Search dblp for Publications

export results for "toc:db/conf/iccns/iccns2022.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iccns/AzhariB22,
  author       = {Luthfi Azhari and
                  Ari Moesriami Barmawi},
  title        = {Activity Attribute-Based User Behavior Model for Continuous User Authentication},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {69--76},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586113},
  doi          = {10.1145/3586102.3586113},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/AzhariB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/BaiTY0WZ22,
  author       = {Xuetao Bai and
                  Shanshan Tu and
                  Haishuang Yan and
                  Yongjie Yang and
                  Aiming Wu and
                  Yihe Zhang},
  title        = {SPoW: {A} solution to the problem of centralization of computing power},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {205--210},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586133},
  doi          = {10.1145/3586102.3586133},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/BaiTY0WZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/BarkworthTL22,
  author       = {Ashley Barkworth and
                  Rehnuma Tabassum and
                  Arash Habibi Lashkari},
  title        = {Detecting {IMAP} Credential Stuffing Bots Using Behavioural Biometrics},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {7--15},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586104},
  doi          = {10.1145/3586102.3586104},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/BarkworthTL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChenLW22,
  author       = {Yunwen Chen and
                  Zheng Li and
                  Weiru Wang},
  title        = {A mutual authentication and key establishment scheme for peer to peer
                  network scenario},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {140--145},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586123},
  doi          = {10.1145/3586102.3586123},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChenLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChopraVL22,
  author       = {Abhishek Chopra and
                  Nikhill Vombatkere and
                  Arash Habibi Lashkari},
  title        = {AuthAttLyzer: {A} Robust defensive distillation-based Authorship Attribution
                  framework},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {43--50},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586109},
  doi          = {10.1145/3586102.3586109},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChopraVL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/GaoJL22,
  author       = {Tiaokang Gao and
                  Xiaoning Jin and
                  Yingxu Lai},
  title        = {Model Heterogeneous Federated Learning for Intrusion Detection based
                  on knowledge distillation},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {30--35},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586107},
  doi          = {10.1145/3586102.3586107},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/GaoJL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Ge0LZZ22,
  author       = {Ruihai Ge and
                  Yongzheng Zhang and
                  Shuhao Li and
                  Guoqiao Zhou and
                  Guangze Zhao},
  title        = {Leveraging Zero-Payload Packets to Detect Mobile Malware based on
                  Network Traffic},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {23--29},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586106},
  doi          = {10.1145/3586102.3586106},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Ge0LZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/GuiYYGWC22,
  author       = {Yanshuang Gui and
                  Miaomiao Yang and
                  Haishuang Yan and
                  Yayun Guo and
                  Qixu Wang and
                  Xingshu Chen},
  title        = {{MURAS:} An Efficient Multi-Value-Proof-Based Remote Attestation Scheme
                  for Cloud Platform},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {98--104},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586117},
  doi          = {10.1145/3586102.3586117},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/GuiYYGWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/HongN22,
  author       = {Yu Hong and
                  Zhenhu Ning},
  title        = {A trusted construction mechanism for sever based on trusted hard disk},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {90--97},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586116},
  doi          = {10.1145/3586102.3586116},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/HongN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/KhanTAAAW22,
  author       = {Mansoor Khan and
                  Shanshan Tu and
                  Ghulam Abbas and
                  Ziaul Haq Abbas and
                  Hisham Alasmary and
                  Muhammad Waqas},
  title        = {A Reliable and Stable {V2V} Routing Scheme for Warning Message Dissemination
                  in VANETs using Bi-Directional Clustering},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {159--167},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586126},
  doi          = {10.1145/3586102.3586126},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/KhanTAAAW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiY22,
  author       = {Aiguo Li and
                  Wenhao Yan},
  title        = {Research on vulnerability assessment of physical protection system
                  based on combined weighting-two-dimensional cloud model},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {85--89},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586137},
  doi          = {10.1145/3586102.3586137},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiY22a,
  author       = {Aiguo Li and
                  Jie Yang},
  title        = {Multi-objective optimization algorithm for indoor positioning sensor
                  deployment based on wireless network},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {110--116},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586138},
  doi          = {10.1145/3586102.3586138},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiY22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiaoZXXZZWN22,
  author       = {Xue Liao and
                  Yihua Zhou and
                  Jiawei Xu and
                  Shuaikun Xing and
                  Wei Zou and
                  Jin Zhou and
                  Qi Wang and
                  Zhenhu Ning},
  title        = {Identity-based Linkable Blind Ring Signature Scheme on Lattice},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {51--57},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586110},
  doi          = {10.1145/3586102.3586110},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiaoZXXZZWN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LuoJHS22,
  author       = {Shaojie Luo and
                  Minhao Jin and
                  Rongjie Han and
                  Kexin Sun},
  title        = {Anti-jamming based on Reinforcement Learning in Power System Sensing
                  Network},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {180--184},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586129},
  doi          = {10.1145/3586102.3586129},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LuoJHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/QinLRT22,
  author       = {Su{-}Juan Qin and
                  Zhao Liu and
                  Feixiang Ren and
                  Chong Tan},
  title        = {Smart Contract Vulnerability Detection Based on Critical Combination
                  Path and Deep Learning},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {219--226},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586135},
  doi          = {10.1145/3586102.3586135},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/QinLRT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/TanCZZLL22,
  author       = {Chong Tan and
                  Han Chen and
                  Songlei Zhang and
                  Di Zhai and
                  Yang Lu and
                  Hong Liu},
  title        = {Traffic offloading based on content sharing in {D2D} for Smart Grid},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {185--190},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586130},
  doi          = {10.1145/3586102.3586130},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/TanCZZLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Venkatasubramanian22,
  author       = {Madumitha Venkatasubramanian and
                  Arash Habibi Lashkari and
                  Saqib Hakak},
  title        = {Federated Learning Assisted IoT Malware Detection Using Static Analysis},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {191--198},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586131},
  doi          = {10.1145/3586102.3586131},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Venkatasubramanian22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WaliIH22,
  author       = {Heera G. Wali and
                  Nalini C. Iyer and
                  Shraddha B. Hiremath},
  title        = {Hardware Implementation of {SPONGENT} Lightweight Hash Algorithm},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {105--109},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586118},
  doi          = {10.1145/3586102.3586118},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WaliIH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WanHLZL22,
  author       = {Ming Wan and
                  Minglei Hao and
                  Yang Li and
                  Jianming Zhao and
                  Ying Li},
  title        = {Insights on Cooperative Defense for Multiple Industrial Security Technologies},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {168--173},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586127},
  doi          = {10.1145/3586102.3586127},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WanHLZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangZMDJ22,
  author       = {Xiaoliang Wang and
                  Feng Zhang and
                  Yanbo Ma and
                  Wenjuan Dai and
                  Yingying Jin},
  title        = {Trust evaluation model based on improved Bayesian theory for the Internet
                  of Things},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {152--158},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586125},
  doi          = {10.1145/3586102.3586125},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangZMDJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WuTLZ0B22,
  author       = {Aiming Wu and
                  Shanshan Tu and
                  Junwei Liu and
                  Yihe Zhang and
                  Yongjie Yang and
                  Xuetao Bai},
  title        = {Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm
                  in Fog Computing},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {16--22},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586105},
  doi          = {10.1145/3586102.3586105},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WuTLZ0B22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WuWX22,
  author       = {Xiaoyan Wu and
                  Xiaofeng Wang and
                  Qianqian Xing},
  title        = {Identity-Based Authentication Protocol for Trustworthy {IP} Address},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {58--63},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586111},
  doi          = {10.1145/3586102.3586111},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WuWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangCT022,
  author       = {Shisong Yang and
                  Yuwen Chen and
                  Shanshan Tu and
                  Zhen Yang},
  title        = {A Post-quantum Secure Aggregation for Federated Learning},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {117--124},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586120},
  doi          = {10.1145/3586102.3586120},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangCT022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangS22,
  author       = {Siyuan Yang and
                  Yuhao Sun},
  title        = {Status and Key Technologies of UAV-boat Cross-domain Collaborative
                  Development},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {131--139},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586122},
  doi          = {10.1145/3586102.3586122},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangTYZWB22,
  author       = {Yongjie Yang and
                  Shanshan Tu and
                  Haishuang Yan and
                  Yihe Zhang and
                  Aiming Wu and
                  Xuetao Bai},
  title        = {Deep Reinforcement Learning-Based Computation Offloading for Anti-jamming
                  in Fog Computing Networks},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {36--42},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586108},
  doi          = {10.1145/3586102.3586108},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangTYZWB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangWH22,
  author       = {Yang Yang and
                  Zengtao Wei and
                  Minming Huang},
  title        = {Accountable Policy-Based Sanitizable Signature for Medical Data Sharing},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {77--84},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586114},
  doi          = {10.1145/3586102.3586114},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YuTZ22,
  author       = {Haoyu Yu and
                  Shanshan Tu and
                  Yihe Zhang},
  title        = {Decentralized Consensus Blockchain-Based Authentication Algorithm
                  Using in Secure Internet of Vehicles},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {199--204},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586132},
  doi          = {10.1145/3586102.3586132},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YuTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YuanZWTG22,
  author       = {Yidong Yuan and
                  Tianmeng Zhang and
                  Chaoyi Wang and
                  Lu Tian and
                  Jinchun Gao},
  title        = {Impact of Common Mode Current Induced by Transformer on Electromagnetic
                  Radiation in Digital Isolation Chip},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {125--130},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586121},
  doi          = {10.1145/3586102.3586121},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YuanZWTG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangT00WB22,
  author       = {Yihe Zhang and
                  Shanshan Tu and
                  Muhammad Waqas and
                  Yongjie Yang and
                  Aiming Wu and
                  Xuetao Bai},
  title        = {Resource Allocation for Blockchain-Enabled Fog Computing with Deep
                  Reinforcement Learning},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {211--218},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586134},
  doi          = {10.1145/3586102.3586134},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangT00WB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangTZ0WB22,
  author       = {Yihe Zhang and
                  Shanshan Tu and
                  Shengju Zhang and
                  Yongjie Yang and
                  Aiming Wu and
                  Xuetao Bai},
  title        = {Performance Optimization Blockchain-Enabled Fog Computing with Deep
                  Reinforcement Learning},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {227--233},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586136},
  doi          = {10.1145/3586102.3586136},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangTZ0WB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangY022,
  author       = {Yueqi Zhang and
                  Ruiping Yin and
                  Zhen Yang},
  title        = {Data Poisoning Attacks to Session-Based Recommender Systems},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586103},
  doi          = {10.1145/3586102.3586103},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangY022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhengKYT22,
  author       = {Wei Zheng and
                  Naixin Kang and
                  Tao Ye and
                  Haining Tan},
  title        = {Trusted authentication mechanism oriented to network computing offloading
                  at the perception layer},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {146--151},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586124},
  doi          = {10.1145/3586102.3586124},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhengKYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhengKYW22,
  author       = {Wei Zheng and
                  Naixin Kang and
                  Tao Ye and
                  Qi Wang},
  title        = {Trusted Authentication Mechanism for Perceptual layer-oriented Network
                  Routing},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {174--179},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586128},
  doi          = {10.1145/3586102.3586128},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhengKYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhouNWW22,
  author       = {Jin Zhou and
                  Zhenhu Ning and
                  Qi Wang and
                  Yuchen Wang},
  title        = {Embedded Real-time System Trusted Protection Technology for Supply
                  Chain Scenarios},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {64--68},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586112},
  doi          = {10.1145/3586102.3586112},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhouNWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccns/2022,
  title        = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102},
  doi          = {10.1145/3586102},
  isbn         = {978-1-4503-9752-0},
  timestamp    = {Fri, 28 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics