default search action
5th ICAIS 2019: New York, NY, USA
- Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part IV. Lecture Notes in Computer Science 11635, Springer 2019, ISBN 978-3-030-24267-1
Encryption and Cybersecurity
- Chunlai Du, Xingbang Tan, Yanhui Guo:
A Gray-Box Vulnerability Discovery Model Based on Path Coverage. 3-12 - Tao Shang, Ran Liu, Chengran Fang, Jianwei Liu:
Quantum Network Coding Based on Entanglement Distribution. 13-24 - Kaiyu Feng, Xiao Gu, Wei Peng, Dequan Yang:
Moving Target Defense in Preventing SQL Injection. 25-34 - Li Cui, Yang Heng, Wu Gang:
Design and Security Analysis of Certificateless Aggregate Signature Scheme. 35-45 - Zibo Li, Xiangzhan Yu, Dawei Wang, Yiru Liu, Huaidong Yin, Shoushuai He:
SuperEye: A Distributed Port Scanning System. 46-56 - Xige Dang, Xu Wu, Xiaqing Xie, Tianle Zhang:
An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data. 57-66 - Hangyu Hu, Xuemeng Zhai, Mingda Wang, Guangmin Hu:
NCGs: Building a Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis. 67-78 - Xu Wu, Haitao Wu, Xiaqing Xie, Jin Xu, Tianle Zhang:
Short Text Topic Recognition and Optimization Method for University Online Community. 79-90 - Qiuping Zhu, Dong Li, Yi Xin, Xiangzhan Yu, Guocai Mu:
A Survey on Network Traffic Identification. 91-100 - Chen Chen, Lin Ye, Xiangzhan Yu, Bailang Ding:
A Survey of Network Security Situational Awareness Technology. 101-109 - Zheng Tao, Xiang Gao, Shibin Zhang, Yan Chang, Jinyue Xia:
Multi-function Quantum Cryptography Protocol Based on Bell State. 110-119 - Wunan Wan, Hao Chen, Jun Chen:
The Attack Case of ECDSA on Blockchain Based on Improved Simple Power Analysis. 120-132 - Jian Liu, Yalin Yuan:
A Weight-Based Channel Estimation Implementation Algorithm. 133-142 - Wenbin Yu, Zangqiang Dong, Wenjie Liu, Zhiguo Qu, Xiaolong Xu, Xiang-Yang Alex Liu:
Multi-party Quantum Communication Complexity on Composite Boolean-Valued Function. 143-154 - Wentong Wang, Ning Hu, Xin Liu:
BlockZone: A Blockchain-Based DNS Storage and Retrieval Scheme. 155-166 - Jun Xiang, Jiao Zhu, Shuyang Guo, Yue Chen, Zhizhong Qiao:
Robust Analysis of Grid System Based on Complex Network Attack Mode. 167-177 - Bo Mi, Hongyang Pan, Darong Huang, Tiancheng Wei, Xingfeng Wang:
A Secure Data Aggregation Protocol in VANETs Based on Multi-key FHE. 178-190 - Zongshi Chen, Mohan Li, Xiang Cui, Yanbin Sun:
Research on SQL Injection and Defense Technology. 191-201 - Xinguo Zhang, Mohan Li, Yu Jiang, Yanbin Sun:
A Review of the Factorization Problem of Large Integers. 202-213 - XiaoLong Chen, Mohan Li, Yu Jiang, Yanbin Sun:
A Comparison of Machine Learning Algorithms for Detecting XSS Attacks. 214-224 - Yuchong Cui, Bing Pan, Yanbin Sun:
A Survey of Privacy-Preserving Techniques for Blockchain. 225-234 - Zhuangyou Chen, Bing Pan, Yanbin Sun:
A Survey of Software Reverse Engineering Applications. 235-245 - Guanjun Guo, Yi Xin, Xiangzhan Yu, Likun Liu, Houhua Cao:
A Fast IP Matching Algorithm Under Large Traffic. 246-255 - Xiaosen Zeng, Dongbin Wang, Shuwen Han, Wenbin Yao, Zhao Wang, Rui Chen:
An Effective Load Balance Using Link Bandwidth for SDN-Based Data Centers. 256-265 - Ziwei Ye, Yuanbo Guo, Ankang Ju:
Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric. 266-278 - Hangfeng Yang, Hui Lu, Shudong Li, Mohan Li, Yanbin Sun:
Research on Content Extraction of Rich Text Web Pages. 279-287 - Weixiang Chen, Hui Lu, Mohan Li, Yanbin Sun:
Network Protocol Analysis Base on WeChat PC Version. 288-297 - Runnan Tan, Xiangyi Kong, Yu Zhang, Qingfeng Tan, Hui Lu, Mohan Li, Yanbin Sun:
Bitcoin Network Size Estimation Based on Coupon Collection Model. 298-307 - Jian Jiang, Xiangzhan Yu, Yan Sun, Haohua Zeng:
A Survey of the Software Vulnerability Discovery Using Machine Learning Techniques. 308-317 - Chaobin Wang, Le Wang, Mohan Li, Yu Jiang, Hui Lu:
A Distributed Cryptanalysis Framework Based on Mobile Phones. 318-331 - Yu Liu, Tong Liu:
A Novel Threshold Signature Scheme Based on Elliptic Curve with Designated Verifier. 332-342 - Renhui Hou, Dongbin Wang, Yao Wang, Zhouyi Zhu:
A Congestion Control Methodology with Probability Routing Based on MNL for Datacenter Network. 343-352 - Zilong Yin, Dongbin Wang, Yinxing Zhao, Yaoyao Guo, Shuwen Han:
Fast Failover for Link Failures in Software Defined Networks. 353-361 - Di Yang, Yan Liu, Jing Chen:
Steady-State Topology Discovery of Target Networks Based on Statistics Method. 362-374 - Chun Shi, Zhi-qun Zheng, Zhengjie Deng, Yu-juan Wang, Shu-Qian He:
A Novel Method for Weighted Throughput Fairness in Contention-Based WLANs with Multiple Priority Levels. 375-384 - Yu Zhang, Runan Tan, Xiangyi Kong, Qingfeng Tan, Xiangtao Liu:
Bitcoin Node Discovery: Large-Scale Empirical Evaluation of Network Churn. 385-395 - Wei Guo, Xiangyan Tang, Jieren Cheng, Jinying Xu, Canting Cai, Yulong Guo:
DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory. 396-407 - Fangjian Tao, Chunjie Cao, Zhihui Liu:
Webshell Detection Model Based on Deep Learning. 408-420 - Lin Chen, Chunfang Yang, Fenlin Liu, Daofu Gong, Shichang Ding:
A Security-Sensitive Function Mining Framework for Source Code. 421-432 - Yong Yu, Ming Jing, Detao Ji, Yuanyuan Wang, Zhongwen Xie, Shudong Li:
Abstraction of Operations in Trusted Components Based on OR-Transition Colored Petri Net. 433-442 - Na Zhao, Min Cao, Chenming Song, Shuang Shi, Yong Yu, Shudong Li:
Trusted Component Decomposition Based on OR-Transition Colored Petri Net. 443-451 - Jiajun Xie, Chunrui Zhang, Fang Lou, Yu Cui, Lun An, Le Wang:
High-Speed File Transferring Over Linux Bridge for QGA Enhancement in Cyber Range. 452-462 - Yibo Sun, Adil Khan, Kai Yang, Feng Jiang, Shaohui Liu:
Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents Using Reinforcement Learning. 463-475 - Yong Quan, Yichen Song, Lu Deng, Yan Jia, Bin Zhou, Weihong Han:
Identify Influentials Based on User Behavior Across Different Topics. 476-487 - Jianfeng Lu, Xuanyuan Yang:
Taylor Series Localization Algorithm Based on Semi-definite Programming. 488-497 - Xin Feng, Yangyang Li, Haomin Du, Hongbo Wang:
Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene. 498-509 - Tao Tang, Guangmin Hu:
An Evolving Network Model Based on a Triangular Connecting Mechanism for the Internet Topology. 510-519 - Xi Chen, Shangjun He, Gonghua Hou, Lifan Yang, Lin Lin, Ruyi Chen, Ningcheng Yuan:
A New Quantum Private Query Protocol with Better Performance in Resisting Joint-Measurement Attack. 520-528 - Chenyang Li, Yuling Chen, Yu Yang, Chaochao Li, Yang Zeng:
PPCSB: A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid. 529-541 - Ning Wang, Yuling Chen, Yu Yang, Zigang Fang, Yizhe Sun:
Blockchain Private Key Storage Algorithm Based on Image Information Hiding. 542-552 - Xi Chen, Jingjie Chen, Yuling Chen, Jinglan Yang, Deyin Li:
Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning. 553-565 - Lin Gan, Jingjie Chen, Yuling Chen, Zhujun Jin, Wenxi Han:
JPEGCNN: A Transform Domain Steganalysis Model Based on Convolutional Neural Network. 566-577 - Xiao Feng, Jincheng Li, Changgui Huang, Jinze Li, Ruyin Chen, Jinfa Ke, Zhenjiang Ma:
Quantum Algorithm for Support Vector Machine with Exponentially Improved Dependence on Precision. 578-587 - Yunmei Luo, Yuping Luo, Xueping Ye, Jun Lu, Shuqing Li:
Reliability-Based and QoS-Aware Service Redundancy Backup Method in IoT-Based Smart Grid. 588-598 - Yu Xu, Zhoubin Liu, Lili Li, You Sun:
A Privacy-Preserving Electricity Trading Scheme Based on Blockchain. 599-611 - Zhuohua Liu, Hui Suo, Bin Yang:
A Novel Facial Expression Recognition Scheme Based on Deep Neural Networks. 612-622 - Wenjin Yu, Yixiang Jiang, Yizhen Lin:
Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis. 623-636 - Xiao Liang, Yunpeng Li, Baohua Zhao, Zhihao Wang, Ningyu An:
Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust. 637-648
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.