Search dblp for Publications

export results for "stream:streams/conf/sgcrc:"

 download as .bib file

@inproceedings{DBLP:conf/sgcrc/DaiCBT17,
  author       = {Zhongmin Dai and
                  Tong{-}Wei Chua and
                  Dinesh Kumar Balakrishnan and
                  Vrizlynn L. L. Thing},
  editor       = {Abhik Roychoudhury and
                  Yang Liu},
  title        = {Chat-App Decryption Key Extraction Through Information Flow Analysis},
  booktitle    = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore
                  Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February
                  21-22, 2017},
  series       = {Cryptology and Information Security Series},
  volume       = {15},
  pages        = {3--18},
  publisher    = {{IOS} Press},
  year         = {2017},
  url          = {https://doi.org/10.3233/978-1-61499-744-3-3},
  doi          = {10.3233/978-1-61499-744-3-3},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/DaiCBT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/KhanTS17,
  author       = {Wilayat Khan and
                  Alwen Tiu and
                  David San{\'{a}}n},
  editor       = {Abhik Roychoudhury and
                  Yang Liu},
  title        = {VeriFormal: An Executable Formal Model of a Hardware Description Language},
  booktitle    = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore
                  Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February
                  21-22, 2017},
  series       = {Cryptology and Information Security Series},
  volume       = {15},
  pages        = {19--36},
  publisher    = {{IOS} Press},
  year         = {2017},
  url          = {https://doi.org/10.3233/978-1-61499-744-3-19},
  doi          = {10.3233/978-1-61499-744-3-19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/KhanTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/LeeZZT17,
  author       = {Chien Eao Lee and
                  Lilei Zheng and
                  Ying Zhang and
                  Vrizlynn L. L. Thing},
  editor       = {Abhik Roychoudhury and
                  Yang Liu},
  title        = {Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification},
  booktitle    = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore
                  Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February
                  21-22, 2017},
  series       = {Cryptology and Information Security Series},
  volume       = {15},
  pages        = {129--142},
  publisher    = {{IOS} Press},
  year         = {2017},
  url          = {https://doi.org/10.3233/978-1-61499-744-3-129},
  doi          = {10.3233/978-1-61499-744-3-129},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sgcrc/LeeZZT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/NissimCWLREG17,
  author       = {Nir Nissim and
                  Aviad Cohen and
                  Jian Wu and
                  Andrea Lanzi and
                  Lior Rokach and
                  Yuval Elovici and
                  C. Lee Giles},
  editor       = {Abhik Roychoudhury and
                  Yang Liu},
  title        = {Scholarly Digital Libraries as a Platform for Malware Distribution},
  booktitle    = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore
                  Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February
                  21-22, 2017},
  series       = {Cryptology and Information Security Series},
  volume       = {15},
  pages        = {107--128},
  publisher    = {{IOS} Press},
  year         = {2017},
  url          = {https://doi.org/10.3233/978-1-61499-744-3-107},
  doi          = {10.3233/978-1-61499-744-3-107},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sgcrc/NissimCWLREG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/PohCDL17,
  author       = {Zhi Yuan Poh and
                  Hui Cui and
                  Robert H. Deng and
                  Yingjiu Li},
  editor       = {Abhik Roychoudhury and
                  Yang Liu},
  title        = {Attribute-Based Secure Messaging in the Public Cloud},
  booktitle    = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore
                  Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February
                  21-22, 2017},
  series       = {Cryptology and Information Security Series},
  volume       = {15},
  pages        = {86--96},
  publisher    = {{IOS} Press},
  year         = {2017},
  url          = {https://doi.org/10.3233/978-1-61499-744-3-86},
  doi          = {10.3233/978-1-61499-744-3-86},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sgcrc/PohCDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/PomponiuT17,
  author       = {Victor Pomponiu and
                  Vrizlynn L. L. Thing},
  editor       = {Abhik Roychoudhury and
                  Yang Liu},
  title        = {A Deep Convolutional Neural Network for Anomalous Online Forum Incident
                  Classification},
  booktitle    = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore
                  Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February
                  21-22, 2017},
  series       = {Cryptology and Information Security Series},
  volume       = {15},
  pages        = {57--69},
  publisher    = {{IOS} Press},
  year         = {2017},
  url          = {https://doi.org/10.3233/978-1-61499-744-3-57},
  doi          = {10.3233/978-1-61499-744-3-57},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/PomponiuT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/Seo17,
  author       = {Hwajung Seo},
  editor       = {Abhik Roychoudhury and
                  Yang Liu},
  title        = {Faster {ECC} over (feat. {PMULL)}},
  booktitle    = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore
                  Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February
                  21-22, 2017},
  series       = {Cryptology and Information Security Series},
  volume       = {15},
  pages        = {97--106},
  publisher    = {{IOS} Press},
  year         = {2017},
  url          = {https://doi.org/10.3233/978-1-61499-744-3-97},
  doi          = {10.3233/978-1-61499-744-3-97},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/Seo17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/SmithP17,
  author       = {Matthew David Smith and
                  Marie{-}Elisabeth Pat{\'{e}}{-}Cornell},
  editor       = {Abhik Roychoudhury and
                  Yang Liu},
  title        = {Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? {A}
                  Multi-Armed Bandit Approach},
  booktitle    = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore
                  Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February
                  21-22, 2017},
  series       = {Cryptology and Information Security Series},
  volume       = {15},
  pages        = {37--56},
  publisher    = {{IOS} Press},
  year         = {2017},
  url          = {https://doi.org/10.3233/978-1-61499-744-3-37},
  doi          = {10.3233/978-1-61499-744-3-37},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/SmithP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/SumathiSMKM17,
  author       = {G. Sumathi and
                  L. Srivani and
                  D. Thirugnana Murthy and
                  Anish Kumar and
                  K. Madhusoodanan},
  editor       = {Abhik Roychoudhury and
                  Yang Liu},
  title        = {Hardware Obfuscation Using Different Obfuscation Cell Structures for
                  PLDs},
  booktitle    = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore
                  Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February
                  21-22, 2017},
  series       = {Cryptology and Information Security Series},
  volume       = {15},
  pages        = {143--157},
  publisher    = {{IOS} Press},
  year         = {2017},
  url          = {https://doi.org/10.3233/978-1-61499-744-3-143},
  doi          = {10.3233/978-1-61499-744-3-143},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/SumathiSMKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/ZhouGLWZ17,
  author       = {Luying Zhou and
                  Huaqun Guo and
                  Dong Li and
                  Jun Wen Wong and
                  Jianying Zhou},
  editor       = {Abhik Roychoudhury and
                  Yang Liu},
  title        = {Mind the Gap: Security Analysis of Metro Platform Screen Door System},
  booktitle    = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore
                  Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February
                  21-22, 2017},
  series       = {Cryptology and Information Security Series},
  volume       = {15},
  pages        = {70--85},
  publisher    = {{IOS} Press},
  year         = {2017},
  url          = {https://doi.org/10.3233/978-1-61499-744-3-70},
  doi          = {10.3233/978-1-61499-744-3-70},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/ZhouGLWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sgcrc/2017,
  editor       = {Abhik Roychoudhury and
                  Yang Liu},
  title        = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore
                  Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February
                  21-22, 2017},
  series       = {Cryptology and Information Security Series},
  volume       = {15},
  publisher    = {{IOS} Press},
  year         = {2017},
  isbn         = {978-1-61499-743-6},
  timestamp    = {Wed, 22 Mar 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sgcrc/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/AdepuM16,
  author       = {Sridhar Adepu and
                  Aditya P. Mathur},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent
                  Control Actions},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {59--74},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-59},
  doi          = {10.3233/978-1-61499-617-0-59},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/AdepuM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/BulleeMJH16,
  author       = {Jan{-}Willem Bullee and
                  Lorena Montoya and
                  Marianne Junger and
                  Pieter H. Hartel},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Telephone-based social engineering attacks: An experiment testing
                  the success and time decay of an intervention},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {107--114},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-107},
  doi          = {10.3233/978-1-61499-617-0-107},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/BulleeMJH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/CastellanosWOR16,
  author       = {John Henry Castellanos and
                  Tobias W{\"{u}}chner and
                  Mart{\'{\i}}n Ochoa and
                  Sandra Julieta Rueda},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Q-Floid: Android Malware detection with Quantitative Data Flow Graphs},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {13--25},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-13},
  doi          = {10.3233/978-1-61499-617-0-13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/CastellanosWOR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/DivakaranLT16,
  author       = {Dinil Mon Divakaran and
                  Yung Siang Liau and
                  Vrizlynn L. L. Thing},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Accurate in-network file-type classification},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {139--146},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-139},
  doi          = {10.3233/978-1-61499-617-0-139},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/DivakaranLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/JunejoY16,
  author       = {Khurum Nazir Junejo and
                  David K. Y. Yau},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Data Driven Physical Modelling For Intrusion Detection In Cyber Physical
                  Systems},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {43--57},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-43},
  doi          = {10.3233/978-1-61499-617-0-43},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/JunejoY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/MengHK16,
  author       = {Weizhi Meng and
                  Lee Wang Hao and
                  S. P. T. Krishnan},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {A Framework for Large-Scale Collection of Information from Smartphone
                  Users based on Juice Filming Attacks},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {99--106},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-99},
  doi          = {10.3233/978-1-61499-617-0-99},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sgcrc/MengHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/RajR16,
  author       = {Edward Jero Sam Jeeva Raj and
                  Palaniappan Ramu},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {{ECG} Steganography Using Contourlet Transform For Transmission of
                  Secured Patient Identity},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {131--138},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-131},
  doi          = {10.3233/978-1-61499-617-0-131},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/RajR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/TaorminaGTSO16,
  author       = {Riccardo Taormina and
                  Stefano Galelli and
                  Nils Ole Tippenhauer and
                  Elad Salomons and
                  Avi Ostfeld},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Simulation of Cyber-Physical Attacks on Water Distribution Systems
                  with {EPANET}},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {123--130},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-123},
  doi          = {10.3233/978-1-61499-617-0-123},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/TaorminaGTSO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/TranDP16,
  author       = {Ngoc Hieu Tran and
                  Robert H. Deng and
                  HweeHwa Pang},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Privacy-Preserving and Verifiable Data Aggregation},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {115--122},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-115},
  doi          = {10.3233/978-1-61499-617-0-115},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/TranDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/UrbinaGTC16,
  author       = {David I. Urbina and
                  Jairo Alonso Giraldo and
                  Nils Ole Tippenhauer and
                  Alvaro A. C{\'{a}}rdenas},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Attacking Fieldbus Communications in {ICS:} Applications to the SWaT
                  Testbed},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {75--89},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-75},
  doi          = {10.3233/978-1-61499-617-0-75},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sgcrc/UrbinaGTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/XuCZ16,
  author       = {Jia Xu and
                  Ee{-}Chien Chang and
                  Jianying Zhou},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Directed Transitive Signature on Directed Tree},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {91--98},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-91},
  doi          = {10.3233/978-1-61499-617-0-91},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/XuCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/XuZL16,
  author       = {Jia Xu and
                  Jianying Zhou and
                  Liming Lu},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Cyber and Physical Access Control in Legacy System Using Passwords},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {27--42},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-27},
  doi          = {10.3233/978-1-61499-617-0-27},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/XuZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/ZhangGWT16,
  author       = {Ying Zhang and
                  Jonathan Goh and
                  Lei Lei Win and
                  Vrizlynn L. L. Thing},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Image Region Forgery Detection: {A} Deep Learning Approach},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {1--11},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-1},
  doi          = {10.3233/978-1-61499-617-0-1},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sgcrc/ZhangGWT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sgcrc/2016,
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  publisher    = {{IOS} Press},
  year         = {2016},
  isbn         = {978-1-61499-616-3},
  timestamp    = {Wed, 22 Mar 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sgcrc/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics