Search dblp for Publications

export results for "toc:db/conf/iccns/iccns2019.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iccns/BaiQC19,
  author       = {Enjian Bai and
                  Fangyuan Qin and
                  Sijing Chen},
  title        = {Effective Scrambling Scheme for Physical Layer Security},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {92--96},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371689},
  doi          = {10.1145/3371676.3371689},
  timestamp    = {Thu, 22 Apr 2021 19:04:09 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/BaiQC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChangS19,
  author       = {Qingqing Chang and
                  Shenghui Su},
  title        = {Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {34--39},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371682},
  doi          = {10.1145/3371676.3371682},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChangS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChenH19,
  author       = {Yanyan Chen and
                  Wenxian Han},
  title        = {Research on Automatically Switched Optical Network Security Based
                  on Quantum Key Distribution},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {75--78},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371701},
  doi          = {10.1145/3371676.3371701},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChenH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChenLLG19,
  author       = {Biqiong Chen and
                  Yanhua Liu and
                  Shijin Li and
                  Xiaoling Gao},
  title        = {Attack Intent Analysis Method Based on Attack Path Graph},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {97--102},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371680},
  doi          = {10.1145/3371676.3371680},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChenLLG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/DaiGLYLC19,
  author       = {Rui Dai and
                  Chuan Gao and
                  Bo Lang and
                  Lixia Yang and
                  Hongyu Liu and
                  Shaojie Chen},
  title        = {{SSL} Malicious Traffic Detection Based On Multi-view Features},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {40--46},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371697},
  doi          = {10.1145/3371676.3371697},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/DaiGLYLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/DuyAP19,
  author       = {Phan The Duy and
                  Le Duy An and
                  Van{-}Hau Pham},
  title        = {Mitigating Flow Table Overloading Attack with Controller-based Flow
                  Filtering Strategy in {SDN}},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {154--158},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371706},
  doi          = {10.1145/3371676.3371706},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/DuyAP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/GaoLQL19,
  author       = {Xiaoling Gao and
                  Yanhua Liu and
                  Yanbin Qiu and
                  Huajun Liu},
  title        = {A Comprehensive Assessment Method of Asset Importance for Key Asset
                  Protection},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {79--83},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371679},
  doi          = {10.1145/3371676.3371679},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/GaoLQL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/HeDSL19,
  author       = {Qipeng He and
                  Cong Dai and
                  Rong Si and
                  Jianwen Lin},
  title        = {Research on Improvement of Wireless Sensor Network Location Algorithm
                  Based on DV-Hop},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {149--153},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371698},
  doi          = {10.1145/3371676.3371698},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/HeDSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/JiangFZH19,
  author       = {Hua Jiang and
                  Jinpo Fan and
                  Gang Zhang and
                  Ronglei Hu},
  title        = {Design and Implementation of Integrated Access {VPN} Gateway},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {128--132},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371681},
  doi          = {10.1145/3371676.3371681},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/JiangFZH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/KongLZY19,
  author       = {Bin Kong and
                  Zhangpu Liu and
                  Guangming Zhou and
                  Xiaoyan Yu},
  title        = {A Method of Detecting the Abnormal Encrypted Traffic Based on Machine
                  Learning and Behavior Characteristics},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {47--50},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371705},
  doi          = {10.1145/3371676.3371705},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/KongLZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/KongYLJHZ19,
  author       = {Fanyu Kong and
                  Guoqiang Yang and
                  Huiyi Liu and
                  Yali Jiang and
                  Chengyu Hu and
                  Dashui Zhou},
  title        = {Fault-injection Attack and Improvement of a {CRT-RSA} Exponentiation
                  Algorithm},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {123--127},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371699},
  doi          = {10.1145/3371676.3371699},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/KongYLJHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Kun19,
  author       = {Yu Kun},
  title        = {Deep Security Analysis of {DCS} for Ship's Nuclear Power System based
                  on Improved {DEMATEL}},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {103--108},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371677},
  doi          = {10.1145/3371676.3371677},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Kun19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiGCL19,
  author       = {Han Li and
                  Chonglin Gu and
                  Yi Chen and
                  Wenye Li},
  title        = {An Efficient, Secure and Reliable Search Scheme for Dynamic Updates
                  with Blockchain},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {51--57},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371684},
  doi          = {10.1145/3371676.3371684},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/LiGCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LinGHZL19,
  author       = {Zijie Lin and
                  Liangliang Gao and
                  Xuexian Hu and
                  Yuxuan Zhang and
                  Wenfen Liu},
  title        = {Differentially Private Graph Clustering Algorithm Based on Structure
                  Similarity},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {63--68},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371693},
  doi          = {10.1145/3371676.3371693},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LinGHZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiuGCB19,
  author       = {Bo Liu and
                  Honghe Ge and
                  Jinfu Chen and
                  Qihao Bao},
  title        = {An Automatic Testing Platform for Object-oriented Software based on
                  Code Coverage},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {20--24},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371702},
  doi          = {10.1145/3371676.3371702},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/LiuGCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiuLLG19,
  author       = {Huajun Liu and
                  Zhanghui Liu and
                  Yanhua Liu and
                  Xiaoling Gao},
  title        = {Abnormal Network Traffic Detection based on Leaf Node Density Ratio},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {69--74},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371678},
  doi          = {10.1145/3371676.3371678},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiuLLG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiuYC19,
  author       = {Jiaxin Liu and
                  Xuerong Yue and
                  Zhibin Chen},
  title        = {A Note on Polynomial-time Solvability for Edge Packing on Graphs},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {118--122},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371691},
  doi          = {10.1145/3371676.3371691},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiuYC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/QiSH19,
  author       = {Yingying Qi and
                  Wenli Shang and
                  Xiaojun He},
  title        = {A Combined Prediction Method of Industrial Internet Security Situation
                  Based on Time Series},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {84--91},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371704},
  doi          = {10.1145/3371676.3371704},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/QiSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/SongHQ19,
  author       = {Xin Song and
                  Xue Huang and
                  Haijun Qian},
  title        = {Power Allocation Based on Geometric Programming for Non-orthogonal
                  Multiple Access Heterogeneous Networks},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {137--141},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371687},
  doi          = {10.1145/3371676.3371687},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/SongHQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangZWGYF19,
  author       = {Yucheng Wang and
                  Daohua Zhu and
                  Qing Wu and
                  Yajuan Guo and
                  Chonghai Yang and
                  Wenjiang Feng},
  title        = {Wireless Signal Identification in 230MHz Band Based on Interference
                  Cleaning and Convolutional Neural Network},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {133--136},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371686},
  doi          = {10.1145/3371676.3371686},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangZWGYF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/XiongMC19,
  author       = {Xinli Xiong and
                  Linru Ma and
                  Chao Cui},
  title        = {Simulation Environment of Evaluation and Optimization for Moving Target
                  Defense: {A} SimPy Approach},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {114--117},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371692},
  doi          = {10.1145/3371676.3371692},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/XiongMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangS19,
  author       = {Kaige Yang and
                  Shenghui Su},
  title        = {Secure Email Login Based on Lightweight Asymmetric Identities},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {25--29},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371683},
  doi          = {10.1145/3371676.3371683},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangSXK19,
  author       = {Ping Yang and
                  Hui Shu and
                  Xiaobing Xiong and
                  Fei Kang},
  title        = {Semantic-based Malware Behavior Description: Past and Future},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {11--19},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371700},
  doi          = {10.1145/3371676.3371700},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangSXK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangT19,
  author       = {Wu{-}Chuan Yang and
                  Lien{-}Yuan Ting},
  title        = {Embedded Authentication and Blockchain in Micro-course},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {58--62},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371696},
  doi          = {10.1145/3371676.3371696},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangY19,
  author       = {Chen Yang and
                  Wei Yan},
  title        = {Location Privacy Protection Scheme Based on Location Services},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {30--33},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371695},
  doi          = {10.1145/3371676.3371695},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangYLWD19,
  author       = {Wen Yang and
                  Meijuan Yin and
                  Xiaonan Liu and
                  Can Wang and
                  Shunran Duan},
  title        = {Multi-source Landmark Fusion based on Machine Learning},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {142--148},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371694},
  doi          = {10.1145/3371676.3371694},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangYLWD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YueGC19,
  author       = {Xuerong Yue and
                  Jiji Gao and
                  Zhibin Chen},
  title        = {A Polynomial Time Algorithm for Scheduling on Processing Time Constraints},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {109--113},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371690},
  doi          = {10.1145/3371676.3371690},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YueGC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangDZQ19,
  author       = {Zufa Zhang and
                  Jianqiang Dai and
                  Lingling Zhao and
                  Songling Qin},
  title        = {A Web Services Testing Approach based on Difference Measurement and
                  Adaptive Random Testing},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {1--5},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371703},
  doi          = {10.1145/3371676.3371703},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangDZQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangZC19,
  author       = {Jianing Zhang and
                  Xingtao Zhuang and
                  Yunfang Chen},
  title        = {Android Malware Detection Combined with Static and Dynamic Analysis},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {6--10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371685},
  doi          = {10.1145/3371676.3371685},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangZC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhouSWXT19,
  author       = {Kaihang Zhou and
                  Lei Shi and
                  Jiahua Wei and
                  Yang Xue and
                  Jie Tang},
  title        = {Deterministic Controlled Remote State Preparation of Arbitrary Real-parameter
                  Multi-qubit States via Three-qubit Entangled States},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {159--163},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371688},
  doi          = {10.1145/3371676.3371688},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhouSWXT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccns/2019,
  title        = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676},
  doi          = {10.1145/3371676},
  isbn         = {978-1-4503-7662-4},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics