Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iccns/iccns2022.bht:"
@inproceedings{DBLP:conf/iccns/AzhariB22, author = {Luthfi Azhari and Ari Moesriami Barmawi}, title = {Activity Attribute-Based User Behavior Model for Continuous User Authentication}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {69--76}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586113}, doi = {10.1145/3586102.3586113}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/AzhariB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/BaiTY0WZ22, author = {Xuetao Bai and Shanshan Tu and Haishuang Yan and Yongjie Yang and Aiming Wu and Yihe Zhang}, title = {SPoW: {A} solution to the problem of centralization of computing power}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {205--210}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586133}, doi = {10.1145/3586102.3586133}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/BaiTY0WZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/BarkworthTL22, author = {Ashley Barkworth and Rehnuma Tabassum and Arash Habibi Lashkari}, title = {Detecting {IMAP} Credential Stuffing Bots Using Behavioural Biometrics}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {7--15}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586104}, doi = {10.1145/3586102.3586104}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/BarkworthTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChenLW22, author = {Yunwen Chen and Zheng Li and Weiru Wang}, title = {A mutual authentication and key establishment scheme for peer to peer network scenario}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {140--145}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586123}, doi = {10.1145/3586102.3586123}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChenLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChopraVL22, author = {Abhishek Chopra and Nikhill Vombatkere and Arash Habibi Lashkari}, title = {AuthAttLyzer: {A} Robust defensive distillation-based Authorship Attribution framework}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {43--50}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586109}, doi = {10.1145/3586102.3586109}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChopraVL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/GaoJL22, author = {Tiaokang Gao and Xiaoning Jin and Yingxu Lai}, title = {Model Heterogeneous Federated Learning for Intrusion Detection based on knowledge distillation}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {30--35}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586107}, doi = {10.1145/3586102.3586107}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/GaoJL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Ge0LZZ22, author = {Ruihai Ge and Yongzheng Zhang and Shuhao Li and Guoqiao Zhou and Guangze Zhao}, title = {Leveraging Zero-Payload Packets to Detect Mobile Malware based on Network Traffic}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {23--29}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586106}, doi = {10.1145/3586102.3586106}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Ge0LZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/GuiYYGWC22, author = {Yanshuang Gui and Miaomiao Yang and Haishuang Yan and Yayun Guo and Qixu Wang and Xingshu Chen}, title = {{MURAS:} An Efficient Multi-Value-Proof-Based Remote Attestation Scheme for Cloud Platform}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {98--104}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586117}, doi = {10.1145/3586102.3586117}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/GuiYYGWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/HongN22, author = {Yu Hong and Zhenhu Ning}, title = {A trusted construction mechanism for sever based on trusted hard disk}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {90--97}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586116}, doi = {10.1145/3586102.3586116}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/HongN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/KhanTAAAW22, author = {Mansoor Khan and Shanshan Tu and Ghulam Abbas and Ziaul Haq Abbas and Hisham Alasmary and Muhammad Waqas}, title = {A Reliable and Stable {V2V} Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional Clustering}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {159--167}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586126}, doi = {10.1145/3586102.3586126}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/KhanTAAAW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiY22, author = {Aiguo Li and Wenhao Yan}, title = {Research on vulnerability assessment of physical protection system based on combined weighting-two-dimensional cloud model}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {85--89}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586137}, doi = {10.1145/3586102.3586137}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiY22a, author = {Aiguo Li and Jie Yang}, title = {Multi-objective optimization algorithm for indoor positioning sensor deployment based on wireless network}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {110--116}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586138}, doi = {10.1145/3586102.3586138}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiY22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiaoZXXZZWN22, author = {Xue Liao and Yihua Zhou and Jiawei Xu and Shuaikun Xing and Wei Zou and Jin Zhou and Qi Wang and Zhenhu Ning}, title = {Identity-based Linkable Blind Ring Signature Scheme on Lattice}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {51--57}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586110}, doi = {10.1145/3586102.3586110}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiaoZXXZZWN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LuoJHS22, author = {Shaojie Luo and Minhao Jin and Rongjie Han and Kexin Sun}, title = {Anti-jamming based on Reinforcement Learning in Power System Sensing Network}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {180--184}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586129}, doi = {10.1145/3586102.3586129}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LuoJHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/QinLRT22, author = {Su{-}Juan Qin and Zhao Liu and Feixiang Ren and Chong Tan}, title = {Smart Contract Vulnerability Detection Based on Critical Combination Path and Deep Learning}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {219--226}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586135}, doi = {10.1145/3586102.3586135}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/QinLRT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/TanCZZLL22, author = {Chong Tan and Han Chen and Songlei Zhang and Di Zhai and Yang Lu and Hong Liu}, title = {Traffic offloading based on content sharing in {D2D} for Smart Grid}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {185--190}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586130}, doi = {10.1145/3586102.3586130}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/TanCZZLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Venkatasubramanian22, author = {Madumitha Venkatasubramanian and Arash Habibi Lashkari and Saqib Hakak}, title = {Federated Learning Assisted IoT Malware Detection Using Static Analysis}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {191--198}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586131}, doi = {10.1145/3586102.3586131}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Venkatasubramanian22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WaliIH22, author = {Heera G. Wali and Nalini C. Iyer and Shraddha B. Hiremath}, title = {Hardware Implementation of {SPONGENT} Lightweight Hash Algorithm}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {105--109}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586118}, doi = {10.1145/3586102.3586118}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WaliIH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WanHLZL22, author = {Ming Wan and Minglei Hao and Yang Li and Jianming Zhao and Ying Li}, title = {Insights on Cooperative Defense for Multiple Industrial Security Technologies}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {168--173}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586127}, doi = {10.1145/3586102.3586127}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WanHLZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangZMDJ22, author = {Xiaoliang Wang and Feng Zhang and Yanbo Ma and Wenjuan Dai and Yingying Jin}, title = {Trust evaluation model based on improved Bayesian theory for the Internet of Things}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {152--158}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586125}, doi = {10.1145/3586102.3586125}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangZMDJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WuTLZ0B22, author = {Aiming Wu and Shanshan Tu and Junwei Liu and Yihe Zhang and Yongjie Yang and Xuetao Bai}, title = {Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {16--22}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586105}, doi = {10.1145/3586102.3586105}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WuTLZ0B22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WuWX22, author = {Xiaoyan Wu and Xiaofeng Wang and Qianqian Xing}, title = {Identity-Based Authentication Protocol for Trustworthy {IP} Address}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {58--63}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586111}, doi = {10.1145/3586102.3586111}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WuWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangCT022, author = {Shisong Yang and Yuwen Chen and Shanshan Tu and Zhen Yang}, title = {A Post-quantum Secure Aggregation for Federated Learning}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {117--124}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586120}, doi = {10.1145/3586102.3586120}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangCT022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangS22, author = {Siyuan Yang and Yuhao Sun}, title = {Status and Key Technologies of UAV-boat Cross-domain Collaborative Development}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {131--139}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586122}, doi = {10.1145/3586102.3586122}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangTYZWB22, author = {Yongjie Yang and Shanshan Tu and Haishuang Yan and Yihe Zhang and Aiming Wu and Xuetao Bai}, title = {Deep Reinforcement Learning-Based Computation Offloading for Anti-jamming in Fog Computing Networks}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {36--42}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586108}, doi = {10.1145/3586102.3586108}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangTYZWB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangWH22, author = {Yang Yang and Zengtao Wei and Minming Huang}, title = {Accountable Policy-Based Sanitizable Signature for Medical Data Sharing}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {77--84}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586114}, doi = {10.1145/3586102.3586114}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YuTZ22, author = {Haoyu Yu and Shanshan Tu and Yihe Zhang}, title = {Decentralized Consensus Blockchain-Based Authentication Algorithm Using in Secure Internet of Vehicles}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {199--204}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586132}, doi = {10.1145/3586102.3586132}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YuTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YuanZWTG22, author = {Yidong Yuan and Tianmeng Zhang and Chaoyi Wang and Lu Tian and Jinchun Gao}, title = {Impact of Common Mode Current Induced by Transformer on Electromagnetic Radiation in Digital Isolation Chip}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {125--130}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586121}, doi = {10.1145/3586102.3586121}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YuanZWTG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangT00WB22, author = {Yihe Zhang and Shanshan Tu and Muhammad Waqas and Yongjie Yang and Aiming Wu and Xuetao Bai}, title = {Resource Allocation for Blockchain-Enabled Fog Computing with Deep Reinforcement Learning}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {211--218}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586134}, doi = {10.1145/3586102.3586134}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangT00WB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangTZ0WB22, author = {Yihe Zhang and Shanshan Tu and Shengju Zhang and Yongjie Yang and Aiming Wu and Xuetao Bai}, title = {Performance Optimization Blockchain-Enabled Fog Computing with Deep Reinforcement Learning}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {227--233}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586136}, doi = {10.1145/3586102.3586136}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangTZ0WB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangY022, author = {Yueqi Zhang and Ruiping Yin and Zhen Yang}, title = {Data Poisoning Attacks to Session-Based Recommender Systems}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {1--6}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586103}, doi = {10.1145/3586102.3586103}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangY022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhengKYT22, author = {Wei Zheng and Naixin Kang and Tao Ye and Haining Tan}, title = {Trusted authentication mechanism oriented to network computing offloading at the perception layer}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {146--151}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586124}, doi = {10.1145/3586102.3586124}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ZhengKYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhengKYW22, author = {Wei Zheng and Naixin Kang and Tao Ye and Qi Wang}, title = {Trusted Authentication Mechanism for Perceptual layer-oriented Network Routing}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {174--179}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586128}, doi = {10.1145/3586102.3586128}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ZhengKYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhouNWW22, author = {Jin Zhou and Zhenhu Ning and Qi Wang and Yuchen Wang}, title = {Embedded Real-time System Trusted Protection Technology for Supply Chain Scenarios}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {64--68}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586112}, doi = {10.1145/3586102.3586112}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhouNWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccns/2022, title = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102}, doi = {10.1145/3586102}, isbn = {978-1-4503-9752-0}, timestamp = {Fri, 28 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.