+ All Categories
Home > Documents > [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise...

[XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise...

Date post: 29-Apr-2018
Category:
Upload: lymien
View: 223 times
Download: 4 times
Share this document with a friend
63
ID 49 71 76 89 105 106 116 129 141 151 157 166 180 183 184 185 195 196 200 201 206 222 223 225 236 238 242 243 252 253 266 267 268 276 278 279 280 281 284 303 306
Transcript
Page 1: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

ID49717689

105106116

129

141151157166180183184185195196200201

206

222

223

225236238242243252253266267268276278279280281284303306310324326

Page 2: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

333334336337338339340342345346347353356358362366

367

370378382384385386387397399402404408409414417418421424425

428

432433436437443444445

448

Page 3: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

450

451

454

459

460462465466471474476482484488490492493494495496497504

509

510511512513516518521522

523

525527532533534538541542544545550553

Page 4: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

555556557560564566568569

572

575576579580581583584

585

587589590591593594595599600601602603

605

606610611613614617619620623624625626

627

628

Page 5: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

629632634635636641642644648650651652654655656657658

659

660

661

662

664665666667668670672676

678

679

680682684685686687695701706710711715

Page 6: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

718

719

721723724726729

730

732733735736738740743744749

750

752754755757759761762

764

765768769770771772773774777778779783785786787789791792

Page 7: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

794795800801

803

806807808809812813814815816817818

819

820821822825827828829830835837841842843

846

849850851852853854858859

860

861862864865

Page 8: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

866871873874875876877879880881883886887888889890891893894

895

896897898899900

901

902904905906907909910913914916

919

921922923924925929930932

Page 9: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

936938939940941942943944945947948

949

951

952953954955957958961963966967968970971973974976977978980982983985986987988989994995996999100010011004

Page 10: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

10081009

1010

10111013101610191020102210231024102510261027102810311034103610371041

1043

1046104710481049105010511052

1053

1055

1057

1059106110621063106510661068106910701071

1075

1076

Page 11: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

10821083108510861090109110931094109510961097109810991100110111021103110411051106

1108

1109

1112

1115

1117

111811191120112211241125113011311133113411351136

1138

11391140114111421143

Page 12: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

1145

114611471148

1152

1154115511561158

1161

1163116411661171117211741175117811791181118311841185118611881195119812011205

1208

1210121212171218121912201221122212241225

1227

12291231

Page 13: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

1232

123512361240

1241

1242124412451246124712481249

1250

12511252125312551259126012621263126412651267126812701274127512761277128012811282128612871288129012931295129712991301130213051306

Page 14: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

13071308

1311

1313131513171320132213231324132613291330133213331336134013411342134313441346134713501351135213571358135913601363136413651366136813711372

1373

137413801381

1382

138313851387

Page 15: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

13891390139113921394139613971403

1407

14081410141114121414141614171418

1420

1421

1422

1423142514261429143014311432143414351436143714381440144114431444144714481449145014511452145314551457

Page 16: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

145814591462146414651466146714681471147214771480148114821485

1486

148714881489

1491

1494

1495149714981500150115021503

1504

15051506150715091511151215131514

1515

15161517

1519

1520

Page 17: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

1521152215241525

1526

1527152815291530153315351536153715381540154115421543154415451546

1547

1549155015511552155315541557155915601561156315651566156715681569

1570

1572

1573157415751576

Page 18: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

1577157915811583158415851586

1587

15881589159115921594159515961597160016021603

1604

16051607

1610

161116181619162216241625162616271628162916301631163216331634163516361637164016411642

Page 19: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

1643

1644164616471648164916511652165316571658

1659

16601661

1662

166416661667166816701671167316741677167816791681168216831684

1685

1686168716881689169016941730173117331736173717431783

Page 20: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

TitleResearch on Image Recognition Based on Depth LearningA Dynamic Group Signature from Lattice AssumptionsCoverless Information Hiding Based on the Molecular Structure Images of MaterialA covert communication model based on IPv6 multicassUnified quantum no-go theorems of pure statesProvably Secure APK Redevelopment Authorization Scheme in the Standard ModelHow the variance of hotel dominance attribute affects the consumer recommendation rate

Correlation Analysis of Alarm Data Based on Fuzzy Rule in Power NetworkReversible Data Hiding in Partially-Encrypted ImagesImage Recovery via Truncated WeigSteganography by Constructing Marbling TextureAn Enhanced Parallel Processing Algorithm Based on TOP-K Decomposition of Hypercube ModelA Novel Framework of Robust Video Watermarking Based on Statistical ModelSignal Subtle Feature Extraction Algorithm Based on Improved Fractal Box-counting DimensionAn optimized resolution coefficient algorithm of gray relation classifierRailway Passenger Volume Forecast Based on Web Search Terms and Adversarial NetsThe Cut and Dominating Set Problem in A Steganographer NetworkThe New Progress in the Research of Software Vulnerability ExploitsThe New Progress in the Research of Binary Vulnerability Analysis

Roles of Anchor Trust and Platform Trust in Live-Streaming Consumers' Propensity: An Extended TAM Model

Analysis of two session key agreement protocols based IBE framework

An Improved Reversible Data Hiding Scheme with Large Payload Based on Image Local-ComplexityTime Optimization of Multiple Knowledge Transfers in the Big Data EnvironmentViolent Scene Detection Algorithm Based on Kernel Extreme Learning Machine and HOG3DA New Provably Secure Identity-Based Multi-Proxy Signature SchemeVerifiable Diversity Ranking Search Over Encrypted Outsourced DataResearch on Trajectory and Modeling of Body MovementMultiple Schemes for Bike-share Service Authentication using QR Code and Visual CryptographyPhishing Detection With Image Retrieval Based on improved Texton Correlation DescriptorA New Encryption-then-Compression Scheme on Gray Images Using the Markov Random FieldA Color Image Blind Watermarking Technique based on QR Decomposition and Ternary CodingAn efficient and secure key agreement protocol preserving user anonymity under Chebyshev chaotic mapsProperties Emulation on TD-LTE Electric Power Wireless PrivateSecDisplay: A Super Light-weight Trust Display Anchor for ARM PlatformOptimization Model of Knowledge Transfer at Different Time Points in the Big Data EnvironmentAnalysis of Stock Investment and Selection Based on Principal Component TheoryFault diagnosis of motor in frequency domain signal by Stacked De-noising Auto-encoderThe Handoff Mechanism Based on Mobile Location PredictionTrust and Reputation Model For Fog-based IoTDecision stump and StackingC based hybrid algorithm for healthcare data classificationResearch Progress of Cloud Computing Task Scheduling TechnologyLong short term memory model for analysis and forecast of PM2.5

Investigation of the short-time photodissociation dynamics of Furfural in S2 state by Resonance Raman and quantum chemistry calculations

An Improved IoT notion-based Authentication and Key Agreement Protocol for Heterogenous Ad Hoc Wireless Sensor Network

Page 21: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Attribute-based Encryption with Efficient Keyword SearchA Novel Channel Extraction Method Based on Modulated Wideband ConverterThe Auxiliary Handoff Mechanism Based on Context and Particle Filter Algorithms

The Design of Flexible Workflow in Scientific Research Management SystemReversible Data Embedding and Scrambling Method Based on JPEG ImagesThe Design of Flexible Workflow in Scientific Research Management SystemA Novel Channel Extraction Method Based on Modulated Wideband ConverterThe Comprehensive Method of Communication Jam-ming effectiveness Based on Grey Relational AnalysisPerceptual Image Hashing using Rotation Invariant Uniform Local Binary Patterns and Color FeatureIdentification of Forensic Objects Based on Textual Content in Online Social NetworksAn Improved Distributed PCA-Based Outlier Detection in Wireless Sensor NetworkResearch into Effects of Phytoplankton in the Ocean with Extensible Mind MappingImproved Two-factor Authentication Protocol Based on Biometric Feature and Password for Cloud ServiceA Novel Channel Extraction Method Based on Modulated Wideband ConverterThe Assessment Research of Communication Jammming Effect Based On Grey Relational Analysis

Research on signal reconstruction of phased array structure health monitoring based on the basis pursuit algorithm

Identifying influential spreaders by Temporal efficiency centrality in temporal networkPerceptual Image Hashing using Rotation Invariant Uniform Local Binary Patterns and Color FeatureSynthesis of Quantum Barrel ShiftersMultiple Classifier System for Remote Sensing Images ClassificationLong short-term Traffic Flow Prediction using Improved LSTM Network Performance Under Big DataPublic opinion prediction model on emotional analysis based on Bayesian theoryA Forecasting Model Based on information granulated GA-SVR and ARIMA for Producer Price IndexA High Extraction Accuracy Robust JPEG Steganography with No Side InformationThe Construction of Solar Greenhouse Control System Based on IoT Data SecurityVideo Quality Assessment Algorithm Based on Persistence-of-Vision EffectProvably Secure APK Redevelopment Authorization Scheme in the Standard ModelA CP-ABE Access Control Scheme Based on Proxy Re-Encryption in Cloud StorageResearch on Syndrome Classification and Risk Factors Extraction of Tibetan Medicine Based on ClusteringAchieving ID-and-Data Privacy Public Auditing Protocol with Forward securityPrivacy-preserving Multi-receiver Certificateless Broadcast Encryption Scheme with De-duplicationAchieving ID-and-Data Privacy Public Auditing Protocol with Forward securityA case study of a two-stage image segmentation algorithmPerfect Quantum Teleportation via Bell-stateSecurity Strategy Of Campus Network Data Center Of Cloud Environment

Serialization of Lifecycles in ACBP Model as Regular ExpressionsImproved lossless data hiding for JPEG images based on histogram modificationA modified Wei-Yao-Liu conjugate gradient algorithm for two type minimization optimization modelsVariSecure: Facial Appearance Variance based Secure Device PairingControlled cyclic remote state preparation of arbitrary qubit statesImproved quantum secret sharing schemes based on GHZ statesEfficient multiparty quantum secret sharing scheme in high-dimensional system

Students鈥 Comprehensive Achievement Based on Factor Analysis and Clustering Analysis

Snow cover mapping for mountainous areas by fusion of MODIS L1B and geographic data based on Stacked Denoising Auto-encoders

Waveband Selection with Equivalent Prediction Performance for FTIR ATR Spectroscopic Analysis of COD in Sugar Refinery Wastewater

Page 22: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

A Dual-spline Approach to Load Error Repair in a HEMS Sensor Network

abnormal network flow feature sequence prediction approach for DDoS attacks detection in bigdata environment

Simulation of Communication Protocol in Seafloor Observatory Network

Learning Sparse Representation with Variational Auto-Encoder for Anomaly DetectionResearch on Data Fusion of Adaptive Weighted Multi- source SensorRTP timestamp steganography detection methodResearch on Haze Governance Willingness Based on Structural Equation ModelingEarly stage of oxidation on titanium surface by reactive molecular dynamics simulationThe electronic structures and optical properties in Mn2+/N2- co-doped Zn2GeO4Improved GNSS Cooperation Positioning Algorithm for Indoor LocalizationClassification on Grade, Price, and Region with Multi-Label Methods in WineinformaticsParagraph Vector Representation Based on Word to Vector and CNN LearningSide Channel Steganalysis: When Behavior is Considered in Steganographer DetectionReversible Embedding to Covers Full of BoundariesOptimization Algorithms for Deep Q-LearningFRDV: A DTN Routing based on Human Moving Status in Urban EnvironmentsTemporal Collaborative Filtering Algorithm Based on Purchase CycleAN ACCURATE REAL-TIME PEDESTRIAN TRACKING ALGORITHMUpdating Software Reliability Test Cases Generation Using Temporal Motifs Recovery and ConfigurationA New NTRU-type Public-Key Cryptosystem over the Binary FieldA Distributed LRTCO Algorithm in large-scale DVE Systems

Covert Communication by Exploring Statistical and Linguistical Distortion in TextResearch into Effects of Shrimp Aquaculture by Extensible Mind MappingCircular-Secure Analysis on Matrix GSW-FHE and Optimizing BootstrappingCluster-based Consistent Rule Update Scheme for Software-Defined Wireless Sensor NetworksAn Improved Tamper Detection and Location Scheme for DOCX format documentsAn Adaptive Audio Steganography Combining Interval and Variable Low Bit CodingCross-modal Retrieval Based on Optimized Matrix Factorization HashingA Quantum Key Distribution Protocol Based on the EPR Pairs

A Source Hiding Identity-Based Proxy Re-Encryption Scheme Without Random Oracles for Cloud Computing

Rain-Removal Net: A Novel Deep Learning Architecture for Rain Removal from ImagesImage Retrieval Technology Based on Morphology in Cloud ComputingBlockchain-based Trusted Electronic Records Preservation in Cloud StorageAdaptive Compressive Sensing of Images Using Error between BlocksConsistency Guarantee Method of Electronic Record based on Blockchain in Cloud StorageClassification Based on A Self-adaptive Fireworks AlgorithmReversible Data Hiding in JPEG Images Based on Two-Dimensional Histogram ModificationResearch on building energy consumption acquisition system based on configurationResearch on Energy Consumption Audit and Intelligent Decision of Green BuildingsReal-Time Visual Tracking with Compact Shape and Color FeatureSecurity solution for real-time data access in Wireless Sensor NetworksUnified Connectivity Framework for Integrating Hetero-geneous Sensor Networks into Sensor Clouds

SURVEY AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUES FOR PRIVACY PROTECTION IN RECOMMENDER SYSTEMS

Monitoring Home Energy Usage using an Unsupervised NILM Algorithm based on Entropy Index Constraints Competitive Agglomeration (EICCA)

Page 23: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Collusion Malware Attack Against Machine Learning: Issues and CountermeasuresRLWE-Based Fully Homomorphic Encryption Scheme of Batch TechniqueOptimization algorithm for freight car transportation schedulingHazard Assessment of IoT Vulnerability Correlation Based on Risk MatrixAn Evolutionary Computation based Feature Selection Method for Intrusion DetectionKey-Private Identity-Based Proxy Re-encryptionQuantum Secure Communication: A Survey

Density-functional calculations of the crystal structure, magnetic and electronic properties of transition metal doped SrRuO3

New Method for Computer Identification through Electromagnetic RadiationThe Design and Implementation of Web System Based on BlockchainThe Impact of Psychological Capital on Employee Career Success: Mediating Effects of LMXA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB applicationFacebook5K: A novel evaluation resource dataset for Cross-media searchSecure Image LBP Feature Extraction in Cloud ComputingNovel Algorithm for Influence Maximization on Signed Networks

Novel Essential Protein Identification Method By Integration of Network Topology and Multi-Source Biological Information

Coverless information hiding based on object detection and locationThe Research on the Permission Management of Android Application Based Machine LearningPerceptual Gradient Similarity Deviation for Full Refer-ence Image Quality AssessmentExploring Methods of Assessing Influence Relevance of News ArticlesAAC Audio Compression Detection Based on QMDCT CoefficientA Replay Voice Detection Algorithm Based on Multi-feature FusionResearch on Nonballasted-track Bed Lifting System Based on Wireless Hydrostatic Leveling TechnologyA Multi-Controller Load Balancing Strategy for Software Defined WiFi NetworksMarket-oriented multi-agent sequential decision making for cloud service compositionInteractive Construction of Criterion Relations for Multi-criteria Decision MakingQuantum private comparison based on delegating quantum computationThe effect of financial policy on the Sci-tech Innovation -A empirical analysis based on SVAR model

High Capacity Data Hiding in Encrypted Image Based on Compressive Sensing for Nonequivalent Resources

A Distributed Intrusion Detection Model via Nondestructive Partitioning and Balanced Allocation in Big DataPrivacy-Preserving Public Auditing Protocol with Resistant Key ExposureAn Effective Low-Resource Text Processing Approach Based on Modified Skip-gram and AlignServer-aided Multi-Secret Sharing Scheme for Weak Computational DevicesResearch on intuitionistic fuzzy multiple output least squares support vector regressionEvolution of short- and medium-range order in melt-quenching amorphization of Ge2Sb2Te5Modeling and analysis of epidemic spreading on networks with heterogeneous contact patternExploring the two-dimensional monolayer materials in Group-VICoverless Steganography for Digital Images Based on a Generative ModelElectronic structure and Physical Characteristics of Dioxin under External Electric FieldA novel hybrid anti-collision algorithm based on frame breaking policy for UHF RFIDFeature Relationships Learning Incorporated Age Estimation Assisted by Cumulative Attribute Encoding

Analysis and Improvement of Quantum Steganography Protocol Based on Bell States in Quantum Noise Environment

A Robust Image Watermarking Scheme in DCT Domain Based on Adaptive Texture Direction Quantization

Disseminating Quality-Baesd Analysis of Microblog Users鈥 Influencing Ability

Page 24: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Text Semantic Steganalysis Based on Word EmbeddingA Spark Scheduling Strategy for Heterogeneous ClusterSecure multimedia distribution in cloud computing using re-encryption and fingerprintingA Kind of Agricultural Content Networking Information fusion Method Based on OntologyLocation Privacy-Preserving Scheme Based on Multiple Virtual MapsSecure, Efficient and Searchable File System On Distributed CloudsSecure File Storage System among Distributed public CloudsITSD: Imbalanced Triangle Synthetic Data Method for Anomaly DetectionAccurate UHF Tag Authentication using Near-Field CapabilitiesFast Multi-Query Image Retrieval of Small Category Gallery using VGG16Defect Detection of Alumina Substrate with Adaptive Edge Detection AlgorithmA Novel Twist Deformation Model of Soft Tissue in Surgery SimulationDynamic Risk Access Control Model for Cloud PlatformDBHUB: A Lightweight Middleware for Accessing Heterogeneous Database SystemsNew Multi-keyword Ciphertext Search Method for Cloud PlatformExploration for Software Mitigation to Spectre Attacks of Poisoning Indirect BranchesMulti-Class Imbalanced Learning with One-versus-One Decomposition: An Empirical Study

Dynamic-enabled Defense Strategy Base on Improved CVSS for the Smart Home System of Internet of Things

Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud Storage

Event-based Anomaly Detection for Non-public Industrial Communication Protocols in SDN-based Control Systems

a robust fingerprint identification method by deep learning with Gabor filter multidimensional feature expansion

Application of Extensible Mind Mapping In Retirement Paradox SolutionAn efficient image matching algorithm based on adaptive threshold and RANSACDigital Continuity Guarantee of Electronic Record based on Data Usability in Big Data EnvironmentA face privacy protection algorithm based on block scrambling and deep learningInverted XML Access Control Model based on Ontology Semantic DependencyInfluence Maximization Algorithm in Social Networks Based on Three Degrees of Influence RulePMS-Sorting: a new sorting algorithm based on similarityMethod of Small Sample Reliability Assessment Based on Bayesian Theory

The study on stress concentration factor and fatigue behavior of CHS-CHS X-joints with concrete-filled braces

Social Networks Node Mining Algorithm of Based on Greedy SubgraphOutlier Detection Algorithm Based on Deviation CharacteristicRemove-duplicate Algorithm Based on Meta Search ResultMonitoring of Root Privilege Escalation in Android Kernelia-PNCC: noise processing method for underwater target recognition convolutional neural networkSymmetric learning data augmentation model for underwater target noise data expansionA Novel Part-based Model For Fine-grained Vehicle RecognitionA novel quantum image steganography algorithm based on exploiting modification directionHuffman-code based retrieval for encrypted JPEG imagesCipher image retrieval based on AC-coefficients and color histogramsNovel Steganography Scheme Based on Asymmetric Embedding ModelAn data driven design for stress concentration factors of CHC X-joint with concrete-filled chord

Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection

Page 25: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Hyper-graph Regularized Multi-view Matrix Factorization for Vehicle Identification

On the Privacy-preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image data in Cloud Computing

A Linear Filter Kernel Estimation Based on PRNU NoiseAn Attack on Hollow CAPTCHA Using Accurate Filling and Nonredundant MergingReliable medical recommendation based on privacy-preserving collaborative filteringRare bird sparse recognition via part-based gist feature fusion and regularized intraclass dictionary learningFuzzy Identity-Based Signature from Lattices for Identities in A Large Universe

A Survey of Machine Learning-based Resource Scheduling Algorithms in Cloud Computing EnvironmentA Lightweight Graph-based Model for Inter-Networking Access ControlA Novel Watermark-based Access Control Model for Digital ImaginesSemi-supervised Learning with Generative Adversarial Networks on Digital Signal Modulation ClassificationNetwork Security Situation Assessment Approach Based on Attack-Defense Stochastic Game ModelAlgorithm Research on Distributed Pattern RecognitionFocused crawler framework based on open search engineSelective Opening Secure Certicateless Encryption SchemeFeature Selection Method Based on Class Discriminative Degree for Intelligent Medical Diagnosis

Spatial-Temporal Variability of PM2.5 Concentration in Xuzhou, Eastern China using a method of Aerosol Classification

Machine Learning Based Resource Allocation of Cloud Computing in AuctionDynamic Proofs of Retrievability Based on Partitioning-Based Square Root Oblivious RAMA Self-organizing LSTM Network Based Approach to Forecast PM2.5 ConcentrationTeam Formation in Social Networks Using Imperialist Competitive AlgorithmA modified three-term conjugate gradient algorithm for large-scale nonsmooth convex optimizationResearch on Two-factor Identity Authentication System Based on Smart Phone and User PasswordImproved Quantum "Ping-pong" Protocol Based on Single-Particle and EPR Entanglement

Temperature and Humidity Monitoring System for Bulk Grain Container Based on LoRa Wireless Technology

A Review of Privacy-Preserving Machine Learning ClassificationRational Non-hierarchical Quantum State Sharing ProtocolControlled Bidirectional Remote Preparation of Single- and Two-qubit StateSecure Multiparty Quantum Summation based on d-level Single ParticlesControlled Secure Direct Communication Protocol via the Three-qubit Partially Entangled Set of StatesA Cryptograph Domain Image Retrieval Method Based On Paillier Homomorphic Block EncryptionA Hybrid Resource Scheduling Strategy in Speculative Execution Based on Non-cooperative Game TheorySMK-means: An Improved Mini Batch K-means Algo-rithm Based on Mapreduce with Big DataMulti-VMs Intrusion Detection for Cloud Security using Dempster-Shafer TheoryCentroid Location Technology Based on Fuzzy Clustering and Data ConsistencyAccurate Hand Detection Method for Noisy EnvironmentsLinked-Behaviors Profiling in IoT networks Using Network Connection Graphs (NCGs)A New Mutual Authentication Protocol in Mobile RFIDA Review of Convolutional Neural Network and Object DetectionResearch on indirect location technology of ground target based on scene matchingExpression preserved face privacy protection based on Multi-Mode Discriminant AnalysisFast three-phase fabric defect detectionImproving the System Log Analysis with Language Model and Semi-supervised Classifier

A Virtual Puncture Surgery System Based on Soft Tissue Simulated with Spherical Harmonic Function and Mass Spring Model

Page 26: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

novel nonlocal low rank technique for fabric defect detectionResearch on Real-time Storage Technology of UAV Freight Stream DataFormal Analysis and Improvement on Ultralightweight Mutual Authentication Protocols of RFIDA novel quantum stegonagraphy protocol based on Brown states

JPEG Image Forensics for Video Screenshot vs. PhotographThe research of mobile location privacy protection access control method based on game theoryAutomatic Integrated Exhaust Fan Based on AT89S51 Single Chip MicrocomputerDesign of indoor LED intelligent dimming and color modulation system based on ZigbeeBlind Signature Scheme with Disclaimer Contract in the Standard ModelA Data Hiding Scheme with High Quality for H.264/AVC Video StreamsA novel multi-hop algorithm for wireless network with evenly distributed nodesDetecting Android Applications with Malicious Behavior Based on Sparse Bayesian Learning AlgorithmAppliance Recognition Based on Continuous Quadratic ProgrammingWeb APIs Recommendation in Web of ThingsThe Security Analysis and Improvement of Digital Signature Scheme on Elliptic Curve

Finding All You Need: Web APIs Recommendation through Keywords SearchMedical Information Access Control Method Based on Weighted Information EntropySurface correction by quadratic quasi-uniform B-spline with multi-parameterA memory-efficient simulation method of Grover's search algorithmAggregated Multimodal Bidirectional Recurrent Model for Audiovisual Speech RecognitionAssessment of Haze Effects with Normal Distribution-Based Weighting Method and AHPSocial-Aware Based Secure Relay Selection in Relay-Assisted D2D CommunicationsImprovement of STDM Watermarking Algorithm Based on Watson ModelFeature selection as a tool for assessing methods for seismic hazard predictionCommunity-based Matrix Factorization Model for RecommendationA Novel Universal Steganalysis Algorithm Based on the IQM and the SRM

Effect of urbanization on the climate change in Ningbo

Multichannel Convolutional Neural Network based Forensics-aware Scheme for Cyber-Physical-Social Systems

Image Encryption and Compression Based on a VAE Generative ModelEmotion Effect Detection with a Two-stage ModelA Novel Convolution Neural Network for Background Segmentation RecognitionClassification of car scratch types based on optimized BP Neural Network in cloud computing environmeExpression preserved face privacy protection based on Multi-Mode Discriminant Analysis.docxThe Application of Distributed database on Electromagnetic Spectrum Big DataAdaptive robust reversible watermarking schemeTowards Optimized DFA Attacks on AES under Multi-Byte Random Fault Model

The Quasi-Circular Mapping Visualization Based on Extending and Reordering Dimensions for Visual Clustering Analysis

Adjacency-Hash-Table based Public Auditing for Cloud Storage SecurityA Method for Improving CNN-based Image Recognition Using DCGANA Matrix Coding Based Image Self-Embedding Fragile Watermarking

The comparison of effects of quantum noise on two different deterministic remote state preparation of an arbitrary three-particle state protocols

A Lightweight Three-Factor Anonymous Authentication Scheme with Privacy Protection for Personalized Healthcare Applications

Effect of urbanization on climate change 鈥斺 The Yangtze River Delta as an example

VideoChain锛歍rusted Video Surveillance Based on Blockchain for Campus

Page 27: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Obfuscation-based Watermarking for Cloud Software Copyright ProtectionResearch and Application of Chinese Text Classification TechnologyA Reversible Data Hiding Algorithm Based on Ridge Regression Least Square PredictionSecurity Classification Transmission Method Based on SDN in Industrial NetworksA Robust Recoverable Algorithm used for Digital Speech Forensics based on DCTNetwork Scalability for Ultra-Wideband Real Time Location Systems Based on vMISOHeterogeneous Cloud Resources Management: Truthful Mechanism Design in Shared Multi-Minded UsersTracing system of meat supply based on agricultural internet of thingsDynamics modeling and Stability Analysis of Tilt Wing Unmanned Aerial Vehicle During TransitionSparse Image Classification based on Low-rank Representation SupervisionA Dynamic Network Change Detection Method Using Network EmbeddingIterative Interactive Big Data Cleansing Based On ModelingOptimizing Cuckoo Feature Selection Algorithm with the New Initialization Strategy and Fitness FunctionAn Efficient Lightweight Anonymous Authentication Protocol for Wireless Sensor NetworksTraffic sign recognition based on multi-layer features and extreme learning machineNatural Language Semantic Construction Based on Cloud DatabaseAn improved memory cache management study based onSTC Platform-Based Cluster Heterogeneous Network Benchmark Performance Testing MethodPrivacy-preserving content-aware search based on two-level index

Research on Personalized Recommendation Case Base and Data Source Based on Case-Based Reasoning

A Coverless Information Hiding Algorithm Based On Grayscale Gradient Co-occurrence MatrixLever Arm Compensation of Autonomous Underwater Vehicle for Fast Transfer AlignmentConfusing-keyword based secure search over encrypted cloud dataAn Optimized Labeling Scheme for Reachability QueriesPersonality Trait Prediction Based on 2.5D Face Feature Model

Study on the Observability Degree of Integrated Inertial Navigation System of Autonomous Underwater Vehicle

Terrain-aided Strapdown Inertial Navigation System with Improved ICCPSimulation Research on Safe Operation of UAV Non-isolated AirspaceResearch on Application of ATC Operation Security Based on Data MiningA Modified U-Net for Brain MR Image SegmentationHome security alarm system for middle-aged and elderly people living aloneDesign of feedback shift register of against power analysis attackAdaptive Image Filtering Based On Convolutional Neural NetworkResource Allocation Based on Reverse Auction Algorithm in Edge Computing EnvironmentResearch on The Method of Texture Force Haptic Display Based on Brightness InformationA Secure Revocable Identity-based Proxy Re-encryption Scheme for Cloud Storage

The Research of Computer Network Division Based on Huffman CodingAn Evolutionary Algorithm based on Multi-view and Prior Information for Community DetectionTwo-Dimensional Histogram Modification based Reversible Data Hiding using Motion Vector for H.264A Robust Algorithm of Encrypted Face Recognition Based on DWT-DCT and Tent MapInfluence Maximization with Trust Relationship in Social NetworksResearch on Tool Condition Recognition Based On CEEMD-WPTA Modified Dai-Yuan Conjugate Gradient Algorithm for large-scale optimization problemsA Mean Absolute Difference-based Randomness Enhancing Technique for RO PUFs

The Phase and Amplitude Errors Frequency Dependence in L-band Aperture Synthesis Radiometer Using External Noise Sources

Page 28: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Access Control Model based on Time Synchronization Trust in Wireless Sensor NetworksJSPRE: A Large-Scale Detection of Malicious JavaScript Code based on Pre-filterA Novel HW-SW Partitioning Algorithm for Dynamic Partial Reconfigurable SystemsSurvey on IMD and Wearable Devices Security Threats and Protection MethodsArchitecture and Parameter Analysis to Convolutional Neural Network for Hand TrackingA Robust Watermarking Scheme of Resistance to Affine Transformation Based on ASIFT Feature PointsA Study on Revenue Distribution of Information Sharing in the C2M Supply ChainThe first-principle study of the physical properties of the tetragonal two zirconiaA Tag-Based Protection Method for Multi-Tenant Data SecurityResearch and Application of Access Control TechnologyStudy on Topic Intensity Evolution Law of Web News Topic Based on Topic Content Evolution

Localization Algorithm of Indoor Wi-Fi Access Points Based on Signal Strength Relative Relationship and Region Division

Copy-move forgery detection using combined features and transitive matchingSentiment Classification based on Piecewise Pooling Convolutional Neural NetworkSecurity Threat and Protection in Industrial Control SystemA Web Application Runtime Application Self-protection Scheme against Script Injection At-tacksResearch on Application of Network Security Technology Based on Data MiningAn Enhanced PEGASIS Algorithm with Mobile Sink Support for Wireless Sensor NetworksEncoding Spatial Information and Semantic Features for Partial-duplicate Image RetrievalAnalysis of Influencing Factors of Desert Precipitation Based on Big DataFramework Design of Financial Service Platform for Tobacco Supply Chain Based on BlockchainResearch on Application of Logistics Service Quality Management Based on BlockchainAnalysis of dynamic change regulation of water and salt in saline-alkali land based on big dataThe food safety traceability system for the industrial chain of livestock and poultryPrediction of Garlic Prices in Shandong Province Based on ARIMA Model by R LanguageResearch on the Law of Garlic Price Based on Big DataDesign of feedback shift register of against power analysis attackResearch of Farmland Intelligent Information Collection System Based on NB-IOTThreats and Coping Strategies under The IOTResearch on Logistics Distribution Vehicle Scheduling Algorithm Based on Cloud ComputingThe Traceability Code of Agricultural Products and Its Application of Winter Jujube Industrial ChainWorkflow task scheduling algorithm based on IFCM and IACOIntelligent Poultry Environment Control System Based on Internet of ThingsA VANET anonymous authentication mechanism for multi-level application scenariosDesert Weather Analysis and Prediction based on Big DataStudy on Time Series Restoration Method based on Image Coding and Neural NetworkIntelligent control system of cucumber production in the greenhouse of the Internet of thingsAutomatic Detection of Melanoma Based on Image Feature learningAccurate Moving Distance Estimation via Multimodal Fusion from IMU Sensors and WiFi SignalSearchable encryption scheme based on CPABE with attribute update in a Cloud Medical EnvironmentTracing system of meat supply based on agricultural internet of thingsResearch on the relationship between garlic and Young Garlic Shoot based on big dataResearch and Application of Traceability Model of Agricultural ProductsIntegrated intelligent control system of tomato and water and fertilizer based on Internet of thingsThe Traceability Information Management Platform of Duck Poultry Industry Chain

A Dominance-based Constrained Optimization Evolutionary Algorithm for the 4-th Tensor Power Problem of Matrix Multiplication

Page 29: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Research on The Combined Model of Garlic Short - term Price Forecasting Based on Big DataDesign and Development of Wheat Production Information Management System Based on Internet of Things

Research and Implementation on the Traceability Equipment of the Whole Industrial Chain for Agricultural Products

Design and Application of Agricultural Product Traceability Management Platform ModelCloud Security Solution Based on Software Defined NetworkNetwork Attack Prediction Method based on Threat IntelligenceResearch on Flame Generation Method Based on Particle System and Texture MappingDesign And Implementation of the Product Quality Traceability System of Winter JujubeAnalysis of price fluctuation characteristics and influencing factors of garlic based on HP filter methodEkCRNN: A kNN privacy preserving query algorithm based on Circular Region ExtensionGA-BP Air Quality Evaluation Method Based on Fuzzy TheoryStreet-Level Landmark Evaluation Based on Nearest RoutersThe Research of Computer Network Division Based on Huffman CodingResearch on Spatial Quantitative Analysis of Garlic Price Data Based on ArcGISApplication of block chain technology in supply chain managementConstruction of VMI Mode Supply Chain Management System Based on Block ChainDefining Embedding Distortion for Intra Prediction Mode-based Video SteganographyFast Detection of Heavy Hitters in Software Defined Networking Using an Adaptive and Learning MethodDevelopment and Application of Big Data Platform for Garlic Industry ChainBased on data analysis and JC retrofit scheme of dam risk function and the simulation experiment

Traffic accident time series analysis -- take Guiyang city as an exampleA navigation system for small-sized autonomous underwater vehicleEnergy Efficient Scheduling of Computation-Intensive Tasks on Multicore Server in CloudMS-SCTA: Space crowdsourcing task assignment algorithmCloud computing data security protection strategyOptimal Secondary User Selection for Cooperative Spectrum Sensing in Cognitive Radio Sensor NetworksTrace representations of the sequences derived from polynomial quotients

A Self-embedding Image Fragile Watermarking Based on Combined Decision Using pre-offset and post-offset Blocks

Provably Secure Verifier-based Password Authenticated Key Exchange from Lattice

A Weighted Threshold Secret Sharing Scheme for Remote Sensing Image based on Chinese Remainder Theorem

Study on Storage Location Strategy Based on Clustering and Association AlgorithmTask Scheduling Based on Dynamic Non-linear PSO in Cloud EnvironmentResearch on drug regulation mode in the age of the Internet of thingsA Novel Hierarchical Identity-Based Fully Homomorphic Encryption Scheme from LatticesRecaptured Image Detection Through Enhanced Residual-Based Correlation CoefficientsIdentity Based Privacy Information Sharing with Similarity Test in Cloud EnvironmentDigital Continuity Guarantee based on Data Consistency in Cloud StorageAn Immunity-based Security Threat Detection System for Cyberspace Digital Virtual AssetsA Spectrum Sensing Algorithm Based on Information Geometry and K-medoids ClusteringPrivacy-preserving Sorting Algorithms based on Logistic Map for Clouds

The Algorithm of Chemical Species Analysis for Ab intio Molecular Dynamics Simulations and Its Application

A Real-Time Correlation of Host-Level Events in Cyber Range Environment

The Internet of Things and Big Data in the Submarine Cable Release Process of Finite Element Simulation and Matlab Simulation

Page 30: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

An Information Hiding Algorithm for HEVC Videos Based on PU Partitioning ModesAn Encryption Traffic Analysis Countermeasure Model Based on Game TheoryAnalysis of LSTM-RNN based on Attack Type of KDD-99 DatasetMerging-and-Evolution Networks for Mobile Vision ApplicationsAn Architecture of Secure Health Information Storage System based on Blockchain TechnologyDynamical interaction between information and disease spreading in populations of moving agentsA Data Leakage Prevention Method Based on The Reduction of Con dential and Context TermsBig Data Equi-join Optimization Algorithms on Spark Cloud Computing PlatformStyle Transferring Based Data Hiding for Color ImagesRumor spreading model considering rumor’s attraction in heterogeneous social networks3D Airway Tree Centerline Extraction Algorithm for Virtual BronchoscopeResearch on risk aversion enterprise financial crisis warning based on support vector data descriptionText Coverless Information Hiding Based on Word2vecText Information Hiding Method Using the Custom ComponentsAutomatic retinal layer segmentation in SD-OCT images with CSC Guided by Spatial CharacteristicsPrivacy Preserving for Big Data Based on Fuzzy SetA Fuzzy Keyword Matching Proxy Broadcast Re-Encryption Scheme for Cloud Storage SystemOptimal Resource Allocation for Underlay Cognitive Radio NetworksA Joint Approach to Data Clustering and Robo-advisorA Steganographic Method Based on the Pulse Code Positions of the G.723.1 Speech Codec

Clustering Model Based on RBM Encoding in Big Data

A Novel Nonlinear Multi-feature Fusion Algorithm: Multiple Kernel Multiset Integrated Canonical Correlation Analysis

Error Tolerant ASCA on FPGA

Adaptively Chosen Ciphertext Secure Lattice IBE Based Programmable Hash Function in the Standard Model

Energy-efficient Cloud Task Scheduling Research based on Immunity-Ant colony AlgorithmTruthful Mechanism for Virtual Machine Provision and Allocation Considering Dynamic Demand in CloudsMultichannel Spectrum Sharing of Internet of Things in 5G CommunicationEfficient group signature schemes over NTRU latticeThe Study of Stochastic Model about Picking Path under the V-type warehouse layoutAdversarial Learning for Distant Supervised Relation Extractionrandom datasetA Cooperative Spectrum Sensing Method Based on Clustering Algorithm and Signal FeatureResearch on the Application of RFID Technology in Logistics Warehousing Management SystemImproved lossless data hiding for JPEG images based on histogram modificationAttribute-based Encryption Scheme Supporting Tree-access Structure on Ideal LatticesA Multiple Linear Regression Based High-precision Error Prediction algorithm for Reversible Data Hiding

A Cooperative Spectrum Sensing Method Based on Empirical Mode Decomposition and K-mediods Algorithm

A Privacy Preserving Scheme for Nearest Neighbor QueryA Spectrum Sensing Method Based on Null Space Pursuit Algorithm and FCM Clustering AlgorithmEnhancing Location Privacy for Geolocation Service through PerturbationA Highly Effective DPA Attack Method based on Genetic AlgorithmVAT: A Velocity-Aware Trajectory Privacy Preservation Scheme for IoT Searching

Trade-off between Minimizing Energy Consumption and Minimizing Makespan in the Mapreduce Resource Allocation Problem

Page 31: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

A Comparative Study on the Performance of Three Intelligent Algorithms in Route Selection of Fishbone Layout

A Proxy Re-encryption with Keyword Search Scheme in Cloud ComputingThe Study of Stochastic Model about Picking Path under the Fishbone LayoutPower Missing Data Filling Based on Improved k-Means Algorithm and RBF Neural Network

A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis

A lightweight multi-factor for the information perception of IoTRandomness Tests for ZigBee Protocol Based on Matrix Probability TestA Behavior-Based Intrusion Detection Model for IoTMFI-5 Based Similarity Measurement of Business Process Models

Application of Self-organizing Feature Map Neural Network Based on k-means Clustering in Network Intrusion Detection

A Hash-Based Public Key CryptosystemBinary Image Steganalysis Based on Distortion Level Co-occurrence MatrixMedical Image Fusion Algorithm Based on NSCT and SR-PCNNCode Division Multiplexing Based Reversible Data Hiding Scheme for Medical ImagesA novel detection method for word-based DGASLIDE: An Efficient Secure Linguistic Steganography Detection ProtocolA Truthful Combinatorial Auction for Privacy-Aware Service Subscription in People-centric SensingA biometrics-based remote user authentication scheme using smart cardsThe Stability of Thymine-Glycine Dimers with Excess ElectronA Novel Hierarchical Identity-Based Encryption Scheme from LatticesFew-Shot Learning for Twitter Sentiment AnalysisSemi-Supervised Few-Shot Learning for Twitter Sentiment AnalysisRobust Image Hashing via Random Gabor Filtering and DWTResearch on rolling bearing on-line fault diagnosis based on multi-dimensional feature extractionContourlet-DCT Based Multiple Robust Watermarkings For Medical ImageA GLCM-feature-based approach for reversible image transformationA Mixed Mobile Charging Strategy in Rechargeable Wireless Sensor NetworksAn Improved ICS Honeypot Based On SNAP7 And IMUNESA Delay Step Based Geolocation Data Verification Method

A BLF generation scheme with clock variance-tolerance for baseband processor of EPC Gen2 UHF RFID Tag

Enhancing Named-based Caching in NDNResearch on Kuperberg's Subexponential-time Quantum Algorithm for Dihedral Hidden Subgroup ProblemEfficient Processing of Top-k Dominating Queries On Incomplete Data In Distributed EnvironmentsStudy On the Internet of Things from Applications to Security IssuesTowards the Cloud Computing from Services to Securities and ChallengesResearch on the Design and Selection Path Model of V Channel Storage LayoutResearch on dynamic performance and road performance of dense-gradation asphalt mixtureNetwork Security Situation Awareness Framework based on Threat IntelligenceDetecting Inconsistency and Incompleteness in Access Control PoliciesSafeMP: Using Mechanical Wave Communication for safer Payment

IPFRA: An Online Protocol Reverse Analysis MechanismDesign and implementation of Web crawler based on coroutine Model

Event-triggered Fault Estimation and Accommodation for Stochastic State-delay Systems subject to Randomly Occurring Sensor Nonlinearities and Deception Attacks

Page 32: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Proposed Econometrics Modeling for Estimation of Animal Welfare: Parametric and Non-Parametric Approaches

A vascular model based on dynamic internal point set and Gauss processDigital Cardan Grille: A Modern Approach for Information HidingLabel Noise Detection Based on Tri-training

Design and Implementation of VxWorks System Vulnerability Mining Framework Based on Dynamic Symbol Execution

Mitigating Content Caching Attack in NDNWiFi Attacks and Privacy Disclosure via Photographs on Unmanned Aerial VehiclesCollective Computing Architecture Supporting Heterogeneous Tasks and Computing DevicesMulti-task Joint Sparse Representation Classification Based on Fisher Discrimination Dictionary LearningImproving Testing Accuracy of Convolutional Neural Network for Steganalysis Using Segmented SubimagesText Steganography Model Based on Instant MessageImproved VGG Model for Road Traffic Sign Recognition

ParaBTM: A Parallel Processing Framework for Biomedical 2 Text Mining on the Tianhe-2 SupercomputerReversible Data Hiding for VideoICRA: Index based Cache Replacement Algorithm for Cloud StorageDetection Method of Hardware Trojan Based on Wavelet Noise Reduction and Neural NetworkA Co-occurrence Matrix based Multi-keyword Ranked Search Scheme over Encrypted Cloud DataAttention-based Chinese Word EmbeddingApplication of Big Data Technology in JDTopk Service Composition Algorithm Based on Optimal QoSInconsistent Selection of Optimal Frame Length in WMSNReversible Data Hiding Scheme in Multiple Encrypted Images based on Code Division MultiplexingNMF-based Authentication Scheme for Encrypted SpeechDifferential Cryptanalysis on Block Cipher SKINNY with MILP MethodCloud-based Image Fusion for Mobile NetworkAn Evidence Combination Method Based on DBSCAN ClusteringA Three-factor Remote Authentication Scheme for Multi-server EnvironmentMolecular structure and electronic spectra of CoS under the radiation fieldsAn improved Remote User Authentication Protocol Based on Biometric and Smart CardsResearch on big data Fusion method of Smart Grid in the Environment of Internet of thingsResearch on Image Classification of Marine Pollutants with Convolution Neural NetworkOptical Multi-Wavelength Comb Generation Scheme Using Cascaded Configuration of Intensity ModulatorsA Heuristic Evolutionary Algorithm of UAV Path PlanningThe Comprehensive Method of Communication Jamming effectiveness Based on Grey Relational AnalysisSeed selection for data offloading based on social and interest graphsDomain Adaptive Collaborative Representation based Classification}A Blind Quantization Watermarking Scheme For Screen Content ImageA Privacy-preserving image retrieval method based on improved BoVW model in cloud environmentDesign and Simulation of a New Stacked Printed AntennaA New Malicious Node Detection Model Based on Improved LEACH ProtocolReview on Privacy-Preserving Comparison ProtocolsRobust H.264/AVC Video Watermarking without Intra Distortion driftResearch on Trust Management Model in Cloud ManufacturingRITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model

An Integrated Suture Simulation System for Multiple Surgery Scenes with Deformation Constraint Under A Suture Control Strategy

Page 33: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Comparative Study of CNN and RNN for Deep Learning based Intrusion Detection SystemResearch on filtering method based on generalized S transform image processing

Research on the Construction of Three Level Customer Service Knowledge Graph in Electric MarketingThe Classification of Traditional Chinese Painting Based on CNNResearch on Trust Model in Container-based Cloud ServiceDesign and Simulation of a New Antenna Using MetallicLoop and Annular-RingSlotImage steganalysis based on densely connected convolutional networksTeam Formation in Social Networks Using Imperialist Competitive AlgorithmSharing Economy Protocol with Privacy Preservation and Fairness based on BlockchainResearch on Big Data Platform Security Strategy Based on Cloud ComputingMass Discovery of Android Malware Behavioral Characteristics for Detection ConsiderationDetection of bird's nest in high power lines based on combination features and cascade classifierCrowdsourcing based Framework for Teaching Quality Evaluation and Feedback Using Linguistic 2-TupleEstimating the Number of Posts in Sina Weiboreliable method of icing detection for transmission linesA Dual-Chaining Watermark Scheme for Data Integrity Protection in the Perception Layer of IoTQ-Learning based Computation Offloading Strategy for Mobile Edge ComputingA Security Sandbox Technology of Android based on Hook MechanismImproving Privacy-preserving CP-ABE with Hidden Access Policy Over Prime-Order GroupsADFL: An Improved Algorithm for American Fuzzy Lop in Fuzz TestingIntelligent control system of wheelchair based on brain wave and voiceDesigning adaptive JPEG steganography based on the statistical properties in spatial domainSemantic Search Encryption Based on Conceptual Graphs of ContextA Comprehensive Analysis of Interval Based Network Flow WatermarkingTowards Multi-task Fair Sharing for Multi-resource Allocation in Cloud ComputingComputing Topological Indices of the Archimedean Lattice $L_{3,4,6,4}(n)$Research and Application of Chinese Text Classification TechnologyAbnormal web page detection using dynamic fusion of multi algorithmsA Privacy-Preserving Classier in Statistic Pattern RecognitionSmart Transportation Systems for Cities in the Framework of Future NetworksAnalysis and Improvement On An Image Encryption Algorithm Based On Bit Level PermutationA homomorphic masking defense scheme based on RSA cryptography algorithmAn Image Augmentation-Based Multi-label Classification of Food Ingredients Using Deep LearningA Method of Identifying Thunderstorm Clouds in Satellite Cloud Image Based on ClusteringacSB: Anti-Collision Selective-based Broadcast Protocol in CR-AdHocsA Novel Photovoltaic Cell Simulator for Green Internet of Things

Analyzing Cross-domain Transportation Big Data of New York City with Semi-supervised and Active Learning

A Novel Coverless Information Hiding Method BasedDoS Attack Intrusion Detection Algorithm Based on Support Vector MachineEnergy Efficient Smart Irrigation System Based on 6LoWPAN

Medical Image Watermarking based on SIFT-DCT Perceptual HashingStudy on Time Series Restoration Method based on Image Coding and Neural NetworkSecure Data Sharing Framework via Hierarchical Greedy Eembedding in Darknets

Mchain: A Blockchain-based VM Measurements Secure Storage Approach in IaaS Cloud Environment with Enhanced Integrity and Controllability

A Commercial Smartwatch Based Driver Drowsiness Detection System Using Its Built-in Accelerometer, Gyroscope and Heart Rate Sensor

Page 34: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Greedy Embedding Strategy for Dynamic Graphs based on Spanning TreeAccess Control Policy Based on Friend CircleQuality-aware Query based on Relative Source QualityIdentifying Rumor Source of Online Social Networks in the SEIR ModelFCache: a Comprehensive Failure Cache forErasure-coded Storage SystemsA fusion steganographic algorithm based on object regionsSome Topological indices computing results of Archimedean lattices L (4 ; 6 ; 12)Efficient Fully Homomorphic Encryption with Larger Plaintext Space

Identifying materials of photographic images and photorealistic computer generated graphics based on deep CNNs

Efficient Interference Estimation with Accuracy Control for Data-Driven Resource Allocation in Cloud-RANResearch on Detection and Traceback of DDoS AttacksTraceable and full verifiability for outsourced decryption in CP-ABEA Study on Virtual Network Mapping with Dynamic Resource RequirementBlocking Time-based MPTCP Scheduler for Heterogeneous NetworksAn Efficient proxy ring signature for VANETAddress Allocation Scheme Based on local MAC AddressSecure video streaming with lightweight cipher PRESENT in a SDN Testbed

Review on Blockchain application for IoT

Differentially Private Real-time Streaming Data Publication Based on Sliding Window under Exponential Decay

Research on Vehicle Scale Adaptive Tracking Method Based on Background Informationf-ALC(S): A Fuzzy Description Logic for Spatial Representation and ReasoningASSESSMENT MODEL AND OPTIMIZATION FOR ACOUSTIC POSITIONING SYSTEMBring Intelligence to Ports based on Internet of ThingsVulnerability Analysis and Spoof Scheme on AoA-based WLAN Location SystemsDynamic Trust Model Based on Service Recommendation in Big DataApplication of BlockChain in IoTClustering Algorithm for Privacy Preservation on MapReduceAn Approach Based on Value Revision to Activity RecognitionPaillier Encryption Blockchain for Edge ComputingA Method of Detection of Network Covert Timing Channel Based on IPDs Multidimensional FeaturesPCR: Caching Replacement Algorithm in Proxy ServerDistribution of CA-role in Block-chain SystemsT2FA: Transparent Two-Factor AuthenticationResearch on Data Mining Method for Breast Cancer Case DataPhysical Layer Security Performance for Wireless Mobile Sensor Communication NetworksReversible Data Hiding in Classification-Scrambling Encrypted Image Based on Iterative RecoveryAPRO: An Improved Zero-copy Framework for Intelligent Surveillance NetworksA parallel pre-schedule max-min ant systemMultilevel Features Fusion in Deep Convolutional Neural NetworksResearch on indoor positioning method based on visible light communication technologyA New Image Feature Ensemble Method based on LSTMReplay Attack Detection Based on Distortion by Loudspeaker for voice authenticationDesign and Research on B2B Trading Platform Based on Consortium BlockchainsToward a High performance mobile phone protection scheme based on block chain

Research on Feedback Effects between Perception of Internet Word of Mouth and Online Reviews Based on Dynamic Endogeneity

Page 35: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Composite structure health monitoring review based on FBG sensorImage classification with a MSF dropoutAttack on Deep Steganalysis Neural NetworksLarge data platform system project Safety guaranteeAssociation Analysis of Firmware Based on NoSQL DatabaseMoving video vehicle detection combining ViBe and inter-frame differenceWearable IoT enabled Real Time Health and Behaviour Monitoring SystemAn Advanced Quantum-Resistent Signature Scheme for Cloud Based on Eisenstein RingResearch on network security in large data environmentA word-embedding-based steganalysis method for linguistic steganography via synonym-substitutionresearch on software reliability and security based on big dataExperiment implementation of quantum algorithms based on IBM Q simulatorTowards Secure Device Pairing via Vibration DetectionW-Bayes indoor location algorithm based on dynamic region selectionTopology Control for Constructive Interference-Based Data Dissemination in WSNs

An Exception Handling Approach for Privacy-preserving Service Recommendation Failure in A Cloud Environment

Developing a New Security Framework for Bluetooth Low Energy DevicesBig data security framework based on EncryptionDistributed Monitoring System for Microservices-based IoT Middleware System

Controlled remote state preparing an arbitrary two-qubit state via the Brown state under the noisy environment

study on the Development of U.S Intercontinental Alliance Clean Renewable Energy Based on CA-DEA Model

The Research on Intelligent Calculation Model of Oil and Gas Water Physical ParametersTopic Model based Physical-layer Identity AuthenticationTime-based Access Control for Multi-attribute Data in Internet of ThingsTeaching Video recommendation based on Student EvaluationData-driven Logical Topology Inference and Person Re-identification based on Multi-cameras IoTA security protocol for access to sensitive data in trusted cloud serverHuman Body Temperature Online Monitoring System Based on Fiber Bragg Grating

Reducing the computational complexity of the reference-sharing based self-embedding watermarking approach

Improving semantic annotation using semantic modeling of knowledge embeddingA MPTCP Scheduler for Web TransferMulti-Dimensional Regression for Colour Prediction in Pad DyeingCoverage Holes Recovery Algorithm of Underwater Wireless Sensor NetworksNoise Modelling and Analysis for Indoor Broadband Power Line CommunicationStudy on Cloud Logistics Distribution Model of Agricultural ProductsINTEGRAL AND IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS OF RC6A Novel GAN based Denoising Method for Images with Text Overlay

A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key Generation

Watermark Embedding for Direct Binary Searched Halftone Images by Adopting Visual CryptographySpeech resampling detection based on the inconsistency of band energy

A General Two-Server Framework For Ciphertext-Checkable Encryption Against Offline Message Recovery Attack

Research on Cascading Failures in Complex Network

Page 36: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

An Adaptive Test Method Based on Geometric Calculation for Linearly Separable ProblemPrivacy-Preserving Credit Scoring on CloudAn Improved Deep Learning to Hash For Indexing Big DataVisual Analysis on Stock Market

High Speed Pharmaceutical Packaging Detection System Based on Genetic algorithm and Memory Optimization

A Research about Trustworthiness Metric Method of SaaS Services Based on AHPModeling and Analysis of a Hybrid Authentication Protocol for VANETSecure and Privacy-Preserving 3D Vehicle Positioning Schemes for Vehicular Ad Hoc Network3D steganalysis using Laplacian smoothing at various levelsA Co-Verification Interface Design for High-Assurance CPSHybrid Network Coding Scheme in Cognitive Radio Networks with Multiple Secondary UsersResolve PLC Security Threats through Monitoring and Restoring I/O PortsEnergy Efficient Flow-based Access Control in HetNets with Renewable Energy SupplyA fair blind signature scheme to revoke malicious vehicles in VANETsIris Liveness Detection with Batch Normalization Convolutional Neural NetworkModeling and Data analysis of the Balise SystemCryptanalysis of ElGamal-like cryptosystem based on matrices over groupringThe Ship Struck by Lightning Indirect Effect Simulation and Data AnalysisAn Anonymous Network Hidden Service Domain Name SystemMulti-situation Analytic Hierarchy Process based on Bayesian for Mobile Service RecommendationA genetic algorithm based method of early warning rule mining for student performance prediction

User Profile-Aware Attention-based Bidirectional Long Short-Term Memory Neural Network for Political Content Detection

An Algorithm of Mining Key Accounts in Topic Propagation Based on Dual Random WalkVirtual Network Embedding in Wireless Multi-hop Cellular NetworksFull Secure Identity based Proxy Re-Encryption Scheme from LWE in Cloud ComputingThe Research on Security Audit for Information System Classified ProtectionTR-IDS: Anomaly-based Intrusion Detection through Text-convolutional Neural Network and Random ForestA Trusted Computing Base for Information System Classified ProtectionA Model Based on Convolutional Neural Network for Online Transaction Fraud DetectionSU-IDS: An Semi-supervised and Unsupervised Framework for Network Intrusion DetectionA Control Approach Using Network Latency Interval to Preserve Real-time CausalityMulti-Source Enterprise Innovation Data Fusion Method Based on HierarchyResearch on Fire Image Detection Technology base on RBFComposite Descriptors and deep features based visual phrase for Image RetrievalDetecting PLC program Malicious Behaviors Based on State VerificationReversible Data hiding in Encrypted Images with Public Key CryptographyRCS: Hybrid Co-Scheduling Optimization in Virtualized SystemImproved Schemes for Visual Secret Sharing Based on Random Grids

Research on Energy Balance Data Fusion Algorithm based on Compressed Sensing in Wireless Sensor Networks

Creating Features from NIST's Randomness Tests for Recognition of Block CiphersA Variable-Angle-Distance Quantum Evolutionary Algorithm for 2D HP ModelAlgorithm to Most Reliable Maximum Flow on CDNLocation Privacy Preserving of Social Network based on RCCAM Access Control

Analysis and improvement of an efficient controlled quantum secure direct communication and authentication by using four particle cluster states

Page 37: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

A Median Filtering Forensics Scheme for Color Images Based on Magnitude-Phase CNNApplication of BP Neural Networks to Analysis of National VulnerabilityRich QR Code with Three-layer Information Using Visual Secret Sharing SchemeAuthentication of Quantum Dialogue under NoiseInternet of Things Security Analysis of Smart CampusNetwork defense decision-making method based on stochastic differential game modelRevisiting Anonymous Two-Factor Authentication Schemes for Cloud Computing

Discriminative Dictionary Learning with Local Constraints for Face Recognition with OcclusionA Recommender for Personalized Travel ItinerariesBand Selection Method of Absorption Peak Perturbance for the FTIRATR Spectrum AnalysisDesign of event-triggered fault-tolerant control for stochastic systems with time-delayAlgorithms for the Densest Subgraph with at least k Vertices and with a Specifed SubsetA Robust Rotation-Invariant Image Watermarking SchemeGenerative Steganography Based on GANsAn Efficient Privacy-preserving Handover Authentication Scheme for Mobile Wireless NetworkA Deep Forest-based Approach for Online Transaction Fraud DetectionA Survey on the New Development of Medical Image Security AlgorithmsComparison Study on the Statistics Based Trust Schemes for Wireless Sensor Networks

Discretization Algorithm Based on Cloud Computing Technology for High Resolution Remote Sensing Image

An Efficient Integrity Auditing Scheme without Bilinear PairingBotnet detection with hybrid analysis on flow based and graph based features of network traffic

A new steganographic distortion function with explicit considerations of modification interactionsDesign and Implementation Lightweight Authentication for Low-cost RFID TagsOptimal Network Defense Strategy Selection Based on Incomplete Information Evolutionary GameSecure Device Pairing via Facial Image SimilarityNode Scheduling Algorithm Based on Grid for Wireless Sensor NetworksRobust USBL for DOA estimation in MIMO radar with mutual coupling and nonuniform noiseA multiple watermarking scheme for content authentication of OOXML format documentsA Secure Blind Watermarking Scheme Based on Dual Frequency Domains and Ergodic MatrixSecurity Verification for Rateless Codes Over-the-Air ProgrammingAn Arithmetic design for stress concentration factors of Circle-to-Circle jointEvaluation of Ultra-low Power High Performance Capacitive Soil Moisture SensorCriteria Interdependence in fuzzy multi-criteria decision making: a surveyA Computer Simulation Model for CHC X-joint with concrete-filledAB-TDMA: An Energy-Efficient MAC for Concurrent Data Collection and Data DisseminationPrivacy-Preserved Prediction for Mobile Application AdoptionThe advantages and disadvantages of the teaching method of "MOOC" in the course of universityFull-blind delegating private quantum computationA chaotic searchable image encryption integrating with block truncation codingA novel watermarking technology based on posterior probability SVM and improved GAAdaptive Linguistic Steganography based on Syndrome-trellis CodesDesign and Verification of a Security Policy to Defense DDoS Attack for Cloud Robot

The Design and Implementation of a Backup and Disaster Recovery System for vSphere Data Center Based on Swift Cloud Storage

A Estimation Mechanism of the Level of the Service based on Fuzzy Logic in both the Cloud Computing and the Internet of Things

Page 38: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

DDoS Attack Security Situation Assessment using Fusion Feature based on Fuzzy C-means Clustering Algorithm

A novel time-aware frame adjustment strategy for RFID anti-collisionIn situ synthesis of cuprous oxide/cellulose nanofibers gel and antibacterial propertiesZero Leakage Key Conciliation using Private Set IntersectionAutomatic Mining of Security-sensitive Functions from Source CodePrivacy-preserving quantum two-party geometric intersectionSegmentation and Recognition of Continuous Human Activity using WiFiA Multi-grained Log Auditing Scheme for Cloud Data ConfidentialityCloud-based Image Fusion for Mobile NetworkA Lightweight Fingerprint-based Method for Inexpensive and Scalable Indoor Subarea LocalizationA Blockchain-Based Authentication Protocol for WLAN Mesh Security Access Scheme

Temporal Evolution Data Model for Heterogeneous Entities: Modeling with Temporal and Evolution Information

Time-Aware CF and Association Rule Mining based Personalized Hybrid RecommenderModification of Nano Tourmaline Surface Treatment Agent and Its Performance on Negative Ion Release

A New Dependency Parsing Tree Generation Algorithm Based on the Semantic Dependency Relationship between Words

Analysis and research on the temporal and spatial correlation of traffic accidents and illegal activitiesResearch on resource demand forecasting model of PaaS platformDDoS attack detection method based on flow correlation and random forestRobust Manifold Learning Based Ordinal Discriminative Correlation RegressionSteganography using reversible texture synthesis based on seeded region growing and LSBMulti-Target Regression via Multi-target Stacking and Random Linear Target CombinationsPower Missing Data Filling Based on Improved k-Means Algorithm and RBF Neural NetworkTwo solutions uniform superposition statePower Data Cleaning Method Based on Isolation Forest and LSTM Neural NetworkAttention-Based Bidirectional Recurrent Neural Networks for Description Generation of VideosUsing Blockchain for Data Auditing in Cloud StoragePoisson surface algorithm based on noise classification and MLSAn Image Augmentation-Based Multi-label Classification of Food Ingredients Using Deep LearningThe structure topology sampling of H2SO4-NH3 with meta-dynamics methodReversible Natural Language Watermarking Using Synonym Substitution and Arithmetic Coding

Interpolation of missing wind speed data of wind turbine nacelle in wind farms by similarity based PSO-GRNN model

Adaptive DDoS attack detection method based on multiple kernel learningTBPA: TESLA-Based Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc NetworksFast Near-duplicate Image Detection in Riemannian Space by a Novel Hashing SchemeThreshold Proxy Re-encryption and its application in BlockchainEfficient Secure Data Provenance Scheme in Multimedia Outsourcing and SharingMultiple-parameter fractional quaternion Fourier transform and its application in color image encryptionResearch of a Reliable Constraint Algorithm on MIMO Signal DetectionComparisons of Learning-Based Methods for Stock Market PredictionA network illegal access monitoring method based on PSO-SVM algorithmNetwork vulnerability detection based on improved Adaboost algorithmA Distributed Security Feature Selection Algorithm Based on K-means in Power Grid SystemMotion and Disparity Vectors Early Determination for Texture Video in 3D-HEVCQS-Code: A Quasi-Systematic Erasure Code with Partial Security for Cloud Storage

Page 39: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

DecisionAccept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Page 40: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept

Accept

Page 41: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept

Accept

Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Page 42: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept

Page 43: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept

Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Page 44: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept

Accept

Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Page 45: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept

Page 46: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept

Page 47: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Page 48: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept

Accept

Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept

Page 49: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept

Accept

Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept

Page 50: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept

Accept Accept Accept

Accept

Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept

Page 51: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept

Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Page 52: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept

Accept

Accept Accept Accept

Page 53: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Page 54: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept

Accept

Accept

Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept

Accept

Accept

Page 55: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept

Accept Accept Accept Accept

Page 56: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Page 57: [XLS]icccsconf.orgicccsconf.org/ICCCS 2018 Accepted Papers.xlsx · Web viewA high gain, noise cancelling 3.1-10.6 GHz CMOS LNA for UWB application Facebook5K: A novel evaluation resource

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept

Accept

Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept Accept


Recommended