![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 701 matches
- 2021
- Siyu Chen, Shujie Cui, Joseph Liu:
A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones. QSHINE 2021: 129-143 - Arunavo Dey
, Md. Shohrab Hossain
, Md. Nazmul Hoq
, Suryadipta Majumdar
:
Towards an Attention-Based Accurate Intrusion Detection Approach. QSHINE 2021: 261-279 - Rathindra Nath Dutta
, Sasthi C. Ghosh:
Joint Relay Selection and Frequency Allocation for D2D Communications. QSHINE 2021: 159-173 - Shankar K. Ghosh
, Avirup Das
, Sasthi C. Ghosh, Nabanita Das:
Anti-eavesdropping Proportional Fairness Access Control for 5G Networks. QSHINE 2021: 144-158 - Mitsuyoshi Imamura, Kazumasa Omote:
Toward Achieving Unanimity for Implicit Closings in a Trustless System. QSHINE 2021: 75-93 - Abhay Kumar, Sandeep K. Shukla:
Topology Validator - Defense Against Topology Poisoning Attack in SDN. QSHINE 2021: 241-260 - Xianxian Li, Jiahui Peng, Zhenkui Shi, Chunpei Li:
Achieving Fair and Accountable Data Trading Scheme for Educational Multimedia Data Based on Blockchain. QSHINE 2021: 111-125 - Xianxian Li, Junhao Yang, Shiqi Gao, Zhenkui Shi, Jie Li, Xuemei Fu:
DBS: Blockchain-Based Privacy-Preserving RBAC in IoT. QSHINE 2021: 94-110 - Rui Lian
, Anxin Zhou
, Yifeng Zheng, Cong Wang:
Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics. QSHINE 2021: 42-53 - Yu Liu, Craig A. Shue:
Avoiding VPN Bottlenecks: Exploring Network-Level Client Identity Validation Options. QSHINE 2021: 280-300 - Junwei Luo, Xun Yi, Fengling Han, Xuechao Yang
:
A Usability Study of Cryptographic API Design. QSHINE 2021: 194-213 - Lin Mei, Chungen Xu, Qianmu Li:
Puncturable Search: Enabling Authorized Search in Cross-data Federation. QSHINE 2021: 303-322 - Ziaur Rahman
, Xun Yi, Ibrahim Khalil, Andrei Kelarev:
Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability. QSHINE 2021: 57-74 - Ziaur Rahman
, Xun Yi, Ibrahim Khalil, Mousumi Akter Sumi:
Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security. QSHINE 2021: 177-193 - Muhammad Rana
, Quazi Mamun
, Md. Rafiqul Islam:
An S-box Design Using Irreducible Polynomial with Affine Transformation for Lightweight Cipher. QSHINE 2021: 214-227 - Åvald Åslaugson Sommervoll
:
The Phantom Gradient Attack: A Study of Replacement Functions for the XOR Function. QSHINE 2021: 228-238 - Chandra Thapa
, Kallol Krishna Karmakar, Alberto Huertas Celdrán
, Seyit Camtepe
, Vijay Varadharajan, Surya Nepal:
FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation. QSHINE 2021: 3-24 - Viet Vo:
Memory-Efficient Encrypted Search Using Trusted Execution Environment. QSHINE 2021: 340-351 - Chengyao Xu, Shangqi Lai
:
Accelerating TEE-Based DNN Inference Using Mean Shift Network Pruning. QSHINE 2021: 25-41 - Yu Zhao, Chungen Xu, Lin Mei, Pan Zhang:
Privacy-Preserving Ranked Searchable Encryption Based on Differential Privacy. QSHINE 2021: 323-339 - Xingliang Yuan
, Wei Bao, Xun Yi, Nguyen Hoang Tran:
Quality, Reliability, Security and Robustness in Heterogeneous Systems - 17th EAI International Conference, QShine 2021, Virtual Event, November 29-30, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 402, Springer 2021, ISBN 978-3-030-91423-3 [contents] - 2020
- Xiaowen Chu, Hongbo Jiang, Bo Li, Dan Wang, Wei Wang:
Quality, Reliability, Security and Robustness in Heterogeneous Systems - 15th EAI International Conference, QShine 2019, Shenzhen, China, November 22-23, 2019, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 300, Springer 2020, ISBN 978-3-030-38818-8 [contents] - 2019
- Shanila Azhar, Shan Chang, Ye Liu, Yuting Tao, Guohua Liu, Donghong Sun:
Utility-Aware Participant Selection with Budget Constraints for Mobile Crowd Sensing. QSHINE 2019: 38-49 - Yu He, Lin Ma, Ruiting Zhou, Chuanhe Huang:
Batch Auction Design for Cloud Container Services. QSHINE 2019: 118-137 - Anxiao He, Yubai Xie, Wensen Mao, Tienpei Yeh:
Divide and Conquer: Efficient Multi-path Validation with ProMPV. QSHINE 2019: 219-234 - Jinghan Jiang, Yiqin Dai, Kui Wu, Rong Zheng:
Goldilocks: Learning Pattern-Based Task Assignment in Mobile Crowdsensing. QSHINE 2019: 63-83 - Wenzao Li, Yuwen Pan, Fangxin Wang, Lei Zhang, Jiangchuan Liu:
Toward Optimal Resource Allocation for Task Offloading in Mobile Edge Computing. QSHINE 2019: 50-62 - Chao Liu
, Xinchuan Li, Dongyang Zhao, Shaolong Guo, Xiaojun Kang
, Lijun Dong
, Hong Yao:
A-GNN: Anchors-Aware Graph Neural Networks for Node Embedding. QSHINE 2019: 141-153 - Jolanta Mizera-Pietraszko
, Jolanta Tancula:
Stability of Positive Systems in WSN Gateway for IoT&IIoT. QSHINE 2019: 22-37 - Yang Qin, Tiantian Zhang, Mengya Li:
Privacy Protection Routing and a Self-organized Key Management Scheme in Opportunistic Networks. QSHINE 2019: 252-268
skipping 671 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-21 00:01 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint