Digital Library
Vol. 13, No. 5, May 30, 2019
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Target localization
- Multipath environment
- Data association
- Expectation maximization
- Distributed implementation
- Average consensus
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Small Cell Networks (SCNs)
- Pre-caching Technology
- Internet Content Providers (ICPs)
- Bankruptcy Game
- Analytic Hierarchy Process (AHP)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Reliability, expression of reliability, I.E principle
- vehicular ad-hoc networks, headway distance, freeway highway, universal speed factor
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Top-N recommendation
- Collaborative Filtering (CF)
- learning to rank (LTR)
- Mean Average Precision (MAP)
- implicit feedback
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- distributed compressive sensing (DCS)
- adaptive matching pursuit
- doubly-selective fading channel
- basis expansion model (BEM)
- channel estimation
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- 3D laser radar
- laser triangulation
- distance measurement
- weighted average algorithm
- 3D reconstruction
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Direct position determinations(DPD)
- Nested array
- distributed source
- Compressed sensing
- vectorization
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Low-energy adaptive clustering hierarchy (LEACH) protocol
- bat algorithm
- Curve decline strategy
- Triangle-flipping strategy
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Online communications
- comments and reactions
- media consumers
- willingness to watch
- distinction bias
- behavioral economics
Multimedia
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- license plate recognition
- license plate structure classification
- multi-style license plate
- k-nearest neighbor
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Internet Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- homomorphic encryption
- digital speech signal
- secure speech storing
- less data expansion
- Cloud computing
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Fully homomorphic encryption
- Ciphertext Matrix
- Ciphertexts Stack
- Decryption Structure
- Concert Parameters
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- password authentication
- targeted password attacking
- BiLSTM
- probabilistic context-free grammar
- Markov chain
- Personal Information
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Image secrecy
- Multi-stage encryption
- Visual cryptography
- One time pad
- Steganography
- Least Significant Bit
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Ciphertext-policy attribute-based encryption
- conjunctive keyword search
- Secure channel
- Keyword-guessing attacks
- Search policy
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Wireless Sensor Network
- artificial immune
- Intrusion Detection
- danger theory
- Genetic Algorithms
- Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives