Search dblp for Publications

export results for "toc:db/conf/paisi/paisi2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/paisi/ChenHO13,
  author       = {Chia{-}Mei Chen and
                  Jhe{-}Jhun Huang and
                  Ya{-}Hui Ou},
  editor       = {G. Alan Wang and
                  Xiaolong Zheng and
                  Michael Chau and
                  Hsinchun Chen},
  title        = {Detecting Web Attacks Based on Domain Statistics},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2013, Beijing, China, August 3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8039},
  pages        = {97--106},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39693-9\_10},
  doi          = {10.1007/978-3-642-39693-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/ChenHO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/GaoLZ13,
  author       = {Heng Gao and
                  Qiudan Li and
                  Xiaolong Zheng},
  editor       = {G. Alan Wang and
                  Xiaolong Zheng and
                  Michael Chau and
                  Hsinchun Chen},
  title        = {Label Micro-blog Topics Using the Bayesian Inference Method},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2013, Beijing, China, August 3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8039},
  pages        = {19--28},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39693-9\_3},
  doi          = {10.1007/978-3-642-39693-9\_3},
  timestamp    = {Sat, 15 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/GaoLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/GhosalSB13,
  author       = {Amrita Ghosal and
                  Aadirupa Saha and
                  Sipra Das Bit},
  editor       = {G. Alan Wang and
                  Xiaolong Zheng and
                  Michael Chau and
                  Hsinchun Chen},
  title        = {Energy Saving Replay Attack Prevention in Clustered Wireless Sensor
                  Networks},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2013, Beijing, China, August 3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8039},
  pages        = {82--96},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39693-9\_9},
  doi          = {10.1007/978-3-642-39693-9\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/GhosalSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/HeZZCZL13,
  author       = {Saike He and
                  Xiaolong Zheng and
                  Daniel Zeng and
                  Kainan Cui and
                  Zhu Zhang and
                  Chuan Luo},
  editor       = {G. Alan Wang and
                  Xiaolong Zheng and
                  Michael Chau and
                  Hsinchun Chen},
  title        = {Identifying Peer Influence in Online Social Networks Using Transfer
                  Entropy},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2013, Beijing, China, August 3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8039},
  pages        = {47--61},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39693-9\_6},
  doi          = {10.1007/978-3-642-39693-9\_6},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/paisi/HeZZCZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/Hunter13,
  author       = {Aaron Hunter},
  editor       = {G. Alan Wang and
                  Xiaolong Zheng and
                  Michael Chau and
                  Hsinchun Chen},
  title        = {Belief Manipulation: {A} Formal Model of Deceit in Message Passing
                  Systems},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2013, Beijing, China, August 3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8039},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39693-9\_1},
  doi          = {10.1007/978-3-642-39693-9\_1},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/Hunter13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/LiFJX13,
  author       = {Ning Li and
                  Xu Feng and
                  Shufan Ji and
                  Ke Xu},
  editor       = {G. Alan Wang and
                  Xiaolong Zheng and
                  Michael Chau and
                  Hsinchun Chen},
  title        = {Modeling Relationship Strength for Link Prediction},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2013, Beijing, China, August 3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8039},
  pages        = {62--74},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39693-9\_7},
  doi          = {10.1007/978-3-642-39693-9\_7},
  timestamp    = {Fri, 10 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/paisi/LiFJX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/LiNCWY13,
  author       = {Tim M. H. Li and
                  Ben C. M. Ng and
                  Michael Chau and
                  Paul W. C. Wong and
                  Paul Siu Fai Yip},
  editor       = {G. Alan Wang and
                  Xiaolong Zheng and
                  Michael Chau and
                  Hsinchun Chen},
  title        = {Collective Intelligence for Suicide Surveillance in Web Forums},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2013, Beijing, China, August 3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8039},
  pages        = {29--37},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39693-9\_4},
  doi          = {10.1007/978-3-642-39693-9\_4},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/LiNCWY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/LisyP13,
  author       = {Viliam Lis{\'{y}} and
                  Radek P{\'{\i}}bil},
  editor       = {G. Alan Wang and
                  Xiaolong Zheng and
                  Michael Chau and
                  Hsinchun Chen},
  title        = {Computing Optimal Attack Strategies Using Unconstrained Influence
                  Diagrams},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2013, Beijing, China, August 3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8039},
  pages        = {38--46},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39693-9\_5},
  doi          = {10.1007/978-3-642-39693-9\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/LisyP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/TanG0Z13,
  author       = {Rong Tan and
                  Junzhong Gu and
                  Peng Chen and
                  Zhou Zhong},
  editor       = {G. Alan Wang and
                  Xiaolong Zheng and
                  Michael Chau and
                  Hsinchun Chen},
  title        = {Region of Interest Discovery in Location-Based Social Networking Services
                  with Protected Locations},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2013, Beijing, China, August 3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8039},
  pages        = {9--18},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39693-9\_2},
  doi          = {10.1007/978-3-642-39693-9\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/TanG0Z13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/WangZFWZ13,
  author       = {Tao Wang and
                  Qingpeng Zhang and
                  Julei Fu and
                  Xiao Wang and
                  Suncong Zheng},
  editor       = {G. Alan Wang and
                  Xiaolong Zheng and
                  Michael Chau and
                  Hsinchun Chen},
  title        = {What Is the Uniqueness of Growth Pattern in Human Flesh Search Organization?},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2013, Beijing, China, August 3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8039},
  pages        = {75--81},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39693-9\_8},
  doi          = {10.1007/978-3-642-39693-9\_8},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/WangZFWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/XieWW13,
  author       = {Weimin Xie and
                  Liejun Wang and
                  Mingwei Wang},
  editor       = {G. Alan Wang and
                  Xiaolong Zheng and
                  Michael Chau and
                  Hsinchun Chen},
  title        = {A Novel Key Scheme Based on {QR} Decomposition for Wireless Sensor
                  Networks},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2013, Beijing, China, August 3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8039},
  pages        = {107--115},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39693-9\_11},
  doi          = {10.1007/978-3-642-39693-9\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/XieWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/paisi/2013,
  editor       = {G. Alan Wang and
                  Xiaolong Zheng and
                  Michael Chau and
                  Hsinchun Chen},
  title        = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2013, Beijing, China, August 3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8039},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39693-9},
  doi          = {10.1007/978-3-642-39693-9},
  isbn         = {978-3-642-39692-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}