Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icccsec/icccsec2019-4.bht:"
@inproceedings{DBLP:conf/icccsec/0002D0QXL19, author = {Wenbin Yu and Zangqiang Dong and Wenjie Liu and Zhiguo Qu and Xiaolong Xu and Xiang{-}Yang Alex Liu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Multi-party Quantum Communication Complexity on Composite Boolean-Valued Function}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {143--154}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_14}, doi = {10.1007/978-3-030-24268-8\_14}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/0002D0QXL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/0009JJWXL19, author = {Yong Yu and Ming Jing and Detao Ji and Yuanyuan Wang and Zhongwen Xie and Shudong Li}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Abstraction of Operations in Trusted Components Based on OR-Transition Colored Petri Net}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {433--442}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_40}, doi = {10.1007/978-3-030-24268-8\_40}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/0009JJWXL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenCCYL19, author = {Xi Chen and Jingjie Chen and Yuling Chen and Jinglan Yang and Deyin Li}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Heuristic-Q: {A} Privacy Data Pricing Method Based on Heuristic Reinforcement Learning}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {553--565}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_51}, doi = {10.1007/978-3-030-24268-8\_51}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenCCYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenHHYLCY19, author = {Xi Chen and Shangjun He and Gonghua Hou and Lifan Yang and Lin Lin and Ruyi Chen and Ningcheng Yuan}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A New Quantum Private Query Protocol with Better Performance in Resisting Joint-Measurement Attack}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {520--528}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_48}, doi = {10.1007/978-3-030-24268-8\_48}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenHHYLCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenLCS19, author = {Zongshi Chen and Mohan Li and Xiang Cui and Yanbin Sun}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research on {SQL} Injection and Defense Technology}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {191--201}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_18}, doi = {10.1007/978-3-030-24268-8\_18}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenLCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenLJS19, author = {XiaoLong Chen and Mohan Li and Yu Jiang and Yanbin Sun}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Comparison of Machine Learning Algorithms for Detecting {XSS} Attacks}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {214--224}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_20}, doi = {10.1007/978-3-030-24268-8\_20}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenLJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenLLS19, author = {Weixiang Chen and Hui Lu and Mohan Li and Yanbin Sun}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Network Protocol Analysis Base on WeChat {PC} Version}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {288--297}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_27}, doi = {10.1007/978-3-030-24268-8\_27}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenLLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenPS19, author = {Zhuangyou Chen and Bing Pan and Yanbin Sun}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Survey of Software Reverse Engineering Applications}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {235--245}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_22}, doi = {10.1007/978-3-030-24268-8\_22}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenYLGD19, author = {Lin Chen and Chunfang Yang and Fenlin Liu and Daofu Gong and Shichang Ding}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Security-Sensitive Function Mining Framework for Source Code}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {421--432}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_39}, doi = {10.1007/978-3-030-24268-8\_39}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenYLGD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenYYD19, author = {Chen Chen and Lin Ye and Xiangzhan Yu and Bailang Ding}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Survey of Network Security Situational Awareness Technology}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {101--109}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_10}, doi = {10.1007/978-3-030-24268-8\_10}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenYYD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/CuiHG19, author = {Li Cui and Yang Heng and Wu Gang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Design and Security Analysis of Certificateless Aggregate Signature Scheme}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {35--45}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_4}, doi = {10.1007/978-3-030-24268-8\_4}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/CuiHG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/CuiPS19, author = {Yuchong Cui and Bing Pan and Yanbin Sun}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Survey of Privacy-Preserving Techniques for Blockchain}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {225--234}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_21}, doi = {10.1007/978-3-030-24268-8\_21}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/CuiPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/DangWXZ19, author = {Xige Dang and Xu Wu and Xiaqing Xie and Tianle Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {57--66}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_6}, doi = {10.1007/978-3-030-24268-8\_6}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/DangWXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/DuTG19, author = {Chunlai Du and Xingbang Tan and Yanhui Guo}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Gray-Box Vulnerability Discovery Model Based on Path Coverage}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {3--12}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_1}, doi = {10.1007/978-3-030-24268-8\_1}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/DuTG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/FengGPY19, author = {Kaiyu Feng and Xiao Gu and Wei Peng and Dequan Yang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Moving Target Defense in Preventing {SQL} Injection}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {25--34}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_3}, doi = {10.1007/978-3-030-24268-8\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/FengGPY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/FengLDW19, author = {Xin Feng and Yangyang Li and Haomin Du and Hongbo Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {498--509}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_46}, doi = {10.1007/978-3-030-24268-8\_46}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/FengLDW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/FengLHLCKM19, author = {Xiao Feng and Jincheng Li and Changgui Huang and Jinze Li and Ruyin Chen and Jinfa Ke and Zhenjiang Ma}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Quantum Algorithm for Support Vector Machine with Exponentially Improved Dependence on Precision}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {578--587}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_53}, doi = {10.1007/978-3-030-24268-8\_53}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/FengLHLCKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/GanCCJH19, author = {Lin Gan and Jingjie Chen and Yuling Chen and Zhujun Jin and Wenxi Han}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {{JPEGCNN:} {A} Transform Domain Steganalysis Model Based on Convolutional Neural Network}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {566--577}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_52}, doi = {10.1007/978-3-030-24268-8\_52}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/GanCCJH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/GuoTCXCG19, author = {Wei Guo and Xiangyan Tang and Jieren Cheng and Jinying Xu and Canting Cai and Yulong Guo}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {396--407}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_37}, doi = {10.1007/978-3-030-24268-8\_37}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/GuoTCXCG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/GuoXYLC19, author = {Guanjun Guo and Yi Xin and Xiangzhan Yu and Likun Liu and Houhua Cao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Fast {IP} Matching Algorithm Under Large Traffic}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {246--255}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_23}, doi = {10.1007/978-3-030-24268-8\_23}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/GuoXYLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HouWWZ19, author = {Renhui Hou and Dongbin Wang and Yao Wang and Zhouyi Zhu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Congestion Control Methodology with Probability Routing Based on {MNL} for Datacenter Network}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {343--352}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_32}, doi = {10.1007/978-3-030-24268-8\_32}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/HouWWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HuZWH19, author = {Hangyu Hu and Xuemeng Zhai and Mingda Wang and Guangmin Hu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {NCGs: Building a Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {67--78}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_7}, doi = {10.1007/978-3-030-24268-8\_7}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/HuZWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/JiangYSZ19, author = {Jian Jiang and Xiangzhan Yu and Yan Sun and Haohua Zeng}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Survey of the Software Vulnerability Discovery Using Machine Learning Techniques}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {308--317}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_29}, doi = {10.1007/978-3-030-24268-8\_29}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/JiangYSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiCYLZ19, author = {Chenyang Li and Yuling Chen and Yu Yang and Chaochao Li and Yang Zeng}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {{PPCSB:} {A} Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {529--541}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_49}, doi = {10.1007/978-3-030-24268-8\_49}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiCYLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiYWLYH19, author = {Zibo Li and Xiangzhan Yu and Dawei Wang and Yiru Liu and Huaidong Yin and Shoushuai He}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {SuperEye: {A} Distributed Port Scanning System}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {46--56}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_5}, doi = {10.1007/978-3-030-24268-8\_5}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiYWLYH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiangLZWA19, author = {Xiao Liang and Yunpeng Li and Baohua Zhao and Zhihao Wang and Ningyu An}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {637--648}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_58}, doi = {10.1007/978-3-030-24268-8\_58}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiangLZWA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuL19, author = {Yu Liu and Tong Liu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Novel Threshold Signature Scheme Based on Elliptic Curve with Designated Verifier}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {332--342}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_31}, doi = {10.1007/978-3-030-24268-8\_31}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiuL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuSY19, author = {Zhuohua Liu and Hui Suo and Bin Yang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Novel Facial Expression Recognition Scheme Based on Deep Neural Networks}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {612--622}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_56}, doi = {10.1007/978-3-030-24268-8\_56}, timestamp = {Tue, 21 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiuSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuY19, author = {Jian Liu and Yalin Yuan}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Weight-Based Channel Estimation Implementation Algorithm}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {133--142}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_13}, doi = {10.1007/978-3-030-24268-8\_13}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiuY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LuY19, author = {Jianfeng Lu and Xuanyuan Yang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Taylor Series Localization Algorithm Based on Semi-definite Programming}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {488--497}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_45}, doi = {10.1007/978-3-030-24268-8\_45}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LuY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LuoLYLL19, author = {Yunmei Luo and Yuping Luo and Xueping Ye and Jun Lu and Shuqing Li}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Reliability-Based and QoS-Aware Service Redundancy Backup Method in IoT-Based Smart Grid}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {588--598}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_54}, doi = {10.1007/978-3-030-24268-8\_54}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LuoLYLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/MiPHWW19, author = {Bo Mi and Hongyang Pan and Darong Huang and Tiancheng Wei and Xingfeng Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Secure Data Aggregation Protocol in VANETs Based on Multi-key {FHE}}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {178--190}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_17}, doi = {10.1007/978-3-030-24268-8\_17}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/MiPHWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/QuanSD00H19, author = {Yong Quan and Yichen Song and Lu Deng and Yan Jia and Bin Zhou and Weihong Han}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Identify Influentials Based on User Behavior Across Different Topics}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {476--487}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_44}, doi = {10.1007/978-3-030-24268-8\_44}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/QuanSD00H19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShangLFL19, author = {Tao Shang and Ran Liu and Chengran Fang and Jianwei Liu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Quantum Network Coding Based on Entanglement Distribution}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {13--24}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_2}, doi = {10.1007/978-3-030-24268-8\_2}, timestamp = {Mon, 04 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ShangLFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShiZDWH19, author = {Chun Shi and Zhi{-}qun Zheng and Zhengjie Deng and Yu{-}juan Wang and Shu{-}Qian He}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Novel Method for Weighted Throughput Fairness in Contention-Based WLANs with Multiple Priority Levels}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {375--384}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_35}, doi = {10.1007/978-3-030-24268-8\_35}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ShiZDWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/SunKYFL19, author = {Yibo Sun and Adil Khan and Kai Yang and Feng Jiang and Shaohui Liu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents Using Reinforcement Learning}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {463--475}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_43}, doi = {10.1007/978-3-030-24268-8\_43}, timestamp = {Wed, 15 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/SunKYFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/TanK0TLLS19, author = {Runnan Tan and Xiangyi Kong and Yu Zhang and Qingfeng Tan and Hui Lu and Mohan Li and Yanbin Sun}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Bitcoin Network Size Estimation Based on Coupon Collection Model}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {298--307}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_28}, doi = {10.1007/978-3-030-24268-8\_28}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/TanK0TLLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/TangH19, author = {Tao Tang and Guangmin Hu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {An Evolving Network Model Based on a Triangular Connecting Mechanism for the Internet Topology}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {510--519}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_47}, doi = {10.1007/978-3-030-24268-8\_47}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/TangH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/TaoCL19, author = {Fangjian Tao and Chunjie Cao and Zhihui Liu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Webshell Detection Model Based on Deep Learning}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {408--420}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_38}, doi = {10.1007/978-3-030-24268-8\_38}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/TaoCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/TaoGZCX19, author = {Zheng Tao and Xiang Gao and Shibin Zhang and Yan Chang and Jinyue Xia}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Multi-function Quantum Cryptography Protocol Based on Bell State}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {110--119}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_11}, doi = {10.1007/978-3-030-24268-8\_11}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/TaoGZCX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WanCC19, author = {Wunan Wan and Hao Chen and Jun Chen}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {The Attack Case of {ECDSA} on Blockchain Based on Improved Simple Power Analysis}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {120--132}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_12}, doi = {10.1007/978-3-030-24268-8\_12}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WanCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangCYFS19, author = {Ning Wang and Yuling Chen and Yu Yang and Zigang Fang and Yizhe Sun}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Blockchain Private Key Storage Algorithm Based on Image Information Hiding}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {542--552}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_50}, doi = {10.1007/978-3-030-24268-8\_50}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangCYFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangHL19, author = {Wentong Wang and Ning Hu and Xin Liu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {BlockZone: {A} Blockchain-Based {DNS} Storage and Retrieval Scheme}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {155--166}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_15}, doi = {10.1007/978-3-030-24268-8\_15}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangWLJL19, author = {Chaobin Wang and Le Wang and Mohan Li and Yu Jiang and Hui Lu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Distributed Cryptanalysis Framework Based on Mobile Phones}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {318--331}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_30}, doi = {10.1007/978-3-030-24268-8\_30}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/WangWLJL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WuWXXZ19, author = {Xu Wu and Haitao Wu and Xiaqing Xie and Jin Xu and Tianle Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Short Text Topic Recognition and Optimization Method for University Online Community}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {79--90}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_8}, doi = {10.1007/978-3-030-24268-8\_8}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WuWXXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XiangZGCQ19, author = {Jun Xiang and Jiao Zhu and Shuyang Guo and Yue Chen and Zhizhong Qiao}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Robust Analysis of Grid System Based on Complex Network Attack Mode}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {167--177}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_16}, doi = {10.1007/978-3-030-24268-8\_16}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/XiangZGCQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XieZLCAW19, author = {Jiajun Xie and Chunrui Zhang and Fang Lou and Yu Cui and Lun An and Le Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {High-Speed File Transferring Over Linux Bridge for {QGA} Enhancement in Cyber Range}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {452--462}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_42}, doi = {10.1007/978-3-030-24268-8\_42}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/XieZLCAW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XuLLS19, author = {Yu Xu and Zhoubin Liu and Lili Li and You Sun}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Privacy-Preserving Electricity Trading Scheme Based on Blockchain}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {599--611}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_55}, doi = {10.1007/978-3-030-24268-8\_55}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/XuLLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YangLC19, author = {Di Yang and Yan Liu and Jing Chen}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Steady-State Topology Discovery of Target Networks Based on Statistics Method}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {362--374}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_34}, doi = {10.1007/978-3-030-24268-8\_34}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YangLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YangLLLS19, author = {Hangfeng Yang and Hui Lu and Shudong Li and Mohan Li and Yanbin Sun}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Research on Content Extraction of Rich Text Web Pages}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {279--287}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_26}, doi = {10.1007/978-3-030-24268-8\_26}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YangLLLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YeGJ19, author = {Ziwei Ye and Yuanbo Guo and Ankang Ju}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {266--278}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_25}, doi = {10.1007/978-3-030-24268-8\_25}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YeGJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YinWZGH19, author = {Zilong Yin and Dongbin Wang and Yinxing Zhao and Yaoyao Guo and Shuwen Han}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Fast Failover for Link Failures in Software Defined Networks}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {353--361}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_33}, doi = {10.1007/978-3-030-24268-8\_33}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YinWZGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YuJL19, author = {Wenjin Yu and Yixiang Jiang and Yizhen Lin}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {623--636}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_57}, doi = {10.1007/978-3-030-24268-8\_57}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YuJL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZengWHYWC19, author = {Xiaosen Zeng and Dongbin Wang and Shuwen Han and Wenbin Yao and Zhao Wang and Rui Chen}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {An Effective Load Balance Using Link Bandwidth for SDN-Based Data Centers}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {256--265}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_24}, doi = {10.1007/978-3-030-24268-8\_24}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZengWHYWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangLJS19, author = {Xinguo Zhang and Mohan Li and Yu Jiang and Yanbin Sun}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Review of the Factorization Problem of Large Integers}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {202--213}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_19}, doi = {10.1007/978-3-030-24268-8\_19}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangLJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangTKTL19, author = {Yu Zhang and Runan Tan and Xiangyi Kong and Qingfeng Tan and Xiangtao Liu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Bitcoin Node Discovery: Large-Scale Empirical Evaluation of Network Churn}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {385--395}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_36}, doi = {10.1007/978-3-030-24268-8\_36}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangTKTL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhaoCSS0L19, author = {Na Zhao and Min Cao and Chenming Song and Shuang Shi and Yong Yu and Shudong Li}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Trusted Component Decomposition Based on OR-Transition Colored Petri Net}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {443--451}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_41}, doi = {10.1007/978-3-030-24268-8\_41}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ZhaoCSS0L19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhuLXYM19, author = {Qiuping Zhu and Dong Li and Yi Xin and Xiangzhan Yu and Guocai Mu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A Survey on Network Traffic Identification}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, pages = {91--100}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8\_9}, doi = {10.1007/978-3-030-24268-8\_9}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhuLXYM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2019-4, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8}, doi = {10.1007/978-3-030-24268-8}, isbn = {978-3-030-24267-1}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2019-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.