Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2020
- Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu:
Information and Communications Security - 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11999, Springer 2020, ISBN 978-3-030-41578-5 [contents] - 2019
- Maged AbdelAty, Roberto Doriguzzi Corin, Domenico Siracusa:
AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems. ICICS 2019: 53-70 - Andreas Abraham, Felix Hörandner, Olamide Omolola, Sebastian Ramacher:
Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems. ICICS 2019: 307-323 - Jian Chen, Tao Shu:
Impact of Multiple Reflections on Secrecy Capacity of Indoor VLC System. ICICS 2019: 105-123 - Qiu Chen, Danping Shi, Siwei Sun, Lei Hu:
Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging. ICICS 2019: 233-247 - Muqian Chen, Xuebin Wang, Jinqiao Shi, Yue Gao, Can Zhao, Wei Sun:
Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays. ICICS 2019: 521-538 - Huaifeng Chen, Rui Zong, Xiaoyang Dong:
Improved Differential Attacks on GIFT-64. ICICS 2019: 447-462 - Ruoyu Deng, Na Ruan, Guangsheng Zhang, Xiaohu Zhang:
FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels. ICICS 2019: 569-583 - Ye Dong, Xiaojun Chen, Liyan Shen, Dakui Wang:
Privacy-Preserving Distributed Machine Learning Based on Secret Sharing. ICICS 2019: 684-702 - Fenil Fadadu, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla:
Evading API Call Sequence Based Malware Classifiers. ICICS 2019: 18-33 - Pengbin Feng, Jianhua Sun, Songsong Liu, Kun Sun:
UBER: Combating Sandbox Evasion via User Behavior Emulators. ICICS 2019: 34-50 - Ning Guo, Xiaoyong Li, Hui Yin, Yali Gao:
VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and Bytecode. ICICS 2019: 199-218 - Jianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang:
DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN. ICICS 2019: 503-520 - Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang:
Road Context-Aware Intrusion Detection System for Autonomous Cars. ICICS 2019: 124-142 - WeiPeng Jiang, Bin Wu, Zhou Jiang, ShaoBo Yang:
Cloning Vulnerability Detection in Driver Layer of IoT Devices. ICICS 2019: 89-104 - Meng Li, Lijun Cai, Aimin Yu, Haibo Yu, Dan Meng:
HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks. ICICS 2019: 165-180 - Yuguang Li, Ming Tang, Pengbo Wang, Yanbin Li, Shan Fu:
Practical Evaluation Methodology of Higher-Order Maskings at Different Operating Frequencies. ICICS 2019: 287-304 - Wenjuan Liang, Hong Chen, Yuncheng Wu, Cuiping Li:
Differentially Private Frequent Itemset Mining Against Incremental Updates. ICICS 2019: 649-667 - Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang:
Deep Learning-Based Vulnerable Function Detection: A Benchmark. ICICS 2019: 219-232 - Bowen Liu, Qiang Tang:
Privacy-Preserving Decentralised Singular Value Decomposition. ICICS 2019: 703-721 - Pingchuan Ma, Zhiqiang Wang, Le Zhang, Ruming Wang, Xiaoxiang Zou, Tao Yang:
Differentially Private Reinforcement Learning. ICICS 2019: 668-683 - Long Mai, Yuan Yan, Songlin Jia, Shuran Wang, Jianqiang Wang, Juanru Li, Siqi Ma, Dawu Gu:
Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features. ICICS 2019: 430-446 - Matthias Marx, Monina Schwarz, Maximilian Blochberger, Frederik Wille, Hannes Federrath:
Context-Aware IPv6 Address Hopping. ICICS 2019: 539-554 - Bin Qi, Jie Ma, Kewei Lv:
Using Equivalent Class to Solve Interval Discrete Logarithm Problem. ICICS 2019: 397-412 - Tian Qiu, Lin Hou, Dongdai Lin:
A Multi-Group Signature Scheme from Lattices. ICICS 2019: 359-377 - Athmane Seghier, Jianxin Li:
Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes). ICICS 2019: 413-429 - Qiang Tang:
Towards Blockchain-Enabled Searchable Encryption. ICICS 2019: 482-500 - Churan Tang, Zongbin Liu, Cunqing Ma, Jingquan Ge, Chenyang Tu:
SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks. ICICS 2019: 251-268 - Jing Tian, Gaopeng Gou, Chang Liu, Yige Chen, Gang Xiong, Zhen Li:
DLchain: A Covert Channel over Blockchain Based on Dynamic Labels. ICICS 2019: 814-830 - Geng Wang, Zhen Liu, Dawu Gu:
Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption. ICICS 2019: 378-396
skipping 18 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 09:38 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint