Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Guojun Wang 0001, Haozhe Wang, Geyong Min, Nektarios Georgalas, Weizhi Meng 0001 (eds.) |
Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![Springer, 978-981-97-1273-1 The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Yuheng Zhang, Pin Liu, Guojun Wang 0001, Peiqiang Li, Wanyi Gu, Houji Chen, Xuelei Liu, Jinyao Zhu |
FRAD: Front-Running Attacks Detection on Ethereum Using Ternary Classification Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 63-75, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Chong, Junjie Zhang, Nathaniel Boland, Lingwei Chen |
Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 450-461, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Rafsun Islam, Ahmed Saleh Bataineh, Mohammad Zulkernine |
Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 319-334, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Lars Hupel, Makan Rafiee |
How Does Post-quantum Cryptography Affect Central Bank Digital Currency? ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 45-62, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Faseeh Iftikhar, Muhammad Faizan Khan, Guojun Wang 0001, Fazli Wahid |
Privacy Preserving Elder Fall Detection Using Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 335-347, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Chin-Tser Huang, Laurent Njilla, Matthew Sharp, Tieming Geng |
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 436-449, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Petr Muzikant, Jan Willemson |
Deploying Post-quantum Algorithms in Existing Applications and Embedded Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 147-162, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Michael Mireku Kwakye, Ken Barker 0001 |
Blockchain-Based Privacy-Preservation Platform for Data Storage and Query Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 380-400, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Chun-Fai Chan, Kam-Pui Chow |
Process Mining with Programmable Logic Controller Memory States. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 96-113, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Andrei Vasile Mihalca, Ciprian Pavel Oprisa |
Impact of Library Code in Binary Similarity Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 31-44, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Ali Alshumrani, Nathan L. Clarke, Bogdan Ghita 0003 |
A Unified Knowledge Graph to Permit Interoperability of Heterogenous Digital Evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 420-435, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Georgios P. Spathoulas, Marios Anagnostopoulos, Konstantinos Papageorgiou, Georgios Kavallieratos, Georgios Theodoridis |
Improving DNS Data Exfiltration Detection Through Temporal Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 133-146, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Qingru Li, Yahong Wang, Fangwei Wang, Zhiyuan Tan 0001, Changguang Wang |
A Probability Mapping-Based Privacy Preservation Method for Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 289-303, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Masayoshi Tsutsui, Tatsuya Kaneko, Shinya Takamaeda-Yamazaki |
Poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 191-204, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Andre Büttner, Andreas Thue Pedersen, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono |
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 401-419, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Harry Halpin |
Simulation of Mixmining Reward Parameters for the Nym Mixnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 363-379, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Zhonghao Lu, Lina Xu, Ying Hu, Liping Sun, Yonglong Luo |
Channel Spatio-Temporal Convolutional Network for Trajectory Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 205-218, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Andri Rai, Eul Gyu Im |
Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 219-235, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Vinay Sachidananda, Berwyn Chai, Florian Gondesen, Kwok-Yan Lam, Yang Liu 0003 |
Honey-Gauge: Enabling User-Centric Honeypot Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 114-132, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Amirah Almutairi, BooJoong Kang, Nawfal Al Hashimy |
BiBERT-AV: Enhancing Authorship Verification Through Siamese Networks with Pre-trained BERT and Bi-LSTM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 17-30, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Avishka Shamendra, Binoy Peries, Gayangi Seneviratne, Sunimal Rathnayake |
TruFaaS - Trust Verification Framework for FaaS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 304-318, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Zheqi Feng, Tao Peng 0011, Guojun Wang 0001, Kejian Guan |
Bilateral Personalized Information Fusion in Mobile Crowdsensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 3-16, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Aysan Esmradi, Daniel Wankit Yip, Chun-Fai Chan |
A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 76-95, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Tsz Ho Pun, Yi Jun He, Siu Ming Yiu |
Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 274-288, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Guojun Wang 0001, Kim-Kwang Raymond Choo, Jie Wu 0001, Ernesto Damiani (eds.) |
Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![Springer, 978-981-99-0271-2 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Cong Zha, Zhenan Xu, Ju Xing, Hao Yin |
Loft: An Architecture for Lifetime Management of Privacy Data in Service Cooperation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 255-273, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Yuwei Xu, Tiantian Zhang, Junyu Zeng, Rongrong Wang, Kehui Song, Jingdong Xu |
SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 236-252, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Li Ma 0011, Qidi Lao, Wenyin Yang, Zexian Yang, Dong Yuan, Zhaoxiong Bu |
Research on Authorization Model of Attribute Access Control Based on Knowledge Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 348-359, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Antonin Verdier, Romain Laborde, Mohamed Ali Kandi, Abdelmalek Benzekri |
A SLAHP in the Face of DLL Search Order Hijacking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 177-190, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Tieming Geng, Chin-Tser Huang, Csilla Farkas |
SCORD: Shuffling Column-Oriented Relational Database to Enhance Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 163-176, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Anam Fatima, Muhammad Waseem Iqbal 0001, Muhammad Aqeel, Toqir A. Rana, Shuhong Chen, Muhammad Arif 0009 |
Impact of Reenactment Programs on Young Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 406-422, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed Sabbah, Adel Taweel, Samer Zein |
Android Malware Detection: A Literature Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 263-278, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Saad Khan 0001, Tariq A. A. Alsboui, Richard Hill, Hussain Al-Aqrabi |
Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 534-544, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Li Duan, Yong Li |
High-Speed Anonymous Device Authentication Without Asymmetric Cryptography in the Internet-of-Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 471-484, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Haiyang Huang, Falong Xiao, Xiaofang Zhang, Wanting Yan, Fumin Liu, Yuezhong Wu |
Garbage Recognition Algorithm Based on Self-attention Mechanism and Deep Sorting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 511-522, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Kharma, Adel Taweel |
Threat Modeling in Cloud Computing - A Literature Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 279-291, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yun Duan, Laifu Wang, Dongxin Liu, Boren Deng, Yunfan Tian |
Malware Traffic Classification Based on GAN and BP Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 144-160, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Michael Tsai, Vimal Kumar 0001 |
Listen to the Music: Evaluating the Use of Music in Audio Based Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 22-37, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Akram Louati, Tiago Gasiba |
Source Code Vulnerability Detection Using Deep Learning Algorithms for Industrial Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 161-178, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yanbin Weng, Zuochuang Li, Xiaobin Huang, Xiahu Chen |
Improved DeepLabV3+ based Railway Track Extraction to Enhance Railway Transportation Safety. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 233-247, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina Friedl, Ludwig Englbrecht, Fabian Böhm, Günther Pernul |
Support Tool Selection in Digital Forensics Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 3-21, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Songlv Feng, Cuina Cheng, Liping Mo |
An Improved Cuckoo Search Algorithm and Its Application in Function Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 439-455, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Mst. Shapna Akter, Hossain Shahriar, Zakirul Alam Bhuiya |
Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 83-102, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Hamid, Muhammad Waseem Iqbal 0001, Muhammad Aqeel, Xiangyong Liu, Muhammad Arif |
Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 248-262, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | John Carter, Spiros Mancoridis, Malvin Nkomo, Steven Weber 0001, Kapil R. Dandekar |
System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 103-115, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Irfan Ali, Muhammad Naeem Shehzad, Qaisar Bashir, Haroon Elahi, Muhammad Naeem Awais, Oana Geman, Pin Liu |
A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-Based Applications in Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 497-508, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoqian Ran, Yufeng Zhuang, Hongping Wang, Danni Cao, Yulian Cao, Wenjuan Gu |
Sensor Cloud Data Privacy Protection Model Based on Collaborative Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 423-435, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Mohamad Jamil Al Bouhairi, Mostakim Mullick, Marvin Wolf, Ivan Gudymenko, Sebastian Clauss |
Encryption Proxies in a Confidential Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 366-379, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Guanghui Feng, Wenyin Yang, Tao Peng 0011, Xiaofei Xing, Shuhong Chen, Yuting Li |
An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 337-351, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Bo Zheng, Yong Xie |
A New Signal Packing Algorithm for CAN-FD with Security Consideration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 292-303, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Zhenru Huo, Guoqing Jia, Weidong Fang, Wei Chen 0036, Wuxiong Zhang |
A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 485-496, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Fumin Yu, Feng Gao, Yao Yuan, Xiaofei Xing, Yinglong Dai |
Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 220-232, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Muntaha Alawneh, Imad M. Abbadi |
Approaches for Zero Trust Adoption Based upon Organization Security Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 523-533, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Omar Alshaikh, Simon Parkinson, Saad Khan 0001 |
On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 545-555, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Zijing Zhang, Vimal Kumar 0001, Michael Mayo, Albert Bifet |
Assessing Vulnerability from Its Description. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 129-143, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Shuqi Liu, Yufeng Zhuang, Xinyu Ma, Hongping Wang, Danni Cao |
An Adversarial Sample Defense Method Based on Saliency Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 304-318, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Xiangyong Liu, Pengfei Yin, Pin Liu, Shuhong Chen |
Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 352-365, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Nuno Torres, Ana Chaves, César Toscano, Pedro Pinto 0001 |
Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 193-206, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Guojun Wang 0001, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu 0013, Bruno Crispo (eds.) |
Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![Springer, 978-981-19-0467-7 The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Xiangbin Li, Xiaofei Xing, Guojun Wang 0001, Peiqiang Li, Xiangyong Liu |
Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 179-192, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Henrique Dias, Nirvana Meratnia |
BlockLearning: A Modular Framework for Blockchain-Based Vertical Federated Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 319-333, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Shitao Wang, Wenjun Jiang, Shuhong Chen |
An Aspect-Based Semi-supervised Generative Model for Online Review Spam Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 207-219, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Xin Qi, Hongling Chen, Qin Liu |
Empirical Likelihood for PLSIM with Missing Response Variables and Error-Prone Covariates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 456-470, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yuting Li, Guojun Wang 0001, Tao Peng 0011, Guanghui Feng |
FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 380-391, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Kai Cheng, Liandong Chen, Huifeng Yang, Dan Luo, Shuai Yuan, Zhitao Guan |
Differentially Private Clustering Algorithm for Mixed Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 392-405, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Wenti Yang, Zhaoyang He, Yalei Li, Haiyan Zhang, Zhitao Guan |
A Hybrid Secure Two-Party Protocol for Vertical Federated Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 38-51, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Zhiqiang Wang, Sulong Meng, Ying Chen |
Vulnerability Detection with Representation Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 116-128, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Wanyi Gu, Guojun Wang 0001, Peiqiang Li, Xubin Li, Guangxin Zhai, Xiangbin Li, Mingfei Chen |
Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 52-63, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Tiange Zhao, Ulrike Lechner, Maria Pinto-Albuquerque, Ece Ata, Tiago Gasiba |
CATS: A Serious Game in Industry Towards Stronger Cloud Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers, pp. 64-82, 2022, Springer, 978-981-99-0271-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yuting Tang, Dafang Zhang, Wei Liang 0005, Kuan-Ching Li, Nitin Sukhija |
Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 38-52, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jiangchang Cheng, Fumin Yu, Hongliang Zhang 0004, Yinglong Dai |
Skill Reward for Safe Deep Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 203-213, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Shakil, Muhammad Arif, Shahab Saquib Sohail, Mohammed Talha Alam, Syed Ubaid, Md. Tabrez Nafis, Guojun Wang 0001 |
Towards a Two-Tier Architecture for Privacy-Enabled Recommender Systems (PeRS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 268-278, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jiaying Lin, Yehua Wei, Wenjia Li, Jing Long |
Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 255-267, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Wenjia Li, Juecong Cai, Zi Wang, Sihua Cheng |
A Robust Malware Detection Approach for Android System Based on Ensemble Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 309-321, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Shaila Sharmin, Hafizah Mansor, Andi Fitriah Abdul Kadir, Normaziah Abdul Aziz |
Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 131-144, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Aiswarya S. Nair, Sabu M. Thampi |
PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 66-89, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hossein Keipour, Saptarshi Hazra, Niclas Finne, Thiemo Voigt |
Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 214-228, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Meirong Liu, Hong Zheng, Qin Liu 0001, Xiaofei Xing, Yinglong Dai |
A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 1-12, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Li Ma 0011, Huihong Yang, Yiming Chai, Jiawen Fan, Wenyin Yang |
An Online Automated Anti-anti-virus Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 351-362, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Peng Yang, Shaohong Zhang, Liu Yang 0002 |
Privacy-Preserving Cluster Validity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 159-170, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | John Carter, Spiros Mancoridis |
Evaluation of an Anomaly Detector for Routers Using Parameterizable Malware in an IoT Ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 53-65, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Wahid Sadique Koly, Abu Kaisar Jamil, Mohammad Shahriar Rahman, Hanif Bhuiyan, Md. Zakirul Alam Bhuiyan, Abdullah Al Omar |
Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 116-130, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hongling Chen, Zhiwen Liao, Qin Liu |
Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 363-370, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Qiang Zhang 0017, Guihua Duan, Shukun Liu |
Smart Search over Encrypted Educational Resources in Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 90-101, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Xingshen Wei, Yongjian Cao, Peng Gao, Junxian Xu |
A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 322-335, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Lei Xu, Dingkun Yang |
An Edge-Cloud Collaborative Object Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 371-378, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Shaobo Zhang 0001, Shuo Yang, Gengming Zhu, Entao Luo, Jiyong Zhang, Desheng Xiang |
A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 25-37, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yuzhu Wang, Peiheng Zhang, Haitao Zhan, Mingwu Zhang |
Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 145-158, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Abigail M. Y. Koay, Miao Xie, Ryan K. L. Ko, Charles Sterner, Taejun Choi, Naipeng Dong |
SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 102-115, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Iosif Andrei-Cristian, Tiago Espinha Gasiba, Tiange Zhao, Ulrike Lechner, Maria Pinto-Albuquerque |
A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 171-188, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Sheikh Rabiul Islam |
A Supervised Rare Anomaly Detection Technique via Cooperative Co-evolution-Based Feature Selection Using Benchmark UNSW_NB15 Dataset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 279-291, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yipeng Zou, Tao Peng 0011, Wentao Zhong, Kejian Guan, Guojun Wang 0001 |
Reliable and Controllable Data Sharing Based on Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 229-240, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Tristan Corrick, Vimal Kumar 0001 |
Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 189-202, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Wei Liu, Wenlong Feng, Benguo Yu, Tao Peng |
Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 13-24, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Xuehua Liu, Liping Ding, Tao Zheng, Fang Yu, Zhen Jia, Wang Xiao |
A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 241-254, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Ashley Woodiss-Field, Michael N. Johnstone, Paul S. Haskell-Dowland |
Towards Evaluating the Effectiveness of Botnet Detection Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 292-308, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Xianggang Zhang, Jing Zeng, Guoyu Wang |
A Fine-Tuning Strategy Based on Real Scenes in Gait Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers, pp. 336-350, 2021, Springer, 978-981-19-0467-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|