The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "EISA"( http://dblp.L3S.de/Venues/EISA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/eisa

Publication years (Num. hits)
2021 (11) 2022 (15) 2023 (11) 2024 (1)
Publication types (Num. hits)
inproceedings(35) proceedings(3)
Venues (Conferences, Journals, ...)
EISA(38)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 38 publication records. Showing 38 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jun Shao 0001, Sokratis K. Katsikas, Weizhi Meng 0001 (eds.) Emerging Information Security and Applications - 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings Search on Bibsonomy EISA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Izabela Savic, Haonan Yan, Xiaodong Lin 0001, Daniel Gillis Adversarial Example Attacks and Defenses in DNS Data Exfiltration. Search on Bibsonomy EISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Weixun Li, Guanghui Sun, Yajun Wang, Long Yuan, Minghui Gao, Yan Dong, Chen Wang Deep Neural Network Model over Encrypted Data. Search on Bibsonomy EISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Chuan Zhang 0003, Haotian Liang, Zhuopeng Li, Tong Wu 0011, Licheng Wang, Liehuang Zhu PtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples. Search on Bibsonomy EISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yinxing Wei, Jun Zheng, Hong Zhong A Systematic Method for Constructing ICT Supply Chain Security Requirements. Search on Bibsonomy EISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Liang Li, Gengran Hu Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and Its Applications to Pairing-Based Cryptography. Search on Bibsonomy EISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jun Feng, Hongkai Wang, Liangying Peng, Yidan Wang, Haomin Song, Hongju Guo Chinese Named Entity Recognition Within the Electric Power Domain. Search on Bibsonomy EISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Huifeng Li, Pengzhou Jia, Weixun Li, Bin Ma, Bo Li, Dexin Wu, Haoran Li Towards Efficient Universal Adversarial Attack on Audio Classification Models: A Two-Step Method. Search on Bibsonomy EISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jun Tu, Gang Shen Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare System. Search on Bibsonomy EISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Simone Soderi, Rocco De Nicola CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN. Search on Bibsonomy EISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Kangkang Sun, Xiaojin Zhang 0008, Xi Lin 0003, Gaolei Li, Jing Wang, Jianhua Li Toward the Tradeoffs Between Privacy, Fairness and Utility in Federated Learning. Search on Bibsonomy EISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Hongkai Wang, Jun Feng, Yidan Wang, Sichen Pan, Shuai Zhao, Yi Xue Enhancing Chinese Named Entity Recognition with Disentangled Expert Knowledge. Search on Bibsonomy EISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yen Yee Chan, Cher-Yin Khor, Je Sen Teh, Weijian Teng, Norziana Jamil Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB. Search on Bibsonomy EISA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jiaxin Deng, Simin Chen, Jiageng Chen, Weizhi Meng 0001 A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography. Search on Bibsonomy EISA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Guoheng Wei, Yanlin Qin, Wei Fu Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET. Search on Bibsonomy EISA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yang Liu, Qi Feng, Cong Peng 0005, Min Luo 0002, Debiao He Asymmetric Secure Multi-party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. Search on Bibsonomy EISA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Pei Li, Liliu Tan, Shixiong Yao, Jiageng Chen Parallel Validity Analysis of the Boomerang Attack Model. Search on Bibsonomy EISA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Fei Chen, Zhengzheng Yan, Liang Gu Towards Low-Latency Big Data Infrastructure at Sangfor. Search on Bibsonomy EISA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yunfeng Cui, Wenbin Zhai, Liang Liu 0006, Youwei Ding, Wanying Lu Link Aware Aggregation Query with Privacy-Preserving Capability in Wireless Sensor Networks. Search on Bibsonomy EISA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Thi Quynh Nguyen, Romain Laborde, Abdelmalek Benzekri, Arnaud Oglaza, Mehdi Mounsif AutoRoC-DBSCAN: Automatic Tuning of DBSCAN to Detect Malicious DNS Tunnels. Search on Bibsonomy EISA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ye Li, Jiale Zhang, Junwu Zhu, Wenjuan Li 0001 HBMD-FL: Heterogeneous Federated Learning Algorithm Based on Blockchain and Model Distillation. Search on Bibsonomy EISA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Weizhi Meng 0001, Sokratis K. Katsikas (eds.) Emerging Information Security and Applications - Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers Search on Bibsonomy EISA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis Without q-type Assumption. Search on Bibsonomy EISA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yi Xiong, Shixiong Yao, Pei Li D2CDIM: DID-Based Decentralized Cross-Domain Identity Management with Privacy-Preservation and Sybil-Resistance. Search on Bibsonomy EISA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jiageng Chen, Debiao He, Rongxing Lu (eds.) Emerging Information Security and Applications - Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings Search on Bibsonomy EISA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Zhe Xia, Shiyun Liu, Yichen Huang, Hua Shen, Mingwu Zhang A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks. Search on Bibsonomy EISA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Dayin Zhang, Xiaojun Chen 0004, Jinqiao Shi An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy. Search on Bibsonomy EISA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Renjun Ye, Liang Liu, Simin Hu, Fangzhou Zhu, Jingxiu Yang, Feng Wang JSLIM: Reducing the Known Vulnerabilities of JavaScript Application by Debloating. Search on Bibsonomy EISA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jixin Zhang, Jiageng Chen Practical and Provable Secure Vehicular Component Protection Scheme. Search on Bibsonomy EISA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yueyue He, Jiageng Chen AMLChain: Supporting Anti-money Laundering, Privacy-Preserving, Auditable Distributed Ledger. Search on Bibsonomy EISA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Boyun Zhang, Puneet Gill, Nelu Mihai, Mahesh Tripunitara Granularity and Usability in Authorization Policies. Search on Bibsonomy EISA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sunny Shrestha, Esa Irby, Raghav Thapa, Sanchari Das SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures. Search on Bibsonomy EISA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Brian Greaves, Marijke Coetzee, Wai Sze Leung Digital Twin Monitoring for Cyber-Physical Access Control. Search on Bibsonomy EISA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Muhammad Imran Khan 0001, Simon N. Foley, Barry O'Sullivan Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches. Search on Bibsonomy EISA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Martin Grimmer 0002, Tim Kaelble, Erhard Rahm Improving Host-Based Intrusion Detection Using Thread Information. Search on Bibsonomy EISA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sanonda Datta Gupta, Stephen Kaplan, Aubree Nygaard, Sepideh Ghanavati A Two-Fold Study to Investigate Users' Perception of IoT Information Sensitivity Levels and Their Willingness to Share the Information. Search on Bibsonomy EISA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ting Lyu, Liang Liu 0006, Fangzhou Zhu, Jingxiu Yang, Simin Hu, Yanxi Huang NEEX: An Automated and Efficient Tool for Detecting Browser Extension Fingerprint. Search on Bibsonomy EISA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Pujie Jing, Shixiong Yao, Yueyue He APHC: Auditable and Privacy Preserving Health QR Code Based on Blockchain. Search on Bibsonomy EISA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #38 of 38 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license