• Understanding how Social Media Imagery EmpowersCaregivers: an Analysis of Microcephaly in Latin America

  • Putting pregnancy track in hands of women to try to reduce Maternal-fetal morbidity and mortality

  • Non-Realtime Social Presence in LumaPath as a Virtual Reality Therapy: Better Adherence for Chronic Pain Treatment?

  • Interactive Balance and Walking Training for Stroke Survivors

  • Design Pitfalls lowering Acceptance of Technology-Based Interventions to Advocate Stair-Climbing

  • Design and Development of Mobile, Tablet-based ECG Hardware and Software for Clinical Use

  • Uses and Attitudes of Old and Oldest Adults towards Self-Monitoring Health Systems

  • Designing Thermal Feedback for Notifying Users About Stress

  • You Are How You Sleep: Personalized Sleep Monitoring Based on Wrist Temperature and Accelerometer Data

  • WheezeD: Respiration Phase Based Wheeze Detection Using Acoustic Data From Pulmonary Patients Under Attack

  • Health promoting experiences in urban green space: A case study of a co-design toolkit based on feedbacks from fNIRS, IoT and game probes

  • Estimation of Municipal Solid Waste (MSW) combustion enthalpy for energy recovery

  • Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategy

  • Network Risk Assessment Based on Improved MulVAL Framework and HMM

  • Lightweight Secure Cloud Auditing Scheme for Shared Data Supporting Identity Privacy and Traceability

  • PJC: A Multi-source Method for Identifying Information Dissemination in Networks

  • A Practical Group Signatures for Providing Privacy-Preserving Authentication with Revocation

  • An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on ElGamal

  • Database Query System with Budget Option for Differential Privacy Against Repeated Attacks

  • Steganalysis of Adaptive Multiple-Rate Speech Using Parity of Pitch-Delay Value

  • Research on Big Data Platform Security Based on Cloud Computing

  • Study on Incident Response System of Automotive Cybersecurity

  • Android Malware Detection Based on Sensitive Permissions and APIs

  • Research on Social Networks Publishing Method Under Differential Privacy

  • A Blind Signature Scheme Applying on Electronic Payment Scene Based on Quantum Secret Sharing

  • Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem

  • Anomaly Detection of Vehicle CAN Network Based on Message Content

  • Privacy Preservation in Publishing Electronic Health Records Based on Perturbation

  • CROSS: Supervised Sharing of Private Data over Blockchains

  • Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity Under Quantum Environment

  • Privacy in Location-Based Services: Present Facts and Future Paths

  • Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data

  • Privacy Disclosures Detection in Natural-Language Text Through Linguistically-Motivated Artificial Neural Networks

  • Research on Information Security Test Evaluation Method Based on Intelligent Connected Vehicle

  • A Survey of Trusted Network Trust Evaluation Methods

  • A Design of the Group Decision Making Medical Diagnosis Expert System Based on SED-JD Algorithm

  • Reliability Analysis of Coupled Cyber-Physical Systems Under Different Network Types

  • Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory

  • Detecting Steganography in AMR Speech Based on Pulse Correlation

  • State Consistency Checking for Non-reentrant Function Based on Taint Assisted Symbol Execution

  • Design and Implementation of a Lightweight Intrusion Detection and Prevention System

  • Invulnerability Assessment of Cyber-Physics Systems for Blockchain Environment

  • SE Dots: A Sensitive and Extensible Framework for Cross-Region DDoS Processing

  • A Blockchain-Based Digital Advertising Media Promotion System

  • Identification and Trust Techniques Compatible with eIDAS Regulation

  • A Posted Pricing Mechanism Based on Random Forests in Crowdsourcing Market

  • A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-Serial Structure

  • Travel Modes Recognition Method Based on Mobile Phone Signaling Data

  • Zone Based Lossy Image Compression Using Discrete Wavelet and Discrete Cosine Transformations

  • A Non-repudiable Dynamic Provable Data Possession