![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 42 matches
- 2024
- Haizhou Bao
, Minhao Chen, Yiming Huo, Guorong Yu, Lei Nie, Peng Li, Yuxuan Wang:
Network Traffic Intrusion Detection Strategy Based on E-GraphSAGE and LSTM. ICIC (9) 2024: 25-37 - ShenHong Cao
, Kaixi Wang
, Yanbin Fan
:
Steganalysis of VoIP Streams via Bidirectional Correlation Extract Network. ICIC (9) 2024: 316-327 - Jian Chen, Ming Jiang, Fuyun He:
Model Construction and Empirical Research on Cross-Platform Propagation of Disinformation. ICIC (9) 2024: 397-408 - Kuiye Ding, Xin Yang, Jintao Chen, Chao Liu, Songyao Hou, Wenyuan Yang:
UB-CRAF: A User Behavior-Driven Co-resident Risk Assessment Framework for Dynamically Migrating VMs in Clouds. ICIC (9) 2024: 340-351 - Ruizhong Du, Xijie She, Mingyue Li, Ziyuan Wang:
Full Database Reconstruction: Leakage-Abuse Attacks Based on Expected Distributions. ICIC (9) 2024: 110-121 - Hao Fan, Zhaoyang Ma, Yong Li, Rui Tian, Yunli Chen, Chenlong Gao:
MixPrompt: Enhancing Generalizability and Adversarial Robustness for Vision-Language Models via Prompt Fusion. ICIC (9) 2024: 328-339 - Jian Ge, Jianwu Rui, Hengtai Ma, Bin Li, Yeping He:
Root Cause Analysis of Anomaly in Smart Homes Through Device Interaction Graph. ICIC (9) 2024: 363-374 - Zhenkun Guo, Yeshen He, Yifan Fan, Xueliang Wang, Meiming Fu, Yiying Zhang:
A Dual Channel Attention Mechanism-Based Intrusion Detection Model for Advanced Metering Infrastructure. ICIC (9) 2024: 449-457 - Chao-Hsien Hsieh, Fengya Xu, Dehong Kong, Qingqing Yang, Yue Ma:
CSQF-BA: Efficient Container Query Technology for Cloud Security Query Framework with Bat Algorithm. ICIC (9) 2024: 97-109 - Hao Huang, Wentao Chen, Weidong Fang
, Wei Chen, Wai-Hung Ip, Kai-Leung Yung:
A State of the Art Review on Artificial Intelligence-Enabled Cyber Security in Smart Grid. ICIC (9) 2024: 38-48 - Chenghang Huo
, Jindong Cui
, Ru Ma
, Yunfei Luo
, Fuzhi Zhang
:
Spammer Group Detection Approach Based on Deep Reinforcement Learning. ICIC (9) 2024: 233-244 - Shaojie Ji, Yan Liu, Xiaoyu Guo, Mengmeng Jia:
The Micro-scale Adversarial Detection Algorithm for Overlapping Communities Based on Genetic Algorithms. ICIC (9) 2024: 306-315 - Jia Jia
, Linghui Li
, Pengfei Qiu
, Binsi Cai
, Xu Kang
, Ximing Li
, Xiaoyong Li
:
Domain-Knowledge Enhanced GANs for High-Quality Trajectory Generation. ICIC (9) 2024: 386-396 - Rui Jing
, Wei Chen
, Xiaoxin Wu
, Zehua Wang, Zijian Tian, Fan Zhang:
When Blockchain Meets Asynchronous Federated Learning. ICIC (9) 2024: 199-207 - Ziqian Li, Yeshen He, Yiying Zhang, Siwei Li, Cong Wang, Xiankun Zhang:
Attribute-Based Encryption Method for Data Privacy Security Protection. ICIC (9) 2024: 458-467 - Zeshuai Li, Xiaoyan Liang:
Anonymous and Efficient Authentication Scheme for Privacy-Preserving Federated Cross Learning. ICIC (9) 2024: 281-293 - Chenting Li, Dan Li, Yuqian Zhou:
A Dual Auditing Scheme of Cross-Chain Data Shared Among the Blockchain Network. ICIC (9) 2024: 245-256 - Yisheng Li, Xuekang Peng, Zhichao Lian:
Multi-texture Fusion Attack: A Robust Adversarial Camouflage in Physical World. ICIC (9) 2024: 186-198 - Hanwen Li, Shanshan Wang, Yadi Han, Changlin Liu, Zhenxiang Chen:
Constructing Adversarial Network Attacks in Realistic Network Environments. ICIC (9) 2024: 422-435 - Taiqiang Li, Zhen Zhang, Heng Qian, Qiuyue Wang, Guanqun Su, Lingzhen Meng:
A High-Dimensional Data Trust Publishing Method Based on Attention Mechanism and Differential Privacy. ICIC (9) 2024: 208-219 - Chang Liu, Xiaowei He, Bin Wang, Xinru Sun, Yixuan Luo, Yiji Zeng, Xinyu Wang, Jianhang Wang, Haofei Zhao:
A Differential Privacy Federated Learning Scheme with Improved Noise Perturbation. ICIC (9) 2024: 61-71 - Zhihua Liu, Shenquan Liu, Jian Zhang:
An Intrusion Detection Method for Industrial Internet Fusing Multi-Scale TCN and Transformer Network. ICIC (9) 2024: 82-96 - Bin Ma
, Hongtao Duan
, Ruihe Ma
, Chunpeng Wang
, Xiaolong Li
:
A Pixel Distribution Complexity Classification Enhanced Convolutional Neural Network Predictor for Reversible Data Hiding. ICIC (9) 2024: 375-385 - Hao Ma, Ting Li, Meiming Fu, Xueliang Wang, Yeshen He, Yiying Zhang:
An Intrusion Detection Model of Incorporating Deep Residual Shrinking Networks for Power Internet of Things. ICIC (9) 2024: 479-490 - Zhongjie Mi, Xinghao Jiang, Tanfeng Sun, Ke Xu, Qiang Xu, Laijin Meng:
Low-Quality Deepfake Video Detection Model Targeting Compression-Degraded Spatiotemporal Inconsistencies. ICIC (9) 2024: 267-280 - Jian-Xun Mi, Xiangjin Zhao, Yongtao Chen, Xiao Cheng, Peng Tian, Xiaohong Lv, Jiayong Zhong:
Non-targeted Adversarial Attacks on Object Detection Models. ICIC (9) 2024: 3-12 - Qing Qian, Yi-Lin Kuang, Yi Yue:
EPTLENet: Replay Attack Detection with Efficient Parameter Transfer Learning Based on ERes2Net. ICIC (9) 2024: 409-421 - Zhihao Shi, Yaozong Xu, Maode Ma, Yanan Zhang:
An EWMA-Based Mitigation Scheme Against Interest Flooding Attacks in Named Data Networks. ICIC (9) 2024: 158-167 - Liang Wang, Hao Chen, Lina Zuo, Haibo Liu:
U-shaped Vertical Split Learning with Local Differential Privacy for Privacy Preserving. ICIC (9) 2024: 72-81 - Jialiang Wang, Liuyang Nie, Zhaojun Gu, Huan Zhao:
Real-Time Detection for GPS Spoofing of Quad-Rotor Helicopter Based on Data Fusion. ICIC (9) 2024: 294-305
skipping 12 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-02-07 21:35 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint