International Conference on Information, Communications and Signal Processing最新文献

筛选
英文 中文
AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities AGE:用于检测异常登录活动的认证图嵌入
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_20
Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng
{"title":"AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities","authors":"Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng","doi":"10.1007/978-3-030-41579-2_20","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_20","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131772542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DLchain: A Covert Channel over Blockchain Based on Dynamic Labels DLchain:一种基于动态标签的b区块链隐蔽通道
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_47
Jing Tian, Gaopeng Gou, Chang Liu, Yige Chen, G. Xiong, Zhuguo Li
{"title":"DLchain: A Covert Channel over Blockchain Based on Dynamic Labels","authors":"Jing Tian, Gaopeng Gou, Chang Liu, Yige Chen, G. Xiong, Zhuguo Li","doi":"10.1007/978-3-030-41579-2_47","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_47","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128689196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs 基于可穿刺身份的kem自适应安全可穿刺伪随机函数
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_27
Xin Wang, Shimin Li, Rui Xue
{"title":"Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs","authors":"Xin Wang, Shimin Li, Rui Xue","doi":"10.1007/978-3-030-41579-2_27","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_27","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130475214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CDAE: Towards Empowering Denoising in Side-Channel Analysis CDAE:在侧信道分析中增强去噪
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_16
Guang Yang, Huizhong Li, Jingdian Ming, Yongbin Zhou
{"title":"CDAE: Towards Empowering Denoising in Side-Channel Analysis","authors":"Guang Yang, Huizhong Li, Jingdian Ming, Yongbin Zhou","doi":"10.1007/978-3-030-41579-2_16","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_16","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129142294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems 工业控制系统的噪声鲁棒异常检测框架
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_4
Maged AbdelAty, R. D. Corin, D. Siracusa
{"title":"AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems","authors":"Maged AbdelAty, R. D. Corin, D. Siracusa","doi":"10.1007/978-3-030-41579-2_4","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_4","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115159600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Multi-Group Signature Scheme from Lattices 基于格的多群签名方案
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_21
Tian Qiu, Lin Hou, D. Lin
{"title":"A Multi-Group Signature Scheme from Lattices","authors":"Tian Qiu, Lin Hou, D. Lin","doi":"10.1007/978-3-030-41579-2_21","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_21","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114838602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical Evaluation Methodology of Higher-Order Maskings at Different Operating Frequencies 不同工作频率下高阶掩模的实用评价方法
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_17
Yuguang Li, Ming Tang, Pengbo Wang, Yanbin Li, Shan Fu
{"title":"Practical Evaluation Methodology of Higher-Order Maskings at Different Operating Frequencies","authors":"Yuguang Li, Ming Tang, Pengbo Wang, Yanbin Li, Shan Fu","doi":"10.1007/978-3-030-41579-2_17","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_17","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123194657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Differential Attacks on GIFT-64 改进了GIFT-64的差分攻击
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_26
Huaifeng Chen, Rui Zong, Xiaoyang Dong
{"title":"Improved Differential Attacks on GIFT-64","authors":"Huaifeng Chen, Rui Zong, Xiaoyang Dong","doi":"10.1007/978-3-030-41579-2_26","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_26","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131554119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Deep Learning-Based Vulnerable Function Detection: A Benchmark 基于深度学习的脆弱函数检测:一个基准
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_13
Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang
{"title":"Deep Learning-Based Vulnerable Function Detection: A Benchmark","authors":"Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang","doi":"10.1007/978-3-030-41579-2_13","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_13","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116466221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels 欺诈者:标签较少的数字支付平台的欺诈检测
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_33
Ruoyu Deng, Na Ruan, Guangsheng Zhang, Xiaohu Zhang
{"title":"FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels","authors":"Ruoyu Deng, Na Ruan, Guangsheng Zhang, Xiaohu Zhang","doi":"10.1007/978-3-030-41579-2_33","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_33","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125885438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信