Search dblp for Publications

export results for "toc:db/journals/ejisec/ejisec2023.bht:"

 download as .bib file

@article{DBLP:journals/ejisec/AliMBM23,
  author       = {Arslan Ali and
                  Andrea Migliorati and
                  Tiziano Bianchi and
                  Enrico Magli},
  title        = {Gaussian class-conditional simplex loss for accurate, adversarially
                  robust deep classifier training},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {3},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00137-0},
  doi          = {10.1186/S13635-023-00137-0},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/AliMBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HuZLWLS23,
  author       = {Feifei Hu and
                  Situo Zhang and
                  Xubin Lin and
                  Liu Wu and
                  Niandong Liao and
                  Yanqi Song},
  title        = {Network traffic classification model based on attention mechanism
                  and spatiotemporal features},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {6},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00141-4},
  doi          = {10.1186/S13635-023-00141-4},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HuZLWLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/IslamICLC23,
  author       = {Md. Ezazul Islam and
                  Md. Rafiqul Islam and
                  Madhu Chetty and
                  Suryani Lim and
                  Mehmood Chadhar},
  title        = {User authentication and access control to blockchain-based forensic
                  log data},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {7},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00142-3},
  doi          = {10.1186/S13635-023-00142-3},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/IslamICLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/KatikaK23,
  author       = {Balaji Rao Katika and
                  Kannan Karthik},
  title        = {Image life trails based on contrast reduction models for face counter-spoofing},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {1},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-022-00135-8},
  doi          = {10.1186/S13635-022-00135-8},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/KatikaK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/TaranTHCBV23,
  author       = {Olga Taran and
                  Joakim Tutt and
                  Taras Holotyak and
                  Roman Chaban and
                  Slavi Bonev and
                  Slava Voloshynovskiy},
  title        = {Mobile authentication of copy detection patterns},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {4},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00140-5},
  doi          = {10.1186/S13635-023-00140-5},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/TaranTHCBV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/TaranTHCBV23a,
  author       = {Olga Taran and
                  Joakim Tutt and
                  Taras Holotyak and
                  Roman Chaban and
                  Slavi Bonev and
                  Slava Voloshynovskiy},
  title        = {Correction: Mobile authentication of copy detection patterns},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {8},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00143-2},
  doi          = {10.1186/S13635-023-00143-2},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/TaranTHCBV23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/WangLZ23,
  author       = {Xiaoning Wang and
                  Jia Liu and
                  Chunjiong Zhang},
  title        = {Network intrusion detection based on multi-domain data and ensemble-bidirectional
                  {LSTM}},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {5},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00139-y},
  doi          = {10.1186/S13635-023-00139-Y},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/WangLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Yang23,
  author       = {Jen{-}Ho Yang},
  title        = {A multi-gateway authentication and key-agreement scheme on wireless
                  sensor networks for IoT},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {2},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00138-z},
  doi          = {10.1186/S13635-023-00138-Z},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Yang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ZhangZH23,
  author       = {Jimin Zhang and
                  Xianfeng Zhao and
                  Xiaolei He},
  title        = {Robust {JPEG} steganography based on the robustness classifier},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {11},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00148-x},
  doi          = {10.1186/S13635-023-00148-X},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/ZhangZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Chen23,
  title        = {The design of network security protection trust management system
                  based on an improved hidden Markov model},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {1--13},
  year         = {2023},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-023-00146-z},
  doi          = {10.1186/S13635-023-00146-Z},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Chen23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Li23,
  title        = {Node fault diagnosis algorithm for wireless sensor networks based
                  on {BN} and {WSN}},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {12},
  year         = {2023},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-023-00149-w},
  doi          = {10.1186/S13635-023-00149-W},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/WangWH23,
  title        = {Hierarchical energy-saving routing algorithm using fuzzy logic in
                  wireless sensor networks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {9},
  year         = {2023},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-023-00144-1},
  doi          = {10.1186/S13635-023-00144-1},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/WangWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}