default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 38 matches
- 2024
- Jun Shao, Sokratis K. Katsikas, Weizhi Meng:
Emerging Information Security and Applications - 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings. Communications in Computer and Information Science 2004, Springer 2024, ISBN 978-981-99-9613-1 [contents] - 2023
- Jun Feng, Hongkai Wang, Liangying Peng, Yidan Wang, Haomin Song, Hongju Guo:
Chinese Named Entity Recognition Within the Electric Power Domain. EISA 2023: 133-146 - Liang Li, Gengran Hu:
Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and Its Applications to Pairing-Based Cryptography. EISA 2023: 77-91 - Huifeng Li, Pengzhou Jia, Weixun Li, Bin Ma, Bo Li, Dexin Wu, Haoran Li:
Towards Efficient Universal Adversarial Attack on Audio Classification Models: A Two-Step Method. EISA 2023: 20-37 - Weixun Li, Guanghui Sun, Yajun Wang, Long Yuan, Minghui Gao, Yan Dong, Chen Wang:
Deep Neural Network Model over Encrypted Data. EISA 2023: 107-117 - Izabela Savic, Haonan Yan, Xiaodong Lin, Daniel Gillis:
Adversarial Example Attacks and Defenses in DNS Data Exfiltration. EISA 2023: 147-163 - Simone Soderi, Rocco De Nicola:
CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN. EISA 2023: 164-183 - Kangkang Sun, Xiaojin Zhang, Xi Lin, Gaolei Li, Jing Wang, Jianhua Li:
Toward the Tradeoffs Between Privacy, Fairness and Utility in Federated Learning. EISA 2023: 118-132 - Jun Tu, Gang Shen:
Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare System. EISA 2023: 38-57 - Hongkai Wang, Jun Feng, Yidan Wang, Sichen Pan, Shuai Zhao, Yi Xue:
Enhancing Chinese Named Entity Recognition with Disentangled Expert Knowledge. EISA 2023: 92-106 - Yinxing Wei, Jun Zheng, Hong Zhong:
A Systematic Method for Constructing ICT Supply Chain Security Requirements. EISA 2023: 58-76 - Chuan Zhang, Haotian Liang, Zhuopeng Li, Tong Wu, Licheng Wang, Liehuang Zhu:
PtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples. EISA 2023: 1-19 - 2022
- Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay:
Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis Without q-type Assumption. EISA 2022: 108-125 - Yen Yee Chan, Cher-Yin Khor, Je Sen Teh, Weijian Teng, Norziana Jamil:
Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB. EISA 2022: 55-67 - Fei Chen, Zhengzheng Yan, Liang Gu:
Towards Low-Latency Big Data Infrastructure at Sangfor. EISA 2022: 37-54 - Yunfeng Cui, Wenbin Zhai, Liang Liu, Youwei Ding, Wanying Lu:
Link Aware Aggregation Query with Privacy-Preserving Capability in Wireless Sensor Networks. EISA 2022: 209-224 - Jiaxin Deng, Simin Chen, Jiageng Chen, Weizhi Meng:
A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography. EISA 2022: 87-107 - Pei Li, Liliu Tan, Shixiong Yao, Jiageng Chen:
Parallel Validity Analysis of the Boomerang Attack Model. EISA 2022: 68-86 - Ye Li, Jiale Zhang, Junwu Zhu, Wenjuan Li:
HBMD-FL: Heterogeneous Federated Learning Algorithm Based on Blockchain and Model Distillation. EISA 2022: 145-159 - Yang Liu, Qi Feng, Cong Peng, Min Luo, Debiao He:
Asymmetric Secure Multi-party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. EISA 2022: 1-20 - Thi Quynh Nguyen, Romain Laborde, Abdelmalek Benzekri, Arnaud Oglaza, Mehdi Mounsif:
AutoRoC-DBSCAN: Automatic Tuning of DBSCAN to Detect Malicious DNS Tunnels. EISA 2022: 126-144 - Guoheng Wei, Yanlin Qin, Wei Fu:
Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET. EISA 2022: 160-172 - Zhe Xia, Shiyun Liu, Yichen Huang, Hua Shen, Mingwu Zhang:
A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks. EISA 2022: 21-36 - Yi Xiong, Shixiong Yao, Pei Li:
D2CDIM: DID-Based Decentralized Cross-Domain Identity Management with Privacy-Preservation and Sybil-Resistance. EISA 2022: 191-208 - Dayin Zhang, Xiaojun Chen, Jinqiao Shi:
An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy. EISA 2022: 173-190 - Weizhi Meng, Sokratis K. Katsikas:
Emerging Information Security and Applications - Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers. Communications in Computer and Information Science 1403, Springer 2022, ISBN 978-3-030-93955-7 [contents] - Jiageng Chen, Debiao He, Rongxing Lu:
Emerging Information Security and Applications - Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings. Communications in Computer and Information Science 1641, Springer 2022, ISBN 978-3-031-23097-4 [contents] - 2021
- Muhammad Imran Khan, Simon N. Foley, Barry O'Sullivan:
Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches. EISA 2021: 178-197 - Martin Grimmer, Tim Kaelble, Erhard Rahm:
Improving Host-Based Intrusion Detection Using Thread Information. EISA 2021: 159-177 - Brian Greaves, Marijke Coetzee, Wai Sze Leung:
Digital Twin Monitoring for Cyber-Physical Access Control. EISA 2021: 144-158
skipping 8 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-19 15:48 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint