default search action
Search dblp for Publications
export results for "toc:db/conf/iccns/iccns2019.bht:"
@inproceedings{DBLP:conf/iccns/BaiQC19, author = {Enjian Bai and Fangyuan Qin and Sijing Chen}, title = {Effective Scrambling Scheme for Physical Layer Security}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {92--96}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371689}, doi = {10.1145/3371676.3371689}, timestamp = {Thu, 22 Apr 2021 19:04:09 +0200}, biburl = {https://dblp.org/rec/conf/iccns/BaiQC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChangS19, author = {Qingqing Chang and Shenghui Su}, title = {Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {34--39}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371682}, doi = {10.1145/3371676.3371682}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChangS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChenH19, author = {Yanyan Chen and Wenxian Han}, title = {Research on Automatically Switched Optical Network Security Based on Quantum Key Distribution}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {75--78}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371701}, doi = {10.1145/3371676.3371701}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChenH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChenLLG19, author = {Biqiong Chen and Yanhua Liu and Shijin Li and Xiaoling Gao}, title = {Attack Intent Analysis Method Based on Attack Path Graph}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {97--102}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371680}, doi = {10.1145/3371676.3371680}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChenLLG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/DaiGLYLC19, author = {Rui Dai and Chuan Gao and Bo Lang and Lixia Yang and Hongyu Liu and Shaojie Chen}, title = {{SSL} Malicious Traffic Detection Based On Multi-view Features}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {40--46}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371697}, doi = {10.1145/3371676.3371697}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/DaiGLYLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/DuyAP19, author = {Phan The Duy and Le Duy An and Van{-}Hau Pham}, title = {Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in {SDN}}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {154--158}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371706}, doi = {10.1145/3371676.3371706}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/DuyAP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/GaoLQL19, author = {Xiaoling Gao and Yanhua Liu and Yanbin Qiu and Huajun Liu}, title = {A Comprehensive Assessment Method of Asset Importance for Key Asset Protection}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {79--83}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371679}, doi = {10.1145/3371676.3371679}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/GaoLQL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/HeDSL19, author = {Qipeng He and Cong Dai and Rong Si and Jianwen Lin}, title = {Research on Improvement of Wireless Sensor Network Location Algorithm Based on DV-Hop}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {149--153}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371698}, doi = {10.1145/3371676.3371698}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/HeDSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/JiangFZH19, author = {Hua Jiang and Jinpo Fan and Gang Zhang and Ronglei Hu}, title = {Design and Implementation of Integrated Access {VPN} Gateway}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {128--132}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371681}, doi = {10.1145/3371676.3371681}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/JiangFZH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/KongLZY19, author = {Bin Kong and Zhangpu Liu and Guangming Zhou and Xiaoyan Yu}, title = {A Method of Detecting the Abnormal Encrypted Traffic Based on Machine Learning and Behavior Characteristics}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {47--50}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371705}, doi = {10.1145/3371676.3371705}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/KongLZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/KongYLJHZ19, author = {Fanyu Kong and Guoqiang Yang and Huiyi Liu and Yali Jiang and Chengyu Hu and Dashui Zhou}, title = {Fault-injection Attack and Improvement of a {CRT-RSA} Exponentiation Algorithm}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {123--127}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371699}, doi = {10.1145/3371676.3371699}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/KongYLJHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Kun19, author = {Yu Kun}, title = {Deep Security Analysis of {DCS} for Ship's Nuclear Power System based on Improved {DEMATEL}}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {103--108}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371677}, doi = {10.1145/3371676.3371677}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Kun19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiGCL19, author = {Han Li and Chonglin Gu and Yi Chen and Wenye Li}, title = {An Efficient, Secure and Reliable Search Scheme for Dynamic Updates with Blockchain}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {51--57}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371684}, doi = {10.1145/3371676.3371684}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/LiGCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LinGHZL19, author = {Zijie Lin and Liangliang Gao and Xuexian Hu and Yuxuan Zhang and Wenfen Liu}, title = {Differentially Private Graph Clustering Algorithm Based on Structure Similarity}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {63--68}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371693}, doi = {10.1145/3371676.3371693}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LinGHZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiuGCB19, author = {Bo Liu and Honghe Ge and Jinfu Chen and Qihao Bao}, title = {An Automatic Testing Platform for Object-oriented Software based on Code Coverage}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {20--24}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371702}, doi = {10.1145/3371676.3371702}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/LiuGCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiuLLG19, author = {Huajun Liu and Zhanghui Liu and Yanhua Liu and Xiaoling Gao}, title = {Abnormal Network Traffic Detection based on Leaf Node Density Ratio}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {69--74}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371678}, doi = {10.1145/3371676.3371678}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiuLLG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiuYC19, author = {Jiaxin Liu and Xuerong Yue and Zhibin Chen}, title = {A Note on Polynomial-time Solvability for Edge Packing on Graphs}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {118--122}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371691}, doi = {10.1145/3371676.3371691}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiuYC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/QiSH19, author = {Yingying Qi and Wenli Shang and Xiaojun He}, title = {A Combined Prediction Method of Industrial Internet Security Situation Based on Time Series}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {84--91}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371704}, doi = {10.1145/3371676.3371704}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/QiSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/SongHQ19, author = {Xin Song and Xue Huang and Haijun Qian}, title = {Power Allocation Based on Geometric Programming for Non-orthogonal Multiple Access Heterogeneous Networks}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {137--141}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371687}, doi = {10.1145/3371676.3371687}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/SongHQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangZWGYF19, author = {Yucheng Wang and Daohua Zhu and Qing Wu and Yajuan Guo and Chonghai Yang and Wenjiang Feng}, title = {Wireless Signal Identification in 230MHz Band Based on Interference Cleaning and Convolutional Neural Network}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {133--136}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371686}, doi = {10.1145/3371676.3371686}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangZWGYF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/XiongMC19, author = {Xinli Xiong and Linru Ma and Chao Cui}, title = {Simulation Environment of Evaluation and Optimization for Moving Target Defense: {A} SimPy Approach}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {114--117}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371692}, doi = {10.1145/3371676.3371692}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/XiongMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangS19, author = {Kaige Yang and Shenghui Su}, title = {Secure Email Login Based on Lightweight Asymmetric Identities}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {25--29}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371683}, doi = {10.1145/3371676.3371683}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangSXK19, author = {Ping Yang and Hui Shu and Xiaobing Xiong and Fei Kang}, title = {Semantic-based Malware Behavior Description: Past and Future}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {11--19}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371700}, doi = {10.1145/3371676.3371700}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangSXK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangT19, author = {Wu{-}Chuan Yang and Lien{-}Yuan Ting}, title = {Embedded Authentication and Blockchain in Micro-course}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {58--62}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371696}, doi = {10.1145/3371676.3371696}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangY19, author = {Chen Yang and Wei Yan}, title = {Location Privacy Protection Scheme Based on Location Services}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {30--33}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371695}, doi = {10.1145/3371676.3371695}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangYLWD19, author = {Wen Yang and Meijuan Yin and Xiaonan Liu and Can Wang and Shunran Duan}, title = {Multi-source Landmark Fusion based on Machine Learning}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {142--148}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371694}, doi = {10.1145/3371676.3371694}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangYLWD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YueGC19, author = {Xuerong Yue and Jiji Gao and Zhibin Chen}, title = {A Polynomial Time Algorithm for Scheduling on Processing Time Constraints}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {109--113}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371690}, doi = {10.1145/3371676.3371690}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YueGC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangDZQ19, author = {Zufa Zhang and Jianqiang Dai and Lingling Zhao and Songling Qin}, title = {A Web Services Testing Approach based on Difference Measurement and Adaptive Random Testing}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {1--5}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371703}, doi = {10.1145/3371676.3371703}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangDZQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangZC19, author = {Jianing Zhang and Xingtao Zhuang and Yunfang Chen}, title = {Android Malware Detection Combined with Static and Dynamic Analysis}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {6--10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371685}, doi = {10.1145/3371676.3371685}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhouSWXT19, author = {Kaihang Zhou and Lei Shi and Jiahua Wei and Yang Xue and Jie Tang}, title = {Deterministic Controlled Remote State Preparation of Arbitrary Real-parameter Multi-qubit States via Three-qubit Entangled States}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {159--163}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371688}, doi = {10.1145/3371676.3371688}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhouSWXT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccns/2019, title = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676}, doi = {10.1145/3371676}, isbn = {978-1-4503-7662-4}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.