Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 39 matches
- 2020
- Zhiqiang Wang, Shuhao Li, Bingyan Wang, Xiaorui Ren, Tao Yang:
A Malicious URL Detection Model Based on Convolutional Neural Network. SocialSec 2020: 34-40 - Jinyin Chen, Dunjie Zhang, Xiang Lin:
Adaptive Adversarial Attack on Graph Embedding via GAN. SocialSec 2020: 72-84 - Zishuai Cheng, Baojiang Cui, Junsong Fu:
A Novel Web Anomaly Detection Approach Based on Semantic Structure. SocialSec 2020: 20-33 - Shuo Feng, Yu-an Tan, Gang Zhao, Xiaohui Kuang, Xiao Yu, Juan Wang:
A VirtualXposed-Based Inline Hooking Framework for Android Native Methods. SocialSec 2020: 245-253 - Tianchu Hang, Yang Bai, Guishi Deng:
A Method for Community Partition Based on Information Granularity. SocialSec 2020: 407-419 - Yifei He, Jiqiang Liu, Endong Tong, Wenjia Niu, Xinyu Huang, Ying Zhou, Chenyang Li, Liang Chang:
Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions. SocialSec 2020: 340-354 - Nan Jia, Shaojing Fu, Ming Xu:
Privacy-Preserving Nonlinear SVM Classifier Training Based on Blockchain. SocialSec 2020: 278-288 - Umair Khadam, Muhammad Munwar Iqbal, Leonardo Mostarda, Farhan Ullah:
An Efficient Framework for Text Document Security and Privacy. SocialSec 2020: 132-140 - Min Li, Yingming Zeng, Yue Guo, Yun Guo:
The Movie Recommendation System Based on Differential Privacy. SocialSec 2020: 318-328 - Peng Li, Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu:
Privacy-Preserving Graph Operations for Social Network Analysis. SocialSec 2020: 303-317 - Kaihao Lou, Shuqiu Li, Funing Yang, Xingliang Zhang:
Advertising Strategy for Maximizing Profit Using CrowdSensing Trajectory Data. SocialSec 2020: 395-406 - Jingwen Lu, Peng Tang, Weidong Qiu, Hao Wang, Jie Guo:
Effectiveness Analysis of Traditional Chinese Medicine for Anti-Alzheimer's Disease Based on Machine Learning. SocialSec 2020: 203-214 - Yi Lv:
Forward Calculation for Improving the Sensitivity of Multiple Perturbations in Magnetic Induction Tomography Based on Brain Tissue Structure. SocialSec 2020: 420-432 - Ying Ma, Kaiyong Li, Jiayu Hou:
Automatic Classification Analysis of Tibetan Folk Music Based on Adaboost Algorithm. SocialSec 2020: 379-386 - Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han, Zhaolong Hu:
Risk Assessment of Heterogeneous CPS Systems Under Different Proportions of Links. SocialSec 2020: 369-378 - Hao Peng, Can Liu, Dandan Zhao, Zhao-Long Hu, Jianmin Han, Jianfeng Lu:
Reliability Analysis of Heterogeneous CPS Under Different Swapping Inter-links Strategies. SocialSec 2020: 329-339 - Xiaowei Peng, Hequn Xian, Qian Lu, Xiuqing Lu:
Generating Adversarial Malware Examples with API Semantics-Awareness for Black-Box Attacks. SocialSec 2020: 52-61 - Xueming Qiao, Meng Chen, Xiangkun Zhang, Weiyi Zhu, Yanhong Liu, Zhixin Huo, Ruiqi Sun, Dongjie Zhu:
A Two-Fitness Resource Scheduling Strategy Based on Improved Particle Swarm Optimization. SocialSec 2020: 263-277 - Jiangpeng Shi, Xiaochun Cheng, Jianfeng Wang:
Pair-Wise Convolution Network with Transformers for Sequential Recommendation. SocialSec 2020: 433-445 - Bo Song, Zhengjun Jing, Y. Jay Guo, Ren Ping Liu, Qian Zhou:
A Novel Measure to Quantify the Robustness of Social Network Under the Virus Attacks. SocialSec 2020: 189-200 - Chaogang Tang, Xianglin Wei, Chong Liu, Haifeng Jiang, Huaming Wu, Qing Li:
UAV-Enabled Social Internet of Vehicles: Roles, Security Issues and Use Cases. SocialSec 2020: 153-163 - Jun-Feng Tian, Rui-Fang Guo:
An Efficient and Revocable Auditing Scheme for the Internet of Things. SocialSec 2020: 109-119 - Jing Wang, Hongjie Zhang, Lishong Shao, Li Li, Min Luo:
On the Security of a Certificateless Public Verification Scheme for Cloud-Based Cyber-Physical-Social Systems. SocialSec 2020: 387-394 - Shuoru Wang, Jiqiang Liu, Tong Chen, He Li, Wenjia Niu, Endong Tong, Long Li, Minglu Song:
A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning. SocialSec 2020: 120-131 - Lianfang Wang, Ye Wang, Gang Zhao, Lu Liu, Xiaohui Kuang:
Keeping Privacy Data Secure Under Factory Recovery. SocialSec 2020: 224-233 - Zhifei Wang, Gang Xu, Fengqi Wei, Zhihan Qi, Liqiang He:
Key Nodes Recognition in Opportunistic Network. SocialSec 2020: 178-188 - Wei Wei, Jin Yang, Sikai Wang, Deng Chen, Yanduo Zhang, Zihang Zhang, Wei Liu, Gonghao Duan, Chaohui Zheng, Jianping Ju, Jianyin Tang:
Automatic Counting of Railway Tools Based on Deep Learning. SocialSec 2020: 355-368 - Shengxu Xie, Chang-you Xing, Guomin Zhang, Xianglin Wei, Guyu Hu:
Research on LDoS Attack Detection and Defense Mechanism in Software Defined Networks. SocialSec 2020: 85-96 - Ming Yan, Bo Zhang, Gang Zhao, Xiaohui Kuang, Lu Liu, Ruyun Zhang:
An Intelligent File Transfer Optimization for Poor Network Conditions. SocialSec 2020: 234-244 - Kai Yang, Ling Pang, Bo Zhang, Gang Zhao, Xiaohui Kuang:
An Android Data Protection Scheme for System-as-Root Architectures. SocialSec 2020: 254-262
skipping 9 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-19 18:59 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint