Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/eisa/eisa2023.bht:"
@proceedings{DBLP:conf/eisa/2023, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-99-9614-8}, doi = {10.1007/978-981-99-9614-8}, isbn = {978-981-99-9613-1}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/FengWPWSG23, author = {Jun Feng and Hongkai Wang and Liangying Peng and Yidan Wang and Haomin Song and Hongju Guo}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Chinese Named Entity Recognition Within the Electric Power Domain}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {133--146}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_9}, doi = {10.1007/978-981-99-9614-8\_9}, timestamp = {Thu, 11 Apr 2024 16:38:28 +0200}, biburl = {https://dblp.org/rec/conf/eisa/FengWPWSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/LiH23, author = {Liang Li and Gengran Hu}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and Its Applications to Pairing-Based Cryptography}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {77--91}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_5}, doi = {10.1007/978-981-99-9614-8\_5}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/LiH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/LiJLMLWL23, author = {Huifeng Li and Pengzhou Jia and Weixun Li and Bin Ma and Bo Li and Dexin Wu and Haoran Li}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Towards Efficient Universal Adversarial Attack on Audio Classification Models: {A} Two-Step Method}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {20--37}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_2}, doi = {10.1007/978-981-99-9614-8\_2}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/LiJLMLWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/LiSWYGDW23, author = {Weixun Li and Guanghui Sun and Yajun Wang and Long Yuan and Minghui Gao and Yan Dong and Chen Wang}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Deep Neural Network Model over Encrypted Data}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {107--117}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_7}, doi = {10.1007/978-981-99-9614-8\_7}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/LiSWYGDW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/SavicYLG23, author = {Izabela Savic and Haonan Yan and Xiaodong Lin and Daniel Gillis}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Adversarial Example Attacks and Defenses in {DNS} Data Exfiltration}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {147--163}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_10}, doi = {10.1007/978-981-99-9614-8\_10}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/SavicYLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/SoderiN23, author = {Simone Soderi and Rocco De Nicola}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {{CONNECTION:} COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {164--183}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_11}, doi = {10.1007/978-981-99-9614-8\_11}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/SoderiN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/SunZLLWL23, author = {Kangkang Sun and Xiaojin Zhang and Xi Lin and Gaolei Li and Jing Wang and Jianhua Li}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Toward the Tradeoffs Between Privacy, Fairness and Utility in Federated Learning}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {118--132}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_8}, doi = {10.1007/978-981-99-9614-8\_8}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/SunZLLWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/TuS23, author = {Jun Tu and Gang Shen}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare System}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {38--57}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_3}, doi = {10.1007/978-981-99-9614-8\_3}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/TuS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/WangFWPZX23, author = {Hongkai Wang and Jun Feng and Yidan Wang and Sichen Pan and Shuai Zhao and Yi Xue}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Enhancing Chinese Named Entity Recognition with Disentangled Expert Knowledge}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {92--106}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_6}, doi = {10.1007/978-981-99-9614-8\_6}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/WangFWPZX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/WeiZZ23, author = {Yinxing Wei and Jun Zheng and Hong Zhong}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {A Systematic Method for Constructing {ICT} Supply Chain Security Requirements}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {58--76}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_4}, doi = {10.1007/978-981-99-9614-8\_4}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/WeiZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/ZhangLLWWZ23, author = {Chuan Zhang and Haotian Liang and Zhuopeng Li and Tong Wu and Licheng Wang and Liehuang Zhu}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {PtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {1--19}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_1}, doi = {10.1007/978-981-99-9614-8\_1}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/ZhangLLWWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.