|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 1380 publication records. Showing 1380 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Yanfang Dong, Wenqiang Cai, Wenliang Zhu, Lirong Wang |
An End-to-End Multi-label classification model for Arrhythmia based on varied-length ECG signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1149-1154, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Chao Huang 0012, Yanqing Yao, Xiaojun Zhang, Da Teng, Yingdong Wang, Lei Zhou |
Robust Secure Aggregation with Lightweight Verification for Federated Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 582-589, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Shangyu Tang, Mingde Huo, Yi Du, Yuwen Huo, Yan Zhang, Lexi Xu, Ying Ji, Guoyu Zhou |
Research and Application of 5G Edge AI in Medical Industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1462-1466, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Emilia Cioroaica, Barbora Buhnova, Daniel Schneider 0001, Ioannis Sorokos, Thomas Kuhn 0001, Emrah Tomur |
Towards the Concept of Trust Assurance Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1581-1586, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jinzhou Li, Shouye Lv, Liu Yang, Sheng Wu 0001, Yang Liu, Qijun Luan |
Performance Analysis for Bearings-only Geolocation Based on Constellation of Satellites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1429-1434, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Bin Ge, Ting Wang, Chenxing Xia, Gaole Dai |
Image Encryption Algorithm based on Convolutional Neural Network and Four Square Matrix Encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1368-1375, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jie Fu, Zhili Chen, Xiao Han |
Adap DP-FL: Differentially Private Federated Learning with Adaptive Noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 656-663, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Hervais Simo, Michael Kreutzer |
Towards Automated Detection and Prevention of Regrettable (Self-) Disclosures on Social Media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 638-645, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ou Ruan, Shanshan Qin |
Secure and efficient publicly verifiable ridge regression outsourcing scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 703-709, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jie Gao, Lixia Liu, Tao Zhang, Shenghao Jia, Chuntao Song, Lexi Xu, Yang Wu, Bei Li, Yunyun Wang, Xinjie Hou |
Research on User Complaint Problem Location and Complaint Early Warning Stragegy Based on Big Data Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1504-1509, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Minfeng Qi, Zhiyu Xu, Tengyun Jiao, Sheng Wen, Yang Xiang 0001, Gary Nan |
A Comparative Study on the Security of Cryptocurrency Wallets in Android System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 399-406, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jiming Qi, Jiazheng Zhang, Qingxia Liu, Bang Wang |
A Flow Attack Strategy based on Critical Links for Cyber-attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 913-920, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Chunlan Fu, Shirong Han, Gang Shen |
Detecting Unknown Network Attacks with Attention Encoding and Deep Metric Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 283-290, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Zixiang Di, Tian Xiao, Yi Li, Xinzhou Cheng, Bei Li, Lexi Xu, Xiaomeng Zhu, Lu Zhi, Rui Xia |
Research on Voice Quality Evaluation Method Based on Artificial Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1510-1515, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Hussein Zangoti, Alex Pissinou Makki, Niki Pissinou, Abdur R. Shahid, Omar J. Guerra, Joel Rodriguez |
A Multidimensional Blockchain Framework For Mobile Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 935-944, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Luyao Chen, Na Yan, Boyang Zhang, Zhaoyang Wang, Yu Wen, Yanfei Hu |
A General Backdoor Attack to Graph Neural Networks Based on Explanation Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 759-768, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Rui Gong, Lei Wang 0011, Wei Shi, Wei Liu, Jianfeng Zhang |
A Hardware Security Isolation Architecture for Intelligent Accelerator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 984-991, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Anna-Katharina Wickert, Lars Baumgärtner, Michael Schlichtig, Krishna Narasimhan, Mira Mezini |
To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 315-322, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Xuyang Jing, Xiaojun Cheng, Zheng Yan 0002, Xian Li |
Deceiving Learning-based Sketches to Cause Inaccurate Frequency Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 209-216, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Shirin Kalantari, Danny Hughes 0001, Bart De Decker |
Listing the ingredients for IFTTT recipes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1376-1383, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Xinhe Pu, Xiaofang Yuan, Liangsen Li, Weiming Ji |
Design and Development of Operation Status Monitoring System for Large Glass Substrate Handling Robot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1278-1285, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yun He, Xiaoqi Jia, Shengzhi Zhang, Lou Chitkushev |
EnShare: Sharing Files Securely and Efficiently in the Cloud using Enclave. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 225-232, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Lijian Liu, Jinguo Li |
A Blockchain-assisted Collaborative Ensemble Learning for Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1042-1047, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Pengfei Liu, Weiping Wang 0003, Hong Song, Shigeng Zhang, Yulu Hong |
HashDroid:Extraction of malicious features of Android applications based on function call graph pruning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 66-73, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Md. Jobair Hossain Faruk, Bilash Saha, Mazharul Islam, Fazlul Alam, Hossain Shahriar, Maria Valero, Akond Rahman, Fan Wu 0013, Md. Zakirul Alam Bhuiyan |
Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 959-967, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yong Li, Zhenghao Zhang, Xi Chen, Ruxian Li, Liang Zhang |
Redactable Blockchain with K-Time Controllable Editing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1455-1461, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Feibi Lyu, Xinzhou Cheng, Lexi Xu, Liang Liu, Jinjian Qiao, Lu Zhi, Zixiang Di, Tian Xiao, Chen Cheng |
Coverage Estimation of Wireless Network Using Attention U-Net. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1255-1260, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Luo, Youqi Li, Lixing Chen, Zichuan Xu, Pan Zhou |
Action-Manipulation Attack and Defense to X-Armed Bandits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1115-1122, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Wenxiu Ding, Wei Sun, Zheng Yan 0002, Robert H. Deng, Zhiguo Wan |
An Efficient and Secure Scheme of Verifiable Computation for Intel SGX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 473-482, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Qian Chen 0032, Hongbo Wang, Zilong Wang 0001, Jiawei Chen 0010, Haonan Yan, Xiaodong Lin 0001 |
LLDP: A Layer-wise Local Differential Privacy in Federated Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 631-637, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yongwei Meng, Tao Qin 0002, Haonian Wang, Zhouguo Chen |
TPIPD: A Robust Model for Online VPN Traffic Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 105-110, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yixuan Shen, Yu Cheng, Yini Lin, Sicheng Long, Canjian Jiang, Danjie Li, Siyuan Dai, You Jiang, Junbin Fang, Zoe Lin Jiang, Siu-Ming Yiu |
MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1020-1027, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Wei Sun, Zheng Yan 0002, Xi Xu, Wenxiu Ding, Lijun Gao |
Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 800-809, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Juan Wang 0006, Chenjun Ma, Ziang Li, Huanyu Yuan, Jie Wang 0006 |
ProcGuard: Process Injection Behaviours Detection Using Fine-grained Analysis of API Call Chain with Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 778-785, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Qingqing Zhang, Tao Zhang, Shikun Jiang, Qiang Zhang, Yuhui Han, Xinzhou Cheng, Yunyun Wang, Xin He, Tian Xiao |
Big Data based Potential Fixed-Mobile Convergence User Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1193-1198, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yiping Teng, Dongyue Jiang, Mengmeng Sun, Liang Zhao 0004, Li Xu, Chunlong Fan |
Privacy-Preserving Top-k Spatio-Textual Similarity Join. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 718-726, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Xin Tang, Xiong Chen, Ran Zhou, Linchi Sui, Tian'e Zhou |
Marking based Obfuscation Strategy to resist Side Channel Attack in Cross-User Deduplication for Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 547-555, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Akito Yamamoto, Tetsuo Shibuya |
Efficient and Highly Accurate Differentially Private Statistical Genomic Analysis using Discrete Fourier Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 525-532, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Lukasz Krzywiecki, Hannes Salin |
Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1528-1533, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Piotr Kawa, Marcin Plata, Piotr Syga |
SpecRNet: Towards Faster and More Accessible Audio DeepFake Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 792-799, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Saranda Poddar, Deepraj Chowdhury, Ashutosh Dhar Dwivedi, Raghava Rao Mukkamala |
Data Driven based Malicious URL Detection using Explainable AI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1266-1272, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Hannu Turtiainen, Andrei Costin, Timo Hämäläinen 0002, Tuomo Lahtinen, Lauri Sintonen |
CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1227-1234, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Wu Xin, Qingni Shen, Ke Feng, Yutang Xia, Zhonghai Wu, Zhenghao Lin |
Personalized User Profiles-based Insider Threat Detection for Distributed File System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1441-1446, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Shaolong Guo, Zhou Su, Zhiyi Tian, Shui Yu 0001 |
Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 680-686, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Taining Cheng, Wei Zhou 0011, Shaowen Yao 0001, Libo Feng, Jing He 0012 |
Multi-pipeline HotStuff: A High Performance Consensus for Permissioned Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1008-1019, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Dejia Lin, Yongdong Wu, Wensheng Gan |
Sybil-resistant Truth Discovery in Crowdsourcing by Exploiting the Long-tail Effect. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1545-1550, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Xiaomeng Zhu, Yi Li, Yuting Zheng, Rui Xia, Lexi Xu, Bei Li, Zixiang Di, Lu Zhi, Xinzhou Cheng |
Research on 5G Network Capacity and Expansion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1473-1478, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Hannu Turtiainen, Andrei Costin, Timo Hämäläinen 0002, Tuomo Lahtinen, Lauri Sintonen |
CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1219-1226, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Chunlei Yang, Yunchuan Guo, Mingjie Yu, Lingcui Zhang |
Truthfully Negotiating Usage Policy for Data Sovereignty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 20-27, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Guozhong Wang, Chunling Peng, Yi Huang |
The Power Allocation for SWIPT-based Cognitive Two-Way Relay Networks with Rate Fairness Consideration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 60-65, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoying Li, Guangxiang Zhang, Yuzhou Wu, Yang Yang, Yuelei Wang, Zhen Liu |
Create Persona of Elderly Users by Clustering Analysis of Needs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1261-1265, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyu Du, Guanying Zhou, Yujing Wang, Song Tao |
A Lightweight Honeynet Design In the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 83-88, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Meng Li 0006, Jianbo Gao, Zijian Zhang 0001, Chaoping Fu, Chhagan Lal, Mauro Conti |
Graph Encryption for Shortest Path Queries with k Unsorted Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 89-96, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jinke Xu, Junwei Zhang, Yujie Chen, Gang Ma 0004, Zhanpeng Zhu, Lirong Wang |
Arteriovenous fistula stenosis classification method based on Auxiliary Wave and Transformer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1168-1172, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Xiaofeng Chen, Ying Gao 0006 |
CDEdit: Redactable Blockchain with Cross-audit and Diversity Editing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 945-952, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jie Liu, Xingsheng Qin, Frank Jiang 0001 |
A quantum inspired differential evolution algorithm with multiple mutation strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 927-934, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Giampaolo Bovenzi, Valerio Persico, Antonio Pescapè, Anna Piscitelli, Vincenzo Spadari |
Hierarchical Classification of Android Malware Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1354-1359, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yixuan Qiao, Minghui Zheng, Jingyi Yang |
Implementation of one-time editable blockchain chameleon hash function construction scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 851-856, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Haofeng Liu, Yuefeng Liu, Yue Wang, Bo Liu, Xiang Bao |
EEG classification algorithm of motor imagery based on CNN-Transformer fusion network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1302-1309, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ruixuan Liu, Muyang Lyu, Jiangrong Yang |
A hybrid BCI system combining motor imagery and conceptual imagery in a smart home environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1066-1071, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Joseph Gear, Yue Xu 0001, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson |
SCEVD: Semantic-enhanced Code Embedding for Vulnerability Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1522-1527, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Peilun Wu, Hui Guo |
Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1360-1367, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Baochen Yan, Rui Zhang, Zheng Yan 0002 |
VoiceSketch: a Privacy-Preserving Voiceprint Authentication System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 623-630, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Heng Li 0005, Zhijun Liu, Yongting Liu, Hui Peng, Rui Zhang 0041, Jun Peng 0001, Zhiwu Huang |
Battery Aging-Robust Driving Range Prediction of Electric Bus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1179-1186, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Chao Xia, Yaqi Liu, Qingxiao Guan, Sai Ma, Yu Nan, Jiahui Fu |
Steganalysis for Small-Scale Training Image Pairs with Cover-Stego Feature Difference Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 233-238, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jian Wang, Weiqiong Cao, Hua Chen 0011, Haoyuan Li |
Practical Side-Channel Attack on Message Encoding in Masked Kyber. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 882-889, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ligeng Chen, Zhongling He, Hao Wu, Yuhang Gong, Bing Mao |
AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 217-224, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yanghui Zhang, Kai Gao, Shuo Huang, Xunhao Li, Ronghua Du |
Forgery Trajectory Injection Attack Detection for Traffic Lights under Connected Vehicle Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1333-1339, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yuting Xu, Mang Su, Jinpeng Hou, Chong Nie |
Federated Learning Scheme with Dual Security of Identity Authentication and Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 695-702, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Chennan Lin, Baisong Liu, Xueyuan Zhang, Zhiye Wang, Ce Hu, Linze Luo |
Privacy-Preserving Recommendation with Debiased Obfuscaiton. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 590-597, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Shuai Zhang, Xingfu Wang, Ammar Hawbani, Liang Zhao 0004, Saeed Hamood Alsamhi |
Multimodal Graph Reasoning and Fusion for Video Question Answering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1410-1415, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhang, Dong Mao, Zuge Chen, Yubo Song, Liquan Chen, Zhongyuan Qin |
Smart Grid Data Aggregation Scheme Based on Local Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1534-1539, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yu'Ang Zhang, Yujie Song, Yu Wang, Yue Cao 0002, Xuefeng Ren, Fei Yan |
TECS: A Trust Model for VANETs Using Eigenvector Centrality and Social Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 36-43, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Arsalan, Davide Di Matteo, Sana Imtiaz, Zainab Abbas, Vladimir Vlassov, Vadim Issakov |
Energy-Efficient Privacy-Preserving Time-Series Forecasting on User Health Data Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 541-546, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Cairui She, Liwei Chen, Gang Shi |
TFCFI:Transparent Forward Fine-grained Control-Flow Integrity Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 407-414, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jiawen Diao, Binxing Fang, Xiang Cui, Zhongru Wang, Tian Wang, Shouyou Song |
From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 159-166, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Mengfan Wang, Guifang Huang, Hongmin Gao, Lei Hu |
Improved Zero-Knowledge Proofs for Commitments from Learning Parity with Noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 415-421, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Lei Cheng, Shuaijun Liu, Lixaing Liu, Hailong Hu, Jingyi Chen, Xiandong Meng, Pengcheng Ding |
Study on Gateway Station Deployment for Large Scale LEO Satellite Constellation Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1540-1544, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Li Song, Qiongxiao Wang, Shijie Jia 0001, Jingqiang Lin, Linli Lu, Yanduo Fu |
You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 266-273, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Xinqing Du, Xin Hu 0006, Yin Wang, Weidong Wang |
Dynamic Resource Allocation for Beam Hopping Satellites Communication System: An Exploration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1296-1301, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Qing Gu, Xiangling Ding, Dengyong Zhang, Ce Yang |
Forgery Detection Scheme of Deep Video Frame-rate Up-conversion Based on Dual-stream Multi-scale Spatial-temporal Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 733-738, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Mordechai Guri |
Near Field Air-Gap Covert Channel Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 490-497, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Chaochao Zhang, Rui Hou 0001 |
Security Support on Memory Controller for Heap Memory Safety. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 248-257, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Xin Sun, Wen Wang, Xujian Liu, Jiarong Fan, Zeru Li, Yubo Song, Zhongyuan Qin |
VecSeeds: Generate fuzzing testcases from latent vectors based on VAE-GAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 953-958, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Zhiwei Zhang, Xunzhang Gao, Shuowei Liu, Yujia Diao |
An Empirical Study Towards SAR Adversarial Examples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1144-1148, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Lin Lin, Bin Zhu, Zelin Wang, Guangquan Wang, Jianzhi Wang, Lexi Xu, Sai Han, Yuwei Jia |
5G-A Capability Exposure Scheme based on Harmonized Communication and Sensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1036-1041, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Kealan Dunnett, Shantanu Pal, Guntur Dharma Putra, Zahra Jadidi, Raja Jurdak |
A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1107-1114, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Deqi Cao, Zhaoyun Ding, Fei Wang, Haoyang Ma |
Pre-training Fine-tuning data Enhancement method based on active learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1447-1454, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Stewart Sentanoe, Christofer Fellicious, Hans P. Reiser, Michael Granitzer |
"The Need for Speed": Extracting Session Keys From the Main Memory Using Brute-force and Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1028-1035, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang |
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 139-146, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Chuanxi Chen, Dengpan Ye, Hao Wang 0134, Long Tang, Yue Xu |
Towards Adversarial Robustness with Multidimensional Perturbations via Contrastive Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 184-191, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Mingyu Yang, Tao Yang, Haiyang Wang, Hao Li, Tianming Li, Biao Hu |
Ferrite microstrip limiter based on the equivalent nonlinear loss simulation model for the narrow microwave pulse environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1330-1332, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Lifeng Guo, Huide Lei, Wei-Chuen Yau |
One-Time Rewritable Blockchain with Traitor Tracing and Bilateral Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 905-912, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yongkang Chen, Ming Zhang 0021, Jin Li, Xiaohui Kuang, Xuhong Zhang 0002, Han Zhang |
Dynamic and Diverse Transformations for Defending Against Adversarial Examples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 976-983, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Qiaowen Jia, Guanxiong Ha, Hanwei Wang, Haoyu Ma, Hang Chen |
An enhanced MinHash encryption scheme for encrypted deduplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 565-573, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yuzhe Li, Bo Li 0063, Weiping Wang 0005, Nan Liu 0011 |
An Efficient Epsilon Selection Method for DP-ERM with Expected Accuracy Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 533-540, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Weiqi Dai, Wenhao Zhao, Xia Xie, Song Wu 0001, Hai Jin 0001 |
Shared Incentive System for Clinical Pathway Experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 506-513, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yujie Chen, Wenliang Zhu, Jinke Xu, Junwei Zhang, Zhanpeng Zhu, Lirong Wang |
A Heart Sound Classification Method Based on Residual Block and Attention Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1060-1065, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Tian Xiao, Bei Li, Zixiang Di, Guanghai Liu, Lexi Xu, Jian Guan, Zhaoning Wang, Chen Cheng, Yi Li |
Research on Intelligent 5G Remote Interference Avoidance and Clustering Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1491-1497, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Junwei Zhang, Rui Bao, Lirong Wang, Jinke Xu, Yujie Chen, Xueqin Chen 0001 |
Denoising method of ECG signal based on Channel Attention Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 1273-1277, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1380 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|