default search action
Search dblp for Publications
export results for "toc:db/journals/ejisec/ejisec2023.bht:"
@article{DBLP:journals/ejisec/AliMBM23, author = {Arslan Ali and Andrea Migliorati and Tiziano Bianchi and Enrico Magli}, title = {Gaussian class-conditional simplex loss for accurate, adversarially robust deep classifier training}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {3}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00137-0}, doi = {10.1186/S13635-023-00137-0}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/AliMBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HuZLWLS23, author = {Feifei Hu and Situo Zhang and Xubin Lin and Liu Wu and Niandong Liao and Yanqi Song}, title = {Network traffic classification model based on attention mechanism and spatiotemporal features}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {6}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00141-4}, doi = {10.1186/S13635-023-00141-4}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HuZLWLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/IslamICLC23, author = {Md. Ezazul Islam and Md. Rafiqul Islam and Madhu Chetty and Suryani Lim and Mehmood Chadhar}, title = {User authentication and access control to blockchain-based forensic log data}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {7}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00142-3}, doi = {10.1186/S13635-023-00142-3}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/IslamICLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/KatikaK23, author = {Balaji Rao Katika and Kannan Karthik}, title = {Image life trails based on contrast reduction models for face counter-spoofing}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {1}, year = {2023}, url = {https://doi.org/10.1186/s13635-022-00135-8}, doi = {10.1186/S13635-022-00135-8}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/KatikaK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/TaranTHCBV23, author = {Olga Taran and Joakim Tutt and Taras Holotyak and Roman Chaban and Slavi Bonev and Slava Voloshynovskiy}, title = {Mobile authentication of copy detection patterns}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {4}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00140-5}, doi = {10.1186/S13635-023-00140-5}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/TaranTHCBV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/TaranTHCBV23a, author = {Olga Taran and Joakim Tutt and Taras Holotyak and Roman Chaban and Slavi Bonev and Slava Voloshynovskiy}, title = {Correction: Mobile authentication of copy detection patterns}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {8}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00143-2}, doi = {10.1186/S13635-023-00143-2}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/TaranTHCBV23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/WangLZ23, author = {Xiaoning Wang and Jia Liu and Chunjiong Zhang}, title = {Network intrusion detection based on multi-domain data and ensemble-bidirectional {LSTM}}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {5}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00139-y}, doi = {10.1186/S13635-023-00139-Y}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/WangLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Yang23, author = {Jen{-}Ho Yang}, title = {A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {2}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00138-z}, doi = {10.1186/S13635-023-00138-Z}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Yang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ZhangZH23, author = {Jimin Zhang and Xianfeng Zhao and Xiaolei He}, title = {Robust {JPEG} steganography based on the robustness classifier}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {11}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00148-x}, doi = {10.1186/S13635-023-00148-X}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/ZhangZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Chen23, title = {The design of network security protection trust management system based on an improved hidden Markov model}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {1--13}, year = {2023}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-023-00146-z}, doi = {10.1186/S13635-023-00146-Z}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Chen23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Li23, title = {Node fault diagnosis algorithm for wireless sensor networks based on {BN} and {WSN}}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {12}, year = {2023}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-023-00149-w}, doi = {10.1186/S13635-023-00149-W}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/WangWH23, title = {Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {9}, year = {2023}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-023-00144-1}, doi = {10.1186/S13635-023-00144-1}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/WangWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.