ISEA Asia Security and Privacy Conference最新文献

筛选
英文 中文
Bloom Filter Based Privacy Preserving Deduplication System 基于Bloom Filter的保密性重复数据删除系统
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_2
Jay Dave, V. Laxmi, Parvez Faruki, M. Gaur, Bhavya Shah
{"title":"Bloom Filter Based Privacy Preserving Deduplication System","authors":"Jay Dave, V. Laxmi, Parvez Faruki, M. Gaur, Bhavya Shah","doi":"10.1007/978-981-13-7561-3_2","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_2","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124144066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Malware Signature Generation Using Locality Sensitive Hashing 使用位置敏感哈希生成恶意软件签名
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_9
H. Naderi, P. Vinod, M. Conti, Saeed Parsa, M. Alaeiyan
{"title":"Malware Signature Generation Using Locality Sensitive Hashing","authors":"H. Naderi, P. Vinod, M. Conti, Saeed Parsa, M. Alaeiyan","doi":"10.1007/978-981-13-7561-3_9","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_9","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122314309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks DroidDivesDeep: Android恶意软件分类通过低级别监测功能与深度神经网络
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_10
Parvez Faruki, B. Buddhadev, Bhavya Shah, A. Zemmari, V. Laxmi, M. Gaur
{"title":"DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks","authors":"Parvez Faruki, B. Buddhadev, Bhavya Shah, A. Zemmari, V. Laxmi, M. Gaur","doi":"10.1007/978-981-13-7561-3_10","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_10","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130448938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
EvadePDF: Towards Evading Machine Learning Based PDF Malware Classifiers EvadePDF:基于逃避机器学习的PDF恶意软件分类器
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_11
Sukanta Dey, Abhishek Kumar, Mehul Sawarkar, P. Singh, Sukumar Nandi
{"title":"EvadePDF: Towards Evading Machine Learning Based PDF Malware Classifiers","authors":"Sukanta Dey, Abhishek Kumar, Mehul Sawarkar, P. Singh, Sukumar Nandi","doi":"10.1007/978-981-13-7561-3_11","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_11","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131130642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Bad Signature Identification in a Batch Using Error Detection Codes 使用错误检测码批量识别不良签名
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_4
Apurva S. Kittur, Swapnil Kauthale, A. R. Pais
{"title":"Bad Signature Identification in a Batch Using Error Detection Codes","authors":"Apurva S. Kittur, Swapnil Kauthale, A. R. Pais","doi":"10.1007/978-981-13-7561-3_4","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_4","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123369814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised Person Re-ID in Surveillance Feed Using Re-ranking 使用重新排名在监控Feed中重新识别无监督人员
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_14
M. Singh, V. Laxmi, N. Nain
{"title":"Unsupervised Person Re-ID in Surveillance Feed Using Re-ranking","authors":"M. Singh, V. Laxmi, N. Nain","doi":"10.1007/978-981-13-7561-3_14","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_14","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123491105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Threshold Ring Signature with Message Block Sharing 消息块共享阈值环签名
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_19
Swati Rawal, Sahadeo Padhye
{"title":"Threshold Ring Signature with Message Block Sharing","authors":"Swati Rawal, Sahadeo Padhye","doi":"10.1007/978-981-13-7561-3_19","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_19","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127782180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy String Matching Algorithm for Spam Detection in Twitter Twitter中垃圾邮件检测的模糊字符串匹配算法
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_21
Alok Kumar, M. Singh, A. R. Pais
{"title":"Fuzzy String Matching Algorithm for Spam Detection in Twitter","authors":"Alok Kumar, M. Singh, A. R. Pais","doi":"10.1007/978-981-13-7561-3_21","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_21","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121105082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
IP Traceback in Dynamic Networks 动态网络中的IP回溯
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_12
Sangita Roy, H. Chawla, A. Sairam
{"title":"IP Traceback in Dynamic Networks","authors":"Sangita Roy, H. Chawla, A. Sairam","doi":"10.1007/978-981-13-7561-3_12","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_12","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Opportunistic Data Exchange Using Smart Devices in 5G/LTE-A Networks 在5G/LTE-A网络中使用智能设备进行安全机会数据交换
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_1
S. Tetarave, S. Tripathy
{"title":"Secure Opportunistic Data Exchange Using Smart Devices in 5G/LTE-A Networks","authors":"S. Tetarave, S. Tripathy","doi":"10.1007/978-981-13-7561-3_1","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_1","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"129 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130054185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信