|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 42 occurrences of 41 keywords
|
|
|
Results
Found 501 publication records. Showing 501 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
133 | Imrich Chlamtac, Aura Ganz, G. Karmi |
Circuit switching in multi-hop lightwave networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM Symposium on Communications Architectures and Protocols, SIGCOMM 1988, Stanford, CA, USA, August 16-18, 1988, pp. 188-199, 1988, ACM, 0-89791-279-9. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
119 | Shih Tsung Liang, Ming-Yi Weng |
Protecting IEEE 802.11 Wireless LANs against the FCS False Blocking Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (1) ![In: 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, Fuduoka, Japan, July 20-22, 2005, pp. 723-729, 2005, IEEE Computer Society, 0-7695-2281-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
false blocking attack, FCS false blocking detection and recovery, WLAN, IEEE 802.11, WEP |
116 | Ambrose Kofi Laing, Robert Cypher, Christian A. Duncan |
On the Flattest Common Supersequence Method for Deadlock-Free Routing in Arbitrary Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theory Comput. Syst. ![In: Theory Comput. Syst. 33(5/6), pp. 393-426, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
107 | Rajive L. Bagrodia, Ken Tang, Steve Goldman, Dilip Kumar 0007 |
An accurate, scalable communication effects server for the FCS system of systems simulation environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the Winter Simulation Conference WSC 2006, Monterey, California, USA, December 3-6, 2006, pp. 1226-1233, 2006, IEEE Computer Society, 1-4244-0501-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
100 | Chenyang Lu 0001, Xiaorui Wang, Christopher D. Gill |
Feedback Control Real-Time Scheduling in ORB Middleware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Real Time Technology and Applications Symposium ![In: Proceedings of the 9th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2003), May 27-30, 2003, Toronto, Canada, pp. 37-48, 2003, IEEE Computer Society, 0-7695-1956-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
95 | Miin-Shen Yang, Hsu-Shen Tsai |
An Alternative Fuzzy Compactness and Separation Clustering Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIVS ![In: Advanced Concepts for Intelligent Vision Systems, 7th International Conference, ACIVS 2005, Antwerp, Belgium, September 20-23, 2005, Proceedings, pp. 146-153, 2005, Springer, 3-540-29032-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Fuzzy clustering algorithms, Fuzzy compactness & separation (FCS), Alternative fuzzy compactness & separation (AFCS), Exponential-type distance, Robust, Noise, Fuzzy c-means (FCM) |
90 | H. Todd Minners, Douglas C. Mackey |
Conceptual linking of FCS C4ISR systems performance to information quality and force effectiveness using the CASTFOREM high resolution combat model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the Winter Simulation Conference WSC 2006, Monterey, California, USA, December 3-6, 2006, pp. 1222-1225, 2006, IEEE Computer Society, 1-4244-0501-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
78 | Juan Xu, Zhanhuai Li, Yanlong Wang, Rugui Yao |
An Efficient Encoding and Labeling Scheme for Dynamic XML Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 18th International Conference, DEXA 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 151-161, 2007, Springer, 978-3-540-74467-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Forbidden Code Segment (FCS), re-labeling, updates, labeling scheme, Lexicographical Order |
74 | Pablo Martínez, Miguel Pinzolas, Juan López Coronado, Daniel García |
A Functional Simplification of the BCS/FCS Image Segmentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IbPRIA (1) ![In: Pattern Recognition and Image Analysis, Second Iberian Conference, IbPRIA 2005, Estoril, Portugal, June 7-9, 2005, Proceedings, Part I, pp. 110-118, 2005, Springer, 3-540-26153-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
66 | Roman V. Efremov, Georgy K. Kamenev |
Properties of a method for polyhedral approximation of the feasible criterion set in convex multiobjective problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 166(1), pp. 271-279, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Polyhedral approximation, Estimation refinement method, Feasible goals method, Multicriteria optimization |
66 | Qian Jun, Wang Kuang |
Fast Cell Scheduling Negotiation Algorithm in HSDPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 347-350, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
66 | Eitan Frachtenberg, Dror G. Feitelson, Fabrizio Petrini, Juan Fernández 0001 |
Adaptive Parallel Job Scheduling with Flexible Coscheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 16(11), pp. 1066-1077, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
flexible coscheduling, load balancing, parallel architectures, Cluster computing, job scheduling, gang scheduling |
53 | Zhihua Wei, Jing Chen, Jia Li, Guocheng Xu, Jianxun Lang, Bihui Huang |
Research on Temperature Control System of Ceramic Roller Kiln Based on FCS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIIA (2) ![In: PACIIA 2008, Volume 2, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 19-20 December 2008, Wuhan, China, pp. 412-415, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Temperature Control System, Ceramic Roller Kiln, FCS, industrial process |
50 | Yu-Gang Jiang, Chong-Wah Ngo, Shih-Fu Chang |
Semantic context transfer across heterogeneous sources for domain adaptive video search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 17th International Conference on Multimedia 2009, Vancouver, British Columbia, Canada, October 19-24, 2009, pp. 155-164, 2009, ACM, 978-1-60558-608-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Flickr context similarity, domain adaptive video search, heterogeneous sources, semantic context transfer |
50 | Abdelhamid Bouchachia, Roland T. Mittermeir |
Towards Incremental Fuzzy Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 11(2), pp. 193-207, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Incremental fuzzy rule learning, Incremental and supervised clustering, Incremental feature selection, Classification |
50 | Gwo-Ching Liao, Ta-Peng Tsao |
Application of a fuzzy neural network combined with a chaos genetic algorithm and simulated annealing to short-term load forecasting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Evol. Comput. ![In: IEEE Trans. Evol. Comput. 10(3), pp. 330-340, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Iqbal Mohomed, Jim Chengming Cai, Sina Chavoshi, Eyal de Lara |
Context-aware interactive content adaptation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 4th International Conference on Mobile Systems, Applications, and Services (MobiSys 2006), Uppsala, Sweden, June 19-22, 2006, pp. 42-55, 2006, ACM, 1-59593-195-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
mobile devices, context, customization, content adaptation |
50 | Mehdi Amirijoo, Jörgen Hansson, Sang Hyuk Son |
Error-Driven QoS Management in Imprecise Real-Time Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECRTS ![In: 15th Euromicro Conference on Real-Time Systems (ECRTS 2003), 2-4 July 2003, Porto, Portugal, Proceedings, pp. 63-72, 2003, IEEE Computer Society, 0-7695-1936-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Laks V. S. Lakshmanan, Daniel A. Nonen |
Superfiniteness of Query Answers in Deductive Databases: An Automata-Theoretic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSTTCS ![In: Foundations of Software Technology and Theoretical Computer Science, 12th Conference, New Delhi, India, December 18-20, 1992, Proceedings, pp. 176-190, 1992, Springer, 3-540-56287-7. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
46 | Michael Yang, Ahmed N. Tantawy |
A design methodology for protocol processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 5th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 1995), August 28-30, 1995, Chenju, Korea, Proceedings, pp. 376-383, 1995, IEEE Computer Society, 0-8186-7125-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
protocol processors, FCS, Fibre Channel Standard, homogeneous multi-processors, single VLSI chip, VHDL macro libraries, VLSI protocol processors, CVDS, Communication VLSI Design System, protocols, asynchronous transfer mode, ATM, multiprocessing systems, communication protocols |
43 | Chunjie Cao, Yuqing Zhang 0001, Yuan Hong, Ding Wang (eds.) |
Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![Springer, 978-981-19-0522-3 The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Emmanuel Ahene, Fagen Li (eds.) |
Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![Springer, 978-981-19-8444-0 The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Xiang Li, Ning Yang, Aidong Chen, Weifeng Liu, Xiaoxiao Liu, Na Huang |
Power Analysis Attack Based on Lightweight Convolutional Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 105-118, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Chengrong Liu, Chunming Tang 0003, Huiwen Jia |
New Trapdoor and Preimage Sampling on NTRU Lattice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 275-287, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Yulian Li, Hua Shen |
A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 261-274, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Long Yin, Jian Xu 0004, Heqiu Chai, Chen Wang |
A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage-Based Vehicle Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 413-428, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Jingting Xue, Shuqin Luo, Lingjie Shi, Xiaojun Zhang, Chunxiang Xu |
Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 48-68, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Otuekong Ekpo, Kate Takyi, Rose-Mary Owusuaa Mensah Gyening |
LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 34-47, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Yangpeng Wang, Ling Xiong, Xianhua Niu, Yunxiang Wang, Dexin Liang |
A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 18-33, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Samuel Kelly Brew, Emmanuel Ahene |
Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 163-179, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Sandro Amofa, Jianbin Gao, Maame Gyamfua Asante-Mensah, Charles Roland Haruna, Xia Qi |
Blockchain-Based Patient-to-Patient Health Data Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 198-210, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Zhenhua Liu 0001, Jingwan Gong, Yuanju Ma, Yaxin Niu, Baocang Wang |
Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 324-345, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Yanyan Han, Yikun Zhou, Peng Li, Xinyang Liu |
A Rotating Multi-secret Color Visual Cryptography Scheme Based on Meaningful Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 304-323, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Dongfen Li, Jie Zhou, Xiaolong Yang, Yuqaio Tan, Yundan Zheng, Xiaofang Liu |
Quantum Information Splitting Scheme of Arbitrary Three-Qubit State by Using a Four-Qubit Cluster State and a Bell State. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 395-409, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Yi Liu, Guoxiong Hu, Yudi Zhang 0001, Mingwu Zhang |
SVFLS: A Secure and Verifiable Federated Learning Training Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 134-148, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Xiaoguang Liu, Yingying Sun, Hao Dong |
A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 69-86, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Egide Nkurunziza, Lawrence Tandoh, Issameldeen Elfadul, Mwitende Gervais |
AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-Based Smart Grid Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 183-197, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Emmanuel Kwesi Baah, Steven Yirenkyi, Dominic Asamoah, Stephen Opoku Oppong, Edward Opoku-Mensah, Benjamin Tei Partey, Anthony Kingsley Sackey, Oliver Kornyo, Evans Obu |
Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 119-133, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Chunhua Jin, Chenhao Li, Wenyu Qin, Xiaobing Chen, Guanhua Chen |
A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 3-17, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Yu Wang, Haomiao Yang, Jiasheng Li, Mengyu Ge |
A Pragmatic Label-Specific Backdoor Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 149-162, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Abigail Akosua Addobea, Qianmu Li, Isaac Amankona Obiri, Jun Hou 0002 |
A Gas Cost Analytical Approach Based on Certificateless Key Encapsulation Protocol for Medicalized Blockchains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 241-257, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Xingpeng Tang, Jingwei Li 0001 |
Improving Online Restore Performance of Backup Storage via Historical File Access Pattern. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 365-376, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Zhonglin Liu, Yong Fang 0002, Yijia Xu |
Cross-site Scripting Threat Intelligence Detection Based on Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 89-104, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Yang Yang, Bixia Yi, Yonghua Zhan, Minming Huang |
Secure EHR Sharing Scheme Based on Limited Sanitizable Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 288-303, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Evans Ankomah, Charles Roland Haruna, Francis Xavier Kofi Akotoye, Brighter Agyemang, Kwame Opuni-Boachie Obour Agyekum, Alexander Asante, Lawrence Ephrim, Alexander N. T. Kissiedu |
A Comparative Analysis of Security Features and Concerns in NoSQL Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 349-364, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Motoya Ishimaki, Kazumasa Omote |
Ethereum Contract Honeypot Risk Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 226-240, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Xiangsong Zhang, Ming Yuan 0002, Zhenhua Liu 0001 |
Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 211-225, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Qikai Feng, Bai Liu |
Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 377-391, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
43 | Na Wang, Gaofei Wu, Qiuling Yue, Jinglu Hu, Yuqing Zhang 0001 |
Research on Security Assessment of Cross Border Data Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 327-341, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Jiawei Zhang, Jinwei Wang, Xiangyang Luo, Bin Ma 0003, Naixue Xiong |
Imperceptible and Reliable Adversarial Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 49-62, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Binghui Zou, Chunjie Cao, Longjuan Wang, Fangjian Tao |
DACN: Malware Classification Based on Dynamic Analysis and Capsule Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 3-13, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Bin Ma 0003, Yongkang Fu, Jian Li 0034, Chunpeng Wang, Yuli Wang |
A GDIoU Loss Function-Based YOLOv4 Deep Learning Network for High-Performance Insulator Location in Field Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 245-256, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Xin Ji, Haifeng Zhang, Juan Chu, Linxiao Dong, Chengyue Yang |
New Federation Algorithm Based on End-Edge-Cloud Architecture for Smart Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 120-133, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Jiayuan Zhang, Mengyue Feng, Yuhang Huang, Tao Feng 0007, Wenjie Wang, He Wang 0014, Han Zhang |
Survey of 3D Printer Security Offensive and Defensive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 163-178, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Zhixuan Gao, Shuang Wang, Yaoling Ding, An Wang 0001, Qingjun Yuan |
Correlation Power Analysis and Protected Implementation on Block Cipher RainDrop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 308-323, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Xinjian Lv, Nan Shi, Jing Wei, Yuan Tian 0018, Jie Li, Jian Li 0035 |
Information System Security Risk Assessment Based on Entropy Weight Method - Bayesian Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 152-162, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Ming Cheng, Yang Yang 0059, Yingqiu Ding, Weiming Zhang 0001 |
A Privacy-Preserving Medical Image Scheme Based on Secret Sharing and Reversible Data Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 288-307, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Hao Peng 0002, Zhen Qian, Ming Zhong 0009, Dandan Zhao, Guangquan Xu, Songyang Wu, Jianming Han |
System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 230-242, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Jieru Mu, Hua He, Lin Li, Shanchen Pang, Cong Liu |
A Hybrid Network Intrusion Detection Model Based on CNN-LSTM and Attention Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 214-229, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia |
Cloud-Aided Scalable Revocable Identity-Based Encryption with Ciphertext Update from Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 269-287, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Hongwen Wu, Xiaoming Wang, Ke Zhou, Jianming Zou, Congyun Wu, Wenjian Wen, Zhicheng Huang, Jiezhen Deng, Tingyu Qiu |
Research on Automatic Analysis and Exploitation Technology of Remote Code Execution Vulnerability for Grid System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 14-29, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Hansong Ren, Xuejun Li 0007, Liao Lei, Guoliang Ou, Hongyu Sun, Gaofei Wu, Xiao Tian, Jinglu Hu, Yuqing Zhang 0001 |
Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 78-99, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Xianglin Wei, Chao Wang, Xiang Jiao, Qiang Duan, Yongyang Hu |
Architecture and Security Analysis of Federated Learning-Based Automatic Modulation Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 63-77, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Lawrence Tandoh, Fagen Li, Ikram Ali, Charles Roland Haruna, Michael Y. Kpiebaareh, Christopher Tandoh |
Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 181-196, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Terui Mao, Diqun Yan, Yongkang Gong, Rangding Wang |
Identification of Synthetic Spoofed Speech with Deep Capsule Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 257-265, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Xi Luo, Chunjie Cao, Longjuan Wang |
Multi-modal Universal Embedding Representations for Language Understanding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 103-119, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Egide Nkurunziza, Mwitende Gervais, Lawrence Tandoh, Fagen Li |
Certificateless Authentication and Consensus for the Blockchain-Based Smart Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 134-151, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Kejun Zhang, Xinrui Jiang, Xinying Yu, Liwen Feng |
Network Security Situation Assessment Method Based on MHSA-FL Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 197-213, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Xiang Shu, Chunjie Cao, Longjuan Wang, Fangjian Tao |
GWDGA: An Effective Adversarial DGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 30-48, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Ying Li, Mianxue Gu, Hongyu Sun, Yuhao Lin, Qiuling Yue, Zhen Guo, Jinglu Hu, He Wang 0014, Yuqing Zhang |
A Review of Data Representation Methods for Vulnerability Mining Using Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 342-351, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Guangquan Xu, Kaitai Liang, Chunhua Su (eds.) |
Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![Springer, 978-981-15-9738-1 The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Zhen Gao 0001, Dongbin Zhang, Jiuzhi Zhang |
A Security Problem Caused by the State Database in Hyperledger Fabric. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 361-372, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Wenlong Dun, Youwen Zhu |
Efficient Discrete Distribution Estimation Schemes Under Local Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 508-523, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Xueling Zhu, Huaping Hu, Shaojing Fu, Qing Wu 0004, Bo Liu 0014 |
Efficient Boolean SSE: A Novel Encrypted Database (EDB). ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 373-387, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Han Wang, Xu An Wang 0001, Jiasen Liu, Chuan Lin |
Identify-Based Outsourcing Data Auditing Scheme with Lattice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 347-358, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Lu Bing, Yudong Li, Wen Si |
Noninvasive Research on Cardiac Electrical Activity by Non-Gaussian Prior Bayesian Matching Pursuit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 104-110, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Yong Ma, Yang Hu, Chang Cai |
A Network Traffic Classification Method Based on Hierarchical Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 449-458, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Xuren Wang, Zhou Fang, Dong Wang, Anran Feng, Qiuyun Wang |
Research on Database Anomaly Access Detection Based on User Profile Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 388-399, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Yanan Cheng, Han Wang, Zhaoxin Zhang, Ning Li |
Characterizing the Security Threats of Disposable Phone Numbers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 491-507, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Chao Zhou, Qian Zhang 0033, Bin Wang 0052, Yunzhang Du, Tao Yan, Wen Si |
An Effective Occlusion Edge Prediction Method in Light Field Depth Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 403-416, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Lixia Xie, Huiyu Ni, Guangquan Xu, Jiyong Zhang |
A Key Business Node Identification Model for Business Process Based on AE-VIKOR Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 643-653, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Zhijie Zhang, Lejun Zhang, Waqas Rasheed, Zilong Jin, Tinghuai Ma, Huiling Chen 0001, Guangquan Xu |
The Research on Covert Communication Model Based on Blockchain: A Case Study of Ethereum's Whisper Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 215-230, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Chunhua Jin, Ge Kan, Guanhua Chen, Changhui Yu, Chengjie Xu |
Heterogeneous Deniable Authenticated Encryption Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 331-346, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Zhibin Guan, Xiaomeng Wang, Wei Xin, Jiajie Wang |
Code Property Graph-Based Vulnerability Dataset Generation for Source Code Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 584-591, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Wenzhuang Kang, Shangping Zhong, Kaizhi Chen, Jianhua Lai, Guangquan Xu |
RF-AdaCost: WebShell Detection Method that Combines Statistical Features and Opcode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 667-682, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Hao Peng 0002, Can Liu, Dandan Zhao, Jianmin Han, Zhonglong Zheng |
Robustness Enhancement Analysis of CPS Systems Under the Swapping Strategies Between Different Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 305-314, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Fang Peng, Hui Tian 0002, Hanyu Quan, Jing Lu |
Data Auditing for the Internet of Things Environments Leveraging Smart Contract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 133-149, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Gangting Liu, Jianhong Lin, Yifan Ding, Shihong Yang, Yunhua Xu |
A New Face Detection Framework Based on Adaptive Cascaded Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 233-242, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Yonghao Gu, Liangxun Li, Yong Zhang |
Robust Android Malware Detection Based on Attributed Heterogenous Graph Embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 432-446, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Shiyin Yang, Yongbiao Li, Dehua Zhou, Linfeng Wei, Qingqing Gan |
Privacy Prediction of Lightweight Convolutional Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 524-537, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Dan-Li Zhi, Zhi-Hui Li 0006, Li-Juan Liu, Zhao-Wei Han |
A Hybrid Quantum Secret Sharing Scheme Based on Mutually Unbiased Bases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 595-607, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Chundong Wang 0002, Chuang Li, Tongle An, Xiaochun Cheng |
Low-Speed Injection Attack Detection on CAN Bus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 30-43, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Jing Zhang, Rong Tan, Yudong Li |
Design of Personal Credit Information Sharing Platform Based on Consortium Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 166-177, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Yichao Zang, Tairan Hu, Rongrong Cao, Junhu Zhu |
An Adaptive Utility Quantification Strategy for Penetration Semantic Knowledge Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 654-666, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Xiaomeng Wang, Zhibin Guan, Wei Xin, Jiajie Wang |
Multi-type Source Code Defect Detection Based on TextCNN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 95-103, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Hongyu Yang, Yuhao Feng, Guangquan Xu, Jiyong Zhang |
Fuzzy Petri Nets Based Information System Security Situation Assessment Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 283-293, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Jun Xing, Guangquan Xu, Chengbo Yin |
Video Investigation Analysis System Enhanced by Explicable Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 111-117, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Xianliang Jiang, Jiahua Zhu, Guang Jin |
DPC: A Delay-Driven Prioritized TCP Congestion Control Algorithm for Data Center Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 459-474, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Yukun Dong, Li Zhang 0053, Shanchen Pang, Hao Liu, Wenjing Yin, Mengying Wu, Meng Wu, Haojie Li |
Automatic Repair of Semantic Defects Using Restraint Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 567-583, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Lixia Xie, Liping Yan, Guangquan Xu, Jiyong Zhang |
Analysis Model of Node Failures and Impact for AANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings, pp. 55-64, 2020, Springer, 978-981-15-9738-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 501 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|