Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icics/icics2021-2.bht:"
@inproceedings{DBLP:conf/icics/AldeenZ21, author = {Mohammed Shujaa Aldeen and Chuan Zhao}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Rare Variants Analysis in Genetic Association Studies with Privacy Protection via Hybrid System}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {174--191}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_11}, doi = {10.1007/978-3-030-88052-1\_11}, timestamp = {Tue, 21 Sep 2021 19:14:09 +0200}, biburl = {https://dblp.org/rec/conf/icics/AldeenZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/AnZWZ21, author = {Zhiyuan An and Zhuoran Zhang and Yamin Wen and Fangguo Zhang}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Lattice-Based Secret Handshakes with Reusable Credentials}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {231--248}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_14}, doi = {10.1007/978-3-030-88052-1\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/AnZWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChenCJ21, author = {Shiwei Chen and Ting Cui and Chenhui Jin}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Security Analysis of Even-Mansour Structure Hash Functions}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {163--173}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_10}, doi = {10.1007/978-3-030-88052-1\_10}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChenCJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChenMFH21, author = {Zan Chen and Chaocheng Ma and Yuanjing Feng and Xingsong Hou}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Compressive Sensing Image Steganography via Directional Lifting Wavelet Transform}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {93--109}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_6}, doi = {10.1007/978-3-030-88052-1\_6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChenMFH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HanLSW21, author = {Sicong Han and Chenhao Lin and Chao Shen and Qian Wang}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Rethinking Adversarial Examples Exploiting Frequency-Based Analysis}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {73--89}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_5}, doi = {10.1007/978-3-030-88052-1\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/HanLSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/JiTZ21, author = {Yunfeng Ji and Yang Tao and Rui Zhang}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {More Efficient Construction of Anonymous Signatures}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {394--411}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_23}, doi = {10.1007/978-3-030-88052-1\_23}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/JiTZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiLZLB21, author = {Shuaigang Li and Xianhui Lu and Jiang Zhang and Bao Li and Lei Bi}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Predicting the Concrete Security of {LWE} Against the Dual Attack Using Binary Search}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {265--282}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_16}, doi = {10.1007/978-3-030-88052-1\_16}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiLZLB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiWWZW21, author = {Wenxin Li and Qi Wang and Run Wang and Lei Zhao and Lina Wang}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Exposing DeepFakes via Localizing the Manipulated Artifacts}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {3--20}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_1}, doi = {10.1007/978-3-030-88052-1\_1}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiWWZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/QinBZCL21, author = {Baodong Qin and Xue Bai and Dong Zheng and Hui Cui and Yiyuan Luo}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Forward-Secure Revocable Identity-Based Encryption}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {321--340}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_19}, doi = {10.1007/978-3-030-88052-1\_19}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/QinBZCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SouidK21, author = {Nour Elhouda Souid and Kais Klai}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {A Novel Approach for Supervisor Synthesis to Enforce Opacity of Discrete Event Systems}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {210--227}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_13}, doi = {10.1007/978-3-030-88052-1\_13}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/SouidK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Tang21, author = {Guofeng Tang}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {On Tightly-Secure (Linkable) Ring Signatures}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {375--393}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_22}, doi = {10.1007/978-3-030-88052-1\_22}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/Tang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangW21, author = {Gao Wang and Gaoli Wang}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Improved Differential-ML Distinguisher: Machine Learning Based Generic Extension for Differential Analysis}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {21--38}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_2}, doi = {10.1007/978-3-030-88052-1\_2}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/WangW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WuWYYLJW21, author = {Zhenghao Wu and Jian Weng and Anjia Yang and Lisha Yao and Xiaojian Liang and Zike Jiang and Jinghang Wen}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Efficient and Fully Secure Lattice-Based {IBE} with Equality Test}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {301--318}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_18}, doi = {10.1007/978-3-030-88052-1\_18}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/WuWYYLJW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/XiaoL21, author = {Di Xiao and Shuwen Lan}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Secure Image Coding Based on Compressive Sensing with Optimized Rate-Distortion}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {125--141}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_8}, doi = {10.1007/978-3-030-88052-1\_8}, timestamp = {Fri, 04 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/XiaoL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/XiaoLS21, author = {Yang Xiao and Jie Li and Wengui Su}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {A Lightweight Metric Defence Strategy for Graph Neural Networks Against Poisoning Attacks}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {55--72}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_4}, doi = {10.1007/978-3-030-88052-1\_4}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/XiaoLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/XuWL21, author = {Yaqi Xu and Baofeng Wu and Dongdai Lin}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Rotational-Linear Attack: {A} New Framework of Cryptanalysis on {ARX} Ciphers with Applications to Chaskey}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {192--209}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_12}, doi = {10.1007/978-3-030-88052-1\_12}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/XuWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangCD21, author = {Xiaohan Zhang and Chi Cheng and Ruoyu Ding}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of {PQC} Third Round Finalist {NTRU-HRSS}}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {283--300}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_17}, doi = {10.1007/978-3-030-88052-1\_17}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ZhangCD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangJGQ21, author = {Kai Zhang and Zhe Jiang and Junqing Gong and Haifeng Qian}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Updatable All-But-One Dual Projective Hashing and Its Applications}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {358--374}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_21}, doi = {10.1007/978-3-030-88052-1\_21}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ZhangJGQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangWZWM21, author = {Yuxuan Zhang and Zhaoyang Wang and Boyang Zhang and Yu Wen and Dan Meng}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Black-Box Buster: {A} Robust Zero-Shot Transfer-Based Adversarial Attack Method}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {39--54}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_3}, doi = {10.1007/978-3-030-88052-1\_3}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ZhangWZWM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangZLT21, author = {Zongyang Zhang and Zibo Zhou and Weihan Li and Hongyu Tao}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {An Optimized Inner Product Argument with More Application Scenarios}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {341--357}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_20}, doi = {10.1007/978-3-030-88052-1\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ZhangZLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhuLP21, author = {Yiming Zhu and Zhen Liu and Yanbin Pan}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {When {NTT} Meets Karatsuba: Preprocess-then-NTT Technique Revisited}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {249--264}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_15}, doi = {10.1007/978-3-030-88052-1\_15}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ZhuLP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhuYZ21, author = {Dali Zhu and Long Yang and Hualin Zeng}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Remote Recovery of Sound from Speckle Pattern Video Based on Convolutional {LSTM}}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {110--124}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_7}, doi = {10.1007/978-3-030-88052-1\_7}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ZhuYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZongCS21, author = {Wei Zong and Yang{-}Wai Chow and Willy Susilo}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Black-Box Audio Adversarial Example Generation Using Variational Autoencoder}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {142--160}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_9}, doi = {10.1007/978-3-030-88052-1\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ZongCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2021-2, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1}, doi = {10.1007/978-3-030-88052-1}, isbn = {978-3-030-88051-4}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.