Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 51 matches
- 2018
- Chundong Wang, Likun Zhu, Liangyi Gong, Zheli Liu, Xiu-liang Mo, Wenjun Yang, Min Li, Zhaoyang Li:
Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer. ICA3PP (4) 2018: 234-248 - Binod Kumar Adhikari, Wanli Zuo, Ramesh Maharjan, Lin Guo:
Sensitive Data Detection Using NN and KNN from Big Data. ICA3PP (4) 2018: 628-642 - Haojun Ai, Weiyi Huang, Yuhong Yang, Liang Liao:
The BLE Fingerprint Map Fast Construction Method for Indoor Localization. ICA3PP (4) 2018: 326-340 - Zhili Chen, Xianyue Bao, Zuobin Ying, Ximeng Liu, Hong Zhong:
Differentially Private Location Protection with Continuous Time Stamps for VANETs. ICA3PP (4) 2018: 204-219 - Zhe Chen, Chunfu Jia, Tongtong Lv, Tong Li:
Harden Tamper-Proofing to Combat MATE Attack. ICA3PP (4) 2018: 98-108 - Nanxi Chen, Xiaobo Xu, Xuzhi Miao:
A Reputation Model for Third-Party Service Providers in Fog as a Service. ICA3PP (4) 2018: 591-599 - Lanlan Dong, Guanjun Liu, Dongming Xiang:
Verifying CTL with Unfoldings of Petri Nets. ICA3PP (4) 2018: 47-61 - Jiaqing Dong, Kai Wang, Yongqiang Lyu, Libo Jiao, Hao Yin:
InterestFence: Countering Interest Flooding Attacks by Using Hash-Based Security Labels. ICA3PP (4) 2018: 527-537 - Qingfeng Du, Tiandi Xie, Yu He:
Anomaly Detection and Diagnosis for Container-Based Microservices with Performance Monitoring. ICA3PP (4) 2018: 560-572 - Dulin, Zhiwei Zhang, Shichong Tan, Jianfeng Wang, Xiaoling Tao:
An Associated Deletion Scheme for Multi-copy in Cloud Storage. ICA3PP (4) 2018: 511-526 - Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li:
Fine-Grained Attribute-Based Encryption Scheme Supporting Equality Test. ICA3PP (4) 2018: 220-233 - Mehdi Gheisari, Guojun Wang, Shuhong Chen, Hamidreza Ghorbani:
IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking. ICA3PP (4) 2018: 303-312 - Yingjie Gu, Xiaolin Gui, Pan Xu, Ruowei Gui, Yingliang Zhao, Wenjie Liu:
A Secure and Targeted Mobile Coupon Delivery Scheme Using Blockchain. ICA3PP (4) 2018: 538-548 - Pei-ming Guo, Jianping Wu:
One-Sided Communication in Coarray Fortran: Performance Tests on TH-1A. ICA3PP (4) 2018: 21-33 - Wencong Han, Quanxin Zhang, Chongzhi Gao, Jingjing Hu, Fang Yan:
Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware. ICA3PP (4) 2018: 249-259 - Ximing He, Sheng Ma, Wenjie Liu, Sijiang Fan, Libo Huang, Zhiying Wang, Zhanyong Zhou:
VISU: A Simple and Efficient Cache Coherence Protocol Based on Self-updating. ICA3PP (4) 2018: 341-357 - Bin He, Jin Wang, Jingya Zhou, Kejie Lu, Lingzhi Li, Shukui Zhang:
The Design and Implementation of Random Linear Network Coding Based Distributed Storage System in Dynamic Networks. ICA3PP (4) 2018: 72-82 - Yujia Hu, Hang Shen, Guangwei Bai, Tianjing Wang:
Privacy-Preserving Task Allocation for Edge Computing Enhanced Mobile Crowdsensing. ICA3PP (4) 2018: 431-446 - Yujie Huang, Quan Zhang, Yujie Cai, Ming-e Jing, Yibo Fan, Xiaoyang Zeng:
Dynamic Task Scheduler for Real Time Requirement in Cloud Computing System. ICA3PP (4) 2018: 3-11 - Swati Jain, Priyanka Sharma, Jaina Bhoiwala, Sarthak Gupta, Pramit Dutta, Krishan Kumar Gotewal, Naveen Rastogi, Daniel Raju:
Deep Q-Learning for Navigation of Robotic Arm for Tokamak Inspection. ICA3PP (4) 2018: 62-71 - Zoe Lin Jiang, Ning Guo, Yabin Jin, Jiazhuo Lv, Yulin Wu, Yating Yu, Xuan Wang, Siu-Ming Yiu, Junbin Fang:
Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing. ICA3PP (4) 2018: 447-460 - Jing Lei, Qingqi Pei, Xuefeng Liu, Wenhai Sun:
A Practical Privacy-Preserving Face Authentication Scheme with Revocability and Reusability. ICA3PP (4) 2018: 193-203 - Qun Li, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Kun Ma, Yuliang Shi, Lizhen Cui:
MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion. ICA3PP (4) 2018: 166-177 - Xu Li, Guojun Wang, Saqib Ali, QiLin He:
Android Malware Detection Using Category-Based Permission Vectors. ICA3PP (4) 2018: 399-414 - Jiahao Liang, Lin You:
Secure Biometric Authentication Scheme Based on Chaotic Map. ICA3PP (4) 2018: 643-653 - Anran Liu, Zhenxiang Chen, Shanshan Wang, Lizhi Peng, Chuan Zhao, Yuliang Shi:
A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic. ICA3PP (4) 2018: 109-120 - Jianwei Liu, Jianhua Fan:
Access Delay Analysis in String Multi-hop Wireless Network Under Jamming Attack. ICA3PP (4) 2018: 549-559 - Mengdi Liu, Guangquan Xu, Jun Zhang, Rajan Shankaran, Gang Luo, Xi Zheng, Zonghua Zhang:
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems. ICA3PP (4) 2018: 495-510 - Siyi Lv, Yanyu Huang, Bo Li, Yu Wei, Zheli Liu, Joseph K. Liu, Dong Hoon Lee:
Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique. ICA3PP (4) 2018: 85-97 - David Madsen, Wenjuan Li, Weizhi Meng, Yu Wang:
Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA. ICA3PP (4) 2018: 481-494
skipping 21 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-10 15:35 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint