Editorial Board
Skewed non-Gaussian GARCH models for cryptocurrencies volatility modelling
General interval-valued overlap functions and interval-valued overlap indices
Event-triggered control for stochastic networked control systems against Denial-of-Service attacks
Robust Manhattan non-negative matrix factorization for image recovery and representation
Efficient algorithms based on centrality measures for identification of top-K influential users in social networks
Privacy-Preserving distributed deep learning based on secret sharing
Fixed charge 4D-TP for a breakable item under hybrid random type-2 uncertain environments
An endorsement-based trust bootstrapping approach for newcomer cloud services
Pose-guided spatiotemporal alignment for video-based person Re-identification
Adaptive neural network control for time-varying state constrained nonlinear stochastic systems with input saturation
Privacy-enhanced remote data integrity checking with updatable timestamp
Improving artificial Bee colony algorithm using a new neighborhood selection mechanism
Cross-language question retrieval with multi-layer representation and layer-wise adversary
Quantum-inspired algorithm with fitness landscape approximation in reduced dimensional spaces for numerical function optimization
Hierarchical clustering supported by reciprocal nearest neighbors
Special Section on Privacy Computing: Principles and Applications
Privacy by Evidence: A Methodology to develop privacy-friendly software applications
Effective privacy preserving data publishing by vectorization
Cloud-based lightweight secure RFID mutual authentication protocol in IoT
Privacy-preserving computation in cyber-physical-social systems: A survey of the state-of-the-art and perspectives
An efficient approach for secure multi-party computation without authenticated channel
Incentive mechanism for cooperative authentication: An evolutionary game approach
A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS
Building a dynamic searchable encrypted medical database for multi-client
A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services
Efficient privacy preservation of big data for accurate data mining
Exploiting location-related behaviors without the GPS data on smartphones
APS: Attribute-aware privacy-preserving scheme in location-based services
Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcing
A privacy-preserving cryptosystem for IoT E-healthcare
APCN: A scalable architecture for balancing accountability and privacy in large-scale content-based networks
PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT
Cloud-assisted privacy-conscious large-scale Markowitz portfolio
CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud
An insurance theory based optimal cyber-insurance contract against moral hazard
Blockchain-based system for secure outsourcing of bilinear pairings
Preserving adjustable path privacy for task acquisition in Mobile Crowdsensing Systems