default search action
Search dblp for Publications
export results for "toc:db/conf/ubisec/ubisec2021.bht:"
@proceedings{DBLP:conf/ubisec/2021, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-0468-4}, doi = {10.1007/978-981-19-0468-4}, isbn = {978-981-19-0467-7}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/0017DL21, author = {Qiang Zhang and Guihua Duan and Shukun Liu}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Smart Search over Encrypted Educational Resources in Cloud Storage}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {90--101}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_7}, doi = {10.1007/978-981-19-0468-4\_7}, timestamp = {Wed, 25 May 2022 10:56:01 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/0017DL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/Andrei-Cristian21, author = {Andrei{-}Cristian Iosif and Tiago Espinha Gasiba and Tiange Zhao and Ulrike Lechner and Maria Pinto{-}Albuquerque}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {171--188}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_13}, doi = {10.1007/978-981-19-0468-4\_13}, timestamp = {Wed, 25 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/Andrei-Cristian21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/CarterM21, author = {John Carter and Spiros Mancoridis}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Evaluation of an Anomaly Detector for Routers Using Parameterizable Malware in an IoT Ecosystem}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {53--65}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_5}, doi = {10.1007/978-981-19-0468-4\_5}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/CarterM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/ChenLL21, author = {Hongling Chen and Zhiwen Liao and Qin Liu}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {363--370}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_27}, doi = {10.1007/978-981-19-0468-4\_27}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/ChenLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/ChengYZD21, author = {Jiangchang Cheng and Fumin Yu and Hongliang Zhang and Yinglong Dai}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Skill Reward for Safe Deep Reinforcement Learning}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {203--213}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_15}, doi = {10.1007/978-981-19-0468-4\_15}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ubisec/ChengYZD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/CorrickK21, author = {Tristan Corrick and Vimal Kumar}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Design and Architecture of Progger 3: {A} Low-Overhead, Tamper-Proof Provenance System}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {189--202}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_14}, doi = {10.1007/978-981-19-0468-4\_14}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/CorrickK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/KeipourHFV21, author = {Hossein Keipour and Saptarshi Hazra and Niclas Finne and Thiemo Voigt}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {214--228}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_16}, doi = {10.1007/978-981-19-0468-4\_16}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/KeipourHFV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/KoayXKSCD21, author = {Abigail M. Y. Koay and Miao Xie and Ryan K. L. Ko and Charles Sterner and Taejun Choi and Naipeng Dong}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {SDGen: {A} Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {102--115}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_8}, doi = {10.1007/978-981-19-0468-4\_8}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/KoayXKSCD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/KolyJRBBO21, author = {Wahid Sadique Koly and Abu Kaisar Jamil and Mohammad Shahriar Rahman and Hanif Bhuiyan and Md. Zakirul Alam Bhuiyan and Abdullah Al Omar}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {116--130}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_9}, doi = {10.1007/978-981-19-0468-4\_9}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/KolyJRBBO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/LiCWC21, author = {Wenjia Li and Juecong Cai and Zi Wang and Sihua Cheng}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {A Robust Malware Detection Approach for Android System Based on Ensemble Learning}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {309--321}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_23}, doi = {10.1007/978-981-19-0468-4\_23}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/LiCWC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/LinWLL21, author = {Jiaying Lin and Yehua Wei and Wenjia Li and Jing Long}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle {CAN} Networks}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {255--267}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_19}, doi = {10.1007/978-981-19-0468-4\_19}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/LinWLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/LiuDZYJX21, author = {Xuehua Liu and Liping Ding and Tao Zheng and Fang Yu and Zhen Jia and Wang Xiao}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {A Network Forensics Investigating Method Based on Weak Consistency for Distributed {SDN}}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {241--254}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_18}, doi = {10.1007/978-981-19-0468-4\_18}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/LiuDZYJX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/LiuFYP21, author = {Wei Liu and Wenlong Feng and Benguo Yu and Tao Peng}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {13--24}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_2}, doi = {10.1007/978-981-19-0468-4\_2}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/LiuFYP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/LiuZLXD21, author = {Meirong Liu and Hong Zheng and Qin Liu and Xiaofei Xing and Yinglong Dai}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {1--12}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_1}, doi = {10.1007/978-981-19-0468-4\_1}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/LiuZLXD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/MaYCFY21, author = {Li Ma and Huihong Yang and Yiming Chai and Jiawen Fan and Wenyin Yang}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {An Online Automated Anti-anti-virus Method}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {351--362}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_26}, doi = {10.1007/978-981-19-0468-4\_26}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/MaYCFY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/NairT21, author = {Aiswarya S. Nair and Sabu M. Thampi}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {PUFloc: {PUF} and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {66--89}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_6}, doi = {10.1007/978-981-19-0468-4\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/NairT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/RashidAI21, author = {A. N. M. Bazlur Rashid and Mohiuddin Ahmed and Sheikh Rabiul Islam}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {A Supervised Rare Anomaly Detection Technique via Cooperative Co-evolution-Based Feature Selection Using Benchmark UNSW{\_}NB15 Dataset}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {279--291}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_21}, doi = {10.1007/978-981-19-0468-4\_21}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/RashidAI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/ShakilASAUNW21, author = {Shakil and Muhammad Arif and Shahab Saquib Sohail and Mohammed Talha Alam and Syed Ubaid and Md. Tabrez Nafis and Guojun Wang}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Towards a Two-Tier Architecture for Privacy-Enabled Recommender Systems (PeRS)}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {268--278}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_20}, doi = {10.1007/978-981-19-0468-4\_20}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/ShakilASAUNW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/SharminMKA21, author = {Shaila Sharmin and Hafizah Mansor and Andi Fitriah Abdul Kadir and Normaziah Abdul Aziz}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {131--144}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_10}, doi = {10.1007/978-981-19-0468-4\_10}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/SharminMKA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/TangZLLS21, author = {Yuting Tang and Dafang Zhang and Wei Liang and Kuan{-}Ching Li and Nitin Sukhija}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {38--52}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_4}, doi = {10.1007/978-981-19-0468-4\_4}, timestamp = {Wed, 18 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/TangZLLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/WangZZZ21, author = {Yuzhu Wang and Peiheng Zhang and Haitao Zhan and Mingwu Zhang}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {145--158}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_11}, doi = {10.1007/978-981-19-0468-4\_11}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/WangZZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/WeiCGX21, author = {Xingshen Wei and Yongjian Cao and Peng Gao and Junxian Xu}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {A Reverse Auction Based Efficient {D2D} Transmission Mechanism for Ubiquitous Power Terminals}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {322--335}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_24}, doi = {10.1007/978-981-19-0468-4\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/WeiCGX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/Woodiss-FieldJH21, author = {Ashley Woodiss{-}Field and Michael N. Johnstone and Paul S. Haskell{-}Dowland}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Towards Evaluating the Effectiveness of Botnet Detection Techniques}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {292--308}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_22}, doi = {10.1007/978-981-19-0468-4\_22}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/Woodiss-FieldJH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/XuY21, author = {Lei Xu and Dingkun Yang}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {An Edge-Cloud Collaborative Object Detection System}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {371--378}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_28}, doi = {10.1007/978-981-19-0468-4\_28}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/XuY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/YangZ021, author = {Peng Yang and Shaohong Zhang and Liu Yang}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Privacy-Preserving Cluster Validity}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {159--170}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_12}, doi = {10.1007/978-981-19-0468-4\_12}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/YangZ021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/ZhangYZLZX21, author = {Shaobo Zhang and Shuo Yang and Gengming Zhu and Entao Luo and Jiyong Zhang and Desheng Xiang}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {25--37}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_3}, doi = {10.1007/978-981-19-0468-4\_3}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/ZhangYZLZX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/ZhangZW21, author = {Xianggang Zhang and Jing Zeng and Guoyu Wang}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {A Fine-Tuning Strategy Based on Real Scenes in Gait Identification}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {336--350}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_25}, doi = {10.1007/978-981-19-0468-4\_25}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/ZhangZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/Zou0ZG021, author = {Yipeng Zou and Tao Peng and Wentao Zhong and Kejian Guan and Guojun Wang}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Reliable and Controllable Data Sharing Based on Blockchain}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {229--240}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_17}, doi = {10.1007/978-981-19-0468-4\_17}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/Zou0ZG021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.