Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 69 matches
- 2024
- Urvashi Bansal, Geeta Sikka, Lalit Kumar Awasthi, Bharat K. Bhargava:
Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis. IEEE Trans. Dependable Secur. Comput. 21(1): 298-308 (2024) - Jianping Cai, Ximeng Liu, Jiayin Li, Kim-Kwang Raymond Choo:
Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees. IEEE Trans. Dependable Secur. Comput. 21(1): 388-402 (2024) - Xabier Sáez de Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza:
Gotham Testbed: A Reproducible IoT Testbed for Security Experiments and Dataset Generation. IEEE Trans. Dependable Secur. Comput. 21(1): 186-203 (2024) - Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors. IEEE Trans. Dependable Secur. Comput. 21(1): 284-297 (2024) - Xiao Cheng, Xu Nie, Ningke Li, Haoyu Wang, Zheng Zheng, Yulei Sui:
How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors. IEEE Trans. Dependable Secur. Comput. 21(2): 542-558 (2024) - Peng Cheng, Yuexin Wu, Yuan Hong, Zhongjie Ba, Feng Lin, Li Lu, Kui Ren:
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations. IEEE Trans. Dependable Secur. Comput. 21(1): 31-46 (2024) - Moslem Didehban, Hwisoo So, Prudhvi Gali, Aviral Shrivastava, Kyoungwoo Lee:
Generic Soft Error Data and Control Flow Error Detection by Instruction Duplication. IEEE Trans. Dependable Secur. Comput. 21(1): 78-92 (2024) - Shlomi Dolev, Bingyong Guo, Jianyu Niu, Ziyu Wang:
SodsBC: A Post-Quantum by Design Asynchronous Blockchain Framework. IEEE Trans. Dependable Secur. Comput. 21(1): 47-62 (2024) - Caiqin Dong, Jian Weng, Ming Li, Jia-Nan Liu, Zhiquan Liu, Yudan Cheng, Shui Yu:
Privacy-Preserving and Byzantine-Robust Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(2): 889-904 (2024) - Han Fang, Yupeng Qiu, Guorui Qin, Jiyi Zhang, Kejiang Chen, Weiming Zhang, Ee-Chien Chang:
DP2Dataset Protection by Data Poisoning. IEEE Trans. Dependable Secur. Comput. 21(2): 636-649 (2024) - Renato Ferrero, Bartolomeo Montrucchio:
Banknote Identification Through Unique Fluorescent Properties. IEEE Trans. Dependable Secur. Comput. 21(2): 975-986 (2024) - Chunpeng Ge, Zhe Liu, Willy Susilo, Liming Fang, Hao Wang:
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract. IEEE Trans. Dependable Secur. Comput. 21(2): 937-948 (2024) - Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 21(2): 949-960 (2024) - Linqing Gui, Weihao Zhou, Pinchang Zhang, Fu Xiao:
Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks. IEEE Trans. Dependable Secur. Comput. 21(2): 764-774 (2024) - Cheng Guo, Wenfeng Li, Xinyu Tang, Kim-Kwang Raymond Choo, Yining Liu:
Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query. IEEE Trans. Dependable Secur. Comput. 21(2): 746-763 (2024) - Xiao Han, Yuncong Yang, Leye Wang, Junjie Wu:
Privacy-Preserving Network Embedding Against Private Link Inference Attacks. IEEE Trans. Dependable Secur. Comput. 21(2): 847-859 (2024) - Yongzhong He, Yiming Wang, Sencun Zhu, Wei Wang, Yunjia Zhang, Qiang Li, Aimin Yu:
Automatically Identifying CVE Affected Versions With Patches and Developer Logs. IEEE Trans. Dependable Secur. Comput. 21(2): 905-919 (2024) - Cheng Huang, Dongxiao Liu, Anjia Yang, Rongxing Lu, Xuemin Shen:
Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 21(1): 353-371 (2024) - Ke Huang, Yi Mu, Fatemeh Rezaeibagha, Xiaosong Zhang, Xiong Li, Sheng Cao:
Monero With Multi-Grained Redaction. IEEE Trans. Dependable Secur. Comput. 21(1): 241-253 (2024) - Wenbo Jiang, Hongwei Li, Guowen Xu, Tianwei Zhang, Rongxing Lu:
A Comprehensive Defense Framework Against Model Extraction Attacks. IEEE Trans. Dependable Secur. Comput. 21(2): 685-700 (2024) - Wenbo Jiang, Tianwei Zhang, Han Qiu, Hongwei Li, Guowen Xu:
Incremental Learning, Incremental Backdoor Threats. IEEE Trans. Dependable Secur. Comput. 21(2): 559-572 (2024) - Shahid Khan, Joost-Pieter Katoen, Marc Bouissou:
A Compositional Semantics of Boolean-Logic Driven Markov Processes. IEEE Trans. Dependable Secur. Comput. 21(2): 701-716 (2024) - Insup Lee, Wonjun Lee:
UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design. IEEE Trans. Dependable Secur. Comput. 21(2): 732-745 (2024) - Yuwei Li, Yuan Chen, Shouling Ji, Xuhong Zhang, Guanglu Yan, Alex X. Liu, Chunming Wu, Zulie Pan, Peng Lin:
G-Fuzz: A Directed Fuzzing Framework for gVisor. IEEE Trans. Dependable Secur. Comput. 21(1): 168-185 (2024) - Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu:
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. IEEE Trans. Dependable Secur. Comput. 21(2): 920-936 (2024) - Yi-Fan Li, Yang Gao, Gbadebo Ayoade, Latifur Khan, Anoop Singhal, Bhavani Thuraisingham:
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data. IEEE Trans. Dependable Secur. Comput. 21(1): 1-11 (2024) - Qian Li, Chao Shen, Qingyuan Hu, Chenhao Lin, Xiang Ji, Saiyu Qi:
Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness. IEEE Trans. Dependable Secur. Comput. 21(2): 530-541 (2024) - Sheng Li, Zichi Wang, Xiudong Zhang, Xinpeng Zhang:
Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery. IEEE Trans. Dependable Secur. Comput. 21(1): 340-352 (2024) - Ruixuan Li, Zhenyong Zhang, Jun Shao, Rongxing Lu, Xiaoqi Jia, Guiyi Wei:
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services. IEEE Trans. Dependable Secur. Comput. 21(1): 125-138 (2024) - Hongliang Liang, Xiangyu Li, Da Xiao, Jie Liu, Yanjie Zhou, Aibo Wang, Jin Li:
Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls. IEEE Trans. Dependable Secur. Comput. 21(1): 309-324 (2024)
skipping 39 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-21 22:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint