callback( { "result":{ "query":":facetid:toc:\"db/conf/cns/cns2017.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"356.67" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"96", "@dc":"96", "@oc":"96", "@id":"43372826", "text":":facetid:toc:db/conf/cns/cns2017.bht" } }, "hits":{ "@total":"96", "@computed":"96", "@sent":"96", "@first":"0", "hit":[{ "@score":"1", "@id":"2895649", "info":{"authors":{"author":[{"@pid":"98/5660-4","text":"Xu Zhang 0004"},{"@pid":"k/EWKnightly","text":"Edward W. Knightly"}]},"title":"Massive MIMO pilot distortion attack and zero-startup-cost detection: Analysis and experiments.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/0004K17","doi":"10.1109/CNS.2017.8228634","ee":"https://doi.org/10.1109/CNS.2017.8228634","url":"https://dblp.org/rec/conf/cns/0004K17"}, "url":"URL#2895649" }, { "@score":"1", "@id":"2895650", "info":{"authors":{"author":[{"@pid":"183/6500","text":"Amr Abdelaziz"},{"@pid":"01/799","text":"C. Emre Koksal"}]},"title":"Fundamental limits of covert communication over MIMO AWGN channel.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/AbdelazizK17","doi":"10.1109/CNS.2017.8228657","ee":"https://doi.org/10.1109/CNS.2017.8228657","url":"https://dblp.org/rec/conf/cns/AbdelazizK17"}, "url":"URL#2895650" }, { "@score":"1", "@id":"2895651", "info":{"authors":{"author":[{"@pid":"211/3737","text":"Nabil Abubaker"},{"@pid":"211/3736","text":"Leonard Dervishi"},{"@pid":"44/2529","text":"Erman Ayday"}]},"title":"Privacy-preserving fog computing paradigm.","venue":"CNS","pages":"502-509","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/AbubakerDA17","doi":"10.1109/CNS.2017.8228709","ee":"https://doi.org/10.1109/CNS.2017.8228709","url":"https://dblp.org/rec/conf/cns/AbubakerDA17"}, "url":"URL#2895651" }, { "@score":"1", "@id":"2895652", "info":{"authors":{"author":[{"@pid":"176/5740","text":"Berk Akgun"},{"@pid":"47/2755","text":"Marwan Krunz"},{"@pid":"19/6211","text":"Onur Ozan Koyluoglu"}]},"title":"Pilot contamination attacks in massive MIMO systems.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/AkgunKK17","doi":"10.1109/CNS.2017.8228655","ee":"https://doi.org/10.1109/CNS.2017.8228655","url":"https://dblp.org/rec/conf/cns/AkgunKK17"}, "url":"URL#2895652" }, { "@score":"1", "@id":"2895653", "info":{"authors":{"author":[{"@pid":"86/9168","text":"Blake Anderson"},{"@pid":"m/DavidAMcGrew","text":"David A. McGrew"}]},"title":"OS fingerprinting: New techniques and a study of information gain and obfuscation.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/AndersonM17","doi":"10.1109/CNS.2017.8228647","ee":"https://doi.org/10.1109/CNS.2017.8228647","url":"https://dblp.org/rec/conf/cns/AndersonM17"}, "url":"URL#2895653" }, { "@score":"1", "@id":"2895654", "info":{"authors":{"author":[{"@pid":"211/3819","text":"Seth Andrews"},{"@pid":"73/1832","text":"Ryan M. Gerdes"},{"@pid":"l/MingLi3","text":"Ming Li 0003"}]},"title":"Towards physical layer identification of cognitive radio devices.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/AndrewsGL17","doi":"10.1109/CNS.2017.8228658","ee":"https://doi.org/10.1109/CNS.2017.8228658","url":"https://dblp.org/rec/conf/cns/AndrewsGL17"}, "url":"URL#2895654" }, { "@score":"1", "@id":"2895655", "info":{"authors":{"author":[{"@pid":"211/3848","text":"Farshad Rahimi Asl"},{"@pid":"66/2556","text":"Fei Chiang"},{"@pid":"45/2682","text":"Wenbo He"},{"@pid":"76/2789","text":"Reza Samavi"}]},"title":"Privacy aware web services in the cloud.","venue":"CNS","pages":"458-466","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/AslCHS17","doi":"10.1109/CNS.2017.8228682","ee":"https://doi.org/10.1109/CNS.2017.8228682","url":"https://dblp.org/rec/conf/cns/AslCHS17"}, "url":"URL#2895655" }, { "@score":"1", "@id":"2895656", "info":{"authors":{"author":[{"@pid":"174/6656","text":"Mohamed Aslan"},{"@pid":"11/2732","text":"Ashraf Matrawy"}]},"title":"Could network view inconsistency affect virtualized network security functions?","venue":"CNS","pages":"510-512","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/AslanM17","doi":"10.1109/CNS.2017.8228698","ee":"https://doi.org/10.1109/CNS.2017.8228698","url":"https://dblp.org/rec/conf/cns/AslanM17"}, "url":"URL#2895656" }, { "@score":"1", "@id":"2895657", "info":{"authors":{"author":[{"@pid":"162/1919","text":"Enrico Bacis"},{"@pid":"211/3712","text":"Alan Barnett"},{"@pid":"84/165","text":"Andrew Byrne"},{"@pid":"v/SabrinaDeCapitanidiVimercati","text":"Sabrina De Capitani di Vimercati"},{"@pid":"69/3814","text":"Sara Foresti"},{"@pid":"05/600","text":"Stefano Paraboschi"},{"@pid":"69/8772","text":"Marco Rosa"},{"@pid":"s/PSamarati","text":"Pierangela Samarati"}]},"title":"Distributed shuffle index: Analysis and implementation in an industrial testbed.","venue":"CNS","pages":"396-397","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/BacisBBVFPRS17","doi":"10.1109/CNS.2017.8228695","ee":"https://doi.org/10.1109/CNS.2017.8228695","url":"https://dblp.org/rec/conf/cns/BacisBBVFPRS17"}, "url":"URL#2895657" }, { "@score":"1", "@id":"2895658", "info":{"authors":{"author":[{"@pid":"162/1919","text":"Enrico Bacis"},{"@pid":"69/8772","text":"Marco Rosa"},{"@pid":"19/1866","text":"Ali Sajjad"}]},"title":"EncSwift and key management: An integrated approach in an industrial setting.","venue":"CNS","pages":"483-486","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/BacisRS17","doi":"10.1109/CNS.2017.8228711","ee":"https://doi.org/10.1109/CNS.2017.8228711","url":"https://dblp.org/rec/conf/cns/BacisRS17"}, "url":"URL#2895658" }, { "@score":"1", "@id":"2895659", "info":{"authors":{"author":[{"@pid":"51/9795","text":"Martín Barrère"},{"@pid":"l/ECLupu","text":"Emil C. Lupu"}]},"title":"Naggen: A network attack graph generation tool - IEEE CNS 17 poster.","venue":"CNS","pages":"378-379","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/BarrereL17","doi":"10.1109/CNS.2017.8228667","ee":"https://doi.org/10.1109/CNS.2017.8228667","url":"https://dblp.org/rec/conf/cns/BarrereL17"}, "url":"URL#2895659" }, { "@score":"1", "@id":"2895660", "info":{"authors":{"author":[{"@pid":"150/6244","text":"Sebastian Baur"},{"@pid":"39/3615","text":"Holger Boche"}]},"title":"Storage of general data sources on a public database with security and privacy constraints.","venue":"CNS","pages":"555-559","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/BaurB17","doi":"10.1109/CNS.2017.8228678","ee":"https://doi.org/10.1109/CNS.2017.8228678","url":"https://dblp.org/rec/conf/cns/BaurB17"}, "url":"URL#2895660" }, { "@score":"1", "@id":"2895661", "info":{"authors":{"author":[{"@pid":"189/1352","text":"Daniela Becker"},{"@pid":"51/3023","text":"Jorge Guajardo"},{"@pid":"05/5338","text":"Karl-Heinz Zimmermann"}]},"title":"Towards a new privacy-preserving social media advertising architecture (invited position paper).","venue":"CNS","pages":"45-457","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/BeckerGZ17","doi":"10.1109/CNS.2017.8228712","ee":"https://doi.org/10.1109/CNS.2017.8228712","url":"https://dblp.org/rec/conf/cns/BeckerGZ17"}, "url":"URL#2895661" }, { "@score":"1", "@id":"2895662", "info":{"authors":{"author":[{"@pid":"13/10522","text":"Shameek Bhattacharjee"},{"@pid":"55/7987","text":"Nirnay Ghosh"},{"@pid":"169/4702","text":"Vijay K. Shah"},{"@pid":"d/SajalKDas","text":"Sajal K. Das 0001"}]},"title":"QnQ: A reputation model to secure mobile crowdsourcing applications from incentive losses.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/BhattacharjeeGS17","doi":"10.1109/CNS.2017.8228635","ee":"https://doi.org/10.1109/CNS.2017.8228635","url":"https://dblp.org/rec/conf/cns/BhattacharjeeGS17"}, "url":"URL#2895662" }, { "@score":"1", "@id":"2895663", "info":{"authors":{"author":[{"@pid":"14/2769","text":"Erik-Oliver Blass"},{"@pid":"25/5432","text":"Guevara Noubir"}]},"title":"Secure logging with crash tolerance.","venue":"CNS","pages":"1-10","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/BlassN17","doi":"10.1109/CNS.2017.8228649","ee":"https://doi.org/10.1109/CNS.2017.8228649","url":"https://dblp.org/rec/conf/cns/BlassN17"}, "url":"URL#2895663" }, { "@score":"1", "@id":"2895664", "info":{"authors":{"author":[{"@pid":"211/3731","text":"Konstantin Boyarinov"},{"@pid":"28/4803-1","text":"Aaron Hunter 0001"}]},"title":"Security and trust for surveillance cameras.","venue":"CNS","pages":"384-385","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/BoyarinovH17","doi":"10.1109/CNS.2017.8228676","ee":"https://doi.org/10.1109/CNS.2017.8228676","url":"https://dblp.org/rec/conf/cns/BoyarinovH17"}, "url":"URL#2895664" }, { "@score":"1", "@id":"2895665", "info":{"authors":{"author":[{"@pid":"199/2302","text":"Prashanth Busireddygari"},{"@pid":"47/717","text":"Subhash C. Kak"}]},"title":"Binary primes sequence for cryptography and secure communication.","venue":"CNS","pages":"570-574","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/BusireddygariK17","doi":"10.1109/CNS.2017.8228686","ee":"https://doi.org/10.1109/CNS.2017.8228686","url":"https://dblp.org/rec/conf/cns/BusireddygariK17"}, "url":"URL#2895665" }, { "@score":"1", "@id":"2895666", "info":{"authors":{"author":[{"@pid":"92/4021","text":"Chang-Wu Chen"},{"@pid":"86/10759","text":"Sang-Yoon Chang"},{"@pid":"51/6805","text":"Yih-Chun Hu"},{"@pid":"26/2646","text":"Yen-Wen Chen"}]},"title":"Protecting vehicular networks privacy in the presence of a single adversarial authority.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/ChenCHC17","doi":"10.1109/CNS.2017.8228648","ee":"https://doi.org/10.1109/CNS.2017.8228648","url":"https://dblp.org/rec/conf/cns/ChenCHC17"}, "url":"URL#2895666" }, { "@score":"1", "@id":"2895667", "info":{"authors":{"author":[{"@pid":"89/2506","text":"Wei Cheng"},{"@pid":"08/3135","text":"Aidong Xu"},{"@pid":"26/5034","text":"Yixin Jiang"},{"@pid":"94/5572-1","text":"Hong Wen 0001"},{"@pid":"160/0773","text":"Huanhuan Song"},{"@pid":"67/2866","text":"Kai Ouyang"},{"@pid":"130/9322","text":"Xiping Zhu"}]},"title":"A method of reconciling the key discrepancy by exploiting unconditional secure transmission.","venue":"CNS","pages":"372-373","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/ChengXJWSOZ17","doi":"10.1109/CNS.2017.8228664","ee":"https://doi.org/10.1109/CNS.2017.8228664","url":"https://dblp.org/rec/conf/cns/ChengXJWSOZ17"}, "url":"URL#2895667" }, { "@score":"1", "@id":"2895668", "info":{"authors":{"author":[{"@pid":"89/2506","text":"Wei Cheng"},{"@pid":"08/3135","text":"Aidong Xu"},{"@pid":"26/5034","text":"Yixin Jiang"},{"@pid":"94/5572-1","text":"Hong Wen 0001"},{"@pid":"160/0773","text":"Huanhuan Song"},{"@pid":"67/2866","text":"Kai Ouyang"},{"@pid":"130/9322","text":"Xiping Zhu"}]},"title":"The realization of key extraction based on USRP and OFDM channel response.","venue":"CNS","pages":"374-375","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/ChengXJWSOZ17a","doi":"10.1109/CNS.2017.8228665","ee":"https://doi.org/10.1109/CNS.2017.8228665","url":"https://dblp.org/rec/conf/cns/ChengXJWSOZ17a"}, "url":"URL#2895668" }, { "@score":"1", "@id":"2895669", "info":{"authors":{"author":[{"@pid":"140/7525","text":"Gradeigh D. Clark"},{"@pid":"65/1182","text":"Janne Lindqvist"},{"@pid":"93/99","text":"Antti Oulasvirta"}]},"title":"Composition policies for gesture passwords: User choice, security, usability and memorability.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/ClarkLO17","doi":"10.1109/CNS.2017.8228644","ee":"https://doi.org/10.1109/CNS.2017.8228644","url":"https://dblp.org/rec/conf/cns/ClarkLO17"}, "url":"URL#2895669" }, { "@score":"1", "@id":"2895670", "info":{"authors":{"author":[{"@pid":"211/3673","text":"Franck Cornevaux-Juignet"},{"@pid":"16/1399","text":"Matthieu Arzel"},{"@pid":"67/7646","text":"Pierre-Henri Horrein"},{"@pid":"40/9980","text":"Tristan Groleat"},{"@pid":"26/372","text":"Christian Person"}]},"title":"Combining FPGAs and processors for high-throughput forensics IEEE CNS 17 poster.","venue":"CNS","pages":"388-389","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/Cornevaux-Juignet17","doi":"10.1109/CNS.2017.8228684","ee":"https://doi.org/10.1109/CNS.2017.8228684","url":"https://dblp.org/rec/conf/cns/Cornevaux-Juignet17"}, "url":"URL#2895670" }, { "@score":"1", "@id":"2895671", "info":{"authors":{"author":[{"@pid":"211/3673","text":"Franck Cornevaux-Juignet"},{"@pid":"16/1399","text":"Matthieu Arzel"},{"@pid":"67/7646","text":"Pierre-Henri Horrein"},{"@pid":"40/9980","text":"Tristan Groleat"},{"@pid":"26/372","text":"Christian Person"}]},"title":"Open-source flexible packet parser for high data rate agile network probe.","venue":"CNS","pages":"610-618","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/Cornevaux-Juignet17a","doi":"10.1109/CNS.2017.8228685","ee":"https://doi.org/10.1109/CNS.2017.8228685","url":"https://dblp.org/rec/conf/cns/Cornevaux-Juignet17a"}, "url":"URL#2895671" }, { "@score":"1", "@id":"2895672", "info":{"authors":{"author":[{"@pid":"62/737","text":"Giovanni Di Crescenzo"},{"@pid":"211/3726","text":"Matluba Khodjaeva"},{"@pid":"71/4705","text":"Delaram Kahrobaei"},{"@pid":"78/1532","text":"Vladimir Shpilrain"}]},"title":"Computing multiple exponentiations in discrete log and RSA groups: From batch verification to batch delegation.","venue":"CNS","pages":"531-539","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/CrescenzoKKS17","doi":"10.1109/CNS.2017.8228702","ee":"https://doi.org/10.1109/CNS.2017.8228702","url":"https://dblp.org/rec/conf/cns/CrescenzoKKS17"}, "url":"URL#2895672" }, { "@score":"1", "@id":"2895673", "info":{"authors":{"author":[{"@pid":"69/870-9","text":"Wei Du 0009"},{"@pid":"34/4755","text":"Qinghua Li"}]},"title":"Secure and efficient outsourcing of large-scale nonlinear programming.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/DuL17","doi":"10.1109/CNS.2017.8228633","ee":"https://doi.org/10.1109/CNS.2017.8228633","url":"https://dblp.org/rec/conf/cns/DuL17"}, "url":"URL#2895673" }, { "@score":"1", "@id":"2895674", "info":{"authors":{"author":[{"@pid":"150/3139","text":"Song Fang"},{"@pid":"180/8226","text":"Ian D. Markwood"},{"@pid":"64/424-7","text":"Yao Liu 0007"}]},"title":"Manipulatable wireless key establishment.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/FangML17","doi":"10.1109/CNS.2017.8228625","ee":"https://doi.org/10.1109/CNS.2017.8228625","url":"https://dblp.org/rec/conf/cns/FangML17"}, "url":"URL#2895674" }, { "@score":"1", "@id":"2895675", "info":{"authors":{"author":[{"@pid":"15/67","text":"Matthias Frey"},{"@pid":"01/534","text":"Igor Bjelakovic"},{"@pid":"s/SlawomirStanczak","text":"Slawomir Stanczak"}]},"title":"MAC resolvability: First and second order results.","venue":"CNS","pages":"560-564","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/FreyBS17","doi":"10.1109/CNS.2017.8228683","ee":"https://doi.org/10.1109/CNS.2017.8228683","url":"https://dblp.org/rec/conf/cns/FreyBS17"}, "url":"URL#2895675" }, { "@score":"1", "@id":"2895676", "info":{"authors":{"author":[{"@pid":"150/5499","text":"Rick Fritschek"},{"@pid":"63/5261","text":"Gerhard Wunder"}]},"title":"On full-duplex secure key generation with deterministic models.","venue":"CNS","pages":"550-554","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/FritschekW17","doi":"10.1109/CNS.2017.8228687","ee":"https://doi.org/10.1109/CNS.2017.8228687","url":"https://dblp.org/rec/conf/cns/FritschekW17"}, "url":"URL#2895676" }, { "@score":"1", "@id":"2895677", "info":{"authors":{"author":[{"@pid":"23/4245","text":"Andrey Garnaev"},{"@pid":"72/5440","text":"Wade Trappe"}]},"title":"An OFDM-based dual radar/communication system facing uncertain jamming power.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/GarnaevT17","doi":"10.1109/CNS.2017.8228632","ee":"https://doi.org/10.1109/CNS.2017.8228632","url":"https://dblp.org/rec/conf/cns/GarnaevT17"}, "url":"URL#2895677" }, { "@score":"1", "@id":"2895678", "info":{"authors":{"author":[{"@pid":"176/5923","text":"Mohamed Grissa"},{"@pid":"73/4897","text":"Attila A. Yavuz"},{"@pid":"89/4899","text":"Bechir Hamdaoui"}]},"title":"When the hammer meets the nail: Multi-server PIR for database-driven CRN with location privacy assurance.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/GrissaYH17","doi":"10.1109/CNS.2017.8228646","ee":"https://doi.org/10.1109/CNS.2017.8228646","url":"https://dblp.org/rec/conf/cns/GrissaYH17"}, "url":"URL#2895678" }, { "@score":"1", "@id":"2895679", "info":{"authors":{"author":[{"@pid":"18/10571","text":"Bilal Habib"},{"@pid":"178/3641","text":"Bertrand Cambou"},{"@pid":"211/3886","text":"Duane Booher"},{"@pid":"211/3640","text":"Christopher Robert Philabaum"}]},"title":"Public key exchange scheme that is addressable (PKA).","venue":"CNS","pages":"392-393","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/HabibCBP17","doi":"10.1109/CNS.2017.8228693","ee":"https://doi.org/10.1109/CNS.2017.8228693","url":"https://dblp.org/rec/conf/cns/HabibCBP17"}, "url":"URL#2895679" }, { "@score":"1", "@id":"2895680", "info":{"authors":{"author":[{"@pid":"199/2650","text":"Julie M. Haney"},{"@pid":"70/2101","text":"Simson L. Garfinkel"},{"@pid":"72/2304","text":"Mary Frances Theofanos"}]},"title":"Organizational practices in cryptographic development and testing.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/HaneyGT17","doi":"10.1109/CNS.2017.8228643","ee":"https://doi.org/10.1109/CNS.2017.8228643","url":"https://dblp.org/rec/conf/cns/HaneyGT17"}, "url":"URL#2895680" }, { "@score":"1", "@id":"2895681", "info":{"authors":{"author":[{"@pid":"69/2814","text":"Jagadeesh Harshan"},{"@pid":"86/10759","text":"Sang-Yoon Chang"},{"@pid":"33/11191","text":"Seungmin Kang"},{"@pid":"51/6805","text":"Yih-Chun Hu"}]},"title":"Securing balise-based train control systems using cryptographic random fountains.","venue":"CNS","pages":"405-410","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/HarshanCKH17","doi":"10.1109/CNS.2017.8228689","ee":"https://doi.org/10.1109/CNS.2017.8228689","url":"https://dblp.org/rec/conf/cns/HarshanCKH17"}, "url":"URL#2895681" }, { "@score":"1", "@id":"2895682", "info":{"authors":{"author":[{"@pid":"211/3753","text":"J. P. Houle"},{"@pid":"81/1806","text":"S. Ahmadi"},{"@pid":"211/3787","text":"B. C. A. Robart"},{"@pid":"11/2732","text":"Ashraf Matrawy"}]},"title":"Leveraging inter-controller communication to MitigateDDoS attacks in SDN networks.","venue":"CNS","pages":"376-377","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/HouleARM17","doi":"10.1109/CNS.2017.8228666","ee":"https://doi.org/10.1109/CNS.2017.8228666","url":"https://dblp.org/rec/conf/cns/HouleARM17"}, "url":"URL#2895682" }, { "@score":"1", "@id":"2895683", "info":{"authors":{"author":[{"@pid":"62/10077","text":"Zonghao Huang"},{"@pid":"145/6503-1","text":"Yanmin Gong 0001"}]},"title":"Differential location privacy for crowdsourced spectrum sensing.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/HuangG17","doi":"10.1109/CNS.2017.8228652","ee":"https://doi.org/10.1109/CNS.2017.8228652","url":"https://dblp.org/rec/conf/cns/HuangG17"}, "url":"URL#2895683" }, { "@score":"1", "@id":"2895684", "info":{"authors":{"author":[{"@pid":"220/7716","text":"R. Padmavathi Iyer"},{"@pid":"81/478","text":"Pradeep K. Atrey"},{"@pid":"73/4883","text":"Gaurav Varshney"},{"@pid":"71/3734","text":"Manoj Misra"}]},"title":"Email spoofing detection using volatile memory forensics.","venue":"CNS","pages":"619-625","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/IyerAVM17","doi":"10.1109/CNS.2017.8228692","ee":"https://doi.org/10.1109/CNS.2017.8228692","url":"https://dblp.org/rec/conf/cns/IyerAVM17"}, "url":"URL#2895684" }, { "@score":"1", "@id":"2895685", "info":{"authors":{"author":[{"@pid":"168/1932","text":"Yujie Ji"},{"@pid":"29/2669-1","text":"Xinyang Zhang 0001"},{"@pid":"12/2633-6","text":"Ting Wang 0006"}]},"title":"Backdoor attacks against learning systems.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/JiZW17","doi":"10.1109/CNS.2017.8228656","ee":"https://doi.org/10.1109/CNS.2017.8228656","url":"https://dblp.org/rec/conf/cns/JiZW17"}, "url":"URL#2895685" }, { "@score":"1", "@id":"2895686", "info":{"authors":{"author":[{"@pid":"151/0307","text":"Kun Jin"},{"@pid":"211/3852","text":"Si Fang"},{"@pid":"98/3313-1","text":"Chunyi Peng 0001"},{"@pid":"136/8660","text":"Zhiyang Teng"},{"@pid":"26/775","text":"XuFei Mao"},{"@pid":"54/2752-2","text":"Lan Zhang 0002"},{"@pid":"l/XiangYangLi","text":"Xiangyang Li 0001"}]},"title":"ViViSnoop: Someone is snooping your typing without seeing it!","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/JinFPTMZL17","doi":"10.1109/CNS.2017.8228624","ee":"https://doi.org/10.1109/CNS.2017.8228624","url":"https://dblp.org/rec/conf/cns/JinFPTMZL17"}, "url":"URL#2895686" }, { "@score":"1", "@id":"2895687", "info":{"authors":{"author":[{"@pid":"175/5350","text":"Dennis Kergl"},{"@pid":"153/2839","text":"Robert Roedler"},{"@pid":"97/1158","text":"Gabi Dreo Rodosek"}]},"title":"VulMap: Global information security vulnerabilities IEEE CNS 17 poster.","venue":"CNS","pages":"362-363","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/KerglRR17","doi":"10.1109/CNS.2017.8228659","ee":"https://doi.org/10.1109/CNS.2017.8228659","url":"https://dblp.org/rec/conf/cns/KerglRR17"}, "url":"URL#2895687" }, { "@score":"1", "@id":"2895688", "info":{"authors":{"author":[{"@pid":"211/3724","text":"Mani Khavari"},{"@pid":"150/6244","text":"Sebastian Baur"},{"@pid":"39/3615","text":"Holger Boche"}]},"title":"Optimal capacity region for PUF-based authentication with a constraint on the number of challenge-response pairs.","venue":"CNS","pages":"575-579","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/KhavariBB17","doi":"10.1109/CNS.2017.8228679","ee":"https://doi.org/10.1109/CNS.2017.8228679","url":"https://dblp.org/rec/conf/cns/KhavariBB17"}, "url":"URL#2895688" }, { "@score":"1", "@id":"2895689", "info":{"authors":{"author":[{"@pid":"211/3876","text":"Youssef Khazbak"},{"@pid":"c/GuohongCao","text":"Guohong Cao"}]},"title":"Deanonymizing mobility traces with co-location information.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/KhazbakC17","doi":"10.1109/CNS.2017.8228621","ee":"https://doi.org/10.1109/CNS.2017.8228621","url":"https://dblp.org/rec/conf/cns/KhazbakC17"}, "url":"URL#2895689" }, { "@score":"1", "@id":"2895690", "info":{"authors":{"author":[{"@pid":"211/3659","text":"R. James Ranjith Kumar"},{"@pid":"s/BiplabSikdar","text":"Biplab Sikdar 0001"}]},"title":"Efficient detection of false data injection attacks on AC state estimation in smart grids.","venue":"CNS","pages":"411-415","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/KumarS17","doi":"10.1109/CNS.2017.8228707","ee":"https://doi.org/10.1109/CNS.2017.8228707","url":"https://dblp.org/rec/conf/cns/KumarS17"}, "url":"URL#2895690" }, { "@score":"1", "@id":"2895691", "info":{"authors":{"author":[{"@pid":"210/6365","text":"Sukwha Kyung"},{"@pid":"136/2499","text":"Wonkyu Han"},{"@pid":"205/2267","text":"Naveen Tiwari"},{"@pid":"210/6346","text":"Vaibhav Hemant Dixit"},{"@pid":"57/10318","text":"Lakshmi Srinivas"},{"@pid":"11/7704-1","text":"Ziming Zhao 0001"},{"@pid":"28/8280","text":"Adam Doupé"},{"@pid":"a/GailJoonAhn","text":"Gail-Joon Ahn"}]},"title":"HoneyProxy: Design and implementation of next-generation honeynet via SDN.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/KyungHTDSZDA17","doi":"10.1109/CNS.2017.8228653","ee":"https://doi.org/10.1109/CNS.2017.8228653","url":"https://dblp.org/rec/conf/cns/KyungHTDSZDA17"}, "url":"URL#2895691" }, { "@score":"1", "@id":"2895692", "info":{"authors":{"author":[{"@pid":"47/8960","text":"Heather Lawrence"},{"@pid":"37/922","text":"Andrew Hughes"},{"@pid":"211/3845","text":"Robert Tonic"},{"@pid":"z/CliffChangchunZou","text":"Cliff C. Zou"}]},"title":"D-miner: A framework for mining, searching, visualizing, and alerting on darknet events.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/LawrenceHTZ17","doi":"10.1109/CNS.2017.8228628","ee":"https://doi.org/10.1109/CNS.2017.8228628","url":"https://dblp.org/rec/conf/cns/LawrenceHTZ17"}, "url":"URL#2895692" }, { "@score":"1", "@id":"2895693", "info":{"authors":{"author":[{"@pid":"02/2778","text":"Jong-Hoon Lee"},{"@pid":"19/843","text":"Young Soo Kim"},{"@pid":"92/5951","text":"Jong-Hyun Kim"},{"@pid":"23/6710","text":"Ik-Kyun Kim"}]},"title":"Toward the SIEM architecture for cloud-based security services.","venue":"CNS","pages":"398-399","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/LeeKKK17","doi":"10.1109/CNS.2017.8228696","ee":"https://doi.org/10.1109/CNS.2017.8228696","url":"https://dblp.org/rec/conf/cns/LeeKKK17"}, "url":"URL#2895693" }, { "@score":"1", "@id":"2895694", "info":{"authors":{"author":[{"@pid":"202/2697","text":"Sarah M. Lehman"},{"@pid":"71/3836","text":"Chiu C. Tan 0001"}]},"title":"PrivacyManager: An access control framework for mobile augmented reality applications.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/LehmanT17","doi":"10.1109/CNS.2017.8228630","ee":"https://doi.org/10.1109/CNS.2017.8228630","url":"https://dblp.org/rec/conf/cns/LehmanT17"}, "url":"URL#2895694" }, { "@score":"1", "@id":"2895695", "info":{"authors":{"author":[{"@pid":"203/2034","text":"Runfa Liao"},{"@pid":"94/5572-1","text":"Hong Wen 0001"},{"@pid":"97/305","text":"Fei Pan"},{"@pid":"160/0773","text":"Huanhuan Song"},{"@pid":"26/5034","text":"Yixin Jiang"},{"@pid":"211/3831","text":"FeiYi Xie"},{"@pid":"08/3135","text":"Aidong Xu"}]},"title":"A physical layer secure transmission method based on channel prediction and QoS.","venue":"CNS","pages":"366-367","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/LiaoWPSJXX17","doi":"10.1109/CNS.2017.8228661","ee":"https://doi.org/10.1109/CNS.2017.8228661","url":"https://dblp.org/rec/conf/cns/LiaoWPSJXX17"}, "url":"URL#2895695" }, { "@score":"1", "@id":"2895696", "info":{"authors":{"author":[{"@pid":"78/6365-2","text":"Hongbo Liu 0002"},{"@pid":"58/2670-58","text":"Bo Liu 0058"},{"@pid":"07/6946-4","text":"Cong Shi 0004"},{"@pid":"18/2343-1","text":"Yingying Chen 0001"}]},"title":"Secret key distribution leveraging color shift over visible light channel.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/LiuLSC17","doi":"10.1109/CNS.2017.8228626","ee":"https://doi.org/10.1109/CNS.2017.8228626","url":"https://dblp.org/rec/conf/cns/LiuLSC17"}, "url":"URL#2895696" }, { "@score":"1", "@id":"2895697", "info":{"authors":{"author":[{"@pid":"64/3137","text":"Changwei Liu"},{"@pid":"57/1382","text":"Anoop Singhal"},{"@pid":"w/DumindaWijesekera","text":"Duminda Wijesekera"}]},"title":"A layered graphical model for mission attack impact analysis.","venue":"CNS","pages":"602-609","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/LiuSW17","doi":"10.1109/CNS.2017.8228706","ee":"https://doi.org/10.1109/CNS.2017.8228706","url":"https://dblp.org/rec/conf/cns/LiuSW17"}, "url":"URL#2895697" }, { "@score":"1", "@id":"2895698", "info":{"authors":{"author":[{"@pid":"28/7592","text":"Avradip Mandal"},{"@pid":"m/JohnCMitchell","text":"John C. Mitchell"},{"@pid":"44/8733","text":"Hart William Montgomery"},{"@pid":"88/4138-1","text":"Arnab Roy 0001"}]},"title":"Privacy for targeted advertising.","venue":"CNS","pages":"438-443","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/MandalMM017","doi":"10.1109/CNS.2017.8228673","ee":"https://doi.org/10.1109/CNS.2017.8228673","url":"https://dblp.org/rec/conf/cns/MandalMM017"}, "url":"URL#2895698" }, { "@score":"1", "@id":"2895699", "info":{"authors":{"author":[{"@pid":"211/3828","text":"Marmara El Masri"},{"@pid":"55/2640","text":"Natalija Vlajic"}]},"title":"Current state of client-side extensions aimed at protecting against CSRF-like attacks.","venue":"CNS","pages":"390-391","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/MasriV17","doi":"10.1109/CNS.2017.8228690","ee":"https://doi.org/10.1109/CNS.2017.8228690","url":"https://dblp.org/rec/conf/cns/MasriV17"}, "url":"URL#2895699" }, { "@score":"1", "@id":"2895700", "info":{"authors":{"author":{"@pid":"211/3868","text":"Robert C. Mitchell"}},"title":"Epidemic-resistant configurations for intrusion detection systems.","venue":"CNS","pages":"487-494","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/Mitchell17","doi":"10.1109/CNS.2017.8228672","ee":"https://doi.org/10.1109/CNS.2017.8228672","url":"https://dblp.org/rec/conf/cns/Mitchell17"}, "url":"URL#2895700" }, { "@score":"1", "@id":"2895701", "info":{"authors":{"author":[{"@pid":"67/5995","text":"Robert Mitchell"},{"@pid":"211/3847","text":"Marci McBride"},{"@pid":"172/6536","text":"John Jarocki"}]},"title":"Linkography abstraction refinement and cyber security.","venue":"CNS","pages":"595-601","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/MitchellMJ17","doi":"10.1109/CNS.2017.8228675","ee":"https://doi.org/10.1109/CNS.2017.8228675","url":"https://dblp.org/rec/conf/cns/MitchellMJ17"}, "url":"URL#2895701" }, { "@score":"1", "@id":"2895702", "info":{"authors":{"author":[{"@pid":"184/6077","text":"Utku Ozgur"},{"@pid":"211/3870","text":"Harikrishnan T. Nair"},{"@pid":"157/6306","text":"Aditya Sundararajan"},{"@pid":"88/755","text":"Kemal Akkaya"},{"@pid":"157/6317","text":"Arif I. Sarwat"}]},"title":"An efficient MQTT framework for control and protection of networked cyber-physical systems.","venue":"CNS","pages":"421-426","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/OzgurNSAS17","doi":"10.1109/CNS.2017.8228674","ee":"https://doi.org/10.1109/CNS.2017.8228674","url":"https://dblp.org/rec/conf/cns/OzgurNSAS17"}, "url":"URL#2895702" }, { "@score":"1", "@id":"2895703", "info":{"authors":{"author":[{"@pid":"97/305","text":"Fei Pan"},{"@pid":"94/5572-1","text":"Hong Wen 0001"},{"@pid":"203/2034","text":"Runfa Liao"},{"@pid":"26/5034","text":"Yixin Jiang"},{"@pid":"08/3135","text":"Aidong Xu"},{"@pid":"67/2866","text":"Kai Ouyang"},{"@pid":"130/9322","text":"Xiping Zhu"}]},"title":"Physical layer authentication based on channel information and machine learning.","venue":"CNS","pages":"364-365","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/PanWLJXOZ17","doi":"10.1109/CNS.2017.8228660","ee":"https://doi.org/10.1109/CNS.2017.8228660","url":"https://dblp.org/rec/conf/cns/PanWLJXOZ17"}, "url":"URL#2895703" }, { "@score":"1", "@id":"2895704", "info":{"authors":{"author":[{"@pid":"211/3812","text":"Steffen Passmann"},{"@pid":"211/3672","text":"Anne Lauber-Roensberg"},{"@pid":"69/2809","text":"Thorsten Strufe"}]},"title":"Privacy-preserving audience measurement in practice - Opportunities and challenges.","venue":"CNS","pages":"444-449","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/PassmannLS17","doi":"10.1109/CNS.2017.8228680","ee":"https://doi.org/10.1109/CNS.2017.8228680","url":"https://dblp.org/rec/conf/cns/PassmannLS17"}, "url":"URL#2895704" }, { "@score":"1", "@id":"2895705", "info":{"authors":{"author":[{"@pid":"37/9786","text":"Vikram Patil"},{"@pid":"211/3838","text":"Shivam Parikh"},{"@pid":"84/9555","text":"Priyanka Singh"},{"@pid":"81/478","text":"Pradeep K. Atrey"}]},"title":"GeoSecure: Towards secure outsourcing of GPS data over cloud.","venue":"CNS","pages":"495-501","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/PatilPSA17","doi":"10.1109/CNS.2017.8228699","ee":"https://doi.org/10.1109/CNS.2017.8228699","url":"https://dblp.org/rec/conf/cns/PatilPSA17"}, "url":"URL#2895705" }, { "@score":"1", "@id":"2895706", "info":{"authors":{"author":[{"@pid":"160/8682","text":"Jeffrey Pawlick"},{"@pid":"03/6207","text":"Quanyan Zhu"}]},"title":"Quantitative models of imperfect deception in network security using signaling games with evidence [IEEE CNS 17 Poster].","venue":"CNS","pages":"394-395","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/PawlickZ17","doi":"10.1109/CNS.2017.8228694","ee":"https://doi.org/10.1109/CNS.2017.8228694","url":"https://dblp.org/rec/conf/cns/PawlickZ17"}, "url":"URL#2895706" }, { "@score":"1", "@id":"2895707", "info":{"authors":{"author":[{"@pid":"137/0114","text":"Ahmed Refaey"},{"@pid":"58/7481","text":"Khaled Loukhaoukha"},{"@pid":"20/6375","text":"Adel Omar Dahmane"}]},"title":"Cryptanalysis of stream cipher using density evolution.","venue":"CNS","pages":"382-383","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/RefaeyLD17","doi":"10.1109/CNS.2017.8228669","ee":"https://doi.org/10.1109/CNS.2017.8228669","url":"https://dblp.org/rec/conf/cns/RefaeyLD17"}, "url":"URL#2895707" }, { "@score":"1", "@id":"2895708", "info":{"authors":{"author":[{"@pid":"211/3633","text":"Sandra Domenique Ringmann"},{"@pid":"64/2317","text":"Hanno Langweg"}]},"title":"Determining security requirements for cloud-supported routing of physical goods.","venue":"CNS","pages":"514-521","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/RingmannL17","doi":"10.1109/CNS.2017.8228691","ee":"https://doi.org/10.1109/CNS.2017.8228691","url":"https://dblp.org/rec/conf/cns/RingmannL17"}, "url":"URL#2895708" }, { "@score":"1", "@id":"2895709", "info":{"authors":{"author":[{"@pid":"41/3822","text":"Erkuden Rios"},{"@pid":"49/9493","text":"Eider Iturbe"},{"@pid":"74/4777","text":"Wissam Mallouli"},{"@pid":"90/6488","text":"Massimiliano Rak"}]},"title":"Dynamic security assurance in multi-cloud DevOps.","venue":"CNS","pages":"467-475","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/RiosIMR17","doi":"10.1109/CNS.2017.8228701","ee":"https://doi.org/10.1109/CNS.2017.8228701","url":"https://dblp.org/rec/conf/cns/RiosIMR17"}, "url":"URL#2895709" }, { "@score":"1", "@id":"2895710", "info":{"authors":{"author":[{"@pid":"142/7932","text":"John D. Roth"},{"@pid":"39/2944","text":"Jeremy Martin"},{"@pid":"74/8292","text":"Travis Mayberry"}]},"title":"A graph-theoretic approach to virtual access point correlation.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/RothMM17","doi":"10.1109/CNS.2017.8228645","ee":"https://doi.org/10.1109/CNS.2017.8228645","url":"https://dblp.org/rec/conf/cns/RothMM17"}, "url":"URL#2895710" }, { "@score":"1", "@id":"2895711", "info":{"authors":{"author":[{"@pid":"41/3519","text":"Robert Seeliger"},{"@pid":"204/4378","text":"Daniel Silhavy"},{"@pid":"83/1328","text":"Stefan Arbanowski"}]},"title":"Dynamic ad-insertion and content orchestration workflows through manifest manipulation in HLS and MPEG-DASH.","venue":"CNS","pages":"450-455","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/SeeligerSA17","doi":"10.1109/CNS.2017.8228708","ee":"https://doi.org/10.1109/CNS.2017.8228708","url":"https://dblp.org/rec/conf/cns/SeeligerSA17"}, "url":"URL#2895711" }, { "@score":"1", "@id":"2895712", "info":{"authors":{"author":[{"@pid":"160/0773","text":"Huanhuan Song"},{"@pid":"115/4408","text":"Luping Zhang"},{"@pid":"94/5572-1","text":"Hong Wen 0001"},{"@pid":"08/3135","text":"Aidong Xu"},{"@pid":"26/5034","text":"Yixin Jiang"},{"@pid":"203/2034","text":"Runfa Liao"},{"@pid":"77/9456","text":"Songlin Chen"},{"@pid":"49/6574","text":"Yi Chen"}]},"title":"Performance analysis of cooperative secure transmission system.","venue":"CNS","pages":"368-369","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/SongZWXJLCC17","doi":"10.1109/CNS.2017.8228662","ee":"https://doi.org/10.1109/CNS.2017.8228662","url":"https://dblp.org/rec/conf/cns/SongZWXJLCC17"}, "url":"URL#2895712" }, { "@score":"1", "@id":"2895713", "info":{"authors":{"author":[{"@pid":"211/3661","text":"Mingshun Sun"},{"@pid":"l/MingLi3","text":"Ming Li 0003"},{"@pid":"73/1832","text":"Ryan M. Gerdes"}]},"title":"A data trust framework for VANETs enabling false data detection and secure vehicle tracking.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/SunLG17","doi":"10.1109/CNS.2017.8228654","ee":"https://doi.org/10.1109/CNS.2017.8228654","url":"https://dblp.org/rec/conf/cns/SunLG17"}, "url":"URL#2895713" }, { "@score":"1", "@id":"2895714", "info":{"authors":{"author":[{"@pid":"36/1447","text":"Jianhua Sun"},{"@pid":"30/3530-1","text":"Kun Sun 0001"},{"@pid":"181/2688-2","text":"Qi Li 0002"}]},"title":"CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/SunSL17","doi":"10.1109/CNS.2017.8228642","ee":"https://doi.org/10.1109/CNS.2017.8228642","url":"https://dblp.org/rec/conf/cns/SunSL17"}, "url":"URL#2895714" }, { "@score":"1", "@id":"2895715", "info":{"authors":{"author":[{"@pid":"164/8104","text":"Bojan Suzic"},{"@pid":"70/10330","text":"Andreas Reiter"},{"@pid":"79/11260","text":"Alexander Marsalek"}]},"title":"Structuring the Scope: Enabling adaptive and multilateral authorization management.","venue":"CNS","pages":"522-530","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/SuzicRM17","doi":"10.1109/CNS.2017.8228700","ee":"https://doi.org/10.1109/CNS.2017.8228700","url":"https://dblp.org/rec/conf/cns/SuzicRM17"}, "url":"URL#2895715" }, { "@score":"1", "@id":"2895716", "info":{"authors":{"author":[{"@pid":"139/0697","text":"Mehrdad Tahmasbi"},{"@pid":"36/10963","text":"Matthieu R. Bloch"}]},"title":"Covert secret key generation.","venue":"CNS","pages":"540-544","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/TahmasbiB17","doi":"10.1109/CNS.2017.8228681","ee":"https://doi.org/10.1109/CNS.2017.8228681","url":"https://dblp.org/rec/conf/cns/TahmasbiB17"}, "url":"URL#2895716" }, { "@score":"1", "@id":"2895717", "info":{"authors":{"author":[{"@pid":"29/7482","text":"Mohamed Haj Taieb"},{"@pid":"95/2968","text":"Jean-Yves Chouinard"}]},"title":"Physical layer security using BCH and LDPC codes with adaptive granular HARQ.","venue":"CNS","pages":"564-569","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/TaiebC17","doi":"10.1109/CNS.2017.8228670","ee":"https://doi.org/10.1109/CNS.2017.8228670","url":"https://dblp.org/rec/conf/cns/TaiebC17"}, "url":"URL#2895717" }, { "@score":"1", "@id":"2895718", "info":{"authors":{"author":[{"@pid":"88/3365","text":"Hailun Tan"},{"@pid":"08/1183","text":"Gene Tsudik"},{"@pid":"j/SanjayJha","text":"Sanjay Jha 0001"}]},"title":"MTRA: Multiple-tier remote attestation in IoT networks.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/TanTJ17","doi":"10.1109/CNS.2017.8228638","ee":"https://doi.org/10.1109/CNS.2017.8228638","url":"https://dblp.org/rec/conf/cns/TanTJ17"}, "url":"URL#2895718" }, { "@score":"1", "@id":"2895719", "info":{"authors":{"author":[{"@pid":"192/9839","text":"Yifan Tian"},{"@pid":"31/10644","text":"Yantian Hou"},{"@pid":"03/11190","text":"Jiawei Yuan"}]},"title":"CAPIA: Cloud assisted privacy-preserving image annotation.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/TianHY17","doi":"10.1109/CNS.2017.8228627","ee":"https://doi.org/10.1109/CNS.2017.8228627","url":"https://dblp.org/rec/conf/cns/TianHY17"}, "url":"URL#2895719" }, { "@score":"1", "@id":"2895720", "info":{"authors":{"author":[{"@pid":"206/6564","text":"Anselme Tueno"},{"@pid":"26/5304","text":"Florian Kerschbaum"},{"@pid":"202/6742","text":"Daniel Bernau"},{"@pid":"69/3814","text":"Sara Foresti"}]},"title":"Selective access for supply chain management in the cloud.","venue":"CNS","pages":"476-482","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/TuenoKBF17","doi":"10.1109/CNS.2017.8228710","ee":"https://doi.org/10.1109/CNS.2017.8228710","url":"https://dblp.org/rec/conf/cns/TuenoKBF17"}, "url":"URL#2895720" }, { "@score":"1", "@id":"2895721", "info":{"authors":{"author":[{"@pid":"151/0437","text":"Elena Uchiteleva"},{"@pid":"26/704","text":"Abdallah Shami"},{"@pid":"137/0114","text":"Ahmed Refaey"}]},"title":"Time-varying keys for encryption in WSNs: IEEE CNS 17 poster.","venue":"CNS","pages":"380-381","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/UchitelevaSR17","doi":"10.1109/CNS.2017.8228668","ee":"https://doi.org/10.1109/CNS.2017.8228668","url":"https://dblp.org/rec/conf/cns/UchitelevaSR17"}, "url":"URL#2895721" }, { "@score":"1", "@id":"2895722", "info":{"authors":{"author":[{"@pid":"144/7426","text":"Huangxin Wang"},{"@pid":"151/8886","text":"Zhonghua Xi"},{"@pid":"87/3534-1","text":"Fei Li 0001"},{"@pid":"47/3276","text":"Songqing Chen"}]},"title":"WebTrap: A dynamic defense scheme against economic denial of sustainability attacks.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/WangX0C17","doi":"10.1109/CNS.2017.8228640","ee":"https://doi.org/10.1109/CNS.2017.8228640","url":"https://dblp.org/rec/conf/cns/WangX0C17"}, "url":"URL#2895722" }, { "@score":"1", "@id":"2895723", "info":{"authors":{"author":[{"@pid":"77/2177","text":"Ken Wong"},{"@pid":"28/4803-1","text":"Aaron Hunter 0001"}]},"title":"Bluetooth for decoy systems: A practical study.","venue":"CNS","pages":"86-387","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/WongH17","doi":"10.1109/CNS.2017.8228677","ee":"https://doi.org/10.1109/CNS.2017.8228677","url":"https://dblp.org/rec/conf/cns/WongH17"}, "url":"URL#2895723" }, { "@score":"1", "@id":"2895724", "info":{"authors":{"author":[{"@pid":"211/3758","text":"Kenneth C. K. Wong"},{"@pid":"28/4803-1","text":"Aaron Hunter 0001"}]},"title":"Managing cybersecurity break-ins using bluetooth low energy devices to verify attackers: A practical study.","venue":"CNS","pages":"432-437","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/WongH17a","doi":"10.1109/CNS.2017.8228697","ee":"https://doi.org/10.1109/CNS.2017.8228697","url":"https://dblp.org/rec/conf/cns/WongH17a"}, "url":"URL#2895724" }, { "@score":"1", "@id":"2895725", "info":{"authors":{"author":[{"@pid":"211/3879","text":"Yuanyi Wu"},{"@pid":"200/8971","text":"Dongyu Meng"},{"@pid":"86/475-3","text":"Hao Chen 0003"}]},"title":"Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/WuMC17","doi":"10.1109/CNS.2017.8228636","ee":"https://doi.org/10.1109/CNS.2017.8228636","url":"https://dblp.org/rec/conf/cns/WuMC17"}, "url":"URL#2895725" }, { "@score":"1", "@id":"2895726", "info":{"authors":{"author":[{"@pid":"115/6308","text":"Liyao Xiang"},{"@pid":"l/BaochunLi","text":"Baochun Li"},{"@pid":"50/3402-1","text":"Bo Li 0001"}]},"title":"Privacy-preserving inference in crowdsourcing systems.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/XiangLL17","doi":"10.1109/CNS.2017.8228623","ee":"https://doi.org/10.1109/CNS.2017.8228623","url":"https://dblp.org/rec/conf/cns/XiangLL17"}, "url":"URL#2895726" }, { "@score":"1", "@id":"2895727", "info":{"authors":{"author":[{"@pid":"151/6222","text":"Jiajun Xin"},{"@pid":"l/MingLi6","text":"Ming Li 0006"},{"@pid":"00/10800","text":"Linke Guo"},{"@pid":"72/2643-1","text":"Pan Li 0001"}]},"title":"Practical privacy-preserving spectrum query schemes for database-driven CRNs with multiple service providers.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/XinLGL17","doi":"10.1109/CNS.2017.8228651","ee":"https://doi.org/10.1109/CNS.2017.8228651","url":"https://dblp.org/rec/conf/cns/XinLGL17"}, "url":"URL#2895727" }, { "@score":"1", "@id":"2895728", "info":{"authors":{"author":[{"@pid":"66/10717","text":"Zhiheng Xu"},{"@pid":"03/6207","text":"Quanyan Zhu"}]},"title":"Secure and practical output feedback control for cloud-enabled cyber-physical systems.","venue":"CNS","pages":"416-420","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/XuZ17","doi":"10.1109/CNS.2017.8228703","ee":"https://doi.org/10.1109/CNS.2017.8228703","url":"https://dblp.org/rec/conf/cns/XuZ17"}, "url":"URL#2895728" }, { "@score":"1", "@id":"2895729", "info":{"authors":{"author":[{"@pid":"86/10809","text":"Qiben Yan"},{"@pid":"54/4089","text":"Hao Yang"},{"@pid":"48/5870","text":"Mehmet C. Vuran"},{"@pid":"119/3917","text":"Suat Irmak"}]},"title":"SPRIDE: Scalable and private continual geo-distance evaluation for precision agriculture.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/YanYVI17","doi":"10.1109/CNS.2017.8228620","ee":"https://doi.org/10.1109/CNS.2017.8228620","url":"https://dblp.org/rec/conf/cns/YanYVI17"}, "url":"URL#2895729" }, { "@score":"1", "@id":"2895730", "info":{"authors":{"author":[{"@pid":"47/3749","text":"Qing Yang"},{"@pid":"26/5034","text":"Yixin Jiang"},{"@pid":"08/3135","text":"Aidong Xu"},{"@pid":"94/5572-1","text":"Hong Wen 0001"},{"@pid":"90/4225","text":"Feng Wang"},{"@pid":"211/3643","text":"LiuFei Chen"},{"@pid":"67/2866","text":"Kai Ouyang"},{"@pid":"130/9322","text":"Xiping Zhu"}]},"title":"A model divides the mobile security level based on SVM.","venue":"CNS","pages":"370-371","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/YangJXWWCOZ17","doi":"10.1109/CNS.2017.8228663","ee":"https://doi.org/10.1109/CNS.2017.8228663","url":"https://dblp.org/rec/conf/cns/YangJXWWCOZ17"}, "url":"URL#2895730" }, { "@score":"1", "@id":"2895731", "info":{"authors":{"author":[{"@pid":"169/4882","text":"Ken Yau"},{"@pid":"30/241","text":"Kam-Pui Chow"},{"@pid":"y/SiuMingYiu","text":"Siu-Ming Yiu"},{"@pid":"177/2897","text":"Chun-Fai Chan"}]},"title":"Detecting anomalous behavior of PLC using semi-supervised machine learning.","venue":"CNS","pages":"580-585","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/YauCYC17","doi":"10.1109/CNS.2017.8228713","ee":"https://doi.org/10.1109/CNS.2017.8228713","url":"https://dblp.org/rec/conf/cns/YauCYC17"}, "url":"URL#2895731" }, { "@score":"1", "@id":"2895732", "info":{"authors":{"author":[{"@pid":"24/6114-1","text":"Xu Yuan 0001"},{"@pid":"21/8884","text":"Xingliang Yuan"},{"@pid":"l/BaochunLi","text":"Baochun Li"},{"@pid":"18/2771-1","text":"Cong Wang 0001"}]},"title":"Secure multi-client data access with boolean queries in distributed key-value stores.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/YuanYLW17","doi":"10.1109/CNS.2017.8228619","ee":"https://doi.org/10.1109/CNS.2017.8228619","url":"https://dblp.org/rec/conf/cns/YuanYLW17"}, "url":"URL#2895732" }, { "@score":"1", "@id":"2895733", "info":{"authors":{"author":[{"@pid":"36/8208","text":"Huacheng Zeng"},{"@pid":"44/5148","text":"Chen Cao"},{"@pid":"62/442","text":"Hongxiang Li"},{"@pid":"86/10809","text":"Qiben Yan"}]},"title":"Enabling jamming-resistant communications in wireless MIMO networks.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/ZengCLY17","doi":"10.1109/CNS.2017.8228622","ee":"https://doi.org/10.1109/CNS.2017.8228622","url":"https://dblp.org/rec/conf/cns/ZengCLY17"}, "url":"URL#2895733" }, { "@score":"1", "@id":"2895734", "info":{"authors":{"author":[{"@pid":"38/9461","text":"Jiapeng Zhang"},{"@pid":"31/6779","text":"Yingfei Dong"}]},"title":"Cyber attacks on remote relays in smart grid.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/ZhangD17","doi":"10.1109/CNS.2017.8228637","ee":"https://doi.org/10.1109/CNS.2017.8228637","url":"https://dblp.org/rec/conf/cns/ZhangD17"}, "url":"URL#2895734" }, { "@score":"1", "@id":"2895735", "info":{"authors":{"author":[{"@pid":"03/5142-1","text":"Xiaonan Zhang 0001"},{"@pid":"69/1921-2","text":"Qi Jia 0002"},{"@pid":"00/10800","text":"Linke Guo"}]},"title":"Secure and optimized unauthorized secondary user detection in dynamic spectrum access.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/ZhangJG17","doi":"10.1109/CNS.2017.8228639","ee":"https://doi.org/10.1109/CNS.2017.8228639","url":"https://dblp.org/rec/conf/cns/ZhangJG17"}, "url":"URL#2895735" }, { "@score":"1", "@id":"2895736", "info":{"authors":{"author":[{"@pid":"33/2071","text":"Fengli Zhang"},{"@pid":"34/4755","text":"Qinghua Li"}]},"title":"Deep learning-based data forgery detection in automatic generation control.","venue":"CNS","pages":"400-404","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/ZhangL17","doi":"10.1109/CNS.2017.8228705","ee":"https://doi.org/10.1109/CNS.2017.8228705","url":"https://dblp.org/rec/conf/cns/ZhangL17"}, "url":"URL#2895736" }, { "@score":"1", "@id":"2895737", "info":{"authors":{"author":[{"@pid":"06/272","text":"Liyang Zhang"},{"@pid":"119/9062-1","text":"Francesco Restuccia 0001"},{"@pid":"05/1629","text":"Tommaso Melodia"},{"@pid":"76/8033","text":"Scott M. Pudlewski"}]},"title":"Learning to detect and mitigate cross-layer attacks in wireless networks: Framework and applications.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/ZhangRMP17","doi":"10.1109/CNS.2017.8228631","ee":"https://doi.org/10.1109/CNS.2017.8228631","url":"https://dblp.org/rec/conf/cns/ZhangRMP17"}, "url":"URL#2895737" }, { "@score":"1", "@id":"2895738", "info":{"authors":{"author":[{"@pid":"37/3381","text":"Ruochi Zhang"},{"@pid":"24/8732","text":"Parv Venkitasubramaniam"}]},"title":"A game theoretic approach to analyze false data injection and detection in LQG system.","venue":"CNS","pages":"427-431","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/ZhangV17","doi":"10.1109/CNS.2017.8228704","ee":"https://doi.org/10.1109/CNS.2017.8228704","url":"https://dblp.org/rec/conf/cns/ZhangV17"}, "url":"URL#2895738" }, { "@score":"1", "@id":"2895739", "info":{"authors":{"author":[{"@pid":"181/2597-17","text":"Ning Zhang 0017"},{"@pid":"183/6821","text":"Ruide Zhang"},{"@pid":"86/10809","text":"Qiben Yan"},{"@pid":"73/3673","text":"Wenjing Lou"},{"@pid":"h/YTHou","text":"Y. Thomas Hou 0001"},{"@pid":"y/DanfengYao","text":"Danfeng Yao"}]},"title":"Black penguin: On the feasibility of detecting intrusion with homogeneous memory.","venue":"CNS","pages":"586-594","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/ZhangZYLHY17","doi":"10.1109/CNS.2017.8228671","ee":"https://doi.org/10.1109/CNS.2017.8228671","url":"https://dblp.org/rec/conf/cns/ZhangZYLHY17"}, "url":"URL#2895739" }, { "@score":"1", "@id":"2895740", "info":{"authors":{"author":[{"@pid":"184/2471","text":"Yuwei Zheng"},{"@pid":"74/2101","text":"Lin Huang"},{"@pid":"211/3822","text":"Haoqi Shan"},{"@pid":"116/1011","text":"Jun Li"},{"@pid":"47/3749","text":"Qing Yang"},{"@pid":"10/3878-1","text":"Wenyuan Xu 0001"}]},"title":"Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/ZhengHSLYX17","doi":"10.1109/CNS.2017.8228629","ee":"https://doi.org/10.1109/CNS.2017.8228629","url":"https://dblp.org/rec/conf/cns/ZhengHSLYX17"}, "url":"URL#2895740" }, { "@score":"1", "@id":"2895741", "info":{"authors":{"author":[{"@pid":"88/10644","text":"Zhiyuan Zheng"},{"@pid":"10/2477","text":"Shan Jin"},{"@pid":"b/RBettati","text":"Riccardo Bettati"},{"@pid":"r/ALNarasimhaReddy","text":"A. L. Narasimha Reddy"}]},"title":"Securing cyber-physical systems with adaptive commensurate response.","venue":"CNS","pages":"1-6","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/ZhengJBR17","doi":"10.1109/CNS.2017.8228641","ee":"https://doi.org/10.1109/CNS.2017.8228641","url":"https://dblp.org/rec/conf/cns/ZhengJBR17"}, "url":"URL#2895741" }, { "@score":"1", "@id":"2895742", "info":{"authors":{"author":[{"@pid":"73/9688","text":"Qingji Zheng"},{"@pid":"181/2688-2","text":"Qi Li 0002"},{"@pid":"63/2941","text":"Aytac Azgin"},{"@pid":"81/1232-1","text":"Jian Weng 0001"}]},"title":"Data verification in information-centric networking with efficient revocable certificateless signature.","venue":"CNS","pages":"1-9","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/ZhengLAW17","doi":"10.1109/CNS.2017.8228650","ee":"https://doi.org/10.1109/CNS.2017.8228650","url":"https://dblp.org/rec/conf/cns/ZhengLAW17"}, "url":"URL#2895742" }, { "@score":"1", "@id":"2895743", "info":{"authors":{"author":[{"@pid":"135/4981","text":"Shaofeng Zou"},{"@pid":"51/332","text":"Yingbin Liang"},{"@pid":"s/ShlomoShamai","text":"Shlomo Shamai"}]},"title":"Gaussian fading channel with secrecy outside a bounded range.","venue":"CNS","pages":"545-549","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/cns/ZouLS17","doi":"10.1109/CNS.2017.8228688","ee":"https://doi.org/10.1109/CNS.2017.8228688","url":"https://dblp.org/rec/conf/cns/ZouLS17"}, "url":"URL#2895743" }, { "@score":"1", "@id":"3034390", "info":{"title":"2017 IEEE Conference on Communications and Network Security, CNS 2017, Las Vegas, NV, USA, October 9-11, 2017","venue":"CNS","publisher":"IEEE","year":"2017","type":"Editorship","key":"conf/cns/2017","ee":"https://ieeexplore.ieee.org/xpl/conhome/8170165/proceeding","url":"https://dblp.org/rec/conf/cns/2017"}, "url":"URL#3034390" } ] } } } )