|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 38 publication records. Showing 38 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jun Shao 0001, Sokratis K. Katsikas, Weizhi Meng 0001 (eds.) |
Emerging Information Security and Applications - 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings |
EISA |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Izabela Savic, Haonan Yan, Xiaodong Lin 0001, Daniel Gillis |
Adversarial Example Attacks and Defenses in DNS Data Exfiltration. |
EISA |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Weixun Li, Guanghui Sun, Yajun Wang, Long Yuan, Minghui Gao, Yan Dong, Chen Wang |
Deep Neural Network Model over Encrypted Data. |
EISA |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Chuan Zhang 0003, Haotian Liang, Zhuopeng Li, Tong Wu 0011, Licheng Wang, Liehuang Zhu |
PtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples. |
EISA |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Yinxing Wei, Jun Zheng, Hong Zhong |
A Systematic Method for Constructing ICT Supply Chain Security Requirements. |
EISA |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Liang Li, Gengran Hu |
Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and Its Applications to Pairing-Based Cryptography. |
EISA |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Jun Feng, Hongkai Wang, Liangying Peng, Yidan Wang, Haomin Song, Hongju Guo |
Chinese Named Entity Recognition Within the Electric Power Domain. |
EISA |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Huifeng Li, Pengzhou Jia, Weixun Li, Bin Ma, Bo Li, Dexin Wu, Haoran Li |
Towards Efficient Universal Adversarial Attack on Audio Classification Models: A Two-Step Method. |
EISA |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Jun Tu, Gang Shen |
Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare System. |
EISA |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Simone Soderi, Rocco De Nicola |
CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN. |
EISA |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Kangkang Sun, Xiaojin Zhang 0008, Xi Lin 0003, Gaolei Li, Jing Wang, Jianhua Li |
Toward the Tradeoffs Between Privacy, Fairness and Utility in Federated Learning. |
EISA |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Hongkai Wang, Jun Feng, Yidan Wang, Sichen Pan, Shuai Zhao, Yi Xue |
Enhancing Chinese Named Entity Recognition with Disentangled Expert Knowledge. |
EISA |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Yen Yee Chan, Cher-Yin Khor, Je Sen Teh, Weijian Teng, Norziana Jamil |
Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB. |
EISA |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jiaxin Deng, Simin Chen, Jiageng Chen, Weizhi Meng 0001 |
A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography. |
EISA |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Guoheng Wei, Yanlin Qin, Wei Fu |
Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET. |
EISA |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yang Liu, Qi Feng, Cong Peng 0005, Min Luo 0002, Debiao He |
Asymmetric Secure Multi-party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. |
EISA |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Pei Li, Liliu Tan, Shixiong Yao, Jiageng Chen |
Parallel Validity Analysis of the Boomerang Attack Model. |
EISA |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Fei Chen, Zhengzheng Yan, Liang Gu |
Towards Low-Latency Big Data Infrastructure at Sangfor. |
EISA |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yunfeng Cui, Wenbin Zhai, Liang Liu 0006, Youwei Ding, Wanying Lu |
Link Aware Aggregation Query with Privacy-Preserving Capability in Wireless Sensor Networks. |
EISA |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Thi Quynh Nguyen, Romain Laborde, Abdelmalek Benzekri, Arnaud Oglaza, Mehdi Mounsif |
AutoRoC-DBSCAN: Automatic Tuning of DBSCAN to Detect Malicious DNS Tunnels. |
EISA |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ye Li, Jiale Zhang, Junwu Zhu, Wenjuan Li 0001 |
HBMD-FL: Heterogeneous Federated Learning Algorithm Based on Blockchain and Model Distillation. |
EISA |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Weizhi Meng 0001, Sokratis K. Katsikas (eds.) |
Emerging Information Security and Applications - Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers |
EISA |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay |
Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis Without q-type Assumption. |
EISA |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yi Xiong, Shixiong Yao, Pei Li |
D2CDIM: DID-Based Decentralized Cross-Domain Identity Management with Privacy-Preservation and Sybil-Resistance. |
EISA |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jiageng Chen, Debiao He, Rongxing Lu (eds.) |
Emerging Information Security and Applications - Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings |
EISA |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Zhe Xia, Shiyun Liu, Yichen Huang, Hua Shen, Mingwu Zhang |
A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks. |
EISA |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Dayin Zhang, Xiaojun Chen 0004, Jinqiao Shi |
An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy. |
EISA |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Renjun Ye, Liang Liu, Simin Hu, Fangzhou Zhu, Jingxiu Yang, Feng Wang |
JSLIM: Reducing the Known Vulnerabilities of JavaScript Application by Debloating. |
EISA |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jixin Zhang, Jiageng Chen |
Practical and Provable Secure Vehicular Component Protection Scheme. |
EISA |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yueyue He, Jiageng Chen |
AMLChain: Supporting Anti-money Laundering, Privacy-Preserving, Auditable Distributed Ledger. |
EISA |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Boyun Zhang, Puneet Gill, Nelu Mihai, Mahesh Tripunitara |
Granularity and Usability in Authorization Policies. |
EISA |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Sunny Shrestha, Esa Irby, Raghav Thapa, Sanchari Das |
SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures. |
EISA |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Brian Greaves, Marijke Coetzee, Wai Sze Leung |
Digital Twin Monitoring for Cyber-Physical Access Control. |
EISA |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Imran Khan 0001, Simon N. Foley, Barry O'Sullivan |
Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches. |
EISA |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Martin Grimmer 0002, Tim Kaelble, Erhard Rahm |
Improving Host-Based Intrusion Detection Using Thread Information. |
EISA |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Sanonda Datta Gupta, Stephen Kaplan, Aubree Nygaard, Sepideh Ghanavati |
A Two-Fold Study to Investigate Users' Perception of IoT Information Sensitivity Levels and Their Willingness to Share the Information. |
EISA |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Ting Lyu, Liang Liu 0006, Fangzhou Zhu, Jingxiu Yang, Simin Hu, Yanxi Huang |
NEEX: An Automated and Efficient Tool for Detecting Browser Extension Fingerprint. |
EISA |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Pujie Jing, Shixiong Yao, Yueyue He |
APHC: Auditable and Privacy Preserving Health QR Code Based on Blockchain. |
EISA |
2021 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #38 of 38 (100 per page; Change: )
|
|