


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 57 matches
- 2022
- Xuetao Bai, Shanshan Tu, Muhammad Waqas
, Aiming Wu, Yihe Zhang, Yongjie Yang:
Blockchain Enable IoT Using Deep Reinforcement Learning: A Novel Architecture to Ensure Security of Data Sharing and Storage. ICAIS (3) 2022: 586-597 - Ning Cao, Yansong Wang
, Xiaofang Li, Rongning Qu, Yuxuan Wang, Zhikun Liang, Zijian Zhu, Chi Zhang, Dongjie Zhu:
MGDP: Architecture Design of Intelligent Detection Platform for Marine Garbage Based on Intelligent Internet of Things. ICAIS (3) 2022: 678-688 - Shiyi Chen, Yi Chen, Yanli Chen, Limengnan Zhou, Hanzhou Wu
:
Robust Video Watermarking Using Normalized Zernike Moments. ICAIS (3) 2022: 323-336 - Hongtao Chen, Shuo Guo, Yanbo Shi, Weixuan Wei, Kaidi Wang:
Intrusion Detection Model Based on KNN-AE-DNN. ICAIS (3) 2022: 71-83 - Xiaowei Chen, HeFang Jiang, Shaocheng Wu, Tao Liu, Tong An, Zhongwei Xu, Man Zhang, Muhammad Shafiq
:
New Generation Power System Security Protection Technology Based on Dynamic Defense. ICAIS (3) 2022: 710-721 - Jie Chen
, Yaping Liu, Shuo Zhang, Bing Chen, Zhiyu Han:
A Survey of Traffic Classification Technology for Smart Home Based on Machine Learning. ICAIS (3) 2022: 544-557 - Lu Chen, Xinjian Zhao, Ran Zhao, Guoquan Yuan, Song Zhang, Shi Chen, Fan Wu:
Mobile Internet Access Control Strategy Based on Trust Perception. ICAIS (3) 2022: 598-611 - Zaojian Dai, Nige Li, Yong Li, Guoquan Yuan, Xinjian Zhao, Ran Zhao, Fan Wu:
Research on Power Mobile Internet Security Situation Awareness Model Based on Zero Trust. ICAIS (3) 2022: 507-519 - Jingwen Fang, Qian Shao, Zhongyi Xu, Penghui Li, Baotong Chen, Haoliang Lan:
Dark Chain Detection Based on the IP Address. ICAIS (3) 2022: 689-699 - Xiao Feng, Yuanzheng Wang, Tengfei Dong, Yingxia Liao, Yixin Zhang, Yi Lin:
A Routing Algorithm for Node Protection in Wireless Sensor Network Based on Clustering Ant Colony Strategy. ICAIS (3) 2022: 184-193 - Junjie Fu
, Xiaoliang Wang
, Yuzhen Liu, Qing Yang, Frank Jiang
:
A Scheme to Improve the Security of IoT Communication. ICAIS (3) 2022: 455-468 - Wei Gan, Xuqiu Chen, Wei Wang, Lu Chen, Jiaxi Wu, Xian Wang, Xin He, Fan Wu:
Multi-device Continuous Authentication Mechanism Based on Homomorphic Encryption and SVM Algorithm. ICAIS (3) 2022: 625-638 - Xiaojun Gou, Shunhui Luo, Liang Xiao:
Multi-objective Dual-Route Planning Algorithm for Grid Communication Network. ICAIS (3) 2022: 157-170 - Bin Gu, Yunfeng Zou, Dongyang Cai, Huanyu Fan:
A Method of Data Distribution and Traceability Based on Blockchain. ICAIS (3) 2022: 16-27 - Lan Guo, Yang Lu, Qing Miao, Guangao Zu, Zhongqi Wang:
An Efficient Certificate-Based Encryption Scheme Without Random Oracles. ICAIS (3) 2022: 97-107 - Shaoyong Guo, Baoyu Xiang, Liandong Chen, Huifeng Yang, Dongxiao Yu:
Multi-level Federated Learning Mechanism with Reinforcement Learning Optimizing in Smart City. ICAIS (3) 2022: 441-454 - Fujin Hou, Kun Zhou, Longbin Li, Yuan Tian, Jie Li, Jian Li:
A Vulnerability Detection Algorithm Based on Transformer Model. ICAIS (3) 2022: 43-55 - Qiulu Jiang, Wunan Wan, Zhi Qin, Jinquan Zhang, Hui Han, Shibin Zhang, Jinyue Xia:
Blockchain-Based Efficient Incentive Mechanism in Crowdsensing. ICAIS (3) 2022: 120-132 - Lu Kang
, Qingbing Ji
, Lvlin Ni, Jiaxin Li:
A Framework for Unknown Traffic Identification Based on Neural Networks and Constraint Information. ICAIS (3) 2022: 84-96 - Ruopan Lai, Xiongjie Fang, Peijia Zheng, Hongmei Liu, Wei Lu, Weiqi Luo:
Efficient Fragile Privacy-Preserving Audio Watermarking Using Homomorphic Encryption. ICAIS (3) 2022: 373-385 - Ji Lai, Shuo Li, Qigui Yao:
A Binary Code Vulnerability Mining Method Based on Generative Adversarial Networks. ICAIS (3) 2022: 639-650 - Meng Li
:
A Survey on Ethereum Illicit Detection. ICAIS (3) 2022: 222-232 - Yong Li, Lu Chen, Nige Li, Ziang Lu, Zaojian Dai, Fan Wu:
Fine-Grained Access Control for Power Mobile Service Based on PA Network Under Zero-Trust Framework. ICAIS (3) 2022: 612-624 - Yuanshen Li, Jieren Cheng, Hui Li, Yuming Yuan, Victor S. Sheng:
A Survey of Consensus Mechanism Based on Reputation Model. ICAIS (3) 2022: 208-221 - Yuan Li, Jingbing Li, Chunyan Shao, Uzair Aslam Bhatti, Jixin Ma:
Robust Multi-watermarking Algorithm for Medical Images Using Patchwork-DCT. ICAIS (3) 2022: 386-399 - Yuheng Li, Yongzhong Li, Shipeng Zhang:
A New Transparent File Encryption Method Based on SM4 for Android Platform. ICAIS (3) 2022: 520-531 - Zhe Li, Zhiwei Sheng, Wunan Wan, Shibin Zhang, Zhi Qin, Jinquan Zhang, Jinyue Xia:
Blockchain Cross-Chain Research Based on Verifiable Ring Signatures. ICAIS (3) 2022: 171-183 - Weihua Li, Shaocheng Wu, Yue Ma, Tao Liu, Yali Bai, Jinxin Zuo:
Risk Assessment of Electric Energy Metering Automation System Based on Bayesian Network. ICAIS (3) 2022: 482-495 - Kun Liang, Shijie Sun, Xiangdang Huang, Qiuling Yang, Neal Naixue Xiong:
A Trust-Based Malicious Detection Scheme for Underwater Acoustic Sensor Networks. ICAIS (3) 2022: 427-440 - Jianbin Liu, Sha Li, Zhe Zhang, Jie Zhang:
Efficiency Improvement Method of Flyback Switching Power Supply Based on Quasi-Resonance. ICAIS (3) 2022: 558-571
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-06-26 00:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
