


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 312 matches
- 2016
- Guoqiang Li, Bian Yang, Christoph Busch
:
A Fingerprint Indexing Algorithm on Encrypted Domain. Trustcom/BigDataSE/ISPA 2016: 1030-1037 - Zaid Ameen Abduljabbar
, Hai Jin, Ayad Ibrahim, Zaid Alaa Hussien
, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Privacy-Preserving Image Retrieval in IoT-Cloud. Trustcom/BigDataSE/ISPA 2016: 799-806 - Jacob Abegunde, Hannan Xiao
, Joseph Spring
:
A Dynamic Game with Adaptive Strategies for IEEE 802.15.4 and IoT. Trustcom/BigDataSE/ISPA 2016: 473-480 - Farhad Ahamed
, Seyed A. Shahrestani
, Bahman Javadi:
Security Aware and Energy-Efficient Virtual Machine Consolidation in Cloud Computing Systems. Trustcom/BigDataSE/ISPA 2016: 1516-1523 - Idrees Ahmed
, Abid Khan
, Muhammad Saleem Khan, Mansoor Ahmed
:
Aggregated Signatures for Chaining: A Secure Provenance Scheme. Trustcom/BigDataSE/ISPA 2016: 2012-2017 - Raja Naeem Akram
, Pierre-François Bonnefoi, Serge Chaumette, Konstantinos Markantonakis, Damien Sauveron:
Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements. Trustcom/BigDataSE/ISPA 2016: 606-614 - Ehsan Atoofian:
Temperature-Aware Register Mapping in GPGPUs. Trustcom/BigDataSE/ISPA 2016: 1636-1643 - Ahmad Azab
, Mamoun Alazab
, Mahdi Aiash:
Machine Learning Based Botnet Identification Traffic. Trustcom/BigDataSE/ISPA 2016: 1788-1794 - Anirban Basu, Shinsaku Kiyomoto, Jaideep Vaidya, Stephen Marsh:
PrefRank: Quantification and Aggregation of Subjective User Preferences. Trustcom/BigDataSE/ISPA 2016: 7-13 - Xiu-Li Bi, Chi-Man Pun
, Xiaochen Yuan
:
Adaptive Polar Based Filtering Method for Image Copy-Move Forgery Detection. Trustcom/BigDataSE/ISPA 2016: 952-956 - Christine Blakemore, João Redol, Miguel Correia:
Fingerprinting for Web Applications: From Devices to Related Groups. Trustcom/BigDataSE/ISPA 2016: 144-151 - Xiaoxiao Cao, Bing Chen, Yanchao Zhao:
Wi-Wri: Fine-Grained Writing Recognition Using Wi-Fi Signals. Trustcom/BigDataSE/ISPA 2016: 1366-1373 - Zhenhai Cao, Bo Lang, Jinmiao Wang
:
An Efficient and Fine-Grained Access Control Scheme for Multidimensional Data Aggregation in Smart Grid. Trustcom/BigDataSE/ISPA 2016: 362-369 - Yuan Cao, Heng Qi, Keqiu Li, Milos Stojmenovic:
Multiple Query-Independent Values Based Asymmetric Ranking for Approximate Nearest Neighbor Search. Trustcom/BigDataSE/ISPA 2016: 1628-1635 - Liu Cao, Yuqing Sun
, Shaoqing Wang, Mingzhu Li:
Detecting Malicious Behavior and Collusion for Online Rating System. Trustcom/BigDataSE/ISPA 2016: 1046-1053 - Dong Cao, Shanshan Wang, Qun Li, Zhenxiang Chen, Qiben Yan
, Lizhi Peng, Bo Yang:
DroidCollector: A High Performance Framework for High Quality Android Traffic Collection. Trustcom/BigDataSE/ISPA 2016: 1753-1758 - Sivadon Chaisiri, Ryan K. L. Ko
:
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty. Trustcom/BigDataSE/ISPA 2016: 535-543 - Nilesh Chakraborty, S. Vijay Anand, Gurpinder Singh Randhawa, Samrat Mondal
:
On Designing Leakage-Resilient Vibration Based Authentication Techniques. Trustcom/BigDataSE/ISPA 2016: 1875-1881 - Xiaoshan Chang, Zenghua Zhao, Bingxue Diao, Tao Li:
Experimental Study of Disruption-Tolerant Transport Protocol for Mobile Ad-Hoc Networks with Connection Diversity. Trustcom/BigDataSE/ISPA 2016: 1613-1620 - Yong Chen
, Chao Chen, Yanlong Yin, Xian-He Sun, Rajeev Thakur
, William Gropp
:
Rethinking High Performance Computing System Architecture for Scientific Big Data Applications. Trustcom/BigDataSE/ISPA 2016: 1605-1612 - Zhengyang Chen, Renjie Chen, Yu Zhang, Jianzhong Zhang, Jingdong Xu:
A Statistical-Feature ML Approach to IP Traffic Classification Based on CUDA. Trustcom/BigDataSE/ISPA 2016: 2235-2239 - Changyuan Chen, Ran Dai, Tingting Yang, Zuxin Wu, Quan Li:
The Design and Application of an Intelligentialized Monitoring System for Mooring Safety. Trustcom/BigDataSE/ISPA 2016: 2031-2034 - Chao Chen, Kun-Yu Lin, Chang-Dong Wang, Dong Huang
:
CSBD: A Nonlinear Clustering Method Based on Cluster Shrinking and Border Detection. Trustcom/BigDataSE/ISPA 2016: 2240-2245 - Pei Chen, Yaping Lin, Wei Zhang, Xiaoying Li, Shiwen Zhang:
Preserving Location and Content Privacy for Secure Ranked Queries in Location Based Services. Trustcom/BigDataSE/ISPA 2016: 892-899 - Long Chen, Yue Mao:
Forensic Analysis of Email on Android Volatile Memory. Trustcom/BigDataSE/ISPA 2016: 945-951 - Shu Chen, Hong Shen:
Semantic-Aware Dummy Selection for Location Privacy Preservation. Trustcom/BigDataSE/ISPA 2016: 752-759 - Houwu Chen, Jiwu Shu:
Sznajd2: A Community-Aware Opinion Dynamics Model. Trustcom/BigDataSE/ISPA 2016: 1477-1484 - Yu Chen, Yuliang Shi, Li-zhen Cui:
Model for Hiding Data Relationships Based on Chunk-Confusion in Cloud Computing. Trustcom/BigDataSE/ISPA 2016: 837-844 - Shanshan Chen, Xiaoxin Tang, Hongwei Wang, Han Zhao, Minyi Guo:
Towards Scalable and Reliable In-Memory Storage System: A Case Study with Redis. Trustcom/BigDataSE/ISPA 2016: 1660-1667 - Zhengyang Chen, Bowen Yu, Yu Zhang, Jianzhong Zhang, Jingdong Xu:
Automatic Mobile Application Traffic Identification by Convolutional Neural Networks. Trustcom/BigDataSE/ISPA 2016: 301-307
skipping 282 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-03-11 08:16 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint