Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
71 | Massimiliano Giacomin |
Self-Stabilizing Distributed Algorithms for Defeat Status Computation in Argumentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multi-Agent-Systems and Applications ![In: Multi-Agent-Systems and Applications II, 9th ECCAI-ACAI/EASSS 2001, AEMAS 2001, HoloMAS 2001, Selected Revised Papers, pp. 137-147, 2001, Springer, 3-540-43377-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
71 | Brent Heeringa, Paul R. Cohen |
An underlying model for defeat mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 32nd conference on Winter simulation, WSC 2000, Wyndham Palace Resort & Spa, Orlando, FL, USA, December 10-13, 2000, pp. 933-939, 2000, WSC, 0-7803-6582-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
59 | Gary W. King, Brent Heeringa, David L. Westbrook, Joe Catalano, Paul R. Cohen |
Agent modeling: models of defeat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 34th Winter Simulation Conference: Exploring New Frontiers, San Diego, California, USA, December 8-11, 2002, pp. 928-934, 2002, WSC, 0-7803-7615-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Lei Liu 0021, Songqing Chen |
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 201-218, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Diego C. Martínez, Alejandro Javier García, Guillermo Ricardo Simari |
Progressive Defeat Paths in Abstract Argumentation Frameworks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Canadian AI ![In: Advances in Artificial Intelligence, 19th Conference of the Canadian Society for Computational Studies of Intelligence, Canadian AI 2006, Québec City, Québec, Canada, June 7-9, 2006, Proceedings, pp. 242-253, 2006, Springer, 3-540-34628-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Sanjay Modgil |
Nested Argumentation and Its Application to Decision Making over Actions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ArgMAS ![In: Argumentation in Multi-Agent Systems, Second International Workshop, ArgMAS 2005, Utrecht, The Netherlands, July 26, 2005, Revised Selected and Invited Papers, pp. 57-73, 2005, Springer, 3-540-36355-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Kurosh Madani, Véronique Amarger, Christophe Sabourin |
ANN Based Solutions: It Is Time to Defeat Real-World and Industrial Dilemmas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWANN (1) ![In: Bio-Inspired Systems: Computational and Ambient Intelligence, 10th International Work-Conference on Artificial Neural Networks, IWANN 2009, Salamanca, Spain, June 10-12, 2009. Proceedings, Part I, pp. 1328-1335, 2009, Springer, 978-3-642-02477-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Real-Time, Artificial Neural Networks, Implementation, Industrial, Solutions, Real-world |
35 | Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan |
JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bangalore Compute Conf. ![In: Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, Bangalore, India, January 9-10, 2009, pp. 13, 2009, ACM, 978-1-60558-476-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
restructured arrays, source code obfuscation, reverse engineering |
35 | Yinan Jing, Jingtao Li, Xueping Wang, Xiaochun Xiao, Gendu Zhang |
A Distributed-Log-based IP Traceback Scheme to Defeat DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 25-32, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Xin Li 0008, Fang Bian, Mark Crovella, Christophe Diot, Ramesh Govindan, Gianluca Iannaccone, Anukool Lakhina |
Detection and identification of network anomalies using sketch subspaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006, pp. 147-152, 2006, ACM, 1-59593-561-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
defeat, anomaly detection, sketch, subspace method |
33 | Quoc Bao Vo, Norman Y. Foo, Joe Thurbon |
Semantics for a theory of defeasible reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Math. Artif. Intell. ![In: Ann. Math. Artif. Intell. 44(1-2), pp. 87-119, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
argument-based systems, argumentation-theoretic semantics, defeat, justification, defeasible reasoning |
24 | Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli |
Image Spam Filtering Using Visual Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAP ![In: 14th International Conference on Image Analysis and Processing (ICIAP 2007), 10-14 September 2007, Modena, Italy, pp. 105-110, 2007, IEEE Computer Society, 0-7695-2877-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Paul C. van Oorschot, Anil Somayaji, Glenn Wurster |
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 2(2), pp. 82-92, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
self-hashing, operating system kernels, software protection, Tamper resistance, checksumming, application security, processor design |
24 | Shuo Chen 0001, Jun Xu 0003, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
Defeating Memory Corruption Attacks via Pointer Taintedness Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings, pp. 378-387, 2005, IEEE Computer Society, 0-7695-2282-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning |
Defending against Sybil Attacks in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 6-10 June 2005, Columbus, OH, USA, pp. 185-191, 2005, IEEE Computer Society, 0-7695-2328-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Jaap Hage |
Law and Defeasibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Law ![In: Artif. Intell. Law 11(2-3), pp. 221-243, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
defeasibility, legal justification, non-monotonic logic |
24 | Mike Burmester, Yvo Desmedt, Yongge Wang |
Using Approximation Hardness to Achieve Dependable Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RANDOM ![In: Randomization and Approximation Techniques in Computer Science, Second International Workshop, RANDOM'98, Barcelona, Spain, October 8-10, 1998, Proceedings, pp. 172-186, 1998, Springer, 3-540-65142-X. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
22 | Hamza Javed, Zainab Abaid, Shahid Akbar, Kifayat Ullah 0004, Ashfaq Ahmad, Aamir Saeed, Hashim Ali, Yazeed Yasin Ghadi, Tahani Jaser Alahmadi, Hend Khalid Alkahtani, Ali Raza |
Blockchain-Based Logging to Defeat Malicious Insiders: The Case of Remote Health Monitoring Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 12062-12079, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Ke Sun, Pei Liu, Pengfei Li, Zhifang Liao |
ModWaveMLP: MLP-Based Mode Decomposition and Wavelet Denoising Model to Defeat Complex Structures in Traffic Forecasting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada, pp. 9035-9043, 2024, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Vid Kocijan, Ernest Davis, Thomas Lukasiewicz, Gary Marcus 0001, Leora Morgenstern |
The Defeat of the Winograd Schema Challenge (Abstract Reprint). ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada, pp. 22703, 2024, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Wenjian Sun, Dongsheng Wu, Yang Luo, Lu Liu, Hongjing Zhang, Shuang Wu, Yan Zhang, Chenglong Wang, Houjun Zheng, Jiang Shen, Chunbo Luo |
ExpertNet: Defeat noisy labels by deep expert consultation paradigm for pneumoconiosis staging on chest radiographs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 232, pp. 120710, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Wolfgang Dvorák, Anna Rapberger, Stefan Woltran |
A claim-centric perspective on abstract argumentation semantics: Claim-defeat, principles, and expressiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. ![In: Artif. Intell. 324, pp. 104011, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Vid Kocijan, Ernest Davis, Thomas Lukasiewicz, Gary Marcus 0001, Leora Morgenstern |
The defeat of the Winograd Schema Challenge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. ![In: Artif. Intell. 325, pp. 103971, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Mashari Alatawi, Nitesh Saxena |
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.03426, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Guangyuan Hu, Ruby B. Lee |
Random and Safe Cache Architecture to Defeat Cache Timing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.16172, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Pascal Urien |
Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets: A Crypto Terminal Use Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.17206, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Libor Caha, Xavier Coiteux-Roy, Robert Koenig |
A colossal advantage: 3D-local noisy shallow quantum circuits defeat unbounded fan-in classical circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.09209, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Aleks Knoks |
Conciliatory Reasoning, Self-Defeat, and Abstract Argumentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Rev. Symb. Log. ![In: Rev. Symb. Log. 16(3), pp. 740-787, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Yishay Mansour, Richard Nock, Robert C. Williamson |
Random Classification Noise does not defeat All Convex Potential Boosters Irrespective of Model Choice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML ![In: International Conference on Machine Learning, ICML 2023, 23-29 July 2023, Honolulu, Hawaii, USA., pp. 23706-23742, 2023, PMLR. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
22 | Zeyu Deng, Long Huang, Chen Wang 0009 |
Enhanced In-air Signature Verification via Hand Skeleton Tracking to Defeat Robot-level Replays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Annual Computer Security Applications Conference, ACSAC 2023, Austin, TX, USA, December 4-8, 2023, pp. 451-462, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Lee Sharkey |
Circumventing interpretability: How to defeat mind-readers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.11415, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Vid Kocijan, Ernest Davis, Thomas Lukasiewicz, Gary Marcus 0001, Leora Morgenstern |
The Defeat of the Winograd Schema Challenge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2201.02387, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
22 | Mohammed Baz, Sabita Khatri, Abdullah Baz, Hosam Alhakami 0001, Alka Agrawal, Raees Ahmad Khan |
Blockchain and Artificial Intelligence Applications to Defeat COVID-19 Pandemic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 40(2), pp. 691-702, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Lifeng Huang, Chengying Gao, Ning Liu |
DEFEAT: Decoupled feature attack across deep neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Networks ![In: Neural Networks 156, pp. 13-28, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Michael Coole, Deborah Evans, David Brooks |
A Framework for the Analysis of Security Technology Vulnerabilities: Defeat Evaluation of an Electronic Access Control Locking System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2022, Valeč u Hrotovic, Czech Republic, September 7-9, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-9363-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Didem Demirag, Jeremy Clark |
Opening Sentences in Academic Writing: How Security Researchers Defeat the Blinking Cursor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE (1) ![In: SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, Providence, RI, USA, March 3-5, 2022, Volume 1, pp. 175-181, 2022, ACM, 978-1-4503-9070-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Jack Mumford, Isabel Sassoon, Elizabeth Black, Simon Parsons |
On the Complexity of Determining Defeat Relations Consistent with Abstract Argumentation Semantics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMMA ![In: Computational Models of Argument - Proceedings of COMMA 2022, Cardiff, Wales, UK, 14-16 September 2022, pp. 260-271, 2022, IOS Press, 978-1-64368-306-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Zhendong Zhao, Xiaojun Chen 0004, Yuexin Xuan, Ye Dong, Dakui Wang, Kaitai Liang |
DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2022, New Orleans, LA, USA, June 18-24, 2022, pp. 15192-15201, 2022, IEEE, 978-1-6654-6946-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Mashari Alatawi, Nitesh Saxena |
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 100-123, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Lydia Blümel, Markus Ulbricht 0001 |
Defining Defense and Defeat in Abstract Argumentation From Scratch - A Generalizing Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KR ![In: Proceedings of the 19th International Conference on Principles of Knowledge Representation and Reasoning, KR 2022, Haifa, Israel, July 31 - August 5, 2022., 2022, 978-1-956792-01-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
22 | Wei-Loon Mow, Shih-Kun Huang, Hsu-Chun Hsiao |
LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: IEEE Conference on Dependable and Secure Computing, DSC 2022, Edinburgh, UK, June 22-24, 2022, pp. 1-8, 2022, IEEE, 978-1-6654-2141-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Matthew Moore, Kristen R. Walcott |
Generating Human-Like Motion to Defeat Interaction-Based CAPTCHAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTC (2) ![In: Proceedings of the Future Technologies Conference, FTC 2022, Virtual Event, 20-21 October 2022, Volume 2, pp. 202-217, 2022, Springer, 978-3-031-18457-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Wenjie Yang, Sitong Wang, Zhenhui Peng, Chuhan Shi, Xiaojuan Ma, Diyi Yang |
Know It to Defeat It: Exploring Health Rumor Characteristics and Debunking Efforts on Chinese Social Media during COVID-19 Crisis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWSM ![In: Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, ICWSM 2022, Atlanta, Georgia, USA, June 6-9, 2022, pp. 1157-1168, 2022, AAAI Press, 978-1-57735-875-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
22 | Nguyen Van Huynh, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz |
DeepFake: Deep Dueling-Based Deception Strategy to Defeat Reactive Jammers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 20(10), pp. 6898-6914, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Guangzhao Cheng, Siliang Tang |
To be a fast adaptive learner: using game history to defeat opponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2105.08110, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
22 | Wenjie Yang, Sitong Wang, Zhenhui Peng, Chuhan Shi, Xiaojuan Ma, Diyi Yang |
Know it to Defeat it: Exploring Health Rumor Characteristics and Debunking Efforts on Chinese Social Media during COVID-19 Crisis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2109.12372, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
22 | Samuel Selassie Yakohene, Winfred Yaokumah, Ernest Barfo Boadi Gyebi |
Scrambling Keypad for Secure Pin Entry to Defeat Shoulder Surfing and Inference Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Priv. Pervasive Comput. ![In: Int. J. Secur. Priv. Pervasive Comput. 13(3), pp. 12-33, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Margaux Dugardin, Werner Schindler, Sylvain Guilley |
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Math. Cryptol. ![In: J. Math. Cryptol. 15(1), pp. 408-433, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Charles V. Lovejoy, Mary L. McDonald, Thomas W. Lucas, Susan M. Sanchez |
Investigating an Active Shooter Defeat System With Simulation And Data Farming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Winter Simulation Conference, WSC 2021, Phoenix, AZ, USA, December 12-15, 2021, pp. 1-12, 2021, IEEE, 978-1-6654-3311-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Yusi Feng, Ziyuan Zhu, Shuan Li, Ben Liu, Huozhu Wang, Dan Meng |
Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021, pp. 1132-1140, 2021, IEEE, 978-1-6654-1658-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | James C. Davis 0001, Francisco Servant, Dongyoon Lee |
Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021, pp. 1-17, 2021, IEEE, 978-1-7281-8935-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Pascal Urien |
Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSNet ![In: 5th Cyber Security in Networking Conference, CSNet 2021, Abu Dhabi, United Arab Emirates, October 12-14, 2021, pp. 49-54, 2021, IEEE, 978-1-6654-0722-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Jan Constantin |
Replacement and reasoning: a reliabilist account of epistemic defeat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Synth. ![In: Synth. 197(8), pp. 3437-3457, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Jan Constantin, Thomas Grundmann |
Epistemic authority: preemption through source sensitive defeat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Synth. ![In: Synth. 197(9), pp. 4109-4130, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Ru Ye |
Higher-order defeat and intellectual responsibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Synth. ![In: Synth. 197(12), pp. 5435-5455, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Muneer Alwazzeh, Sameer Karaman, Mohammad Nur Shamma |
Man in The Middle Attacks Against SSL/TLS: Mitigation and Defeat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cyber Secur. Mobil. ![In: J. Cyber Secur. Mobil. 9(3), pp. 449-468, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Zhi Li 0048, Hai Jin 0001, Deqing Zou, Bin Yuan |
Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 31(3), pp. 695-706, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Jaime Spencer, Richard Bowden, Simon Hadfield |
DeFeat-Net: General Monocular Depth via Simultaneous Unsupervised Representation Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2003.13446, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Nguyen Van Huynh, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz |
DeepFake: Deep Dueling-based Deception Strategy to Defeat Reactive Jammers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2005.07034, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Wesley H. Holliday, Eric Pacuit |
Axioms for Defeat in Democratic Elections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2008.08451, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Cong Wu 0003, Kun He 0008, Jing Chen 0003, Ziming Zhao 0001, Ruiying Du |
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, pp. 2219-2236, 2020, USENIX Association, 978-1-939133-17-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Yongge Wang, Jingwen Sun, Xin Wang, Yunchuan Wei, Hao Wu 0023, Zhou Yu, Gillian Chu |
Sperax: An Approach To Defeat Long Range Attacks In Blockchains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM Workshops ![In: 39th IEEE Conference on Computer Communications, INFOCOM Workshops 2020, Toronto, ON, Canada, July 6-9, 2020, pp. 574-579, 2020, IEEE, 978-1-7281-8695-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Jaime Spencer, Richard Bowden, Simon Hadfield |
DeFeat-Net: General Monocular Depth via Simultaneous Unsupervised Representation Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2020, Seattle, WA, USA, June 13-19, 2020, pp. 14390-14401, 2020, Computer Vision Foundation / IEEE, 978-1-7281-7168-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | B. N. Yuvaraju, M. Narender |
To Defeat DDoS Attacks in Cloud Computing Environment Using Software Defined Networking (SDN). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSOC (1) ![In: Intelligent Algorithms in Software Engineering - Proceedings of the 9th Computer Science On-line Conference 2020, Volume 1, pp. 73-93, 2020, Springer, 978-3-030-51964-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Lixin Fan, Kam Woh Ng, Chee Seng Chan |
Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1909.07830, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
22 | Le Guan, Chen Cao, Peng Liu 0005, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu 0001, Trent Jaeger |
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 16(3), pp. 438-453, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Mohamed Zeyad, Houssem Maghrebi, Davide Alessio, Boris Batteux |
Another Look on Bucketing Attack to Defeat White-Box Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COSADE ![In: Constructive Side-Channel Analysis and Secure Design - 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings, pp. 99-117, 2019, Springer, 978-3-030-16349-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Md. Sabir Hossain, Mohammad Robaitul Islam Bhuiyan, Md. Shariful Islam, Md. Faridul Islam, Md. Al-Hasan |
Facilitating Hard-to-Defeat Car AI Using Flood-Fill Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCCI ![In: Proceedings of International Joint Conference on Computational Intelligence, IJCCI 2019, Dhaka, Bangladesh, October 25-26, 2019., pp. 541-553, 2019, Springer, 978-981-15-3606-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Lixin Fan, Kam Woh Ng, Chee Seng Chan |
Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NeurIPS ![In: Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada., pp. 4716-4725, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
22 | Mengjia Yan 0001, Jen-Yang Wen, Christopher W. Fletcher, Josep Torrellas |
SecDir: a secure directory to defeat directory side-channel attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: Proceedings of the 46th International Symposium on Computer Architecture, ISCA 2019, Phoenix, AZ, USA, June 22-26, 2019, pp. 332-345, 2019, ACM, 978-1-4503-6669-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Arvind Rajagopalan, Duong Duc Nguyen, Jijoong Kim |
Predictive Regret-Matching for Cooperating Interceptors to Defeat an Advanced Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australasian Conference on Artificial Intelligence ![In: AI 2019: Advances in Artificial Intelligence - 32nd Australasian Joint Conference, Adelaide, SA, Australia, December 2-5, 2019, Proceedings, pp. 28-40, 2019, Springer, 978-3-030-35287-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | J. Adam Carter |
Meta-epistemic defeat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Synth. ![In: Synth. 195(7), pp. 2877-2896, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Matthias Steup |
Destructive defeat and justificational force: the dialectic of dogmatism, conservatism, and meta-evidentialism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Synth. ![In: Synth. 195(7), pp. 2907-2933, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Duncan Pritchard |
Anti-luck virtue epistemology and epistemic defeat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Synth. ![In: Synth. 195(7), pp. 3065-3077, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Valentina Cardo |
Technology, popular culture and everyday life: The electoral defeat of New Zealand Internet MANA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Polity ![In: Inf. Polity 23(1), pp. 67-80, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Peter A. Chew |
Searching for Unknown Unknowns: Unsupervised Bot Detection to Defeat an Adaptive Adversary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBP-BRiMS ![In: Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Washington, DC, USA, July 10-13, 2018, Proceedings, pp. 357-366, 2018, Springer, 978-3-319-93371-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Chen Cao, Le Guan, Peng Liu 0005, Neng Gao, Jingqiang Lin, Ji Xiang |
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1706.05779, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
22 | Damien Jauvart, Jacques J. A. Fournier, Louis Goubin |
First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017., pp. 104-115, 2017, SciTePress, 978-989-758-259-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Kevin Bock 0001, Daven Patel, George Hughey, Dave Levin |
unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOOT ![In: 11th USENIX Workshop on Offensive Technologies, WOOT 2017, Vancouver, BC, Canada, August 14-15, 2017., 2017, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
22 | Ye Wang 0006, Yuanjiang Huang, Wu Zheng, Zhi Zhou 0006, Debin Liu, Mi Lu |
Combining convolutional neural network and self-adaptive algorithm to defeat synthetic multi-digit text-based CAPTCHA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: IEEE International Conference on Industrial Technology, ICIT 2017, Toronto, ON, Canada, March 22-25, 2017, pp. 980-985, 2017, IEEE, 978-1-5090-5320-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Moritz Contag, Vector Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage |
How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017, pp. 231-250, 2017, IEEE Computer Society, 978-1-5090-5533-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Max Wolotsky, Mohammad Husain, Elisha Choe |
Chill-Pass: Using Neuro-Physiological Responses to Chill Music to Defeat Coercion Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1605.01072, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | |
Future cyberdefenses will defeat cyberattacks on PCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 59(8), pp. 8-9, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul |
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 597, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Ye Wang 0006, Mi Lu |
A self-adaptive algorithm to defeat text-based CAPTCHA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: IEEE International Conference on Industrial Technology, ICIT 2016, Taipei, Taiwan, March 14-17, 2016, pp. 720-725, 2016, IEEE, 978-1-4673-8075-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul |
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, pp. 3-22, 2016, Springer, 978-3-662-53139-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Luke Jones, Andrew J. Sellers, Martin C. Carlisle |
CARDINAL: similarity analysis to defeat malware compiler variations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 39-46, 2016, IEEE Computer Society, 978-1-5090-4542-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Michael L. Mirer, Leticia Bode |
Tweeting in defeat: How candidates concede and claim victory in 140 characters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Media Soc. ![In: New Media Soc. 17(3), pp. 453-469, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Fu-Hau Hsu, Li-Han Chen, Chia-Jun Lin |
Defeat scanning worms in cyber warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(5), pp. 715-726, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Philip Hodgers, Neil Hanley, Máire O'Neill |
Pre-processing power traces to defeat random clocking countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: 2015 IEEE International Symposium on Circuits and Systems, ISCAS 2015, Lisbon, Portugal, May 24-27, 2015, pp. 85-88, 2015, IEEE, 978-1-4799-8391-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Luke Jones, Ryan Whelan, Jeremy Blackthorne, Graham Baker |
Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPREW@ACSAC ![In: Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW@ACSAC, Los Angeles, CA, USA, December 8, 2015, pp. 6:1-6:11, 2015, ACM, 978-1-4503-3642-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Pedro Henriques Abreu, Daniel Castro Silva, João Portela, João Mendes-Moreira 0001, Luís Paulo Reis |
Using model-based collaborative filtering techniques to recommend the expected best strategy to defeat a simulated soccer opponent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intell. Data Anal. ![In: Intell. Data Anal. 18(5), pp. 973-991, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Elena Maceviciute |
Review of: Moon, David, Ruffini, Patrick and Segal, David (eds.) Hacking politics: how geeks, progressives, the Tea Party, gamers, anarchists and suits teamed up to defeat SOPA and save the internet. New York/London: OR Books, 2013. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Res. ![In: Inf. Res. 18(3), 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
22 | J. Matias Kivikangas, Niklas Ravaja |
Emotional Responses to Victory and Defeat as a Function of Opponent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Affect. Comput. ![In: IEEE Trans. Affect. Comput. 4(2), pp. 173-182, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Ruoting Yang, Bernie J. Daigle Jr., Seid Y. Muhie, Rasha Hammamieh, Marti Jett, Linda R. Petzold, Francis J. Doyle III |
Core modular blood and brain biomarkers in social defeat mouse model for post traumatic stress disorder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMC Syst. Biol. ![In: BMC Syst. Biol. 7, pp. 80, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Christopher A. Ballinger, Sushil J. Louis |
Finding robust strategies to defeat specific opponents using case-injected coevolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIG ![In: 2013 IEEE Conference on Computational Inteligence in Games (CIG), Niagara Falls, ON, Canada, August 11-13, 2013, pp. 1-8, 2013, IEEE, 978-1-4673-5308-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Seung-Hyun Kim, Daeseon Choi, Seung-Hun Jin, Sung-Hoon Lee |
Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: DIM'13, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Berlin, Germany, November 8, 2013, pp. 51-62, 2013, ACM, 978-1-4503-2493-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Wentao Chang, Songqing Chen |
Defeat Information Leakage from Browser Extensions via Data Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings, pp. 33-48, 2013, Springer, 978-3-319-02725-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Robert Daland, Kie Zuraw |
Does Korean defeat phonotactic word segmentation? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACL (2) ![In: Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, ACL 2013, 4-9 August 2013, Sofia, Bulgaria, Volume 2: Short Papers, pp. 873-877, 2013, The Association for Computer Linguistics, 978-1-937284-51-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
22 | Matthew Van Gundy, Hao Chen 0003 |
Noncespaces: Using randomization to defeat cross-site scripting attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 31(4), pp. 612-628, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|