BibTeX records: Dali Zhu

download as .bib file

@article{DBLP:journals/cn/ZhaoZXJJW19,
  author    = {Bobai Zhao and
               Dali Zhu and
               Tong Xi and
               Chenggang Jia and
               Shang Jiang and
               Siye Wang},
  title     = {Convolutional neural network and dual-factor enhanced variational
               Bayes adaptive Kalman filter based indoor localization with Wi-Fi},
  journal   = {Computer Networks},
  volume    = {162},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.comnet.2019.106864},
  doi       = {10.1016/j.comnet.2019.106864},
  timestamp = {Fri, 11 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cn/ZhaoZXJJW19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ksem/ZhuX19,
  author    = {Dali Zhu and
               Tong Xi},
  title     = {Permission-Based Feature Scaling Method for Lightweight Android Malware
               Detection},
  booktitle = {Knowledge Science, Engineering and Management - 12th International
               Conference, {KSEM} 2019, Athens, Greece, August 28-30, 2019, Proceedings,
               Part {I}},
  pages     = {714--725},
  year      = {2019},
  crossref  = {DBLP:conf/ksem/2019-1},
  url       = {https://doi.org/10.1007/978-3-030-29551-6\_63},
  doi       = {10.1007/978-3-030-29551-6\_63},
  timestamp = {Wed, 21 Aug 2019 13:49:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ksem/ZhuX19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZhuZW18,
  author    = {Dali Zhu and
               Bobai Zhao and
               Siye Wang},
  title     = {Mobile target indoor tracking based on Multi-Direction Weight Position
               Kalman Filter},
  journal   = {Computer Networks},
  volume    = {141},
  pages     = {115--127},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.comnet.2018.05.021},
  doi       = {10.1016/j.comnet.2018.05.021},
  timestamp = {Wed, 11 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cn/ZhuZW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WuZLZ18,
  author    = {Di Wu and
               Dali Zhu and
               Yinlong Liu and
               Dongmei Zhao},
  title     = {Location Verification Assisted by a Moving Obstacle for Wireless Sensor
               Networks},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {5},
  number    = {1},
  pages     = {322--335},
  year      = {2018},
  url       = {https://doi.org/10.1109/JIOT.2017.2782660},
  doi       = {10.1109/JIOT.2017.2782660},
  timestamp = {Thu, 15 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iotj/WuZLZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhuZHC18,
  author    = {Dali Zhu and
               Renjun Zhang and
               Shuang Hu and
               Gongliang Chen},
  title     = {Public-Key Encryption with Selective Opening Security from General
               Assumptions},
  booktitle = {Information Security and Cryptology - 14th International Conference,
               Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected
               Papers},
  pages     = {510--530},
  year      = {2018},
  crossref  = {DBLP:conf/cisc/2018},
  url       = {https://doi.org/10.1007/978-3-030-14234-6\_27},
  doi       = {10.1007/978-3-030-14234-6\_27},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/ZhuZHC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/ZhuZW018,
  author    = {Dali Zhu and
               Bobai Zhao and
               Siye Wang and
               Di Wu},
  title     = {Direct-path based fingerprint extraction algorithm for indoor localization},
  booktitle = {Proceedings of the 15th {EAI} International Conference on Mobile and
               Ubiquitous Systems: Computing, Networking and Services, MobiQuitous
               2018, 5-7 November 2018, New York City, NY, {USA}},
  pages     = {11--18},
  year      = {2018},
  crossref  = {DBLP:conf/mobiquitous/2018},
  url       = {https://doi.org/10.1145/3286978.3286993},
  doi       = {10.1145/3286978.3286993},
  timestamp = {Sat, 15 Dec 2018 18:02:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobiquitous/ZhuZW018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/ZhuRWP17,
  author    = {Dali Zhu and
               Wenjing Rong and
               Di Wu and
               Na Pang},
  title     = {Lightweight Anonymous {RFID} Group Ownership Transfer Protocol in
               Multi-owner Environment},
  booktitle = {19th {IEEE} International Conference on High Performance Computing
               and Communications; 15th {IEEE} International Conference on Smart
               City; 3rd {IEEE} International Conference on Data Science and Systems,
               HPCC/SmartCity/DSS 2017, Bangkok, Thailand, December 18-20, 2017},
  pages     = {404--411},
  year      = {2017},
  crossref  = {DBLP:conf/hpcc/2017},
  url       = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2017.53},
  doi       = {10.1109/HPCC-SmartCity-DSS.2017.53},
  timestamp = {Tue, 28 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hpcc/ZhuRWP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhuRWP17,
  author    = {Dali Zhu and
               Wenjing Rong and
               Di Wu and
               Na Pang},
  title     = {Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale
               {RFID} System},
  booktitle = {Information and Communications Security - 19th International Conference,
               {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  pages     = {352--362},
  year      = {2017},
  crossref  = {DBLP:conf/icics/2017},
  url       = {https://doi.org/10.1007/978-3-319-89500-0\_31},
  doi       = {10.1007/978-3-319-89500-0\_31},
  timestamp = {Tue, 28 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/ZhuRWP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/ZhuPLL17,
  author    = {Dali Zhu and
               Na Pang and
               Gang Li and
               Shaowu Liu},
  title     = {NotiFi: {A} ubiquitous WiFi-based abnormal activity detection system},
  booktitle = {2017 International Joint Conference on Neural Networks, {IJCNN} 2017,
               Anchorage, AK, USA, May 14-19, 2017},
  pages     = {1766--1773},
  year      = {2017},
  crossref  = {DBLP:conf/ijcnn/2017},
  url       = {https://doi.org/10.1109/IJCNN.2017.7966064},
  doi       = {10.1109/IJCNN.2017.7966064},
  timestamp = {Mon, 10 Jul 2017 09:14:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ijcnn/ZhuPLL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/ZhuJYWC17,
  author    = {Dali Zhu and
               Hao Jin and
               Ying Yang and
               Di Wu and
               Weiyi Chen},
  title     = {DeepFlow: Deep learning-based malware detection by mining Android
               application for abnormal usage of sensitive data},
  booktitle = {2017 {IEEE} Symposium on Computers and Communications, {ISCC} 2017,
               Heraklion, Greece, July 3-6, 2017},
  pages     = {438--443},
  year      = {2017},
  crossref  = {DBLP:conf/iscc/2017},
  url       = {https://doi.org/10.1109/ISCC.2017.8024568},
  doi       = {10.1109/ISCC.2017.8024568},
  timestamp = {Tue, 28 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iscc/ZhuJYWC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ksem/PangZXRLO17,
  author    = {Na Pang and
               Dali Zhu and
               Kaiwen Xue and
               Wenjing Rong and
               Yinlong Liu and
               Changhai Ou},
  title     = {Analyzing Customer's Product Preference Using Wireless Signals},
  booktitle = {Knowledge Science, Engineering and Management - 10th International
               Conference, {KSEM} 2017, Melbourne, VIC, Australia, August 19-20,
               2017, Proceedings},
  pages     = {139--148},
  year      = {2017},
  crossref  = {DBLP:conf/ksem/2017},
  url       = {https://doi.org/10.1007/978-3-319-63558-3\_12},
  doi       = {10.1007/978-3-319-63558-3\_12},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ksem/PangZXRLO17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ksem/ZhuPFAM17,
  author    = {Dali Zhu and
               Na Pang and
               Weimiao Feng and
               Muhmmad Al{-}Khiza'ay and
               Yuchen Ma},
  title     = {Device-Free Intruder Sensing Leveraging Fine-Grained Physical Layer
               Signatures},
  booktitle = {Knowledge Science, Engineering and Management - 10th International
               Conference, {KSEM} 2017, Melbourne, VIC, Australia, August 19-20,
               2017, Proceedings},
  pages     = {183--194},
  year      = {2017},
  crossref  = {DBLP:conf/ksem/2017},
  url       = {https://doi.org/10.1007/978-3-319-63558-3\_16},
  doi       = {10.1007/978-3-319-63558-3\_16},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ksem/ZhuPFAM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/PangZLL17,
  author    = {Na Pang and
               Dali Zhu and
               Gang Li and
               Shaowu Liu},
  title     = {WarnFi: Non-invasive wifi-based abnormal activity sensing using non-parametric
               model},
  booktitle = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore,
               MD, USA, October 23-25, 2017},
  pages     = {800--805},
  year      = {2017},
  crossref  = {DBLP:conf/milcom/2017},
  url       = {https://doi.org/10.1109/MILCOM.2017.8170747},
  doi       = {10.1109/MILCOM.2017.8170747},
  timestamp = {Wed, 13 Dec 2017 13:17:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/milcom/PangZLL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhuZJ17,
  author    = {Dali Zhu and
               Renjun Zhang and
               Dingding Jia},
  title     = {Public-Key Encryption with Simulation-Based Sender Selective-Opening
               Security},
  booktitle = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
               China, October 23-25, 2017, Proceedings},
  pages     = {361--380},
  year      = {2017},
  crossref  = {DBLP:conf/provsec/2017},
  url       = {https://doi.org/10.1007/978-3-319-68637-0\_22},
  doi       = {10.1007/978-3-319-68637-0\_22},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/ZhuZJ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/es/ZhuLPF16,
  author    = {Dali Zhu and
               Ying Li and
               Na Pang and
               Weimiao Feng},
  title     = {An Android System Vulnerability Risk Evaluation Method for Heap Overflow},
  booktitle = {4th International Conference on Enterprise Systems, {ES} 2016, Melbourne,
               Australia, November 2-3, 2016},
  pages     = {89--96},
  year      = {2016},
  crossref  = {DBLP:conf/es/2016},
  url       = {https://doi.org/10.1109/ES.2016.18},
  doi       = {10.1109/ES.2016.18},
  timestamp = {Fri, 22 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/es/ZhuLPF16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/ZhuPLL16,
  author    = {Dali Zhu and
               Na Pang and
               Gang Li and
               Shaowu Liu},
  title     = {WiseFi: Activity Localization and Recognition on Commodity Off-the-Shelf
               WiFi Devices},
  booktitle = {18th {IEEE} International Conference on High Performance Computing
               and Communications; 14th {IEEE} International Conference on Smart
               City; 2nd {IEEE} International Conference on Data Science and Systems,
               HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016},
  pages     = {562--569},
  year      = {2016},
  crossref  = {DBLP:conf/hpcc/2016},
  url       = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0085},
  doi       = {10.1109/HPCC-SmartCity-DSS.2016.0085},
  timestamp = {Thu, 07 Feb 2019 16:03:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hpcc/ZhuPLL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhuZGZ16,
  author    = {Dali Zhu and
               Renjun Zhang and
               Xiaozhuo Gu and
               Haitao Zhu},
  title     = {A Practical Scheme for Data Secure Transport in VoIP Conferencing},
  booktitle = {Information and Communications Security - 18th International Conference,
               {ICICS} 2016, Singapore, November 29 - December 2, 2016, Proceedings},
  pages     = {466--475},
  year      = {2016},
  crossref  = {DBLP:conf/icics/2016},
  url       = {https://doi.org/10.1007/978-3-319-50011-9\_36},
  doi       = {10.1007/978-3-319-50011-9\_36},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/ZhuZGZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ZhuPLR16,
  author    = {Dali Zhu and
               Na Pang and
               Gang Li and
               Wenjing Rong},
  title     = {Opportunistic Probe: An Efficient Adaptive Detection Model for Collaborative
               Intrusion Detection},
  booktitle = {22nd {IEEE} International Conference on Parallel and Distributed Systems,
               {ICPADS} 2016, Wuhan, China, December 13-16, 2016},
  pages     = {430--437},
  year      = {2016},
  crossref  = {DBLP:conf/icpads/2016},
  url       = {https://doi.org/10.1109/ICPADS.2016.0065},
  doi       = {10.1109/ICPADS.2016.0065},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icpads/ZhuPLR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/LiuZM16,
  author    = {Yinlong Liu and
               Dali Zhu and
               Wei Ma},
  title     = {A novel cooperative caching scheme for Content Centric Mobile Ad Hoc
               Networks},
  booktitle = {{IEEE} Symposium on Computers and Communication, {ISCC} 2016, Messina,
               Italy, June 27-30, 2016},
  pages     = {824--829},
  year      = {2016},
  crossref  = {DBLP:conf/iscc/2016},
  url       = {https://doi.org/10.1109/ISCC.2016.7543838},
  doi       = {10.1109/ISCC.2016.7543838},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iscc/LiuZM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuPLRF16,
  author    = {Dali Zhu and
               Na Pang and
               Gang Li and
               Wenjing Rong and
               Zheming Fan},
  title     = {WiN: Non-invasive Abnormal Activity Detection Leveraging Fine-Grained
               WiFi Signals},
  booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
               2016},
  pages     = {744--751},
  year      = {2016},
  crossref  = {DBLP:conf/trustcom/2016},
  url       = {https://doi.org/10.1109/TrustCom.2016.0134},
  doi       = {10.1109/TrustCom.2016.0134},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/ZhuPLRF16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuCZWK16,
  author    = {Dali Zhu and
               Junhuang Chen and
               Yanfang Zhang and
               Siye Wang and
               Huafeng Kong},
  title     = {An Efficient Approach of Integrating {RFID} and Vision Techniques
               in Object Surveillance System},
  booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
               2016},
  pages     = {1023--1029},
  year      = {2016},
  crossref  = {DBLP:conf/trustcom/2016},
  url       = {https://doi.org/10.1109/TrustCom.2016.0171},
  doi       = {10.1109/TrustCom.2016.0171},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/ZhuCZWK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuYJSF16,
  author    = {Dali Zhu and
               Ying Yang and
               Hao Jin and
               Jing Shao and
               Weimiao Feng},
  title     = {Application of Modified {BLP} Model on Mobile Web Operating System},
  booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
               2016},
  pages     = {1818--1824},
  year      = {2016},
  crossref  = {DBLP:conf/trustcom/2016},
  url       = {https://doi.org/10.1109/TrustCom.2016.0279},
  doi       = {10.1109/TrustCom.2016.0279},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/ZhuYJSF16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chinacom/ZhuPFO15,
  author    = {Dali Zhu and
               Na Pang and
               Zheming Fan and
               Changhai Ou},
  title     = {Trusted access in wireless network on mutual interactive authentication
               mechanism},
  booktitle = {10th International Conference on Communications and Networking in
               China, ChinaCom 2015, Shanghai, China, August 15-17, 2015},
  pages     = {776--781},
  year      = {2015},
  crossref  = {DBLP:conf/chinacom/2015},
  url       = {https://doi.org/10.1109/CHINACOM.2015.7498042},
  doi       = {10.1109/CHINACOM.2015.7498042},
  timestamp = {Fri, 30 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/chinacom/ZhuPFO15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/LiuZMQ15,
  author    = {Yinlong Liu and
               Dali Zhu and
               Wei Ma and
               Lei Qian},
  title     = {A QoE-oriented scheduling scheme for {HTTP} streaming service in {LTE}
               system},
  booktitle = {2015 {IEEE} Symposium on Computers and Communication, {ISCC} 2015,
               Larnaca, Cyprus, July 6-9, 2015},
  pages     = {889--894},
  year      = {2015},
  crossref  = {DBLP:conf/iscc/2015},
  url       = {https://doi.org/10.1109/ISCC.2015.7405626},
  doi       = {10.1109/ISCC.2015.7405626},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iscc/LiuZMQ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuFP15,
  author    = {Dali Zhu and
               Zheming Fan and
               Na Pang},
  title     = {A Dynamic Credible Factory Reset Mechanism of Personal Data in Android
               Device},
  booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
               2015, Volume 1},
  pages     = {990--998},
  year      = {2015},
  crossref  = {DBLP:conf/trustcom/2015-1},
  url       = {https://doi.org/10.1109/Trustcom.2015.474},
  doi       = {10.1109/Trustcom.2015.474},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/ZhuFP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuDZW15,
  author    = {Di Wu and
               Jingfu Du and
               Dali Zhu and
               Siye Wang},
  title     = {A Simple RFID-Based Architecture for Privacy Preservation},
  booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
               2015, Volume 1},
  pages     = {1224--1229},
  year      = {2015},
  crossref  = {DBLP:conf/trustcom/2015-1},
  url       = {https://doi.org/10.1109/Trustcom.2015.509},
  doi       = {10.1109/Trustcom.2015.509},
  timestamp = {Tue, 28 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/WuDZW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icds/DuZS07,
  author    = {Hong Du and
               Dali Zhu and
               Degang Sun},
  title     = {New Solutions for Cell Phone Detection},
  booktitle = {First International Conference on the Digital Society {(ICDS} 2007),
               2-6 January 2007, Guadeloupe, French Caribbean},
  pages     = {31},
  year      = {2007},
  crossref  = {DBLP:conf/icds/2007},
  url       = {https://doi.org/10.1109/ICDS.2007.29},
  doi       = {10.1109/ICDS.2007.29},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icds/DuZS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/ChenZL07,
  author    = {Xiaosu Chen and
               Dali Zhu and
               Jian Liu},
  title     = {A Practical Digital Watermarking Protocol Based On {PKI-CA}},
  booktitle = {Proceedings of the 8th {ACIS} International Conference on Software
               Engineering, Artificial Intelligence, Networking and Parallel/Distributed
               Computing, {SNPD} 2007, July 30 - August 1, 2007, Qingdao, China},
  pages     = {483--488},
  year      = {2007},
  crossref  = {DBLP:conf/snpd/2007},
  url       = {https://doi.org/10.1109/SNPD.2007.289},
  doi       = {10.1109/SNPD.2007.289},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/snpd/ChenZL07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ksem/2019-1,
  editor    = {Christos Douligeris and
               Dimitris Karagiannis and
               Dimitris Apostolou},
  title     = {Knowledge Science, Engineering and Management - 12th International
               Conference, {KSEM} 2019, Athens, Greece, August 28-30, 2019, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11775},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-29551-6},
  doi       = {10.1007/978-3-030-29551-6},
  isbn      = {978-3-030-29550-9},
  timestamp = {Wed, 21 Aug 2019 13:49:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ksem/2019-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2018,
  editor    = {Fuchun Guo and
               Xinyi Huang and
               Moti Yung},
  title     = {Information Security and Cryptology - 14th International Conference,
               Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {11449},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-14234-6},
  doi       = {10.1007/978-3-030-14234-6},
  isbn      = {978-3-030-14233-9},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobiquitous/2018,
  editor    = {Henning Schulzrinne and
               Pan Li},
  title     = {Proceedings of the 15th {EAI} International Conference on Mobile and
               Ubiquitous Systems: Computing, Networking and Services, MobiQuitous
               2018, 5-7 November 2018, New York City, NY, {USA}},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3286978},
  doi       = {10.1145/3286978},
  isbn      = {978-1-4503-6093-7},
  timestamp = {Sat, 15 Dec 2018 18:02:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobiquitous/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hpcc/2017,
  title     = {19th {IEEE} International Conference on High Performance Computing
               and Communications; 15th {IEEE} International Conference on Smart
               City; 3rd {IEEE} International Conference on Data Science and Systems,
               HPCC/SmartCity/DSS 2017, Bangkok, Thailand, December 18-20, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8290823},
  isbn      = {978-1-5386-2588-0},
  timestamp = {Tue, 20 Feb 2018 17:49:46 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hpcc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2017,
  editor    = {Sihan Qing and
               Chris Mitchell and
               Liqun Chen and
               Dongmei Liu},
  title     = {Information and Communications Security - 19th International Conference,
               {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10631},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-89500-0},
  doi       = {10.1007/978-3-319-89500-0},
  isbn      = {978-3-319-89499-7},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ijcnn/2017,
  title     = {2017 International Joint Conference on Neural Networks, {IJCNN} 2017,
               Anchorage, AK, USA, May 14-19, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7958416},
  isbn      = {978-1-5090-6182-2},
  timestamp = {Mon, 10 Jul 2017 09:14:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ijcnn/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iscc/2017,
  title     = {2017 {IEEE} Symposium on Computers and Communications, {ISCC} 2017,
               Heraklion, Greece, July 3-6, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8016448},
  isbn      = {978-1-5386-1629-1},
  timestamp = {Fri, 08 Sep 2017 13:29:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iscc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ksem/2017,
  editor    = {Gang Li and
               Yong Ge and
               Zili Zhang and
               Zhi Jin and
               Michael Blumenstein},
  title     = {Knowledge Science, Engineering and Management - 10th International
               Conference, {KSEM} 2017, Melbourne, VIC, Australia, August 19-20,
               2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10412},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-63558-3},
  doi       = {10.1007/978-3-319-63558-3},
  isbn      = {978-3-319-63557-6},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ksem/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/milcom/2017,
  title     = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore,
               MD, USA, October 23-25, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8125230},
  isbn      = {978-1-5386-0595-0},
  timestamp = {Wed, 13 Dec 2017 13:17:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/milcom/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2017,
  editor    = {Tatsuaki Okamoto and
               Yong Yu and
               Man Ho Au and
               Yannan Li},
  title     = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
               China, October 23-25, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10592},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-68637-0},
  doi       = {10.1007/978-3-319-68637-0},
  isbn      = {978-3-319-68636-3},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/es/2016,
  editor    = {Gang Li and
               Yale Yu},
  title     = {4th International Conference on Enterprise Systems, {ES} 2016, Melbourne,
               Australia, November 2-3, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7879536},
  isbn      = {978-1-5090-3790-2},
  timestamp = {Thu, 21 Feb 2019 14:28:36 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/es/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hpcc/2016,
  editor    = {Jinjun Chen and
               Laurence T. Yang},
  title     = {18th {IEEE} International Conference on High Performance Computing
               and Communications; 14th {IEEE} International Conference on Smart
               City; 2nd {IEEE} International Conference on Data Science and Systems,
               HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7819725},
  isbn      = {978-1-5090-4297-5},
  timestamp = {Thu, 07 Feb 2019 16:03:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hpcc/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2016,
  editor    = {Kwok{-}Yan Lam and
               Chi{-}Hung Chi and
               Sihan Qing},
  title     = {Information and Communications Security - 18th International Conference,
               {ICICS} 2016, Singapore, November 29 - December 2, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9977},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-50011-9},
  doi       = {10.1007/978-3-319-50011-9},
  isbn      = {978-3-319-50010-2},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icpads/2016,
  title     = {22nd {IEEE} International Conference on Parallel and Distributed Systems,
               {ICPADS} 2016, Wuhan, China, December 13-16, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7822825},
  isbn      = {978-1-5090-4457-3},
  timestamp = {Wed, 01 Feb 2017 14:33:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icpads/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iscc/2016,
  title     = {{IEEE} Symposium on Computers and Communication, {ISCC} 2016, Messina,
               Italy, June 27-30, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7536670},
  isbn      = {978-1-5090-0679-3},
  timestamp = {Tue, 20 Sep 2016 12:04:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iscc/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2016,
  title     = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
               2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7845250},
  isbn      = {978-1-5090-3205-1},
  timestamp = {Wed, 15 Feb 2017 10:43:47 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chinacom/2015,
  title     = {10th International Conference on Communications and Networking in
               China, ChinaCom 2015, Shanghai, China, August 15-17, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7492447},
  isbn      = {978-1-4799-8795-5},
  timestamp = {Tue, 21 Feb 2017 09:21:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/chinacom/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iscc/2015,
  title     = {2015 {IEEE} Symposium on Computers and Communication, {ISCC} 2015,
               Larnaca, Cyprus, July 6-9, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7397314},
  isbn      = {978-1-4673-7194-0},
  timestamp = {Fri, 06 May 2016 08:58:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iscc/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2015-1,
  title     = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
               2015, Volume 1},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7293439},
  isbn      = {978-1-4673-7952-6},
  timestamp = {Thu, 10 Dec 2015 19:40:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icds/2007,
  title     = {First International Conference on the Digital Society {(ICDS} 2007),
               2-6 January 2007, Guadeloupe, French Caribbean},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4063752},
  isbn      = {978-0-7695-2760-4},
  timestamp = {Mon, 04 Aug 2014 17:08:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icds/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/snpd/2007,
  editor    = {Wenying Feng and
               Feng Gao},
  title     = {Proceedings of the 8th {ACIS} International Conference on Software
               Engineering, Artificial Intelligence, Networking and Parallel/Distributed
               Computing, {SNPD} 2007, July 30 - August 1, 2007, Qingdao, China},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4287452},
  isbn      = {0-7695-2909-7},
  timestamp = {Tue, 11 Aug 2015 15:15:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/snpd/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics