Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2019
- Bin Xia, Junjie Yin, Jian Xu, Yun Li:
LogGAN: A Sequence-Based Generative Adversarial Network for Anomaly Detection Based on System Logs. SciSec 2019: 61-76 - Yun Chen, Yunlan Du, Xiaomei Cao:
Density Peak Clustering Algorithm Based on Differential Privacy Preserving. SciSec 2019: 20-32 - Qian (Guenevere) Chen, Sheikh Rabiul Islam, Henry Haswell, Robert A. Bridges:
Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection. SciSec 2019: 199-214 - Tianfu Chen, Zhenghua Qi, Jiagen Cheng:
Fully Anonymous Blockchain Constructed Based on Aggregate Signature and Ring Signature. SciSec 2019: 250-261 - Kangyang Chen, Xinyi Zou, Xingguo Chen, Huihui Wang:
An Automated Online Spam Detector Based on Deep Cascade Forest. SciSec 2019: 33-46 - Yin Hongji, Chen Wei:
Knowledge Graph Based Semi-automatic Code Auditing System. SciSec 2019: 224-231 - Xin Huang, Fei Yan, Liqiang Zhang, Kai Wang:
HoneyGadget: A Deception Based ROP Detection Scheme. SciSec 2019: 121-135 - Shuai Jiang, Xiaolong Xu:
Application and Performance Analysis of Data Preprocessing for Intrusion Detection System. SciSec 2019: 163-177 - Yinwei Li, Bo Song, Xu Zhang, Guo-Ping Jiang, Yurong Song:
New Robustness Measures of Communication Networks Against Virus Attacks. SciSec 2019: 151-162 - Yuxi Li, Fucai Zhou, Zifeng Xu:
PAFR: Privacy-Aware Friends Retrieval over Online Social Networks. SciSec 2019: 323-338 - Hang Ling, Jing Han, Jiayi Pang, Jianwei Liu, Jia Xu, Zheng Liu:
Behavior Flow Graph Construction from System Logs for Anomaly Analysis. SciSec 2019: 215-223 - Binghui Liu, Keji Han, Jie Hang, Yun Li:
Adversarial Training Based Feature Selection. SciSec 2019: 92-105 - Zhaofeng Liu, Zhen Jia, Wenlian Lu:
Security Comparison of Machine Learning Models Facing Different Attack Targets. SciSec 2019: 77-91 - Lin Mei, Chungen Xu, Lei Xu, Zhongyi Liu, Xiaoling Yu, Zhigang Yao:
Towards Realizing Authorized Encrypted Search with Designed Access Policy. SciSec 2019: 293-307 - Datian Peng, Jianmin Dong, Qinke Peng, Bo Zeng, Zhi-Hong Mao:
FDIA-Identified Overloaded Power Lines. SciSec 2019: 262-277 - Zhi Qiao, Congcong Zhu, Zhiwei Wang, Nianhua Yang:
Anonymous IoT Data Storage and Transaction Protocol Based on Blockchain and Edge Computing. SciSec 2019: 181-189 - Xiao Tu, Guo-Ping Jiang, Yurong Song:
Multiplex PageRank in Multilayer Networks Considering Shunt. SciSec 2019: 47-58 - Zhiwei Wang, Zhiyuan Cheng, Nianhua Yang:
An ID-Based Linear Homomorphic Cryptosystem and Its Applications for the Isolated Smart Grid Devices. SciSec 2019: 339-353 - Yuan Wang, Jinzhi Wang, Jianhong Gao, Shengsheng Hu, Huacheng Sun, Yongli Wang:
Cross-Domain Recommendation System Based on Tensor Decomposition for Cybersecurity Data Analytics. SciSec 2019: 3-19 - Shaohui Wang, Yanxuan Zhang, Changbo Ke, Fu Xiao, Ruchuan Wang:
Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints. SciSec 2019: 278-292 - Yang Wu, Shikang Yu, Yurong Song, Guoping Jiang, Xiao Tu:
High-Efficiency Triangle Counting on the GPU. SciSec 2019: 363-370 - Gang Xue, Jia Xu, Hanwen Wu, Weifeng Lu, Lijie Xu:
Incentive Mechanism for Bitcoin Mining Pool Based on Stackelberg Game. SciSec 2019: 190-198 - Zhigang Yao, Chungen Xu, Lei Xu, Lin Mei:
Forward Private Searchable Encryption with Conjunctive Keywords Query. SciSec 2019: 308-322 - Shikang Yu, Yang Wu, Yurong Song, Guoping Jiang, Xiaoping Su:
Application of DeepWalk Based on Hyperbolic Coordinates on Unsupervised Clustering. SciSec 2019: 106-118 - Zhenchao Zhang, Yali Liu, Xinchun Yin, Xincheng Li:
A New Pairing-Free Certificateless Signature Scheme for Internet of Things. SciSec 2019: 371-379 - Jie Zhang, Zhihao Zhang:
LET-Attack: Latent Encodings of Normal-Data Manifold Transferring to Adversarial Examples. SciSec 2019: 136-150 - Mengce Zheng, Honggang Hu:
Implicit-Key Attack on the RSA Cryptosystem. SciSec 2019: 354-362 - Hao Zhou, Geng Yang, Yahong Xu, Weiya Wang:
Effective Matrix Factorization for Recommendation with Local Differential Privacy. SciSec 2019: 235-249 - Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung:
Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11933, Springer 2019, ISBN 978-3-030-34636-2 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-29 02:13 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint