Search dblp for Publications

export results for "stream:conf/eisa:"

 download as .bib file

@proceedings{DBLP:conf/eisa/2023,
  editor       = {Jun Shao and
                  Sokratis K. Katsikas and
                  Weizhi Meng},
  title        = {Emerging Information Security and Applications - 4th International
                  Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2004},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-99-9614-8},
  doi          = {10.1007/978-981-99-9614-8},
  isbn         = {978-981-99-9613-1},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/FengWPWSG23,
  author       = {Jun Feng and
                  Hongkai Wang and
                  Liangying Peng and
                  Yidan Wang and
                  Haomin Song and
                  Hongju Guo},
  editor       = {Jun Shao and
                  Sokratis K. Katsikas and
                  Weizhi Meng},
  title        = {Chinese Named Entity Recognition Within the Electric Power Domain},
  booktitle    = {Emerging Information Security and Applications - 4th International
                  Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2004},
  pages        = {133--146},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9614-8\_9},
  doi          = {10.1007/978-981-99-9614-8\_9},
  timestamp    = {Thu, 11 Apr 2024 16:38:28 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/FengWPWSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/LiH23,
  author       = {Liang Li and
                  Gengran Hu},
  editor       = {Jun Shao and
                  Sokratis K. Katsikas and
                  Weizhi Meng},
  title        = {Pairing Compression on Some Elliptic Curves with Subgroups of Embedding
                  Degree 6 and Its Applications to Pairing-Based Cryptography},
  booktitle    = {Emerging Information Security and Applications - 4th International
                  Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2004},
  pages        = {77--91},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9614-8\_5},
  doi          = {10.1007/978-981-99-9614-8\_5},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/LiH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/LiJLMLWL23,
  author       = {Huifeng Li and
                  Pengzhou Jia and
                  Weixun Li and
                  Bin Ma and
                  Bo Li and
                  Dexin Wu and
                  Haoran Li},
  editor       = {Jun Shao and
                  Sokratis K. Katsikas and
                  Weizhi Meng},
  title        = {Towards Efficient Universal Adversarial Attack on Audio Classification
                  Models: {A} Two-Step Method},
  booktitle    = {Emerging Information Security and Applications - 4th International
                  Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2004},
  pages        = {20--37},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9614-8\_2},
  doi          = {10.1007/978-981-99-9614-8\_2},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/LiJLMLWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/LiSWYGDW23,
  author       = {Weixun Li and
                  Guanghui Sun and
                  Yajun Wang and
                  Long Yuan and
                  Minghui Gao and
                  Yan Dong and
                  Chen Wang},
  editor       = {Jun Shao and
                  Sokratis K. Katsikas and
                  Weizhi Meng},
  title        = {Deep Neural Network Model over Encrypted Data},
  booktitle    = {Emerging Information Security and Applications - 4th International
                  Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2004},
  pages        = {107--117},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9614-8\_7},
  doi          = {10.1007/978-981-99-9614-8\_7},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/LiSWYGDW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/SavicYLG23,
  author       = {Izabela Savic and
                  Haonan Yan and
                  Xiaodong Lin and
                  Daniel Gillis},
  editor       = {Jun Shao and
                  Sokratis K. Katsikas and
                  Weizhi Meng},
  title        = {Adversarial Example Attacks and Defenses in {DNS} Data Exfiltration},
  booktitle    = {Emerging Information Security and Applications - 4th International
                  Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2004},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9614-8\_10},
  doi          = {10.1007/978-981-99-9614-8\_10},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/SavicYLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/SoderiN23,
  author       = {Simone Soderi and
                  Rocco De Nicola},
  editor       = {Jun Shao and
                  Sokratis K. Katsikas and
                  Weizhi Meng},
  title        = {{CONNECTION:} COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN},
  booktitle    = {Emerging Information Security and Applications - 4th International
                  Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2004},
  pages        = {164--183},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9614-8\_11},
  doi          = {10.1007/978-981-99-9614-8\_11},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/SoderiN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/SunZLLWL23,
  author       = {Kangkang Sun and
                  Xiaojin Zhang and
                  Xi Lin and
                  Gaolei Li and
                  Jing Wang and
                  Jianhua Li},
  editor       = {Jun Shao and
                  Sokratis K. Katsikas and
                  Weizhi Meng},
  title        = {Toward the Tradeoffs Between Privacy, Fairness and Utility in Federated
                  Learning},
  booktitle    = {Emerging Information Security and Applications - 4th International
                  Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2004},
  pages        = {118--132},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9614-8\_8},
  doi          = {10.1007/978-981-99-9614-8\_8},
  timestamp    = {Fri, 07 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/SunZLLWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/TuS23,
  author       = {Jun Tu and
                  Gang Shen},
  editor       = {Jun Shao and
                  Sokratis K. Katsikas and
                  Weizhi Meng},
  title        = {Privacy-Preserving Authenticated Federated Learning Scheme for Smart
                  Healthcare System},
  booktitle    = {Emerging Information Security and Applications - 4th International
                  Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2004},
  pages        = {38--57},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9614-8\_3},
  doi          = {10.1007/978-981-99-9614-8\_3},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/TuS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/WangFWPZX23,
  author       = {Hongkai Wang and
                  Jun Feng and
                  Yidan Wang and
                  Sichen Pan and
                  Shuai Zhao and
                  Yi Xue},
  editor       = {Jun Shao and
                  Sokratis K. Katsikas and
                  Weizhi Meng},
  title        = {Enhancing Chinese Named Entity Recognition with Disentangled Expert
                  Knowledge},
  booktitle    = {Emerging Information Security and Applications - 4th International
                  Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2004},
  pages        = {92--106},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9614-8\_6},
  doi          = {10.1007/978-981-99-9614-8\_6},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/WangFWPZX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/WeiZZ23,
  author       = {Yinxing Wei and
                  Jun Zheng and
                  Hong Zhong},
  editor       = {Jun Shao and
                  Sokratis K. Katsikas and
                  Weizhi Meng},
  title        = {A Systematic Method for Constructing {ICT} Supply Chain Security Requirements},
  booktitle    = {Emerging Information Security and Applications - 4th International
                  Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2004},
  pages        = {58--76},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9614-8\_4},
  doi          = {10.1007/978-981-99-9614-8\_4},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/WeiZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/ZhangLLWWZ23,
  author       = {Chuan Zhang and
                  Haotian Liang and
                  Zhuopeng Li and
                  Tong Wu and
                  Licheng Wang and
                  Liehuang Zhu},
  editor       = {Jun Shao and
                  Sokratis K. Katsikas and
                  Weizhi Meng},
  title        = {PtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples},
  booktitle    = {Emerging Information Security and Applications - 4th International
                  Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2004},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9614-8\_1},
  doi          = {10.1007/978-981-99-9614-8\_1},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/ZhangLLWWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/BelelDM22,
  author       = {Anushree Belel and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {Hierarchical Identity Based Inner Product Functional Encryption for
                  Privacy Preserving Statistical Analysis Without q-type Assumption},
  booktitle    = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  pages        = {108--125},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1\_7},
  doi          = {10.1007/978-3-031-23098-1\_7},
  timestamp    = {Wed, 08 Mar 2023 15:07:45 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/BelelDM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/ChanKTTJ22,
  author       = {Yen Yee Chan and
                  Cher{-}Yin Khor and
                  Je Sen Teh and
                  Weijian Teng and
                  Norziana Jamil},
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {Differential Cryptanalysis of Lightweight Block Ciphers {SLIM} and
                  {LCB}},
  booktitle    = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  pages        = {55--67},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1\_4},
  doi          = {10.1007/978-3-031-23098-1\_4},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/ChanKTTJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/ChenYG22,
  author       = {Fei Chen and
                  Zhengzheng Yan and
                  Liang Gu},
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {Towards Low-Latency Big Data Infrastructure at Sangfor},
  booktitle    = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1\_3},
  doi          = {10.1007/978-3-031-23098-1\_3},
  timestamp    = {Wed, 08 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/ChenYG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/CuiZ0DL22,
  author       = {Yunfeng Cui and
                  Wenbin Zhai and
                  Liang Liu and
                  Youwei Ding and
                  Wanying Lu},
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {Link Aware Aggregation Query with Privacy-Preserving Capability in
                  Wireless Sensor Networks},
  booktitle    = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  pages        = {209--224},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1\_13},
  doi          = {10.1007/978-3-031-23098-1\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/CuiZ0DL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/DengCC022,
  author       = {Jiaxin Deng and
                  Simin Chen and
                  Jiageng Chen and
                  Weizhi Meng},
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography},
  booktitle    = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  pages        = {87--107},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1\_6},
  doi          = {10.1007/978-3-031-23098-1\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/DengCC022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/LiTYC22,
  author       = {Pei Li and
                  Liliu Tan and
                  Shixiong Yao and
                  Jiageng Chen},
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {Parallel Validity Analysis of the Boomerang Attack Model},
  booktitle    = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  pages        = {68--86},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1\_5},
  doi          = {10.1007/978-3-031-23098-1\_5},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/LiTYC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/LiZZL22,
  author       = {Ye Li and
                  Jiale Zhang and
                  Junwu Zhu and
                  Wenjuan Li},
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {{HBMD-FL:} Heterogeneous Federated Learning Algorithm Based on Blockchain
                  and Model Distillation},
  booktitle    = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  pages        = {145--159},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1\_9},
  doi          = {10.1007/978-3-031-23098-1\_9},
  timestamp    = {Tue, 11 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/LiZZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/LiuFP0H22,
  author       = {Yang Liu and
                  Qi Feng and
                  Cong Peng and
                  Min Luo and
                  Debiao He},
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {Asymmetric Secure Multi-party Signing Protocol for the Identity-Based
                  Signature Scheme in the {IEEE} {P1363} Standard for Public Key Cryptography},
  booktitle    = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1\_1},
  doi          = {10.1007/978-3-031-23098-1\_1},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/LiuFP0H22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/NguyenLBOM22,
  author       = {Thi Quynh Nguyen and
                  Romain Laborde and
                  Abdelmalek Benzekri and
                  Arnaud Oglaza and
                  Mehdi Mounsif},
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {AutoRoC-DBSCAN: Automatic Tuning of {DBSCAN} to Detect Malicious {DNS}
                  Tunnels},
  booktitle    = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  pages        = {126--144},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1\_8},
  doi          = {10.1007/978-3-031-23098-1\_8},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/NguyenLBOM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/WeiQF22,
  author       = {Guoheng Wei and
                  Yanlin Qin and
                  Wei Fu},
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {Secure and Efficient Certificateless Authentication Key Agreement
                  Protocol in {VANET}},
  booktitle    = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  pages        = {160--172},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1\_10},
  doi          = {10.1007/978-3-031-23098-1\_10},
  timestamp    = {Wed, 08 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/WeiQF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/XiaLHSZ22,
  author       = {Zhe Xia and
                  Shiyun Liu and
                  Yichen Huang and
                  Hua Shen and
                  Mingwu Zhang},
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving
                  for Vehicle Networks},
  booktitle    = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1\_2},
  doi          = {10.1007/978-3-031-23098-1\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/XiaLHSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/XiongYL22,
  author       = {Yi Xiong and
                  Shixiong Yao and
                  Pei Li},
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {{D2CDIM:} DID-Based Decentralized Cross-Domain Identity Management
                  with Privacy-Preservation and Sybil-Resistance},
  booktitle    = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  pages        = {191--208},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1\_12},
  doi          = {10.1007/978-3-031-23098-1\_12},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/XiongYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/Zhang0S22,
  author       = {Dayin Zhang and
                  Xiaojun Chen and
                  Jinqiao Shi},
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {An Efficient Federated Convolutional Neural Network Scheme with Differential
                  Privacy},
  booktitle    = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  pages        = {173--190},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1\_11},
  doi          = {10.1007/978-3-031-23098-1\_11},
  timestamp    = {Wed, 08 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/Zhang0S22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisa/2021,
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-93956-4},
  doi          = {10.1007/978-3-030-93956-4},
  isbn         = {978-3-030-93955-7},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisa/2022,
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1},
  doi          = {10.1007/978-3-031-23098-1},
  isbn         = {978-3-031-23097-4},
  timestamp    = {Wed, 08 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/0001FO21,
  author       = {Muhammad Imran Khan and
                  Simon N. Foley and
                  Barry O'Sullivan},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {Database Intrusion Detection Systems (DIDs): Insider Threat Detection
                  via Behaviour-Based Anomaly Detection Systems - {A} Brief Survey of
                  Concepts and Approaches},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {178--197},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_11},
  doi          = {10.1007/978-3-030-93956-4\_11},
  timestamp    = {Wed, 02 Mar 2022 16:47:49 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/0001FO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/0002KR21,
  author       = {Martin Grimmer and
                  Tim Kaelble and
                  Erhard Rahm},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {Improving Host-Based Intrusion Detection Using Thread Information},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {159--177},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_10},
  doi          = {10.1007/978-3-030-93956-4\_10},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/0002KR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/GreavesCL21,
  author       = {Brian Greaves and
                  Marijke Coetzee and
                  Wai Sze Leung},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {Digital Twin Monitoring for Cyber-Physical Access Control},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {144--158},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_9},
  doi          = {10.1007/978-3-030-93956-4\_9},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/GreavesCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/GuptaKNG21,
  author       = {Sanonda Datta Gupta and
                  Stephen Kaplan and
                  Aubree Nygaard and
                  Sepideh Ghanavati},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {A Two-Fold Study to Investigate Users' Perception of IoT Information
                  Sensitivity Levels and Their Willingness to Share the Information},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {87--107},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_6},
  doi          = {10.1007/978-3-030-93956-4\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/GuptaKNG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/HeC21,
  author       = {Yueyue He and
                  Jiageng Chen},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {AMLChain: Supporting Anti-money Laundering, Privacy-Preserving, Auditable
                  Distributed Ledger},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {50--67},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_4},
  doi          = {10.1007/978-3-030-93956-4\_4},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/HeC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/JingYH21,
  author       = {Pujie Jing and
                  Shixiong Yao and
                  Yueyue He},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {{APHC:} Auditable and Privacy Preserving Health {QR} Code Based on
                  Blockchain},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {36--49},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_3},
  doi          = {10.1007/978-3-030-93956-4\_3},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/JingYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/Lyu0ZYHH21,
  author       = {Ting Lyu and
                  Liang Liu and
                  Fangzhou Zhu and
                  Jingxiu Yang and
                  Simin Hu and
                  Yanxi Huang},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {{NEEX:} An Automated and Efficient Tool for Detecting Browser Extension
                  Fingerprint},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {21--35},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_2},
  doi          = {10.1007/978-3-030-93956-4\_2},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/Lyu0ZYHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/ShresthaITD21,
  author       = {Sunny Shrestha and
                  Esa Irby and
                  Raghav Thapa and
                  Sanchari Das},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {SoK: {A} Systematic Literature Review of Bluetooth Security Threats
                  and Mitigation Measures},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {108--127},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_7},
  doi          = {10.1007/978-3-030-93956-4\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/ShresthaITD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/YeLHZYW21,
  author       = {Renjun Ye and
                  Liang Liu and
                  Simin Hu and
                  Fangzhou Zhu and
                  Jingxiu Yang and
                  Feng Wang},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {{JSLIM:} Reducing the Known Vulnerabilities of JavaScript Application
                  by Debloating},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {128--143},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_8},
  doi          = {10.1007/978-3-030-93956-4\_8},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/YeLHZYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/ZhangC21,
  author       = {Jixin Zhang and
                  Jiageng Chen},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {Practical and Provable Secure Vehicular Component Protection Scheme},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_1},
  doi          = {10.1007/978-3-030-93956-4\_1},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/ZhangC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/ZhangGMT21,
  author       = {Boyun Zhang and
                  Puneet Gill and
                  Nelu Mihai and
                  Mahesh Tripunitara},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {Granularity and Usability in Authorization Policies},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {68--86},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_5},
  doi          = {10.1007/978-3-030-93956-4\_5},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/ZhangGMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}