Common patterns of online collective attention flow Yong LiXiaofeng MengChangqing Wang Letter 15 December 2016 Article: 059102
Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing Jingyu FengGuangyue LuHonggang Wang Letter 09 November 2016 Article: 059101
Developing nonlinear adaptive optimal regulators through an improved neural learning mechanism Ding WangChaoxu Mu Highlight 17 March 2017 Article: 058201
Tilting-Twisting-Rolling: a pen-based technique for compass geometric construction Fei LyuFeng TianHongan Wang MOOP 10 April 2017 Article: 053101
Quantifying quantum information resources: a numerical study Zhen WangLixin He Research Paper 14 March 2017 Article: 052501
Improving multi-layer spiking neural networks by incorporating brain-inspired rules Yi ZengTielin ZhangBo Xu Research Paper 24 February 2017 Article: 052201
A static technique for detecting input validation vulnerabilities in Android apps Zhejun FangQixu LiuQianru Wu Research Paper 12 September 2016 Article: 052111
Accurate and efficient exploit capture and classification Yu DingTao WeiXinhui Han Research Paper 13 September 2016 Article: 052110
An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries Huafei Zhu Research Paper 28 September 2016 Article: 52109
Cryptanalysis of full PRIDE block cipher Yibin DaiShaozhen Chen Research Paper 13 September 2016 Article: 052108
Universally composable anonymous password authenticated key exchange Xuexian HuJiang ZhangJing Xu Research Paper 28 September 2016 Article: 52107
Minimum length key in MST cryptosystems Haibo HongLicheng WangZhiguo Qu Research Paper 13 September 2016 Article: 052106
Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack Shuo QiuJiqiang LiuRui Zhang Research Paper 13 September 2016 Article: 052105
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation Debiao HeDing WangKefei Chen Research Paper 14 November 2016 Article: 052104
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing Di LuJianfeng MaNing Xi Research Paper 12 September 2016 Article: 52103
On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers Yupeng JiangQun-Xiong ZhengDongdai Lin Research Paper 13 September 2016 Article: 052102
A new construction on randomized message-locked encryption in the standard model via UCEs Huige WangKefei ChenYunhua Wen Research Paper 14 November 2016 Article: 052101
Analysis and design of parameters in soft docking of micro/small satellites Xiang ZhangYiyong HuangXiaoqian Chen Research Paper 01 April 2017 Article: 050204
Vibration suppression of a large flexible spacecraft for on-orbit operation Deshan MengHoude LiuBin Liang Research Paper 01 April 2017 Article: 050203
Two performance enhanced control of flexible-link manipulator with system uncertainty and disturbances Bin XuYuan Yuan Research Paper 10 February 2017 Article: 050202
An overview of the configuration and manipulation of soft robotics for on-orbit servicing Zhongliang JingLingfeng QiaoWujun Chen Review 06 April 2017 Article: 050201
Editorial Zhongliang JingBin XuGeorge Z. Zhu Special Focus on Space Flexible Manipulation and Control for On-orbit Servicing 29 April 2017 Article: 050200