Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 80 matches
- 2020
- Xiangyang Li:
Edge-Centric Intelligent Computing: Intelligence, Privacy and Applications. NaNA 2020: xx - Xinhong Hei, Xiaolong Liang, Yichuan Wang, Wenjiang Ji, Lei Zhu:
Deep Learning as a Service Based on Encrypted Data. NaNA 2020: 53-58 - Yan Liu, Ruizhong Du:
Efficient partially policy-hidden with multi-authority for access control scheme in Internet of Things. NaNA 2020: 375-380 - Abada Abderrahmane, Bin Yang, Tarik Taleb:
Traffic Flow Modeling for UAV-Enabled Wireless Networks. NaNA 2020: 59-64 - Hafsa Kabir Ahmad, Zhenqiang Wu, Bello Ahmad Muhammad:
A Conceptual Framework for Top- N Recommendation Using Attributed Bipartite Graph Embedding. NaNA 2020: 400-404 - Farooq Ahmed, Xudong Li, Yukun Niu, Chi Zhang, Lingbo Wei, Chengjie Gu:
UniRoam: An Anonymous and Accountable Authentication Scheme for Cross-Domain Access. NaNA 2020: 198-205 - Jiawang Chen, Bo Liu, Mubarak Umar:
Evolutionary dynamics games based on edge diversity in complex networks. NaNA 2020: 254-258 - Shekha Chenthara, Hua Wang, Khandakar Ahmed, Frank Whittaker, Ke Ji:
A Blockchain based model for Curbing Doctors Shopping and Ensuring Provenance Management. NaNA 2020: 186-192 - Yiqing Diao, Ayong Ye, Baorong Cheng, Jiaomei Zhang, Qiang Zhang:
A Dummy-Based Privacy Protection Scheme for Location-Based Services under Spatiotemporal Correlation. NaNA 2020: 443-447 - Guishan Dong, Yuxiang Chen, Yao Hao, Jian Bai, Zhaolei Zhang, Sijie Liao:
A Unified Trust Service Scheme for Heterogeneous Identity Alliance. NaNA 2020: 167-173 - Yanning Du, Yichuan Wang, Lei Zhu, Wenjiang Ji, Xin Song, Yida Yang, Long Pan:
A Framework for Audit Analysis of Heterogeneous Logs from PaaS. NaNA 2020: 292-297 - Pengbin Feng, Jianfeng Ma, Teng Li, Xindi Ma, Ning Xi, Di Lu:
Android Malware Detection Based on Call Graph via Graph Neural Network. NaNA 2020: 368-374 - Cong Gao, Yanping Chen, Zhongmin Wang, Hong Xia, Ning Lv:
Anomaly detection frameworks for outlier and pattern anomaly of time series in wireless sensor networks. NaNA 2020: 229-232 - Ping Gao, Guangsong Li, Yanan Shi, Yang Wang:
VPN Traffic Classification Based on Payload Length Sequence. NaNA 2020: 241-247 - Yubaraj Gautam, Bishnu Prasad Gautam, Kazuhiko Sato:
Experimental Security Analysis of SDN Network by Using Packet Sniffing and Spoofing Technique on POX and Ryu Controller. NaNA 2020: 394-399 - Bishnu Prasad Gautam, Yusuke Noda, Ramji Gautam, Hari Prasad Sharma, Kazuhiko Sato, Sangam Babu Neupane:
Body Part Localization and Pose Tracking by Using Deepercut Algorithm for King Cobra's BBL (Biting Behavior Learning). NaNA 2020: 422-429 - Yuying Gu, Jingxyan Hu, Yihui Zhou, Laifeng Lu:
Online Teaching Gestures Recognition Model Based on Deep Learning. NaNA 2020: 410-416 - Jiaxing Guo, Siqi Lu, Chunxiang Gu, Xi Chen, Fushan Wei:
Security Analysis and Design of Authentication Key Agreement Protocol in Medical Internet of Things. NaNA 2020: 233-240 - Mai Hassan, Syed Hassan Raza Naqvi, Pin-Han Ho:
On CPRI based Front-hauling over Residential Power Lines. NaNA 2020: 47-52 - Jiajin He, Hui Zhao:
Fault Diagnosis and Location based on Graph Neural Network in Telecom Networks. NaNA 2020: 304-309 - Yuyu Hu, Zhao Li, Jingling Li, Zhixian Chang, Yang Xu, Jia Liu:
Incremental-Compensation based Robust Topology Control for Micro/Nano Satellite Network. NaNA 2020: 22-28 - Shumaila Javaid, Zhenqiang Wu, Hamza Fahim, Farhana Javed:
Simulated Annealing Algorithm Based Temperature-Aware Routing Scheme for Intrabody Nanonetworks. NaNA 2020: 248-253 - Zhen Jia, Xuening Liao, Xialei Zhang:
Concentration-Shifting-based Modulation Scheme for Molecular Communication System with a Mobile Transmitter. NaNA 2020: 152-156 - Jun Li, Ming Chen:
QMPS: Q-learning based Message Prioritizing and Scheduling Algorithm for Flying Ad hoc Networks. NaNA 2020: 265-270 - Hongtao Li, Lingxia Gong, Bo Wang, Feng Guo, Jie Wang, Tao Zhang:
$k$-Anonymity Based Location Data Query Privacy Protection Method in Mobile Social Networks. NaNA 2020: 326-334 - Liang Li, Zhao Huang, Yin Chen, Maofan Du, Quan Wang, Jinhui Liu:
A PUF-based Scheme for Identify Trusted Mobile Phone Accessories. NaNA 2020: 459-463 - Guochun Li, Binbin Ye, Rentao Gu, Qize Guo, Zhiyun Gu:
Intra-Datacenter Bandwidth Resource Allocation for Bursty Large-Scale Traffic in Polled OLT. NaNA 2020: 96-101 - Mingshuang Li, Yihui Zhou, Wenru Tang, Laifeng Lu:
K-modes Based Categorical Data Clustering Algorithms Satisfying Differential Privacy. NaNA 2020: 86-91 - Xiaoxiao Liu, Haoran Mei, Limei Peng:
Adaptive Beamforming Planning for Multicast mmWave Communication. NaNA 2020: 147-151 - Yangyang Liu, Pinchang Zhang:
Physical Layer Authentication Utilizing Carrier Frequency Offset in Dynamic MIMO Systems. NaNA 2020: 16-21
skipping 50 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-13 07:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint