International Conference on Applications and Techniques in Information Security最新文献

筛选
英文 中文
Optimization of Location Information Hiding Algorithm for Anti Attack 抗攻击的位置信息隐藏算法优化
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_1
Bin Wang, Rong Zhao, Guo-yin Zhang, Jianghao Liang
{"title":"Optimization of Location Information Hiding Algorithm for Anti Attack","authors":"Bin Wang, Rong Zhao, Guo-yin Zhang, Jianghao Liang","doi":"10.1007/978-981-13-2907-4_1","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_1","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115399045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Location Privacy Protection for Sink Node in WSN Based on K Anonymous False Packets Injection 基于K匿名假报文注入的WSN汇聚节点位置隐私保护
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_6
Ling Song, Wei Ma, Jin Ye
{"title":"Location Privacy Protection for Sink Node in WSN Based on K Anonymous False Packets Injection","authors":"Ling Song, Wei Ma, Jin Ye","doi":"10.1007/978-981-13-2907-4_6","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_6","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115855967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive Graph Learning for Supervised Low-Rank Spectral Feature Selection 基于自适应图学习的有监督低秩谱特征选择
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_14
Zhi Zhong
{"title":"Adaptive Graph Learning for Supervised Low-Rank Spectral Feature Selection","authors":"Zhi Zhong","doi":"10.1007/978-981-13-2907-4_14","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_14","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"15 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120853276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer 利用有效的乱码电路减少数据传输的安全两方计算
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_3
Mohammad Hossein Yalame, Mohammad-Hossein Farzam, Siavash Bayat Sarmadi
{"title":"Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer","authors":"Mohammad Hossein Yalame, Mohammad-Hossein Farzam, Siavash Bayat Sarmadi","doi":"10.1007/978-981-10-5421-1_3","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_3","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116680000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy-Preserving Deep Learning: Revisited and Enhanced 保护隐私的深度学习:重新审视和增强
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_9
L. T. Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, S. Moriai
{"title":"Privacy-Preserving Deep Learning: Revisited and Enhanced","authors":"L. T. Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, S. Moriai","doi":"10.1007/978-981-10-5421-1_9","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_9","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128771933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 131
A Privacy Preserving Platform for MapReduce 基于MapReduce的隐私保护平台
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_8
S. Bazai, Julian Jang, Xuyun Zhang
{"title":"A Privacy Preserving Platform for MapReduce","authors":"S. Bazai, Julian Jang, Xuyun Zhang","doi":"10.1007/978-981-10-5421-1_8","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_8","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124177517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
UnitecDEAMP: Flow Feature Profiling for Malicious Events Identification in Darknet Space 暗网空间恶意事件识别的流特征分析
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_13
Ruibin Zhang, Chi Yang, Shaoning Pang, Hossein Sarrafzadeh
{"title":"UnitecDEAMP: Flow Feature Profiling for Malicious Events Identification in Darknet Space","authors":"Ruibin Zhang, Chi Yang, Shaoning Pang, Hossein Sarrafzadeh","doi":"10.1007/978-981-10-5421-1_13","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_13","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125915599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Characterizing Promotional Attacks in Mobile App Store 分析手机应用商店中的促销攻击特征
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_10
Bo Sun, Xiapu Luo, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori
{"title":"Characterizing Promotional Attacks in Mobile App Store","authors":"Bo Sun, Xiapu Luo, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori","doi":"10.1007/978-981-10-5421-1_10","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_10","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133334432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Low-Data Complexity Attacks on Camellia 对山茶花的低数据复杂度攻击
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_11
Takeru Koie, Takanori Isobe, Yosuke Todo, M. Morii
{"title":"Low-Data Complexity Attacks on Camellia","authors":"Takeru Koie, Takanori Isobe, Yosuke Todo, M. Morii","doi":"10.1007/978-981-10-5421-1_11","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_11","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133401787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Private Distributed Three-Party Learning of Gaussian Mixture Models 高斯混合模型的私有分布式三方学习
International Conference on Applications and Techniques in Information Security Pub Date : 2017-07-06 DOI: 10.1007/978-981-10-5421-1_7
Kaleb L. Leemaqz, Sharon X. Lee, G. McLachlan
{"title":"Private Distributed Three-Party Learning of Gaussian Mixture Models","authors":"Kaleb L. Leemaqz, Sharon X. Lee, G. McLachlan","doi":"10.1007/978-981-10-5421-1_7","DOIUrl":"https://doi.org/10.1007/978-981-10-5421-1_7","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131483843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信