default search action
Search dblp for Publications
export results for "stream:conf/eisa:"
@proceedings{DBLP:conf/eisa/2023, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-99-9614-8}, doi = {10.1007/978-981-99-9614-8}, isbn = {978-981-99-9613-1}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/FengWPWSG23, author = {Jun Feng and Hongkai Wang and Liangying Peng and Yidan Wang and Haomin Song and Hongju Guo}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Chinese Named Entity Recognition Within the Electric Power Domain}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {133--146}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_9}, doi = {10.1007/978-981-99-9614-8\_9}, timestamp = {Thu, 11 Apr 2024 16:38:28 +0200}, biburl = {https://dblp.org/rec/conf/eisa/FengWPWSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/LiH23, author = {Liang Li and Gengran Hu}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and Its Applications to Pairing-Based Cryptography}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {77--91}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_5}, doi = {10.1007/978-981-99-9614-8\_5}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/LiH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/LiJLMLWL23, author = {Huifeng Li and Pengzhou Jia and Weixun Li and Bin Ma and Bo Li and Dexin Wu and Haoran Li}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Towards Efficient Universal Adversarial Attack on Audio Classification Models: {A} Two-Step Method}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {20--37}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_2}, doi = {10.1007/978-981-99-9614-8\_2}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/LiJLMLWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/LiSWYGDW23, author = {Weixun Li and Guanghui Sun and Yajun Wang and Long Yuan and Minghui Gao and Yan Dong and Chen Wang}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Deep Neural Network Model over Encrypted Data}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {107--117}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_7}, doi = {10.1007/978-981-99-9614-8\_7}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/LiSWYGDW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/SavicYLG23, author = {Izabela Savic and Haonan Yan and Xiaodong Lin and Daniel Gillis}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Adversarial Example Attacks and Defenses in {DNS} Data Exfiltration}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {147--163}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_10}, doi = {10.1007/978-981-99-9614-8\_10}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/SavicYLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/SoderiN23, author = {Simone Soderi and Rocco De Nicola}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {{CONNECTION:} COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {164--183}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_11}, doi = {10.1007/978-981-99-9614-8\_11}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/SoderiN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/SunZLLWL23, author = {Kangkang Sun and Xiaojin Zhang and Xi Lin and Gaolei Li and Jing Wang and Jianhua Li}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Toward the Tradeoffs Between Privacy, Fairness and Utility in Federated Learning}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {118--132}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_8}, doi = {10.1007/978-981-99-9614-8\_8}, timestamp = {Fri, 07 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/SunZLLWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/TuS23, author = {Jun Tu and Gang Shen}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare System}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {38--57}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_3}, doi = {10.1007/978-981-99-9614-8\_3}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/TuS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/WangFWPZX23, author = {Hongkai Wang and Jun Feng and Yidan Wang and Sichen Pan and Shuai Zhao and Yi Xue}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Enhancing Chinese Named Entity Recognition with Disentangled Expert Knowledge}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {92--106}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_6}, doi = {10.1007/978-981-99-9614-8\_6}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/WangFWPZX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/WeiZZ23, author = {Yinxing Wei and Jun Zheng and Hong Zhong}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {A Systematic Method for Constructing {ICT} Supply Chain Security Requirements}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {58--76}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_4}, doi = {10.1007/978-981-99-9614-8\_4}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/WeiZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/ZhangLLWWZ23, author = {Chuan Zhang and Haotian Liang and Zhuopeng Li and Tong Wu and Licheng Wang and Liehuang Zhu}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {PtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {1--19}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_1}, doi = {10.1007/978-981-99-9614-8\_1}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/ZhangLLWWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/BelelDM22, author = {Anushree Belel and Ratna Dutta and Sourav Mukhopadhyay}, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis Without q-type Assumption}, booktitle = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, pages = {108--125}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1\_7}, doi = {10.1007/978-3-031-23098-1\_7}, timestamp = {Wed, 08 Mar 2023 15:07:45 +0100}, biburl = {https://dblp.org/rec/conf/eisa/BelelDM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/ChanKTTJ22, author = {Yen Yee Chan and Cher{-}Yin Khor and Je Sen Teh and Weijian Teng and Norziana Jamil}, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {Differential Cryptanalysis of Lightweight Block Ciphers {SLIM} and {LCB}}, booktitle = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, pages = {55--67}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1\_4}, doi = {10.1007/978-3-031-23098-1\_4}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/ChanKTTJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/ChenYG22, author = {Fei Chen and Zhengzheng Yan and Liang Gu}, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {Towards Low-Latency Big Data Infrastructure at Sangfor}, booktitle = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, pages = {37--54}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1\_3}, doi = {10.1007/978-3-031-23098-1\_3}, timestamp = {Wed, 08 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/ChenYG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/CuiZ0DL22, author = {Yunfeng Cui and Wenbin Zhai and Liang Liu and Youwei Ding and Wanying Lu}, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {Link Aware Aggregation Query with Privacy-Preserving Capability in Wireless Sensor Networks}, booktitle = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, pages = {209--224}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1\_13}, doi = {10.1007/978-3-031-23098-1\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/CuiZ0DL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/DengCC022, author = {Jiaxin Deng and Simin Chen and Jiageng Chen and Weizhi Meng}, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography}, booktitle = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, pages = {87--107}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1\_6}, doi = {10.1007/978-3-031-23098-1\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/DengCC022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/LiTYC22, author = {Pei Li and Liliu Tan and Shixiong Yao and Jiageng Chen}, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {Parallel Validity Analysis of the Boomerang Attack Model}, booktitle = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, pages = {68--86}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1\_5}, doi = {10.1007/978-3-031-23098-1\_5}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/LiTYC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/LiZZL22, author = {Ye Li and Jiale Zhang and Junwu Zhu and Wenjuan Li}, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {{HBMD-FL:} Heterogeneous Federated Learning Algorithm Based on Blockchain and Model Distillation}, booktitle = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, pages = {145--159}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1\_9}, doi = {10.1007/978-3-031-23098-1\_9}, timestamp = {Tue, 11 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/LiZZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/LiuFP0H22, author = {Yang Liu and Qi Feng and Cong Peng and Min Luo and Debiao He}, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {Asymmetric Secure Multi-party Signing Protocol for the Identity-Based Signature Scheme in the {IEEE} {P1363} Standard for Public Key Cryptography}, booktitle = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, pages = {1--20}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1\_1}, doi = {10.1007/978-3-031-23098-1\_1}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/LiuFP0H22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/NguyenLBOM22, author = {Thi Quynh Nguyen and Romain Laborde and Abdelmalek Benzekri and Arnaud Oglaza and Mehdi Mounsif}, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {AutoRoC-DBSCAN: Automatic Tuning of {DBSCAN} to Detect Malicious {DNS} Tunnels}, booktitle = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, pages = {126--144}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1\_8}, doi = {10.1007/978-3-031-23098-1\_8}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/NguyenLBOM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/WeiQF22, author = {Guoheng Wei and Yanlin Qin and Wei Fu}, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {Secure and Efficient Certificateless Authentication Key Agreement Protocol in {VANET}}, booktitle = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, pages = {160--172}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1\_10}, doi = {10.1007/978-3-031-23098-1\_10}, timestamp = {Wed, 08 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/WeiQF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/XiaLHSZ22, author = {Zhe Xia and Shiyun Liu and Yichen Huang and Hua Shen and Mingwu Zhang}, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks}, booktitle = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, pages = {21--36}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1\_2}, doi = {10.1007/978-3-031-23098-1\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/XiaLHSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/XiongYL22, author = {Yi Xiong and Shixiong Yao and Pei Li}, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {{D2CDIM:} DID-Based Decentralized Cross-Domain Identity Management with Privacy-Preservation and Sybil-Resistance}, booktitle = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, pages = {191--208}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1\_12}, doi = {10.1007/978-3-031-23098-1\_12}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/XiongYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/Zhang0S22, author = {Dayin Zhang and Xiaojun Chen and Jinqiao Shi}, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy}, booktitle = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, pages = {173--190}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1\_11}, doi = {10.1007/978-3-031-23098-1\_11}, timestamp = {Wed, 08 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/Zhang0S22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisa/2021, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-93956-4}, doi = {10.1007/978-3-030-93956-4}, isbn = {978-3-030-93955-7}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisa/2022, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1}, doi = {10.1007/978-3-031-23098-1}, isbn = {978-3-031-23097-4}, timestamp = {Wed, 08 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/0001FO21, author = {Muhammad Imran Khan and Simon N. Foley and Barry O'Sullivan}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - {A} Brief Survey of Concepts and Approaches}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {178--197}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_11}, doi = {10.1007/978-3-030-93956-4\_11}, timestamp = {Wed, 02 Mar 2022 16:47:49 +0100}, biburl = {https://dblp.org/rec/conf/eisa/0001FO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/0002KR21, author = {Martin Grimmer and Tim Kaelble and Erhard Rahm}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {Improving Host-Based Intrusion Detection Using Thread Information}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {159--177}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_10}, doi = {10.1007/978-3-030-93956-4\_10}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/0002KR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/GreavesCL21, author = {Brian Greaves and Marijke Coetzee and Wai Sze Leung}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {Digital Twin Monitoring for Cyber-Physical Access Control}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {144--158}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_9}, doi = {10.1007/978-3-030-93956-4\_9}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/GreavesCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/GuptaKNG21, author = {Sanonda Datta Gupta and Stephen Kaplan and Aubree Nygaard and Sepideh Ghanavati}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {A Two-Fold Study to Investigate Users' Perception of IoT Information Sensitivity Levels and Their Willingness to Share the Information}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {87--107}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_6}, doi = {10.1007/978-3-030-93956-4\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/GuptaKNG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/HeC21, author = {Yueyue He and Jiageng Chen}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {AMLChain: Supporting Anti-money Laundering, Privacy-Preserving, Auditable Distributed Ledger}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {50--67}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_4}, doi = {10.1007/978-3-030-93956-4\_4}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/HeC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/JingYH21, author = {Pujie Jing and Shixiong Yao and Yueyue He}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {{APHC:} Auditable and Privacy Preserving Health {QR} Code Based on Blockchain}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {36--49}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_3}, doi = {10.1007/978-3-030-93956-4\_3}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/JingYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/Lyu0ZYHH21, author = {Ting Lyu and Liang Liu and Fangzhou Zhu and Jingxiu Yang and Simin Hu and Yanxi Huang}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {{NEEX:} An Automated and Efficient Tool for Detecting Browser Extension Fingerprint}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {21--35}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_2}, doi = {10.1007/978-3-030-93956-4\_2}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/Lyu0ZYHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/ShresthaITD21, author = {Sunny Shrestha and Esa Irby and Raghav Thapa and Sanchari Das}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {SoK: {A} Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {108--127}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_7}, doi = {10.1007/978-3-030-93956-4\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/ShresthaITD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/YeLHZYW21, author = {Renjun Ye and Liang Liu and Simin Hu and Fangzhou Zhu and Jingxiu Yang and Feng Wang}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {{JSLIM:} Reducing the Known Vulnerabilities of JavaScript Application by Debloating}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {128--143}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_8}, doi = {10.1007/978-3-030-93956-4\_8}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/YeLHZYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/ZhangC21, author = {Jixin Zhang and Jiageng Chen}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {Practical and Provable Secure Vehicular Component Protection Scheme}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {1--20}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_1}, doi = {10.1007/978-3-030-93956-4\_1}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/ZhangC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/ZhangGMT21, author = {Boyun Zhang and Puneet Gill and Nelu Mihai and Mahesh Tripunitara}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {Granularity and Usability in Authorization Policies}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {68--86}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4\_5}, doi = {10.1007/978-3-030-93956-4\_5}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/ZhangGMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.