default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2018
- Hongyuan Chen, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
SDKSE: A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems. SSIC 2018: 1-6 - Mengyi Chen, Li Pan:
Least Cost Precision Marketing Based on User Profiles in Social Networks. SSIC 2018: 1-8 - Yu Chen, Sheng Yan, Tianyu Pang, Rui Chen:
Detection of DGA Domains Based on Support Vector Machine. SSIC 2018: 1-4 - Hong-Beom Choi, Young-Bae Ko, Keun-Woo Lim:
Energy-Aware Distribution of Data Fragments in Unattended Wireless Sensor Networks. SSIC 2018: 1-8 - Achraf Fayad, Badis Hammi, Rida Khatoun:
An adaptive authentication and authorization scheme for IoT's gateways: a blockchain based approach. SSIC 2018: 1-7 - Zhutian Feng, Cunqing Hua:
Machine Learning-based RF Jamming Detection in Wireless Networks. SSIC 2018: 1-6 - Boren He, Futai Zou, Yue Wu:
Multi-SDN Based Cooperation Scheme for DDoS Attack Defense. SSIC 2018: 1-7 - Yunlong Hu, Ping Yi, Yu Sui, Zongrui Zhang, Yao Yao, Wei Wang, Ting Zhu:
Dispatching and Distributing Energy in Energy Internet under Energy Dilemma. SSIC 2018: 1-5 - Danhua Huang, Li Pan:
An Improved Group-based Influence Maximization Method in Social Networks. SSIC 2018: 1-6 - Liang Hui, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Hongyuan Chen, Yunong Liang:
VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication. SSIC 2018: 1-8 - Qingyuan Li, Hao Wu, Lei Liu, Bin Pan, Lan Dong:
A Group based Dynamic Mix Zone Scheme for Location Privacy Preservation in VANETs. SSIC 2018: 1-5 - Huijie Lian, Guangbo Wang, Qingxian Wang:
Fully Secure Traceable and Revocable-Storage Attribute-Based Encryption with Short Update Keys via Subset Difference Method. SSIC 2018: 1-8 - Yuxuan Luo, Shaoyin Cheng, Chong Liu, Fan Jiang:
PU Learning in Payload-based Web Anomaly Detection. SSIC 2018: 1-5 - Yishuang Meng, Ping Yi, Xuejun Guo, Wen Gu, Xin Liu, Wei Wang, Ting Zhu:
Detection for Pulmonary Nodules using RGB Channel Superposition Method in Deep Learning Framework. SSIC 2018: 1-8 - Jean-Philippe Monteuuis, Jonathan Petit, Jun Zhang, Houda Labiod, Stefano Mafrica, Alain Servel:
"My autonomous car is an elephant": A Machine Learning based Detector for Implausible Dimension. SSIC 2018: 1-8 - Han Qiu, Nathalie Enfrin, Gérard Memmi:
A Case Study for Practical Issues of DCT Based Bitmap Selective Encryption Methods. SSIC 2018: 1-7 - Caleb Riggs, Tanner Douglas, Kanwalinderjit Gagneja:
Image Mapping through Metadata. SSIC 2018: 1-8 - Chih-Wei Shiu, Wien Hong, Jeanne Chen, Tung-Shou Chen, Wan-Yi Ji:
Data Hiding for Color Image by Rubik's Cube. SSIC 2018: 1-5 - Lei Sun, Shuai Li, Songhui Guo, Yingxin Xu:
Performance Modeling towards Interrupt System of Virtualized Cryptography Device. SSIC 2018: 1-6 - Gaobo Sun, Shuyu Li, Zhanchun Kang:
Research on Civil Airborne Task Scheduling Test Platform Supporting Provable Data Possession. SSIC 2018: 1-6 - Junhua Tang, Shuli Zhao, Yue Wu, Jianhua Li:
Caching Strategy for Scalable Video Coding in Information-Centric Networking. SSIC 2018: 1-6 - Xuelei Wang, Ernest Foo:
Assessing Industrial Control System Attack Datasets for Intrusion Detection. SSIC 2018: 1-8 - Xiaoliang Wang, Junhua Tang, Mengdi Yu, Gubei Yin, Jianhua Li:
A UCB1-Based Online Job Dispatcher for Heterogeneous Mobile Edge Computing System. SSIC 2018: 1-6 - Chenbin Wu, Yunjie Zhou, Xiaojuan Jiang, Yinbai Xu, Xiaodi Wang, He He:
Research and Applications of the Key Technology of Intelligent Operation and Maintenance System Architecture for Transmission Power Cables. SSIC 2018: 1-5 - Yaobin Xie, Wei Wang, Faren Wang, Rui Chang:
VTET: A Virtual Industrial Control System Testbed for Cyber Security Research. SSIC 2018: 1-7 - Adja Elloh Yves-Christian, Badis Hammi, Ahmed Serhrouchni, Houda Labiod:
Total Eclipse: How To Completely Isolate a Bitcoin Peer. SSIC 2018: 1-7 - Peng Zhang, Shaoyin Cheng, Songhao Lou, Fan Jiang:
A Novel Android Malware Detection Approach Using Operand Sequences. SSIC 2018: 1-5 - Jianguo Zheng, Li Pan:
Least Cost Rumor Community Blocking optimization in Social Networks. SSIC 2018: 1-5 - Zhihong Zhou, Lihong Yao, Jianhua Li, Bin Hu, Chen Wang, Zhenglong Wang:
Classification of botnet families based on features self-learning under Network Traffic Censorship. SSIC 2018: 1-7 - Third International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2018, Shanghai, China, October 18-19, 2018. IEEE 2018, ISBN 978-1-5386-8187-9 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-28 02:27 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint