


default search action
5th ICAIS 2019: New York, NY, USA
- Xingming Sun, Zhaoqing Pan, Elisa Bertino:

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part IV. Lecture Notes in Computer Science 11635, Springer 2019, ISBN 978-3-030-24267-1
Encryption and Cybersecurity
- Chunlai Du, Xingbang Tan, Yanhui Guo:

A Gray-Box Vulnerability Discovery Model Based on Path Coverage. 3-12 - Tao Shang, Ran Liu, Chengran Fang, Jianwei Liu:

Quantum Network Coding Based on Entanglement Distribution. 13-24 - Kaiyu Feng

, Xiao Gu, Wei Peng, Dequan Yang:
Moving Target Defense in Preventing SQL Injection. 25-34 - Li Cui, Yang Heng, Wu Gang:

Design and Security Analysis of Certificateless Aggregate Signature Scheme. 35-45 - Zibo Li, Xiangzhan Yu, Dawei Wang, Yiru Liu, Huaidong Yin, Shoushuai He:

SuperEye: A Distributed Port Scanning System. 46-56 - Xige Dang, Xu Wu, Xiaqing Xie, Tianle Zhang:

An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data. 57-66 - Hangyu Hu, Xuemeng Zhai, Mingda Wang, Guangmin Hu:

NCGs: Building a Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis. 67-78 - Xu Wu, Haitao Wu, Xiaqing Xie, Jin Xu, Tianle Zhang:

Short Text Topic Recognition and Optimization Method for University Online Community. 79-90 - Qiuping Zhu, Dong Li, Yi Xin, Xiangzhan Yu, Guocai Mu:

A Survey on Network Traffic Identification. 91-100 - Chen Chen, Lin Ye, Xiangzhan Yu, Bailang Ding:

A Survey of Network Security Situational Awareness Technology. 101-109 - Zheng Tao

, Xiang Gao
, Shibin Zhang, Yan Chang, Jinyue Xia:
Multi-function Quantum Cryptography Protocol Based on Bell State. 110-119 - Wunan Wan, Hao Chen, Jun Chen:

The Attack Case of ECDSA on Blockchain Based on Improved Simple Power Analysis. 120-132 - Jian Liu, Yalin Yuan:

A Weight-Based Channel Estimation Implementation Algorithm. 133-142 - Wenbin Yu, Zangqiang Dong, Wenjie Liu, Zhiguo Qu, Xiaolong Xu

, Xiang-Yang Alex Liu:
Multi-party Quantum Communication Complexity on Composite Boolean-Valued Function. 143-154 - Wentong Wang, Ning Hu, Xin Liu:

BlockZone: A Blockchain-Based DNS Storage and Retrieval Scheme. 155-166 - Jun Xiang, Jiao Zhu, Shuyang Guo, Yue Chen, Zhizhong Qiao:

Robust Analysis of Grid System Based on Complex Network Attack Mode. 167-177 - Bo Mi, Hongyang Pan, Darong Huang

, Tiancheng Wei, Xingfeng Wang:
A Secure Data Aggregation Protocol in VANETs Based on Multi-key FHE. 178-190 - Zongshi Chen, Mohan Li, Xiang Cui, Yanbin Sun:

Research on SQL Injection and Defense Technology. 191-201 - Xinguo Zhang, Mohan Li, Yu Jiang, Yanbin Sun:

A Review of the Factorization Problem of Large Integers. 202-213 - XiaoLong Chen, Mohan Li, Yu Jiang, Yanbin Sun:

A Comparison of Machine Learning Algorithms for Detecting XSS Attacks. 214-224 - Yuchong Cui, Bing Pan, Yanbin Sun:

A Survey of Privacy-Preserving Techniques for Blockchain. 225-234 - Zhuangyou Chen, Bing Pan, Yanbin Sun:

A Survey of Software Reverse Engineering Applications. 235-245 - Guanjun Guo, Yi Xin, Xiangzhan Yu, Likun Liu, Houhua Cao:

A Fast IP Matching Algorithm Under Large Traffic. 246-255 - Xiaosen Zeng, Dongbin Wang, Shuwen Han, Wenbin Yao, Zhao Wang, Rui Chen:

An Effective Load Balance Using Link Bandwidth for SDN-Based Data Centers. 256-265 - Ziwei Ye, Yuanbo Guo, Ankang Ju:

Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric. 266-278 - Hangfeng Yang, Hui Lu, Shudong Li, Mohan Li, Yanbin Sun:

Research on Content Extraction of Rich Text Web Pages. 279-287 - Weixiang Chen, Hui Lu, Mohan Li, Yanbin Sun:

Network Protocol Analysis Base on WeChat PC Version. 288-297 - Runnan Tan, Xiangyi Kong, Yu Zhang, Qingfeng Tan, Hui Lu, Mohan Li, Yanbin Sun:

Bitcoin Network Size Estimation Based on Coupon Collection Model. 298-307 - Jian Jiang, Xiangzhan Yu, Yan Sun, Haohua Zeng:

A Survey of the Software Vulnerability Discovery Using Machine Learning Techniques. 308-317 - Chaobin Wang, Le Wang, Mohan Li, Yu Jiang, Hui Lu:

A Distributed Cryptanalysis Framework Based on Mobile Phones. 318-331 - Yu Liu, Tong Liu:

A Novel Threshold Signature Scheme Based on Elliptic Curve with Designated Verifier. 332-342 - Renhui Hou, Dongbin Wang, Yao Wang, Zhouyi Zhu:

A Congestion Control Methodology with Probability Routing Based on MNL for Datacenter Network. 343-352 - Zilong Yin, Dongbin Wang, Yinxing Zhao, Yaoyao Guo, Shuwen Han:

Fast Failover for Link Failures in Software Defined Networks. 353-361 - Di Yang, Yan Liu, Jing Chen:

Steady-State Topology Discovery of Target Networks Based on Statistics Method. 362-374 - Chun Shi, Zhi-qun Zheng, Zhengjie Deng, Yujuan Wang, Shu-Qian He:

A Novel Method for Weighted Throughput Fairness in Contention-Based WLANs with Multiple Priority Levels. 375-384 - Yu Zhang, Runan Tan, Xiangyi Kong, Qingfeng Tan, Xiangtao Liu:

Bitcoin Node Discovery: Large-Scale Empirical Evaluation of Network Churn. 385-395 - Wei Guo, Xiangyan Tang, Jieren Cheng, Jinying Xu, Canting Cai, Yulong Guo:

DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory. 396-407 - Fangjian Tao, Chunjie Cao, Zhihui Liu:

Webshell Detection Model Based on Deep Learning. 408-420 - Lin Chen, Chunfang Yang, Fenlin Liu, Daofu Gong, Shichang Ding:

A Security-Sensitive Function Mining Framework for Source Code. 421-432 - Yong Yu, Ming Jing, Detao Ji, Yuanyuan Wang, Zhongwen Xie, Shudong Li:

Abstraction of Operations in Trusted Components Based on OR-Transition Colored Petri Net. 433-442 - Na Zhao, Min Cao, Chenming Song, Shuang Shi, Yong Yu, Shudong Li:

Trusted Component Decomposition Based on OR-Transition Colored Petri Net. 443-451 - Jiajun Xie, Chunrui Zhang, Fang Lou, Yu Cui, Lun An, Le Wang:

High-Speed File Transferring Over Linux Bridge for QGA Enhancement in Cyber Range. 452-462 - Yibo Sun, Adil Khan

, Kai Yang, Feng Jiang, Shaohui Liu:
Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents Using Reinforcement Learning. 463-475 - Yong Quan, Yichen Song, Lu Deng, Yan Jia, Bin Zhou, Weihong Han:

Identify Influentials Based on User Behavior Across Different Topics. 476-487 - Jianfeng Lu, Xuanyuan Yang:

Taylor Series Localization Algorithm Based on Semi-definite Programming. 488-497 - Xin Feng, Yangyang Li, Haomin Du, Hongbo Wang:

Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene. 498-509 - Tao Tang, Guangmin Hu:

An Evolving Network Model Based on a Triangular Connecting Mechanism for the Internet Topology. 510-519 - Xi Chen, Shangjun He, Gonghua Hou, Lifan Yang, Lin Lin, Ruyi Chen, Ningcheng Yuan:

A New Quantum Private Query Protocol with Better Performance in Resisting Joint-Measurement Attack. 520-528 - Chenyang Li, Yuling Chen, Yu Yang, Chaochao Li, Yang Zeng:

PPCSB: A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid. 529-541 - Ning Wang, Yuling Chen, Yu Yang, Zigang Fang, Yizhe Sun:

Blockchain Private Key Storage Algorithm Based on Image Information Hiding. 542-552 - Xi Chen, Jingjie Chen, Yuling Chen, Jinglan Yang, Deyin Li:

Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning. 553-565 - Lin Gan, Jingjie Chen, Yuling Chen, Zhujun Jin, Wenxi Han:

JPEGCNN: A Transform Domain Steganalysis Model Based on Convolutional Neural Network. 566-577 - Xiao Feng, Jincheng Li, Changgui Huang, Jinze Li, Ruyin Chen, Jinfa Ke, Zhenjiang Ma:

Quantum Algorithm for Support Vector Machine with Exponentially Improved Dependence on Precision. 578-587 - Yunmei Luo, Yuping Luo, Xueping Ye, Jun Lu, Shuqing Li:

Reliability-Based and QoS-Aware Service Redundancy Backup Method in IoT-Based Smart Grid. 588-598 - Yu Xu, Zhoubin Liu, Lili Li, You Sun:

A Privacy-Preserving Electricity Trading Scheme Based on Blockchain. 599-611 - Zhuohua Liu, Hui Suo, Bin Yang:

A Novel Facial Expression Recognition Scheme Based on Deep Neural Networks. 612-622 - Wenjin Yu, Yixiang Jiang, Yizhen Lin:

Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis. 623-636 - Xiao Liang, Yunpeng Li, Baohua Zhao, Zhihao Wang, Ningyu An:

Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust. 637-648

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














