Beijing Institute of System Engineering, Beijing, China, National Key Laboratory of Science and Technology on Information System Security, Beijing, China;Beijing Institute of System Engineering, China, National Key Laboratory of Science and Technology on Information System Security, China
Web service;security architecture;Web service application;reverse engineering;common security requirement;new security implementation approach;security etc.;security flaw;security requirement;security situation
China Constitute of Electronic System Engineering, Beijing, China;Tsinghua University, China;Institute of Electronic System Engineering, Beijing, China;The Institute of Beijing Electronic System Engineering, Beijing, China;Institute of China Electronic System Engineering, Beijing, China;State Key Laboratory of Software Development Environment, Beijing University of Aeronautics and Astronautics, Beijing, China 100191 and Institute of Electronic System Engineering, Beijing, China 1 ...;China Institute of Electronic System Engineering, Beijing;Beijing Institute of Electronic System Engineering, Beijing, China;Beijing Institute of Electronic System Engineering, Beijing, 100039, China
cloud model;complex network;cloud computing;network topology;proposed method;XML data;cloud generator;cloud security;normal cloud model;GPS data
School of Computer, National University of Defense Technology, Changsha, China;Beijing Institute of System Engineerring, Beijing, China and National Key Laboratory of Science and Technology on Information System Security, Beijing, China;Beijing Institute of System Engineering, Beijing, China, National Key Laboratory of Science and Technology on Information System Security, Beijing, China
OS isolation;host OS;untrusted code;virtual machine;OS image;OS resource;booted OS;dynamic OS migration;explicit OS implementation information;preinstalled OS
Beijing Institute of System and Engineering, Beijing, China;National Key Laboratory of Science and Technology on Information System Security, Beijing, China;Beijing Institute of System Engineer, Beijing, China;National Key Laboratory of Science and Technology on Information System Security, Beijing, China, Beijing Institute of System Engineering, China
network survivability;survivable network;Index System;Network Security;clustering algorithm;control network;different network layer;different network system;network application;network condition
School of Computer Science, Shaanxi Normal University, Xi'an, China,School of Computer Science, Northwest Polytechnical University, Xi'an, China;School of Computer Science, Northwest Polytechnical University, Xi'an, China,School of Computer Science, Shaanxi Normal University, Xi'an, China
image encryption algorithm;secret image;DCT multi-channel image information;ciphered image;complete image encryption algorithm;conventional image information;hided secret image;image histogram;image pixel distribution;multi-channel image information sharing
International WIC Institute, Beijing University of Technology, China, Beijing Key Laboratory of MRI and Brain Informatics, China, Dept. of Computer Science, Hong Kong Baptist University, China
brain hypergraph model;brain network;brain networksThis paper;core brain intrinsic network;intrinsic brain organization;large-scale brain;important intrinsic information processing;intrinsic hub hyperedges;graph model;hypergraph model
Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen, China and Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China and Graduate School of C ...;Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen, China,Graduate School of Chinese Academy of Sciences, Beijing, China
social network;location information;MLN model;information propagation;communities structure;location cluster;regional influence analysis;Multi-Layer network;abundant information;information sharing
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China,Graduate University of Chinese Academy of Sciences, Beijing, China
implicit polynomial recovery;large root;cryptosystemA public key cryptosystem;partial private key recovery;private key;public key;implicit polynomial;combinatorial problem;partial information;lattice basis reduction
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China,Graduate University of Chinese Academy of Sciences, Beijing, China
encrypted data;interactive sharing;data security;personal data;sensitive data;traditional data retrieval;access pattern privacy;index privacy;keyword privacy;privacy assurancesBreaches
Institute of Remote Sensing Applications, Chinese Academy of Sciences, Beijing, China,Graduate University of Chinese Academy of Sciences, Beijing, China
fusion image;image fusion method;multispectral image;proposed method;PAN image;false colour composite image;fusion result;fusion technique;important information;large data