default search action
Search dblp for Publications
export results for "toc:db/conf/paisi/paisi2013.bht:"
@inproceedings{DBLP:conf/paisi/ChenHO13, author = {Chia{-}Mei Chen and Jhe{-}Jhun Huang and Ya{-}Hui Ou}, editor = {G. Alan Wang and Xiaolong Zheng and Michael Chau and Hsinchun Chen}, title = {Detecting Web Attacks Based on Domain Statistics}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2013, Beijing, China, August 3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8039}, pages = {97--106}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39693-9\_10}, doi = {10.1007/978-3-642-39693-9\_10}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/paisi/ChenHO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/GaoLZ13, author = {Heng Gao and Qiudan Li and Xiaolong Zheng}, editor = {G. Alan Wang and Xiaolong Zheng and Michael Chau and Hsinchun Chen}, title = {Label Micro-blog Topics Using the Bayesian Inference Method}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2013, Beijing, China, August 3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8039}, pages = {19--28}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39693-9\_3}, doi = {10.1007/978-3-642-39693-9\_3}, timestamp = {Sat, 15 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/GaoLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/GhosalSB13, author = {Amrita Ghosal and Aadirupa Saha and Sipra Das Bit}, editor = {G. Alan Wang and Xiaolong Zheng and Michael Chau and Hsinchun Chen}, title = {Energy Saving Replay Attack Prevention in Clustered Wireless Sensor Networks}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2013, Beijing, China, August 3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8039}, pages = {82--96}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39693-9\_9}, doi = {10.1007/978-3-642-39693-9\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/GhosalSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/HeZZCZL13, author = {Saike He and Xiaolong Zheng and Daniel Zeng and Kainan Cui and Zhu Zhang and Chuan Luo}, editor = {G. Alan Wang and Xiaolong Zheng and Michael Chau and Hsinchun Chen}, title = {Identifying Peer Influence in Online Social Networks Using Transfer Entropy}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2013, Beijing, China, August 3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8039}, pages = {47--61}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39693-9\_6}, doi = {10.1007/978-3-642-39693-9\_6}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/paisi/HeZZCZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/Hunter13, author = {Aaron Hunter}, editor = {G. Alan Wang and Xiaolong Zheng and Michael Chau and Hsinchun Chen}, title = {Belief Manipulation: {A} Formal Model of Deceit in Message Passing Systems}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2013, Beijing, China, August 3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8039}, pages = {1--8}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39693-9\_1}, doi = {10.1007/978-3-642-39693-9\_1}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/Hunter13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/LiFJX13, author = {Ning Li and Xu Feng and Shufan Ji and Ke Xu}, editor = {G. Alan Wang and Xiaolong Zheng and Michael Chau and Hsinchun Chen}, title = {Modeling Relationship Strength for Link Prediction}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2013, Beijing, China, August 3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8039}, pages = {62--74}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39693-9\_7}, doi = {10.1007/978-3-642-39693-9\_7}, timestamp = {Fri, 10 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/paisi/LiFJX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/LiNCWY13, author = {Tim M. H. Li and Ben C. M. Ng and Michael Chau and Paul W. C. Wong and Paul Siu Fai Yip}, editor = {G. Alan Wang and Xiaolong Zheng and Michael Chau and Hsinchun Chen}, title = {Collective Intelligence for Suicide Surveillance in Web Forums}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2013, Beijing, China, August 3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8039}, pages = {29--37}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39693-9\_4}, doi = {10.1007/978-3-642-39693-9\_4}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/LiNCWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/LisyP13, author = {Viliam Lis{\'{y}} and Radek P{\'{\i}}bil}, editor = {G. Alan Wang and Xiaolong Zheng and Michael Chau and Hsinchun Chen}, title = {Computing Optimal Attack Strategies Using Unconstrained Influence Diagrams}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2013, Beijing, China, August 3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8039}, pages = {38--46}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39693-9\_5}, doi = {10.1007/978-3-642-39693-9\_5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/LisyP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/TanG0Z13, author = {Rong Tan and Junzhong Gu and Peng Chen and Zhou Zhong}, editor = {G. Alan Wang and Xiaolong Zheng and Michael Chau and Hsinchun Chen}, title = {Region of Interest Discovery in Location-Based Social Networking Services with Protected Locations}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2013, Beijing, China, August 3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8039}, pages = {9--18}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39693-9\_2}, doi = {10.1007/978-3-642-39693-9\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/TanG0Z13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/WangZFWZ13, author = {Tao Wang and Qingpeng Zhang and Julei Fu and Xiao Wang and Suncong Zheng}, editor = {G. Alan Wang and Xiaolong Zheng and Michael Chau and Hsinchun Chen}, title = {What Is the Uniqueness of Growth Pattern in Human Flesh Search Organization?}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2013, Beijing, China, August 3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8039}, pages = {75--81}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39693-9\_8}, doi = {10.1007/978-3-642-39693-9\_8}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/WangZFWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/XieWW13, author = {Weimin Xie and Liejun Wang and Mingwei Wang}, editor = {G. Alan Wang and Xiaolong Zheng and Michael Chau and Hsinchun Chen}, title = {A Novel Key Scheme Based on {QR} Decomposition for Wireless Sensor Networks}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2013, Beijing, China, August 3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8039}, pages = {107--115}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39693-9\_11}, doi = {10.1007/978-3-642-39693-9\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/XieWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/paisi/2013, editor = {G. Alan Wang and Xiaolong Zheng and Michael Chau and Hsinchun Chen}, title = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2013, Beijing, China, August 3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8039}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39693-9}, doi = {10.1007/978-3-642-39693-9}, isbn = {978-3-642-39692-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.