default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 423 matches
- 2024
- Yingying Cai, Wenhui Hu, Xueyang Liu, Haoxuan Wang, Xiankui Zhang, Jiaxi Wang:
User Dual Intents Graph Modeling for Information Diffusion Prediction. BigDataSecurity 2024: 35-40 - Haozhe Chai, Jun Wu, Qianqian Pan, Xinzheng Feng:
Sound-LDR Sensors Empowered Secure True Random Number Generator for PoS Consensus in Blockchain. BigDataSecurity 2024: 139-144 - Ming Chen, Sen Yang, Wenbo Dai, Zisheng Wang, Jun Xu:
A Method for Anomaly Detection in Power Energy Topology Graph Data Based on Domain Knowledge Graph and Graph Neural Networks. BigDataSecurity 2024: 107-112 - Guohao Cui, Hao Wang, Wentao Hao, Xiaoyi Zhou:
OT24: Optical color image encryption based on Two-dimensional quantum walks and 24-bit-plane permutation. BigDataSecurity 2024: 145-149 - Chuangchuang Dai, Haodong Li, Lei Guan, Mingbo Chi:
Industrial Internet of Things (IIoT) Identity Resolution Techniques: A Review. BigDataSecurity 2024: 161-166 - Chen Jiang, Mengxian Chen, Huasen Xie, Hua Wang, Jun Xu:
A Method for Anomaly Detection in Power Time Series Data within Energy Big Data Based on Generative Adversarial Networks. BigDataSecurity 2024: 125-129 - Fangming Jing, Chen Yang, Shuyi Li, Xueyang Liu, Wenhui Hu:
Precision Assistance for Residents with Subsistence Allowance: Cluster Analysis of Mixed-Type Data Based on K-Prototypes. BigDataSecurity 2024: 78-83 - Yanlu Li, Yufeng Xiao, Yinyan Gong, Ronglin Zhang, Yingzi Huo, Yanbing Wu:
Explainable AI: A Way to Achieve Trustworthy AI. BigDataSecurity 2024: 150-155 - Shizhong Li, Wei Zhang, Ruonan Chen, Dawei Li:
A Distributed Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in IoT. BigDataSecurity 2024: 90-95 - Shuyi Li, Pengyu Zhang, Xueyang Liu, Wenhui Hu:
Test Case Recommendation for Blockchain Systems Based on Graph Convolutional Networks. BigDataSecurity 2024: 17-22 - Yong Lin, Peng Jiang, Keke Gai, Liehuang Zhu:
Exploiting Multi-Model Collaborative Inference for Privacy Enhancement in Text Classification. BigDataSecurity 2024: 58-65 - Jingnian Liu, Wei Liang, Yuxiang Chen, Kai Jin:
SyNet: Medical image anomaly detection with noise synthesis network. BigDataSecurity 2024: 96-100 - Dongfeng Lv, Manman Ma, Hanxia Dong, Yishan Shang, Kuo Bao:
Anomaly Detection in Multivariate Time Series with Contaminated Training Data Using VAE. BigDataSecurity 2024: 5-10 - Qianqian Pan, Jun Wu:
AI-Finger: From Physical Unclonable Function to AI-Hardware Fingerprint. BigDataSecurity 2024: 167-172 - Xiangyun Qian, Rui Zhang, Zi Kang, Hui Xia:
An Invisible Backdoor Attack on Cloud Computing in the Internet of Things. BigDataSecurity 2024: 101-106 - Xintian Ren, Jun Wu, Hansong Xu, Xiuzhen Chen:
Diffusion Model Based Secure Semantic Communications with Adversarial Purification. BigDataSecurity 2024: 130-134 - Taolei Shi, Wei Gong:
A Survey of Bluetooth Indoor Localization. BigDataSecurity 2024: 71-77 - Bhavani Thuraisingham, Kim Nimon, Latifur Khan:
An Education Program for Big Data Security and Privacy. BigDataSecurity 2024: 1-4 - Zijun Wang, Hongchen Guo, Keke Gai:
Decision Tree-based Privacy Protection in Federated Learning: A Survey. BigDataSecurity 2024: 119-124 - Zhouji Wang, Xinyue Lu, Kui Li, Wei Gong:
A Low-Cost Positioning Beacon in Rail Transit System. BigDataSecurity 2024: 11-16 - Wenjia Wang, Seyed Masoud Sadjadi, Naphtali Rishe:
A Survey of Major Cybersecurity Compliance Frameworks. BigDataSecurity 2024: 23-34 - Xiaohui Wei, Mengting Zhou, Nan Jiang, Hengshan Yue:
Evaluating the Soft Error Resilience of Graph Applications on GPGPUs. BigDataSecurity 2024: 84-89 - Beihu Wu, Hao Tian, Xueyang Liu, Wenhui Hu, Chen Yang, Shuyi Li:
Sarcasm Detection in Chinese and English Text with Fine-Tuned Large Language Models. BigDataSecurity 2024: 47-51 - Wenjing Xu, Yulun Song, Haochen Liang, Lin Sun, Yunlong Xie:
A Blockchain-Based Identity Control Scheme for Cross-Organizational Data Sharing. BigDataSecurity 2024: 156-160 - Ranyue Xu, Wei Yu, Hao Huang, Yongchun Pan, Chen Zhou, Gang Zheng:
Enhancing Cybersecurity in Power Substations through Active Immune Detection and Low-Load Network Security Risk Intelligence Platform. BigDataSecurity 2024: 173-178 - Chen Yang, Xueyang Liu, Shuyi Li, Wenhui Hu, Beihu Wu, Hao Tian:
Temporal Analysis and Prediction of Marriage Registration Figures Based on Long-Term Time Series Models. BigDataSecurity 2024: 66-70 - Xinyi Yang, Kaipei Li, Jie Tian:
A Dance Emotion Recognition Method Based on Movement Analysis and Federated Learning in Edge-Cloud Hybrid Environments. BigDataSecurity 2024: 52-57 - Luxiu Yin, Qihui Huang, Xuanya Wang, Wei Liang, Chun Wang:
Towards Privacy Protection: A Non-Invasive Human Detection Method via Edge-Cloud Collaboration. BigDataSecurity 2024: 41-46 - Wei Yu, Jianguo Qian, Ranyue Xu, Chenxing Jin, Haina Fang, Xianhai Shi:
Improving Substation Network Security with DevSecOps and AIOps. BigDataSecurity 2024: 113-118 - Mengyuan Zhang, Yingying Zhao, Yingjie Tian:
Research on Production Capacity Utilization Index Based on Electricity Big Data. BigDataSecurity 2024: 135-138
skipping 393 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-23 01:34 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint