Software Module Clustering Algorithm Using Probability Selection Jiaze SunBeilei Ling Computer Science 19 March 2018 Pages: 93 - 102
A Rendezvous Mechanism for Energy Balance and Link Quality in WSNs Yujun ZhuJie MeiQun Fang Computer Science 19 March 2018 Pages: 103 - 110
Robust Recommendation Algorithm Based on Kernel Principal Component Analysis and Fuzzy C-means Clustering Huawei YiZaiseng NiuYajun Wang Computer Science 19 March 2018 Pages: 111 - 119
Verifiable Auditing Protocol with Proxy Re-Encryption for Outsourced Databases in Cloud Ziyuan GaoBaocang WangYu Zhan Computer Science 19 March 2018 Pages: 120 - 128
Public Auditing for Shared Data Utilizing Backups with User Revocation in the Cloud Hequn LiuBaocang WangYu Zhan Computer Science 19 March 2018 Pages: 129 - 138
A Trustworthy Group Identifying Trust Metric for P2P Service Sharing Economy Based on Personal Social Network of Users Wenqiang Zhu Computer Science 19 March 2018 Pages: 139 - 149
A Vulnerability Model Construction Method Based on Chemical Abstract Machine Xiang LiJinfu ChenWanggen Xie Computer Science 19 March 2018 Pages: 150 - 162
Privacy Preserving Query over Encrypted Multidimensional Massive Data in Cloud Storage Guangli XiangXiang LinBeilei Li Computer Science 19 March 2018 Pages: 163 - 170
Exploring Attack Graphs for Security Risk Assessment: A Probabilistic Approach Ni GaoYiyue HeBeilei Ling Computer Science 19 March 2018 Pages: 171 - 177
Shallow Convolutional Neural Networks for Acoustic Scene Classification Lu LuYuhong YangWeiping Tu Computer Science 19 March 2018 Pages: 178 - 184