Search For:

Displaying 1-50 out of 98 total
Bitwise sketch for lightweight reverse IP reconstruction in network anomaly detection
Found in: 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012)
By Fei Wang,Xiaofeng Wang,Xiaofeng Hu,Jinshu Su
Issue Date:October 2012
pp. 1-4
Sketch is commonly used in network anomaly detection. However, its irreversibility seriously obstacle for identification of origin of traffic anomaly, such as attack flows. In this paper, we design a novel sketch structure, called Bitwise Sketch, with the ...
 
Characterization of OSPF Convergence with Correlated Failures
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Dan Zhao, Chunqing Wu, Xiaofeng Hu, Xiaofeng Wang, Baokang Zhao
Issue Date:July 2013
pp. 1351-1356
As a popular link state protocol, Open Shortest Path First (OSPF) has been studied for years. A network running OSPF usually takes several tens of seconds to recover from a failure because the protocol timers delay the convergence. In this paper we charact...
 
A Distribute and Geographic Information Based Routing Algorithm for LEO Satellite Constellation Networks
Found in: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
By Yanpeng Ma,Jinshu Su,Chunqing Wu,Jinshu Su,Xiaofeng Wang,Wanrong Yu,Baokang Zhao,Xiaofeng Hu
Issue Date:July 2012
pp. 433-438
Satellite networks can provide worldwide-coverage wireless data gram services, but cause great challenges for how to efficiently route data gram. The Low Earth Orbit (LEO) satellite is becoming an essential part of the Next-Generation internet with short r...
 
A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation Networks
Found in: 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC)
By Yanpeng Ma,Jinshu Su,Chunqing Wu,Xiaofeng Wang,Wanrong Yu,Baokang Zhao,Xiaofeng Hu
Issue Date:June 2012
pp. 240-245
Satellites can broadcast datagram over a wide area, even to the areas that cannot be well served by the existing terrestrial infrastructures. Therefore, it is a hot research topic about how to multicast datagram over satellites. Low Earth Orbit (LEO) satel...
 
Abox Inference for Large Scale OWL-Lite Data
Found in: Semantics, Knowledge and Grid, International Conference on
By Xiaofeng Wang, Jianbo Ou, Xiaofeng Meng, Yan Chen
Issue Date:November 2006
pp. 30
Abox inference is an important part in OWL data management. When involving large scale of instance data, it can not be supported by existing inference engines. In this paper, we propose efficient Abox inference algorithms for large scale OWL-Lite data. The...
 
Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services
Found in: 2012 IEEE Symposium on Security and Privacy
By Rui Wang, Shuo Chen, XiaoFeng Wang
Issue Date:May 2012
pp. 365-379
With the boom of software-as-a-service and social networking, web-based single sign-on (SSO) schemes are being deployed by more and more commercial websites to safeguard many web resources. Despite prior research in formal verification, little has been don...
   
How to Shop for Free Online -- Security Analysis of Cashier-as-a-Service Based Web Stores
Found in: Security and Privacy, IEEE Symposium on
By Rui Wang, Shuo Chen, XiaoFeng Wang, Shaz Qadeer
Issue Date:May 2011
pp. 465-480
Web applications increasingly integrate third-party services. The integration introduces new security challenges due to the complexity for an application to coordinate its internal states with those of the component services and the web client across the I...
 
Research on Fault Diagnosis of Mixed-Signal Circuits Based on Genetic Algorithms
Found in: Computer Science and Electronics Engineering, International Conference on
By Shangcong Feng,Xiaofeng Wang
Issue Date:March 2012
pp. 12-15
As the fault modes of mixed-signal circuits growing, aiming at the features for its signal are both analog and digital amount, the paper analyzed that the fault diagnosis program of mixed-signal circuits with genetic algorithms by using SABER simulation me...
 
Research on Composition and Formation Mechanism of Penetration Acceleration Signal
Found in: Intelligent Computation Technology and Automation, International Conference on
By Bai Li, Liu Mingjie, Li Xiaofeng, Wang Shihu
Issue Date:May 2010
pp. 1118-1121
On the basis of the research on the penetration acceleration signal, the composition and frequency characteristic of the acceleration signal are proposed. Through the projectile hammering test, the penetrating projectile response signal is achieved and con...
 
Agent-Based Risk Learning for Computing Systems
Found in: Multi-Agent Systems, International Conference on
By XiaoFeng Wang, Han Kiliccote, Pradeep K. Khosla, ChengQi Zhang
Issue Date:July 2000
pp. 0459
Excessive or inadequate security controls can impair the utility of an open computing system. The agent based open computing environment we propose in this paper balances the amount of security control to maximize the utility of the system. In the system, ...
 
A Research on BIT Single-Fault Threshold Value Setting Approach Based on ROC
Found in: Communications and Intelligence Information Security, International Conference on
By Xiaojie Zhang, Daozhen Wang, Tongmin Jiang, Dong Wang, Xiaofeng Wang
Issue Date:October 2010
pp. 36-39
In order to solve the problem that setting the double threshold value hypothesis question under the single breakdown in the BIT, to decrease BIT's false alarm rate, and improve BIT’s testability. Researches were done on the subject’s quota relations betwee...
 
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software
Found in: ACM Transactions on Information and System Security (TISSEC)
By Chongkyung Kil, Jong Youl Choi, Jong Youl Choi, Jong Youl Choi, Jun Xu, Jun Xu, Jun Xu, Michael K. Reiter, Michael K. Reiter, Michael K. Reiter, Xiaofeng Wang, Xiaofeng Wang, Xiaofeng Wang, Zhuowei Li, Zhuowei Li, Zhuowei Li
Issue Date:December 2008
pp. 1-35
In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by this idea, we propose a packet vaccine mechanism that randomizes address-like st...
     
A Modified PSO Method Based on Cultural Algorithm and Quantum Computing
Found in: 2012 Eighth International Conference on Computational Intelligence and Security (CIS)
By Xiao-Zhi Gao,Ying Wu,Xiaolei Wang,Xianlin Huang,Kai Zenger,Xiaofeng Wang
Issue Date:November 2012
pp. 5-10
A novel Cultural Quantum-behaved Particle Swarm Optimization algorithm (CQPSO) is proposed in this paper to improve the performance of the Quantum-behaved PSO (QPSO). The cultural framework is embedded in our QPSO, and the knowledge stored in the belief sp...
 
A Niching Harmony Search Method for Multi-modal Optimization
Found in: 2012 Eighth International Conference on Computational Intelligence and Security (CIS)
By Xiao-Zhi Gao,Xiaolei Wang,Kai Zenger,Xiaofeng Wang
Issue Date:November 2012
pp. 22-27
The Harmony Search (HS) method is an emerging meta-heuristic optimization algorithm. However, it is generally not so efficient in dealing with multi-modal optimization problems, in which instead of only a single optimum, multiple optima need to be found. I...
 
VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Fei Wang,Xiaofeng Wang,Jinshu Su,Bin Xiao
Issue Date:June 2012
pp. 215-222
Flooding based Distributed Denial of Service (DDoS) attacks can cause very serious security problem by exhausting computing and bandwidth resources of victims. To mitigate these destructive attacks, it is crucially important to detect the occurrence of DDo...
 
Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently
Found in: Network and System Security, International Conference on
By Fengyu Wang, Bin Gong, Shanqing Guo, Xiaofeng Wang
Issue Date:September 2010
pp. 160-166
Identifying heavy-hitter flows in high-speed network link is important for some applications. This paper studied the approach of measuring various heavy-hitter flows simultaneously. We proposed a novel scheme, named TS-LRU (Two-Stage Least Recently Used), ...
 
Traitor Tracing Scheme Based on Luc Public-key Cryptosystem
Found in: Information Technology and Computer Science, International Conference on
By Shangping Wang, Linyue Du, Yaling Zhang, Xiaofeng Wang
Issue Date:July 2010
pp. 194-197
An asymmetric traitor tracing scheme based on Luc public key cryptosystem is proposed. The scheme uses Shamir’s secret sharing scheme. Comparing with existed schemes, the new scheme has some advantages. Firstly, we use the Luc public key cryptosystem in th...
 
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow
Found in: Security and Privacy, IEEE Symposium on
By Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang
Issue Date:May 2010
pp. 191-206
With software-as-a-service becoming mainstream, more and more applications are delivered to the client through the Web. Unlike a desktop application, a web application is split into browser-side and server-side components. A subset of the application’s int...
 
Research on Trust Evaluation Model Based on TPM
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Wei Ou, Xiaofeng Wang, Wenbao Han, Yongjun Wang
Issue Date:December 2009
pp. 593-597
Trusted computing is an important research field in information security and trust evaluation for trust model is the key issue to be resolved. It is great significance for ensuring security of trust model for trusted computing to analyze normally and verif...
 
Research on Trusted Network Model Based on BLP Model
Found in: Convergence Information Technology, International Conference on
By Wei Ou, Xiaofeng Wang, Wenbao Han, Yongjun Wang
Issue Date:November 2009
pp. 1137-1142
With the growth of network in size and complexity, the isolated security systems are facing many challenges and they can not meet users’ needs. As a new type of network, trusted network can make up for security defects of traditional network, change from p...
 
ID-Based Convertible Limited (Multi-)Verifier Signature Scheme
Found in: Computer Science and Software Engineering, International Conference on
By Xiaofeng Wang, Liang Cao, Shangping Wang, Yaling Zhang
Issue Date:December 2008
pp. 774-777
A limited verifier signature scheme provides the functionality that the signer can decide not only when but also by whom his signatures can be verified. This can be used to solve conflicts between authenticity (non-repudiation) andprivacy (controlled verif...
 
An Improved ID-based Restrictive Partially Blind Signature Scheme
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Shangping Wang, Pei Han, Yaling Zhang, Xiaofeng Wang
Issue Date:August 2008
pp. 295-300
Recently, the first ID-based restrictive partially blind signature scheme from bilinear pairing is proposed by Chen et al., which extends the concept of blind signature and possesses the excellent features of partially blind signature, restrictive blind si...
 
A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures
Found in: Electronic Commerce and Security, International Symposium
By Shangping Wang, Zhiqiang Chen, Xiaofeng Wang
Issue Date:August 2008
pp. 362-366
Most of the proposed E-cash systems require that the shop and customer belong to the same bank, which becomes the bottle-neck of E-cash’s wide application. Fangguo Zhang et al. proposed a model of electronic cash using multi-banks, but a trusted third part...
 
A Location Management Algorithm for LEO Satellite Networks
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Yanpeng Ma, Wei Peng, Xiaofeng Wang, Baokang Zhao, Jinshu Su, Chunqing Wu
Issue Date:July 2013
pp. 1362-1366
Location management is a challenging issue for datagram service in LEO satellite constellation networks due to ceaseless satellite handover of land mobile nodes. With the aid of GEO satellites, a novel location management system is proposed. Mathematical a...
 
Privacy Protection in Sharing Personal Genome Sequencing Data
Found in: 2012 IEEE Second International Conference on Healthcare Informatics, Imaging and Systems Biology (HISB)
By XiaoFeng Wang,Haixu Tang
Issue Date:September 2012
pp. 143
The past few years has witnessed rapid development in human genome research, thanking to the advance in the Next Generation Sequencing (NGS) technologies. New technologies for large-scale meta-analysis on genomic data continue to be developed, enabling the...
 
Passive Forensics Method to Detect Tampering for Double JPEG Compression Image
Found in: Multimedia, International Symposium on
By Zhenli Liu,Xiaofeng Wang,Jing Chen
Issue Date:December 2011
pp. 185-189
A passive forensics method to detect tampering for double JPEG compression image is proposed. In the proposed method, inconsistency of quality factors is used to detect double JPEG compression, and then a passive forensics approach to detect tampering and ...
 
Multi-authority Attribute-Based Signature
Found in: Intelligent Networking and Collaborative Systems, International Conference on
By Dan Cao,Baokang Zhao,Xiaofeng Wang,Jinshu Su,Guofei Ji
Issue Date:December 2011
pp. 668-672
Attribute-based signature (ABS) is a new cryptographic primitive, in which a signer can sign a message with his attributes, and the verifier can only known whether the signer owns attributes satisfying his policy. Moreover, the signature cannot be forged b...
 
Authenticating with Attributes in Online Social Networks
Found in: Network-Based Information Systems, International Conference on
By Dan Cao,Baokang Zhao,Xiaofeng Wang,Jinshu Su,Yijiao Chen
Issue Date:September 2011
pp. 607-611
In online social networks (OSN), users' capabilities of accessing a resource depend on attributes they owning. Considering of privacy, authentication with attributes require the signer don't leak more information than the predicate over attributes involvin...
 
Security Risk Management Using Incentives
Found in: IEEE Security and Privacy
By Debin Liu,Ninghui Li,XiaoFeng Wang,L. Jean Camp
Issue Date:November 2011
pp. 20-28
The authors propose an incentive-based access control (IBAC) that uses separate mechanisms for controlling aggregated risks and incentivizing users to reduce unnecessary risks. This mechanism encourages users to make necessary accesses while discouraging t...
 
A Study of the Characteristics of Behaviour Driven Development
Found in: Software Engineering and Advanced Applications, Euromicro Conference
By Carlos Solís,Xiaofeng Wang
Issue Date:September 2011
pp. 383-387
Behaviour Driven Development (BDD) has gained increasing attention as an agile development approach in recent years. However, characteristics that constituite the BDD approach are not clearly defined. In this paper, we present a set of main BDD charactersi...
 
An Effective Combination Rule When Evidence Conflict
Found in: Intelligent Human-Machine Systems and Cybernetics, International Conference on
By Fei Li,Xiaofeng Wang
Issue Date:August 2011
pp. 11-14
Theory of evidence is a kind of effective treatment methods for uncertain information fusion. However there will be problems in the fusion results based on the classical D-S combination when the evidence serious conflict or completely conflict. This paper ...
 
Improving Spectral Clustering Algorithm Based SAR Spill Oil Image Segmentation
Found in: Network Computing and Information Security, International Conference on
By Hua Bo, Jun Zhang, Xiaofeng Wang
Issue Date:May 2011
pp. 371-375
The classic spectral clustering algorithm has a superior performance in the category in any shape of data collection, but the computational complexity of the classic spectral clustering algorithm is very high. In the case of limited computer memory and com...
 
RLM: A General Model for Trust Representation and Aggregation
Found in: IEEE Transactions on Services Computing
By Xiaofeng Wang,Ling Liu,Jinshu Su
Issue Date:January 2012
pp. 131-143
Reputation-based trust systems provide important capability in open and service-oriented computing environments. Most existing trust models fail to assess the variance of a reputation prediction. Moreover, the summation method, widely used for reputation f...
 
Combined Contract of Supply and Inventory Financing for the Apparel Supply Chain
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Lina Yin, Qi Xu, Xiaofeng Wang
Issue Date:November 2010
pp. 339-342
According to the problems of inventory restocking and difficult financing in the apparel supply chain, the paper has expanded the inventory financing method, and established a inventory financing contract, determined the collateral selection and decision-m...
 
People over Process: Key Challenges in Agile Development
Found in: IEEE Software
By Kieran Conboy,Sharon Coyle,Xiaofeng Wang,Minna Pikkarainen
Issue Date:July 2011
pp. 48-57
There's a common perception that, although developers might experience some
 
A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks
Found in: Parallel Processing, International Conference on
By Jie Yu, Liming Lu, Zhoujun Li, Xiaofeng Wang, Jinshu Su
Issue Date:September 2010
pp. 680-689
Nowadays, web servers are suffering from flash crowds and application layer DDoS attacks that can severely degrade the availability of services. It is difficult to prevent them because they comply with the communication protocol. Peer-to-peer (P2P) network...
 
Context-Based Semantic Approach to Ontology Creation of Maritime Information in Chinese
Found in: Granular Computing, IEEE International Conference on
By Lijun Deng, Xiaofeng Wang
Issue Date:August 2010
pp. 133-138
The term “maritime affairs” means in general the shipping (Maritime Services) and all things related to the sea, such as navigation, shipbuilding, surveying, maritime law, and processing the maritime accidents (including the navigation and berthing inciden...
 
Mash-IF: Practical information-flow control within client-side mashups
Found in: Dependable Systems and Networks, International Conference on
By Zhou Li, Kehuan Zhang, XiaoFeng Wang
Issue Date:July 2010
pp. 251-260
Mashup is a representative of Web 2.0 technology that needs both convenience of cross-domain access and protection against the security risks it brings in. Solutions proposed by prior research focused on mediating access to the data in different domains, b...
 
Fuzzy Analysis on Criticality of Tool Magazine Based on Type-2 Membership Function and Interval Number
Found in: Electrical and Control Engineering, International Conference on
By Guixiang Shen, Xiaofeng Wang, Yingzhi Zhang, Shaona Chen, Bingkun Chen
Issue Date:June 2010
pp. 3779-3783
Based on failure data of machining center, according to traditional random theory, analyze tool magazine by FMECA. Fuzzy the parameters of criticality, based on triangle-interval type-2 fuzzy membership function and algorithm of interval number on the type...
 
Research on Collaborative Development Technology System Evolvement Mechanism Based on Brusselator Model
Found in: International Conference on E-Business and E-Government
By Xiaofeng Wang,Zhirui Bian
Issue Date:May 2010
pp. 4344-4346
Collaborative development technology system is a new technology system which is formed by the continuous integration process of related technology during its development, so a reasonable interpretation of its evolution will provide a theoretical basis for ...
 
Design of Wireless Gateway Based on Hybrid Net Control System
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Yao XiaoFeng, Wang ChangYou, Chen XiaoXia
Issue Date:April 2010
pp. 415-418
A hybrid network system is introduced aiming at improved requirements of production management and control in modern enterprise. The data gathering is realized through CAN Bus node, and the remote data transferring is accomplished by GPRS wireless network ...
 
Research on the GARCH Model Optimized by the Ant Colony Algorithm of Forecast Exchange Rate
Found in: Computer Science-Technology and Applications, International Forum on
By Hui Xiaofeng, Wang Junjian, Cai Jingshu
Issue Date:December 2009
pp. 380-383
In 2005, after the RMB exchange rate reform, the RMB-USD exchange rate has been caused for concern. This article is based on the use of GARCH models to establish the prediction model of RMB-USD exchange rate and a new stimulated evolutionary optimization a...
 
A Hase-based SAKA Protocol Algorithm
Found in: Computational Intelligence and Security, International Conference on
By Yipin Lin, Xiaofeng Wang
Issue Date:December 2009
pp. 226-228
It was pointed out that the simple authenticated key agreement (SAKA) protocol suffered three weaknesses. Several improved protocols, such as improved Lin protocol, E-SAKA protocol, then were proposed as claimed being free of these three weaknesses. After ...
 
The Properties of a Class of Two-Direction Compactly Supported Wavelet Packets with a Positive Integer Dilation Factor
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Xiaofeng Wang, Mei Zhou
Issue Date:November 2009
pp. 218-222
In this article, the notion of biorthogonal two-directional compactly supported wavelet packets with a positive integer dilation factor is introduced. A new approach for constructing biorthogonal two-directional wavelet packets is developed and their prope...
 
A Certificateless Broadcast Threshold De-signcryption Scheme and its Application to DRM
Found in: Convergence Information Technology, International Conference on
By Xiaofeng Wang, Lihua Tian
Issue Date:November 2009
pp. 958-963
In this paper, we propose a variation of broadcast encryption, called Certificateless Broadcast Threshold De-signcryption(CL-BTDS), and present a concrete CL-BTDS scheme from the multilinear form. This variation provides the functionality that ensures both...
 
Automatically Organize Web Text Resources with Frequent Term Tree
Found in: Computer and Information Technology, International Conference on
By Xiaofeng Wang, Zhongzhi Shi
Issue Date:October 2009
pp. 330-335
With the expansion of the Web, automatically organizing large scale text resources, e.g. Web pages, becomes very important. Many Web sites, like Google and Yahoo, use hierarchical classification trees to organize text resources in Web. User can easily find...
 
Intelligent Optimization of the Structure of the Large Section Highway Tunnel
Found in: Intelligent Computation Technology and Automation, International Conference on
By Si-Mayuzhou, Jia-Xiaofeng, Wang-Xiaorui
Issue Date:October 2009
pp. 342-345
How to determine the physical and mechanical parameters of the surrounding rock become obstacle of the theory analysis with tunnel and numerical research because of complexity and unpredictable of tunnel surrounding rock. The vast majority of tunnels in th...
 
A Novel Data Purification Algorithm Based on Outlier Mining
Found in: Hybrid Intelligent Systems, International Conference on
By Jianfeng Dong, Xiaofeng Wang, Feng Hu, Liyan Xiao
Issue Date:August 2009
pp. 95-98
This paper presents a data purification algorithm based on outlier mining. In order to implement the purifying of training data, we define the central bias function of complex events and dissimilarity function of event set, and put forward an exception set...
 
Study of a Sort of Orthogonal Multiple Vector-Valued Trivariate Wavelet Packets
Found in: Environmental Science and Information Application Technology, International Conference on
By Xiaofeng Wang, Deyao Song
Issue Date:July 2009
pp. 493-496
Wavelet analysis has been developing a widely used mathematical branch for twenty years. In this work, the notion of biorthogonal multiple vector-valued trivariate wavelet packets is introduced. A new feasible method for designing them is presented. Their ...
 
Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA
Found in: Advanced Information Networking and Applications, International Conference on
By Xiaofeng Wang, Chee Shin Yeo, Rajkumar Buyya, Jinshu Su
Issue Date:May 2009
pp. 411-418
For an application in public-resource computing environments, providing reliable scheduling based on resource reliability evaluation is becoming increasingly important. Most existing reputation models used for reliability evaluation ignore the time influen...
 
 1  2 Next >>