and Technology;Zhejiang University;
..............page:89-96
Trajectory big data: data, applications and techniques
XU Jia-jie;ZHENG Kai;CHI Ming-min;ZHU Yang-yong;YU Xiao-hui;ZHOU Xiao-fang;School of Computer Science and Technology;Soochow University;Collaborative Innovation Center of Novel Software Technology and Industrialization;Dept.of Computer Science;Shanghai Key Laboratory of Data Science;School of Computer Science and Technology;Shandong University;
..............page:97-105
Fusing subjective and objective factors: a dynamic approach to evaluating reputation for IoT search
ZHANG Hui-bing;LI Chao;HU Xiao-li;ZHOU Ya;Guangxi Key Lab of Trusted Software;Guilin University of Electronic Technology;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:106-113
Efficient scheme for user’s trajectory privacy
LI Feng-hua;ZHANG Cui;NIU Ben;LI Hui;HUA Jia-feng;SHI Guo-zhen;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;State Key Laboratory of Integrated Services Networks;Xidian University;Department of Information Security;Beijing Electronic Science and Technology Institute;
..............page:114-123
Study on choosing the parameter ε in differential privacy
HE Xian-mang;WANG X Sean;CHEN Hua-hui;DONG Yi-hong;School of Information Science and Technology;Ningbo University;Shanghai Key Laboratory of Data Science;School of Computer Science;Fudan University;
..............page:124-130
Preserving data privacy in social recommendation
LIU Shu-shu;LIU An;ZHAO Lei;LIU Guan-feng;LI Zhi-xu;ZHENG Kai;ZHOU Xiao-fang;School of Computer Science and Technology;Soochow University;Collaborative Innovation Center of Novel Software Technology and Industrialization;
..............page:131-138
kan wu sheng ming
..............page:138
Cache privacy protection strategy in content centric networking
ZHU Yi;MI Zheng-kun;WANG Wen-nai;College of Communications & Information Engineering;Nanjing University of Posts and Telecommunications;School of Computer Science and Communication Engineering;Jiangsu University;Key Laboratory of Broadband Wireless Communication and Sensor Network Technology;Ministry of Education;Nanjing University of Posts and Telecommunications;
..............page:139-150
Bloom filter-based lightweight private matching scheme
WAN Sheng;HE Yuan-yuan;LI Feng-hua;NIU Ben;LI Hui;WANG Xin-yu;State Key Laboratory of Integrated Services Networks;Xidian University;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;Department of Information Security;Beijing Electronic Science and Technology Institute;
..............page:151-162
Efficient and privacy-preserving profile matching protocols in opportunistic networks
LI Yong-kai;LIU Shu-bo;YANG Zhao-huan;LIU Meng-jun;School of Computer;Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing;Ministry of Education;
..............page:163-171
Privacy-utility tradeoff method using multi-variable source coding
GU Yong-hao;LIN Jiu-chuan;Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia;School of Computer Science;Beijing University of Posts and Telecommunications;The Third Research Institute of Ministry of Public Security;
..............page:172-177
Partially policy hidden CP-ABE supporting dynamic policy updating
YING Zuo-bin;MA Jian-feng;CUI Jiang-tao;School of Computer Science and Technology;Xidian University;
..............page:178-189
Risk-adaptive access control model for big data in healthcare
HUI Zhen;LI Hao;ZHANG Min;FENG Deng-guo;Institute of Software;Chinese Academy of Sciences;
..............page:190-199
Access control scheme for medical data based on PBAC and IBE
ZHANG Yi-ting;FU Yu-chuan;YANG Ming;LUO Jun-zhou;School of Computer Science and Engineering;Southeast University;School of Computer Science & Technology;Nanjing University of Posts and Telecommunications;
..............page:200-211
Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity
CHEN Zhen;ZHANG Wen-fang;WANG Xiao-min;School of Information Science and Technology;Southwest Jiaotong University;Key Laboratory of Information Security and National Computing Grid;Southwest Jiaotong University;
..............page:212-222