Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2022
- Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo:
Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers. Communications in Computer and Information Science 1557, Springer 2022, ISBN 978-981-19-0467-7 [contents] - 2021
- Qiang Zhang, Guihua Duan, Shukun Liu:
Smart Search over Encrypted Educational Resources in Cloud Storage. UbiSec 2021: 90-101 - Iosif Andrei-Cristian, Tiago Espinha Gasiba, Tiange Zhao, Ulrike Lechner, Maria Pinto-Albuquerque:
A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments. UbiSec 2021: 171-188 - John Carter, Spiros Mancoridis:
Evaluation of an Anomaly Detector for Routers Using Parameterizable Malware in an IoT Ecosystem. UbiSec 2021: 53-65 - Hongling Chen, Zhiwen Liao, Qin Liu:
Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment. UbiSec 2021: 363-370 - Jiangchang Cheng, Fumin Yu, Hongliang Zhang, Yinglong Dai:
Skill Reward for Safe Deep Reinforcement Learning. UbiSec 2021: 203-213 - Tristan Corrick, Vimal Kumar:
Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System. UbiSec 2021: 189-202 - Hossein Keipour, Saptarshi Hazra, Niclas Finne, Thiemo Voigt:
Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks. UbiSec 2021: 214-228 - Abigail M. Y. Koay, Miao Xie, Ryan K. L. Ko, Charles Sterner, Taejun Choi, Naipeng Dong:
SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets. UbiSec 2021: 102-115 - Wahid Sadique Koly, Abu Kaisar Jamil, Mohammad Shahriar Rahman, Hanif Bhuiyan, Md. Zakirul Alam Bhuiyan, Abdullah Al Omar:
Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media. UbiSec 2021: 116-130 - Wenjia Li, Juecong Cai, Zi Wang, Sihua Cheng:
A Robust Malware Detection Approach for Android System Based on Ensemble Learning. UbiSec 2021: 309-321 - Jiaying Lin, Yehua Wei, Wenjia Li, Jing Long:
Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks. UbiSec 2021: 255-267 - Xuehua Liu, Liping Ding, Tao Zheng, Fang Yu, Zhen Jia, Wang Xiao:
A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN. UbiSec 2021: 241-254 - Wei Liu, Wenlong Feng, Benguo Yu, Tao Peng:
Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning. UbiSec 2021: 13-24 - Meirong Liu, Hong Zheng, Qin Liu, Xiaofei Xing, Yinglong Dai:
A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks. UbiSec 2021: 1-12 - Li Ma, Huihong Yang, Yiming Chai, Jiawen Fan, Wenyin Yang:
An Online Automated Anti-anti-virus Method. UbiSec 2021: 351-362 - Aiswarya S. Nair, Sabu M. Thampi:
PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks. UbiSec 2021: 66-89 - A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Sheikh Rabiul Islam:
A Supervised Rare Anomaly Detection Technique via Cooperative Co-evolution-Based Feature Selection Using Benchmark UNSW_NB15 Dataset. UbiSec 2021: 279-291 - Shakil, Muhammad Arif, Shahab Saquib Sohail, Mohammed Talha Alam, Syed Ubaid, Md. Tabrez Nafis, Guojun Wang:
Towards a Two-Tier Architecture for Privacy-Enabled Recommender Systems (PeRS). UbiSec 2021: 268-278 - Shaila Sharmin, Hafizah Mansor, Andi Fitriah Abdul Kadir, Normaziah Abdul Aziz:
Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network. UbiSec 2021: 131-144 - Yuting Tang, Dafang Zhang, Wei Liang, Kuan-Ching Li, Nitin Sukhija:
Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm. UbiSec 2021: 38-52 - Yuzhu Wang, Peiheng Zhang, Haitao Zhan, Mingwu Zhang:
Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids. UbiSec 2021: 145-158 - Xingshen Wei, Yongjian Cao, Peng Gao, Junxian Xu:
A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals. UbiSec 2021: 322-335 - Ashley Woodiss-Field, Michael N. Johnstone, Paul S. Haskell-Dowland:
Towards Evaluating the Effectiveness of Botnet Detection Techniques. UbiSec 2021: 292-308 - Lei Xu, Dingkun Yang:
An Edge-Cloud Collaborative Object Detection System. UbiSec 2021: 371-378 - Peng Yang, Shaohong Zhang, Liu Yang:
Privacy-Preserving Cluster Validity. UbiSec 2021: 159-170 - Shaobo Zhang, Shuo Yang, Gengming Zhu, Entao Luo, Jiyong Zhang, Desheng Xiang:
A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes. UbiSec 2021: 25-37 - Xianggang Zhang, Jing Zeng, Guoyu Wang:
A Fine-Tuning Strategy Based on Real Scenes in Gait Identification. UbiSec 2021: 336-350 - Yipeng Zou, Tao Peng, Wentao Zhong, Kejian Guan, Guojun Wang:
Reliable and Controllable Data Sharing Based on Blockchain. UbiSec 2021: 229-240
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-03 17:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint