scispace - formally typeset
Search or ask a question

Showing papers in "Tsinghua Science & Technology in 2016"


Journal ArticleDOI
TL;DR: An online deep-learning-based Android malware detection engine (DroidDetector) that can automatically detect whether an app is a malware or not is implemented and shows that deep learning is suitable for characterizing Android malware and especially effective with the availability of more training data.

357 citations


Journal ArticleDOI
TL;DR: The proposed scheme not only satisfies the security requirements of VANETs, but also optimizes the calculation process of signature generation and verification and is more efficient than existing schemes in terms of communication overhead and computational cost.

75 citations


Journal ArticleDOI
TL;DR: The Greedy Particle Swarm Optimization (G&PSO) based algorithm is introduced to solve the task scheduling problem and demonstrates improved virtual machine efficiency and resource utilization compared with the traditional particle swarm optimization algorithm.

58 citations


Journal ArticleDOI
TL;DR: This model is put forward to implement positive rating and reverse pricing for Big Personal Data by investigating data attributes that affect data value, and analyzing how the value of data tuples varies with information entropy, weight value, data reference index, cost, and other factors.

42 citations


Journal ArticleDOI
TL;DR: Performance evaluations via comparisons among similar protocols demonstrate that HEEDP is superior; it is most efficient in terms of both communication and computation on a wide range of data types, especially in wireless sensor networks.

41 citations


Journal ArticleDOI
TL;DR: This paper shows how to apply PCA to TM analysis and anomaly detection and demonstrates that the PCA-based method can detect anomalies for both single and multiple nodes with high accuracy and efficiency.

39 citations


Journal ArticleDOI
TL;DR: This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications, which helps to guarantee confidentiality and proper access control of outsourced sensitive data.

32 citations


Journal ArticleDOI
TL;DR: Two versions of the L2P2 problem are formalized, which is to find the smallest cloaking area for each location request so that diverse privacy requirements over spatial and/or temporal dimensions are satisfied for each user.

29 citations


Journal ArticleDOI
TL;DR: This paper proposes an SDN-based Explicit-Deadline-aware TCP (SED) for cloud Data Center Networks (DCN) and shows that SED can make flows meet deadlines effectively, and that it significantly outperforms previous protocols in the cloud data center environment.

26 citations


Journal ArticleDOI
TL;DR: This paper designs a new surface coverage algorithm based on a 3-D directional sensing model of nodes that employs grid division, simulated annealing, and local optimum ideas to improve the area coverage ratio by optimizing the position coordinates and the deviation angles of the nodes, which results in coverage enhancement for complex3-D terrains.

26 citations


Journal ArticleDOI
TL;DR: A novel Reducing Iteration Orthogonal Matching Pursuit (RIOMP) algorithm that calculates the correlation of the residual value and measurement matrix to reduce the number of iterations and can accurately reconstruct signals in a shorter running time.

Journal ArticleDOI
TL;DR: This work proposes an optimized algorithm inspired by Rain Forest, a hybrid between a traditional recursive implementation and an iterative implementation which uses more memory but involves less write operations.

Journal ArticleDOI
TL;DR: An integer-programming-based data placement model that addresses the above challenges as a Non-deterministic Polynomial-time (NP)-hard problem is proposed and a Lagrangian relaxation based heuristics algorithm is used to obtain ideal data placement solutions.

Journal ArticleDOI
TL;DR: This paper presents a cloud service architecture that explores a search cluster for data indexing and query and develops REST APIs that the data can be accessed by different analysis modules that enables extensions to integrate with software frameworks of both batch processing and stream processing of big data.

Journal ArticleDOI
TL;DR: The proposed method GOS to identify essential proteins by integrating the Gene expressions, Orthology, and Subcellular localization information outperforms the ten existing methods DC, BC, CC, SC, EC, IC, NC, PeC, ION, and CSC.

Journal ArticleDOI
TL;DR: A model that uses Software-Defined Networks (SDN) to implement traffic redirection that can capture inter-VM traffic, detect known and unknown anomalous network behaviors, adopt hybrid techniques to analyze VM network behavior, and control network systems is proposed.

Journal ArticleDOI
TL;DR: This paper proposes an integrated incentive framework for MCS, which appropriately utilizes three widely used incentive methods: reverse auction, gamification, and reputation updating, and can motivate participants to provide high-quality sensed contents, stimulate publishers to give truthful feedback, and make the platform profitable.

Journal ArticleDOI
TL;DR: Experimental results showed that this algorithm was able to identify a global optimal occlusion strategy that can disturb the tracking machine with 86.8% probability over more than 10000 tracking processes and reduced the time cost by approximately 80%, compared with conventional PSO algorithms.

Journal ArticleDOI
TL;DR: A Bayes-based algorithm is proposed to calculate the probability of a host being an attacker and a detection model based on the algorithm is presented to prevent man-in-the-middle and denial of service attacks caused by an address resolution protocol bug in an SDN-based cloud center.

Journal ArticleDOI
TL;DR: It is found that Weibo users have a higher diversity index, higher Gini index, but a lower reciprocity and clustering coefficient for most of the nodes, compared with a Twitter user network.


Journal ArticleDOI
TL;DR: An access control scheme that uses a combination of discretionary access control and cryptographic techniques to secure users' data and applications hosted by cloud providers and is more flexible and easy to use is proposed.

Journal ArticleDOI
TL;DR: In this article, the authors extend the notion of private proximity detection, and propose a novel approach that allows a mobile user to define an arbitrary convex polygon on the map and test whether his friends are located therein.

Journal ArticleDOI
TL;DR: A survey on the representative mechanisms proposed in the literature for wide area analytics, which point out the limitations of these mechanisms, give comparisons, and conclude with the thoughts on future research directions.

Journal ArticleDOI
TL;DR: A hardware-based remote attestation protocol to tackle the problem within WSNs, where each sensor node is equipped with a Trusted Platform Module which plays the role of a trusted anchor.

Journal ArticleDOI
TL;DR: The experimental results show that the proposed algorithms can efficiently find skyline groups over a data stream and use data structures, namely a hash table, dominance graph, and matrix, to store dominance information and update results incrementally.

Journal ArticleDOI
Donggang Cao1, Peidong Liu1, Wei Cui2, Yehong Zhong1, Bo An1 
TL;DR: A new service model, namely, Cluster as a Service (ClaaS), which is suitable for medium and small-sized data centers to solve these problems in a relatively easy and general way is proposed.

Journal ArticleDOI
TL;DR: This paper proposes a simple Energy Efficient framework for Social-based Routing (EE-SR) in mobile social sensing networks to balance the load of nodes while maintaining the delivery ratio within an acceptable range by limiting the chances of forwarding in traditional social-based routing.

Journal ArticleDOI
TL;DR: A hierarchical coarse-to-fine feature matching and image registration scheme on the basis of additional priori information, including a robust feature location map and platform imaging parameters, for large-scale online remote-sensing data processing tasks.

Journal ArticleDOI
TL;DR: This survey provides a comprehensive review of existing multiview video synthesis and editing algorithms and applications and discusses the discussion of recent advanced techniques for multIView video virtual view synthesis and various interactive editing applications.