Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2022
- Luthfi Azhari, Ari Moesriami Barmawi:
Activity Attribute-Based User Behavior Model for Continuous User Authentication. ICCNS 2022: 69-76 - Xuetao Bai, Shanshan Tu, Haishuang Yan, Yongjie Yang, Aiming Wu, Yihe Zhang:
SPoW: A solution to the problem of centralization of computing power. ICCNS 2022: 205-210 - Ashley Barkworth, Rehnuma Tabassum, Arash Habibi Lashkari:
Detecting IMAP Credential Stuffing Bots Using Behavioural Biometrics. ICCNS 2022: 7-15 - Yunwen Chen, Zheng Li, Weiru Wang:
A mutual authentication and key establishment scheme for peer to peer network scenario. ICCNS 2022: 140-145 - Abhishek Chopra, Nikhill Vombatkere, Arash Habibi Lashkari:
AuthAttLyzer: A Robust defensive distillation-based Authorship Attribution framework. ICCNS 2022: 43-50 - Tiaokang Gao, Xiaoning Jin, Yingxu Lai:
Model Heterogeneous Federated Learning for Intrusion Detection based on knowledge distillation. ICCNS 2022: 30-35 - Ruihai Ge, Yongzheng Zhang, Shuhao Li, Guoqiao Zhou, Guangze Zhao:
Leveraging Zero-Payload Packets to Detect Mobile Malware based on Network Traffic. ICCNS 2022: 23-29 - Yanshuang Gui, Miaomiao Yang, Haishuang Yan, Yayun Guo, Qixu Wang, Xingshu Chen:
MURAS: An Efficient Multi-Value-Proof-Based Remote Attestation Scheme for Cloud Platform. ICCNS 2022: 98-104 - Yu Hong, Zhenhu Ning:
A trusted construction mechanism for sever based on trusted hard disk. ICCNS 2022: 90-97 - Mansoor Khan, Shanshan Tu, Ghulam Abbas, Ziaul Haq Abbas, Hisham Alasmary, Muhammad Waqas:
A Reliable and Stable V2V Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional Clustering. ICCNS 2022: 159-167 - Aiguo Li, Wenhao Yan:
Research on vulnerability assessment of physical protection system based on combined weighting-two-dimensional cloud model. ICCNS 2022: 85-89 - Aiguo Li, Jie Yang:
Multi-objective optimization algorithm for indoor positioning sensor deployment based on wireless network. ICCNS 2022: 110-116 - Xue Liao, Yihua Zhou, Jiawei Xu, Shuaikun Xing, Wei Zou, Jin Zhou, Qi Wang, Zhenhu Ning:
Identity-based Linkable Blind Ring Signature Scheme on Lattice. ICCNS 2022: 51-57 - Shaojie Luo, Minhao Jin, Rongjie Han, Kexin Sun:
Anti-jamming based on Reinforcement Learning in Power System Sensing Network. ICCNS 2022: 180-184 - Su-Juan Qin, Zhao Liu, Feixiang Ren, Chong Tan:
Smart Contract Vulnerability Detection Based on Critical Combination Path and Deep Learning. ICCNS 2022: 219-226 - Chong Tan, Han Chen, Songlei Zhang, Di Zhai, Yang Lu, Hong Liu:
Traffic offloading based on content sharing in D2D for Smart Grid. ICCNS 2022: 185-190 - Madumitha Venkatasubramanian, Arash Habibi Lashkari, Saqib Hakak:
Federated Learning Assisted IoT Malware Detection Using Static Analysis. ICCNS 2022: 191-198 - Heera G. Wali, Nalini C. Iyer, Shraddha B. Hiremath:
Hardware Implementation of SPONGENT Lightweight Hash Algorithm. ICCNS 2022: 105-109 - Ming Wan, Minglei Hao, Yang Li, Jianming Zhao, Ying Li:
Insights on Cooperative Defense for Multiple Industrial Security Technologies. ICCNS 2022: 168-173 - Xiaoliang Wang, Feng Zhang, Yanbo Ma, Wenjuan Dai, Yingying Jin:
Trust evaluation model based on improved Bayesian theory for the Internet of Things. ICCNS 2022: 152-158 - Aiming Wu, Shanshan Tu, Junwei Liu, Yihe Zhang, Yongjie Yang, Xuetao Bai:
Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing. ICCNS 2022: 16-22 - Xiaoyan Wu, Xiaofeng Wang, Qianqian Xing:
Identity-Based Authentication Protocol for Trustworthy IP Address. ICCNS 2022: 58-63 - Shisong Yang, Yuwen Chen, Shanshan Tu, Zhen Yang:
A Post-quantum Secure Aggregation for Federated Learning. ICCNS 2022: 117-124 - Siyuan Yang, Yuhao Sun:
Status and Key Technologies of UAV-boat Cross-domain Collaborative Development. ICCNS 2022: 131-139 - Yongjie Yang, Shanshan Tu, Haishuang Yan, Yihe Zhang, Aiming Wu, Xuetao Bai:
Deep Reinforcement Learning-Based Computation Offloading for Anti-jamming in Fog Computing Networks. ICCNS 2022: 36-42 - Yang Yang, Zengtao Wei, Minming Huang:
Accountable Policy-Based Sanitizable Signature for Medical Data Sharing. ICCNS 2022: 77-84 - Haoyu Yu, Shanshan Tu, Yihe Zhang:
Decentralized Consensus Blockchain-Based Authentication Algorithm Using in Secure Internet of Vehicles. ICCNS 2022: 199-204 - Yidong Yuan, Tianmeng Zhang, Chaoyi Wang, Lu Tian, Jinchun Gao:
Impact of Common Mode Current Induced by Transformer on Electromagnetic Radiation in Digital Isolation Chip. ICCNS 2022: 125-130 - Yihe Zhang, Shanshan Tu, Muhammad Waqas, Yongjie Yang, Aiming Wu, Xuetao Bai:
Resource Allocation for Blockchain-Enabled Fog Computing with Deep Reinforcement Learning. ICCNS 2022: 211-218 - Yihe Zhang, Shanshan Tu, Shengju Zhang, Yongjie Yang, Aiming Wu, Xuetao Bai:
Performance Optimization Blockchain-Enabled Fog Computing with Deep Reinforcement Learning. ICCNS 2022: 227-233
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-02 17:59 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint