default search action
3rd SSIC 2018: Shanghai, China
- Third International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2018, Shanghai, China, October 18-19, 2018. IEEE 2018, ISBN 978-1-5386-8187-9
- Peng Zhang, Shaoyin Cheng, Songhao Lou, Fan Jiang:
A Novel Android Malware Detection Approach Using Operand Sequences. 1-5 - Hongyuan Chen, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
SDKSE: A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems. 1-6 - Chih-Wei Shiu, Wien Hong, Jeanne Chen, Tung-Shou Chen, Wan-Yi Ji:
Data Hiding for Color Image by Rubik's Cube. 1-5 - Gaobo Sun, Shuyu Li, Zhanchun Kang:
Research on Civil Airborne Task Scheduling Test Platform Supporting Provable Data Possession. 1-6 - Adja Elloh Yves-Christian, Badis Hammi, Ahmed Serhrouchni, Houda Labiod:
Total Eclipse: How To Completely Isolate a Bitcoin Peer. 1-7 - Boren He, Futai Zou, Yue Wu:
Multi-SDN Based Cooperation Scheme for DDoS Attack Defense. 1-7 - Mengyi Chen, Li Pan:
Least Cost Precision Marketing Based on User Profiles in Social Networks. 1-8 - Qingyuan Li, Hao Wu, Lei Liu, Bin Pan, Lan Dong:
A Group based Dynamic Mix Zone Scheme for Location Privacy Preservation in VANETs. 1-5 - Xiaoliang Wang, Junhua Tang, Mengdi Yu, Gubei Yin, Jianhua Li:
A UCB1-Based Online Job Dispatcher for Heterogeneous Mobile Edge Computing System. 1-6 - Hong-Beom Choi, Young-Bae Ko, Keun-Woo Lim:
Energy-Aware Distribution of Data Fragments in Unattended Wireless Sensor Networks. 1-8 - Yaobin Xie, Wei Wang, Faren Wang, Rui Chang:
VTET: A Virtual Industrial Control System Testbed for Cyber Security Research. 1-7 - Junhua Tang, Shuli Zhao, Yue Wu, Jianhua Li:
Caching Strategy for Scalable Video Coding in Information-Centric Networking. 1-6 - Han Qiu, Nathalie Enfrin, Gérard Memmi:
A Case Study for Practical Issues of DCT Based Bitmap Selective Encryption Methods. 1-7 - Caleb Riggs, Tanner Douglas, Kanwalinderjit Gagneja:
Image Mapping through Metadata. 1-8 - Liang Hui, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Hongyuan Chen, Yunong Liang:
VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication. 1-8 - Yunlong Hu, Ping Yi, Yu Sui, Zongrui Zhang, Yao Yao, Wei Wang, Ting Zhu:
Dispatching and Distributing Energy in Energy Internet under Energy Dilemma. 1-5 - Danhua Huang, Li Pan:
An Improved Group-based Influence Maximization Method in Social Networks. 1-6 - Jean-Philippe Monteuuis, Jonathan Petit, Jun Zhang, Houda Labiod, Stefano Mafrica, Alain Servel:
"My autonomous car is an elephant": A Machine Learning based Detector for Implausible Dimension. 1-8 - Zhutian Feng, Cunqing Hua:
Machine Learning-based RF Jamming Detection in Wireless Networks. 1-6 - Huijie Lian, Guangbo Wang, Qingxian Wang:
Fully Secure Traceable and Revocable-Storage Attribute-Based Encryption with Short Update Keys via Subset Difference Method. 1-8 - Jianguo Zheng, Li Pan:
Least Cost Rumor Community Blocking optimization in Social Networks. 1-5 - Lei Sun, Shuai Li, Songhui Guo, Yingxin Xu:
Performance Modeling towards Interrupt System of Virtualized Cryptography Device. 1-6 - Yu Chen, Sheng Yan, Tianyu Pang, Rui Chen:
Detection of DGA Domains Based on Support Vector Machine. 1-4 - Xuelei Wang, Ernest Foo:
Assessing Industrial Control System Attack Datasets for Intrusion Detection. 1-8 - Zhihong Zhou, Lihong Yao, Jianhua Li, Bin Hu, Chen Wang, Zhenglong Wang:
Classification of botnet families based on features self-learning under Network Traffic Censorship. 1-7 - Achraf Fayad, Badis Hammi, Rida Khatoun:
An adaptive authentication and authorization scheme for IoT's gateways: a blockchain based approach. 1-7 - Yuxuan Luo, Shaoyin Cheng, Chong Liu, Fan Jiang:
PU Learning in Payload-based Web Anomaly Detection. 1-5 - Yishuang Meng, Ping Yi, Xuejun Guo, Wen Gu, Xin Liu, Wei Wang, Ting Zhu:
Detection for Pulmonary Nodules using RGB Channel Superposition Method in Deep Learning Framework. 1-8 - Chenbin Wu, Yunjie Zhou, Xiaojuan Jiang, Yinbai Xu, Xiaodi Wang, He He:
Research and Applications of the Key Technology of Intelligent Operation and Maintenance System Architecture for Transmission Power Cables. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.