International Journal of Computational Science and Engineering (IJCSE)

International Journal of Computational Science and Engineering

2019 Vol.19 No.2

Special Issue on: Cyberspace Security Protection, Risk Assessment and Management

Guest Editors: Prof. Wei Liang, Prof. Shangguang Wang, Dr. Yanbiao Li and Prof. Fei Yu


Pages Title and author(s)
153-161Hybrid design for cloud data security using combination of AES, ECC and LSB steganography
Osama Hosam; Muhammad Hammad Ahmad
DOI: 10.1504/IJCSE.2019.100236
162-168CSCAC: one constant-size CPABE access control scheme in trusted execution environment
Yongkai Fan; Shengle Liu; Gang Tan; Xiaodong Lin
DOI: 10.1504/IJCSE.2019.100235
169-176Recognising continuous emotions in dialogues based on DISfluencies and non-verbal vocalisation features for a safer network environment
Huan Zhao; Xiaoxiao Zhou; Yufeng Xiao
DOI: 10.1504/IJCSE.2019.100237
177-188PM-LPDR: a prediction model for lost packets based on data reconstruction on lossy links in sensor networks
Zeyu Sun; Guozeng Zhao; Xiaoyan Pan
DOI: 10.1504/IJCSE.2019.100238
189-196An information network security policy learning algorithm based on Sarsa with optimistic initial values
Fang Wang; Renjun Feng; Haiyan Chen; Wen Wu; Fei Zhu
DOI: 10.1504/IJCSE.2019.100239
197-205Evaluation of borrower's credit of P2P loan based on adaptive particle swarm optimisation BP neural network
Sen Zhang; Yuping Hu; Chunmei Wang
DOI: 10.1504/IJCSE.2019.100240
206-214An approach for public cloud trustworthiness assessment based on users' evaluation and performance indicators
Guo-Sheng Zhou; Wei Du; Han-Chao Lin; Xiao-Wei Yan
DOI: 10.1504/IJCSE.2019.100241
215-222A novel computational model for SRAM PUF min-entropy estimation
Dongfang Li; Qiuyan Zhu; Hong Wang; Wenchao Liu; Zhihua Feng; Jianwei Zhang
DOI: 10.1504/IJCSE.2019.100242
223-232Design of DDoS attack detection system based on intelligent bee colony algorithm
Xueshan Yu; Dezhi Han; Zhenxin Du; Qiuting Tian; Gongjun Yin
DOI: 10.1504/IJCSE.2019.100243
233-241LWE-based multi-authority attribute-based encryption scheme with hidden policies
Qiuting Tian; Dezhi Han; Xingao Liu; Xueshan Yu
DOI: 10.1504/IJCSE.2019.100244
242-250A secure hierarchical community detection algorithm
Wei Zhu; Osama Hosam; Xiaodong Zheng
DOI: 10.1504/IJCSE.2019.100245
251-258Efficient security credential management for named data networking
Bo Deng
DOI: 10.1504/IJCSE.2019.100246
259-273A network traffic-aware mobile application recommendation system based on network traffic cost consideration
Xin Su; Yi Zheng; Jiuchuan Lin; Xuchong Liu
DOI: 10.1504/IJCSE.2019.100247

Additional Papers

274-283Pseudo Zernike moments-based approach for text detection and localisation from lecture videos
Belkacem Soundes; Guezouli Larbi; Zidat Samir
DOI: 10.1504/IJCSE.2019.100231
284-292Optimisation model of price changes after knowledge transfer in the big data environment
Chuanrong Wu; Evgeniya Zapevalova; Deming Zeng
DOI: 10.1504/IJCSE.2019.100234
293-300Kernel-based tensor discriminant analysis with fuzzy fusion for face recognition
Xiao-Zhang Liu; Hang-Yu Ruan
DOI: 10.1504/IJCSE.2019.100233
301-310A blind image watermarking algorithm based on amalgamation domain method
Qingtang Su
DOI: 10.1504/IJCSE.2019.100232