Search dblp for Publications

export results for "toc:db/conf/scisec/scisec2019.bht:"

 download as .bib file

@inproceedings{DBLP:conf/scisec/0003Y0019,
  author       = {Bin Xia and
                  Junjie Yin and
                  Jian Xu and
                  Yun Li},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {LogGAN: {A} Sequence-Based Generative Adversarial Network for Anomaly
                  Detection Based on System Logs},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {61--76},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_5},
  doi          = {10.1007/978-3-030-34637-9\_5},
  timestamp    = {Thu, 12 Dec 2019 16:11:31 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/0003Y0019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ChenDC19,
  author       = {Yun Chen and
                  Yunlan Du and
                  Xiaomei Cao},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Density Peak Clustering Algorithm Based on Differential Privacy Preserving},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {20--32},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_2},
  doi          = {10.1007/978-3-030-34637-9\_2},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ChenDC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ChenIHB19,
  author       = {Qian (Guenevere) Chen and
                  Sheikh Rabiul Islam and
                  Henry Haswell and
                  Robert A. Bridges},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Automated Ransomware Behavior Analysis: Pattern Extraction and Early
                  Detection},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {199--214},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_15},
  doi          = {10.1007/978-3-030-34637-9\_15},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/ChenIHB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ChenQC19,
  author       = {Tianfu Chen and
                  Zhenghua Qi and
                  Jiagen Cheng},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Fully Anonymous Blockchain Constructed Based on Aggregate Signature
                  and Ring Signature},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {250--261},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_19},
  doi          = {10.1007/978-3-030-34637-9\_19},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ChenQC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ChenZCW19,
  author       = {Kangyang Chen and
                  Xinyi Zou and
                  Xingguo Chen and
                  Huihui Wang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {An Automated Online Spam Detector Based on Deep Cascade Forest},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {33--46},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_3},
  doi          = {10.1007/978-3-030-34637-9\_3},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ChenZCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/HongjiW19,
  author       = {Yin Hongji and
                  Chen Wei},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Knowledge Graph Based Semi-automatic Code Auditing System},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {224--231},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_17},
  doi          = {10.1007/978-3-030-34637-9\_17},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/HongjiW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/HuangYZW19,
  author       = {Xin Huang and
                  Fei Yan and
                  Liqiang Zhang and
                  Kai Wang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {HoneyGadget: {A} Deception Based {ROP} Detection Scheme},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {121--135},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_9},
  doi          = {10.1007/978-3-030-34637-9\_9},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/HuangYZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/JiangX19,
  author       = {Shuai Jiang and
                  Xiaolong Xu},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Application and Performance Analysis of Data Preprocessing for Intrusion
                  Detection System},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {163--177},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_12},
  doi          = {10.1007/978-3-030-34637-9\_12},
  timestamp    = {Fri, 19 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/JiangX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiSZJS19,
  author       = {Yinwei Li and
                  Bo Song and
                  Xu Zhang and
                  Guo{-}Ping Jiang and
                  Yurong Song},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {New Robustness Measures of Communication Networks Against Virus Attacks},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {151--162},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_11},
  doi          = {10.1007/978-3-030-34637-9\_11},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/LiSZJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiZX19,
  author       = {Yuxi Li and
                  Fucai Zhou and
                  Zifeng Xu},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {{PAFR:} Privacy-Aware Friends Retrieval over Online Social Networks},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {323--338},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_24},
  doi          = {10.1007/978-3-030-34637-9\_24},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LiZX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LingHPLXL19,
  author       = {Hang Ling and
                  Jing Han and
                  Jiayi Pang and
                  Jianwei Liu and
                  Jia Xu and
                  Zheng Liu},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Behavior Flow Graph Construction from System Logs for Anomaly Analysis},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {215--223},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_16},
  doi          = {10.1007/978-3-030-34637-9\_16},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LingHPLXL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiuHH019,
  author       = {Binghui Liu and
                  Keji Han and
                  Jie Hang and
                  Yun Li},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Adversarial Training Based Feature Selection},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {92--105},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_7},
  doi          = {10.1007/978-3-030-34637-9\_7},
  timestamp    = {Wed, 08 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LiuHH019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiuJL19,
  author       = {Zhaofeng Liu and
                  Zhen Jia and
                  Wenlian Lu},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Security Comparison of Machine Learning Models Facing Different Attack
                  Targets},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {77--91},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_6},
  doi          = {10.1007/978-3-030-34637-9\_6},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LiuJL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/MeiXXLYY19,
  author       = {Lin Mei and
                  Chungen Xu and
                  Lei Xu and
                  Zhongyi Liu and
                  Xiaoling Yu and
                  Zhigang Yao},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Towards Realizing Authorized Encrypted Search with Designed Access
                  Policy},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {293--307},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_22},
  doi          = {10.1007/978-3-030-34637-9\_22},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/MeiXXLYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/PengDPZM19,
  author       = {Datian Peng and
                  Jianmin Dong and
                  Qinke Peng and
                  Bo Zeng and
                  Zhi{-}Hong Mao},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {FDIA-Identified Overloaded Power Lines},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {262--277},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_20},
  doi          = {10.1007/978-3-030-34637-9\_20},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/PengDPZM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/QiaoZWY19,
  author       = {Zhi Qiao and
                  Congcong Zhu and
                  Zhiwei Wang and
                  Nianhua Yang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Anonymous IoT Data Storage and Transaction Protocol Based on Blockchain
                  and Edge Computing},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {181--189},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_13},
  doi          = {10.1007/978-3-030-34637-9\_13},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/QiaoZWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/TuJS19,
  author       = {Xiao Tu and
                  Guo{-}Ping Jiang and
                  Yurong Song},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Multiplex PageRank in Multilayer Networks Considering Shunt},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {47--58},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_4},
  doi          = {10.1007/978-3-030-34637-9\_4},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/TuJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WangCY19,
  author       = {Zhiwei Wang and
                  Zhiyuan Cheng and
                  Nianhua Yang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {An ID-Based Linear Homomorphic Cryptosystem and Its Applications for
                  the Isolated Smart Grid Devices},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {339--353},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_25},
  doi          = {10.1007/978-3-030-34637-9\_25},
  timestamp    = {Mon, 16 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/WangCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WangWGHSW19,
  author       = {Yuan Wang and
                  Jinzhi Wang and
                  Jianhong Gao and
                  Shengsheng Hu and
                  Huacheng Sun and
                  Yongli Wang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Cross-Domain Recommendation System Based on Tensor Decomposition for
                  Cybersecurity Data Analytics},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_1},
  doi          = {10.1007/978-3-030-34637-9\_1},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/WangWGHSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WangZKXW19,
  author       = {Shaohui Wang and
                  Yanxuan Zhang and
                  Changbo Ke and
                  Fu Xiao and
                  Ruchuan Wang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Optimal Key-Tree for {RFID} Authentication Protocols with Storage
                  Constraints},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {278--292},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_21},
  doi          = {10.1007/978-3-030-34637-9\_21},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/WangZKXW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WuYSJT19,
  author       = {Yang Wu and
                  Shikang Yu and
                  Yurong Song and
                  Guoping Jiang and
                  Xiao Tu},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {High-Efficiency Triangle Counting on the {GPU}},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {363--370},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_27},
  doi          = {10.1007/978-3-030-34637-9\_27},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/WuYSJT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/XueXWLX19,
  author       = {Gang Xue and
                  Jia Xu and
                  Hanwen Wu and
                  Weifeng Lu and
                  Lijie Xu},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Incentive Mechanism for Bitcoin Mining Pool Based on Stackelberg Game},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {190--198},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_14},
  doi          = {10.1007/978-3-030-34637-9\_14},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/XueXWLX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/YaoXXM19,
  author       = {Zhigang Yao and
                  Chungen Xu and
                  Lei Xu and
                  Lin Mei},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Forward Private Searchable Encryption with Conjunctive Keywords Query},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {308--322},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_23},
  doi          = {10.1007/978-3-030-34637-9\_23},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/YaoXXM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/YuWSJS19,
  author       = {Shikang Yu and
                  Yang Wu and
                  Yurong Song and
                  Guoping Jiang and
                  Xiaoping Su},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Application of DeepWalk Based on Hyperbolic Coordinates on Unsupervised
                  Clustering},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {106--118},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_8},
  doi          = {10.1007/978-3-030-34637-9\_8},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/YuWSJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZhangLYL19,
  author       = {Zhenchao Zhang and
                  Yali Liu and
                  Xinchun Yin and
                  Xincheng Li},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {A New Pairing-Free Certificateless Signature Scheme for Internet of
                  Things},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {371--379},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_28},
  doi          = {10.1007/978-3-030-34637-9\_28},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ZhangLYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZhangZ19,
  author       = {Jie Zhang and
                  Zhihao Zhang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {LET-Attack: Latent Encodings of Normal-Data Manifold Transferring
                  to Adversarial Examples},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {136--150},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_10},
  doi          = {10.1007/978-3-030-34637-9\_10},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ZhangZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZhengH19,
  author       = {Mengce Zheng and
                  Honggang Hu},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Implicit-Key Attack on the {RSA} Cryptosystem},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {354--362},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_26},
  doi          = {10.1007/978-3-030-34637-9\_26},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ZhengH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZhouYXW19,
  author       = {Hao Zhou and
                  Geng Yang and
                  Yahong Xu and
                  Weiya Wang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Effective Matrix Factorization for Recommendation with Local Differential
                  Privacy},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {235--249},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_18},
  doi          = {10.1007/978-3-030-34637-9\_18},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/ZhouYXW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scisec/2019,
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9},
  doi          = {10.1007/978-3-030-34637-9},
  isbn         = {978-3-030-34636-2},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics