Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/scisec/scisec2019.bht:"
@inproceedings{DBLP:conf/scisec/0003Y0019, author = {Bin Xia and Junjie Yin and Jian Xu and Yun Li}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {LogGAN: {A} Sequence-Based Generative Adversarial Network for Anomaly Detection Based on System Logs}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {61--76}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_5}, doi = {10.1007/978-3-030-34637-9\_5}, timestamp = {Thu, 12 Dec 2019 16:11:31 +0100}, biburl = {https://dblp.org/rec/conf/scisec/0003Y0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ChenDC19, author = {Yun Chen and Yunlan Du and Xiaomei Cao}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Density Peak Clustering Algorithm Based on Differential Privacy Preserving}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {20--32}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_2}, doi = {10.1007/978-3-030-34637-9\_2}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ChenDC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ChenIHB19, author = {Qian (Guenevere) Chen and Sheikh Rabiul Islam and Henry Haswell and Robert A. Bridges}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {199--214}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_15}, doi = {10.1007/978-3-030-34637-9\_15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/ChenIHB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ChenQC19, author = {Tianfu Chen and Zhenghua Qi and Jiagen Cheng}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Fully Anonymous Blockchain Constructed Based on Aggregate Signature and Ring Signature}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {250--261}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_19}, doi = {10.1007/978-3-030-34637-9\_19}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ChenQC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ChenZCW19, author = {Kangyang Chen and Xinyi Zou and Xingguo Chen and Huihui Wang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {An Automated Online Spam Detector Based on Deep Cascade Forest}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {33--46}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_3}, doi = {10.1007/978-3-030-34637-9\_3}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ChenZCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/HongjiW19, author = {Yin Hongji and Chen Wei}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Knowledge Graph Based Semi-automatic Code Auditing System}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {224--231}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_17}, doi = {10.1007/978-3-030-34637-9\_17}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/HongjiW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/HuangYZW19, author = {Xin Huang and Fei Yan and Liqiang Zhang and Kai Wang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {HoneyGadget: {A} Deception Based {ROP} Detection Scheme}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {121--135}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_9}, doi = {10.1007/978-3-030-34637-9\_9}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/HuangYZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/JiangX19, author = {Shuai Jiang and Xiaolong Xu}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Application and Performance Analysis of Data Preprocessing for Intrusion Detection System}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {163--177}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_12}, doi = {10.1007/978-3-030-34637-9\_12}, timestamp = {Fri, 19 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/JiangX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiSZJS19, author = {Yinwei Li and Bo Song and Xu Zhang and Guo{-}Ping Jiang and Yurong Song}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {New Robustness Measures of Communication Networks Against Virus Attacks}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {151--162}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_11}, doi = {10.1007/978-3-030-34637-9\_11}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/LiSZJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiZX19, author = {Yuxi Li and Fucai Zhou and Zifeng Xu}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {{PAFR:} Privacy-Aware Friends Retrieval over Online Social Networks}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {323--338}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_24}, doi = {10.1007/978-3-030-34637-9\_24}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LiZX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LingHPLXL19, author = {Hang Ling and Jing Han and Jiayi Pang and Jianwei Liu and Jia Xu and Zheng Liu}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Behavior Flow Graph Construction from System Logs for Anomaly Analysis}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {215--223}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_16}, doi = {10.1007/978-3-030-34637-9\_16}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LingHPLXL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiuHH019, author = {Binghui Liu and Keji Han and Jie Hang and Yun Li}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Adversarial Training Based Feature Selection}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {92--105}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_7}, doi = {10.1007/978-3-030-34637-9\_7}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LiuHH019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiuJL19, author = {Zhaofeng Liu and Zhen Jia and Wenlian Lu}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Security Comparison of Machine Learning Models Facing Different Attack Targets}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {77--91}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_6}, doi = {10.1007/978-3-030-34637-9\_6}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LiuJL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/MeiXXLYY19, author = {Lin Mei and Chungen Xu and Lei Xu and Zhongyi Liu and Xiaoling Yu and Zhigang Yao}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Towards Realizing Authorized Encrypted Search with Designed Access Policy}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {293--307}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_22}, doi = {10.1007/978-3-030-34637-9\_22}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/MeiXXLYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/PengDPZM19, author = {Datian Peng and Jianmin Dong and Qinke Peng and Bo Zeng and Zhi{-}Hong Mao}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {FDIA-Identified Overloaded Power Lines}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {262--277}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_20}, doi = {10.1007/978-3-030-34637-9\_20}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/PengDPZM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/QiaoZWY19, author = {Zhi Qiao and Congcong Zhu and Zhiwei Wang and Nianhua Yang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Anonymous IoT Data Storage and Transaction Protocol Based on Blockchain and Edge Computing}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {181--189}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_13}, doi = {10.1007/978-3-030-34637-9\_13}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/QiaoZWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/TuJS19, author = {Xiao Tu and Guo{-}Ping Jiang and Yurong Song}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Multiplex PageRank in Multilayer Networks Considering Shunt}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {47--58}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_4}, doi = {10.1007/978-3-030-34637-9\_4}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/TuJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangCY19, author = {Zhiwei Wang and Zhiyuan Cheng and Nianhua Yang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {An ID-Based Linear Homomorphic Cryptosystem and Its Applications for the Isolated Smart Grid Devices}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {339--353}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_25}, doi = {10.1007/978-3-030-34637-9\_25}, timestamp = {Mon, 16 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WangCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangWGHSW19, author = {Yuan Wang and Jinzhi Wang and Jianhong Gao and Shengsheng Hu and Huacheng Sun and Yongli Wang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Cross-Domain Recommendation System Based on Tensor Decomposition for Cybersecurity Data Analytics}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {3--19}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_1}, doi = {10.1007/978-3-030-34637-9\_1}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WangWGHSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangZKXW19, author = {Shaohui Wang and Yanxuan Zhang and Changbo Ke and Fu Xiao and Ruchuan Wang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Optimal Key-Tree for {RFID} Authentication Protocols with Storage Constraints}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {278--292}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_21}, doi = {10.1007/978-3-030-34637-9\_21}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WangZKXW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WuYSJT19, author = {Yang Wu and Shikang Yu and Yurong Song and Guoping Jiang and Xiao Tu}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {High-Efficiency Triangle Counting on the {GPU}}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {363--370}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_27}, doi = {10.1007/978-3-030-34637-9\_27}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WuYSJT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/XueXWLX19, author = {Gang Xue and Jia Xu and Hanwen Wu and Weifeng Lu and Lijie Xu}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Incentive Mechanism for Bitcoin Mining Pool Based on Stackelberg Game}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {190--198}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_14}, doi = {10.1007/978-3-030-34637-9\_14}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/XueXWLX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/YaoXXM19, author = {Zhigang Yao and Chungen Xu and Lei Xu and Lin Mei}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Forward Private Searchable Encryption with Conjunctive Keywords Query}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {308--322}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_23}, doi = {10.1007/978-3-030-34637-9\_23}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/YaoXXM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/YuWSJS19, author = {Shikang Yu and Yang Wu and Yurong Song and Guoping Jiang and Xiaoping Su}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Application of DeepWalk Based on Hyperbolic Coordinates on Unsupervised Clustering}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {106--118}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_8}, doi = {10.1007/978-3-030-34637-9\_8}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/YuWSJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZhangLYL19, author = {Zhenchao Zhang and Yali Liu and Xinchun Yin and Xincheng Li}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {A New Pairing-Free Certificateless Signature Scheme for Internet of Things}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {371--379}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_28}, doi = {10.1007/978-3-030-34637-9\_28}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ZhangLYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZhangZ19, author = {Jie Zhang and Zhihao Zhang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {LET-Attack: Latent Encodings of Normal-Data Manifold Transferring to Adversarial Examples}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {136--150}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_10}, doi = {10.1007/978-3-030-34637-9\_10}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ZhangZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZhengH19, author = {Mengce Zheng and Honggang Hu}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Implicit-Key Attack on the {RSA} Cryptosystem}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {354--362}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_26}, doi = {10.1007/978-3-030-34637-9\_26}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ZhengH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZhouYXW19, author = {Hao Zhou and Geng Yang and Yahong Xu and Weiya Wang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Effective Matrix Factorization for Recommendation with Local Differential Privacy}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {235--249}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_18}, doi = {10.1007/978-3-030-34637-9\_18}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/ZhouYXW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scisec/2019, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9}, doi = {10.1007/978-3-030-34637-9}, isbn = {978-3-030-34636-2}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.