International Symposium on Security and Privacy in Social Networks and Big Data最新文献

筛选
英文 中文
The Revocable Attribute Based Encryption Scheme for Social Networks 基于可撤销属性的社交网络加密方案
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1109/SocialSec2015.18
Yiliang Han, Di Jiang, Xiaoyuan Yang
{"title":"The Revocable Attribute Based Encryption Scheme for Social Networks","authors":"Yiliang Han, Di Jiang, Xiaoyuan Yang","doi":"10.1109/SocialSec2015.18","DOIUrl":"https://doi.org/10.1109/SocialSec2015.18","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124271607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Defect Heterogeneous Risk Assessment Method with Misclassification Cost 一种具有错误分类代价的缺陷异质性风险评估方法
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-7242-3_18
Lixia Xie, Siyu Liu, Hongyu Yang, Liang Zhang
{"title":"A Defect Heterogeneous Risk Assessment Method with Misclassification Cost","authors":"Lixia Xie, Siyu Liu, Hongyu Yang, Liang Zhang","doi":"10.1007/978-981-19-7242-3_18","DOIUrl":"https://doi.org/10.1007/978-981-19-7242-3_18","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114533173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption 一种基于内积函数加密的安全字向量训练方案
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-7242-3_5
Mingwu Zhang, Zhenan Li, Peihang Zhang
{"title":"A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption","authors":"Mingwu Zhang, Zhenan Li, Peihang Zhang","doi":"10.1007/978-981-19-7242-3_5","DOIUrl":"https://doi.org/10.1007/978-981-19-7242-3_5","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115205591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Security Researchers on Online Social Networks: From the Lens of the UK's ACEs-CSR on Twitter 在线社交网络的网络安全研究人员:从英国ACEs-CSR在Twitter上的视角
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-5177-2_8
Mohamad Imad Mahaini, Shujun Li
{"title":"Cyber Security Researchers on Online Social Networks: From the Lens of the UK's ACEs-CSR on Twitter","authors":"Mohamad Imad Mahaini, Shujun Li","doi":"10.1007/978-981-99-5177-2_8","DOIUrl":"https://doi.org/10.1007/978-981-99-5177-2_8","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"17 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123447008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Squeeze-Loss: A Utility-Free Defense Against Membership Inference Attacks 挤压损失:对成员推理攻击的无实用程序防御
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-7242-3_19
Yingying Zhang, Hongyang Yan, Guanbiao Lin, Shiyu Peng, Zhenxin Zhang, Yufeng Wang
{"title":"Squeeze-Loss: A Utility-Free Defense Against Membership Inference Attacks","authors":"Yingying Zhang, Hongyang Yan, Guanbiao Lin, Shiyu Peng, Zhenxin Zhang, Yufeng Wang","doi":"10.1007/978-981-19-7242-3_19","DOIUrl":"https://doi.org/10.1007/978-981-19-7242-3_19","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122838942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inner Product Encryption from Middle-Product Learning with Errors 带错误的中间产品学习中的内积加密
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-7242-3_7
Niao Yang, Shaojun Yang, Yong Zhao, Wei Wu
{"title":"Inner Product Encryption from Middle-Product Learning with Errors","authors":"Niao Yang, Shaojun Yang, Yong Zhao, Wei Wu","doi":"10.1007/978-981-19-7242-3_7","DOIUrl":"https://doi.org/10.1007/978-981-19-7242-3_7","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114804306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Network Security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXt 基于多关注机制和HHO-ResNeXt的网络安全态势评估方法
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-7242-3_13
Dongmei Zhao, Guoqing Ji, Shuiguang Zeng
{"title":"A Network Security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXt","authors":"Dongmei Zhao, Guoqing Ji, Shuiguang Zeng","doi":"10.1007/978-981-19-7242-3_13","DOIUrl":"https://doi.org/10.1007/978-981-19-7242-3_13","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114420586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Did State-Sponsored Trolls Shape the 2016 US Presidential Election Discourse? Quantifying Influence on Twitter 国家支持的巨魔是否影响了2016年美国总统大选的言论?量化对Twitter的影响
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-5177-2_4
Nikos Salamanos, Michael J. Jensen, Costas Iordanou, Michael Sirivianos
{"title":"Did State-Sponsored Trolls Shape the 2016 US Presidential Election Discourse? Quantifying Influence on Twitter","authors":"Nikos Salamanos, Michael J. Jensen, Costas Iordanou, Michael Sirivianos","doi":"10.1007/978-981-99-5177-2_4","DOIUrl":"https://doi.org/10.1007/978-981-99-5177-2_4","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117350813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Graph Matching Based Privacy-Preserving Scheme in Social Networks 基于图匹配的社交网络隐私保护方案
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-7913-1_8
Hongyan Zhang, Xiaolin Li, Jiayu Xu, Li Xu
{"title":"Graph Matching Based Privacy-Preserving Scheme in Social Networks","authors":"Hongyan Zhang, Xiaolin Li, Jiayu Xu, Li Xu","doi":"10.1007/978-981-16-7913-1_8","DOIUrl":"https://doi.org/10.1007/978-981-16-7913-1_8","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127971579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Temporal Analysis of Privacy Enhancing Technology Traffic Using Deep Learning 基于深度学习的隐私增强技术流量时序分析
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-5177-2_14
M. Kumari, Mohona Ghosh, Niyati Baliyan
{"title":"Temporal Analysis of Privacy Enhancing Technology Traffic Using Deep Learning","authors":"M. Kumari, Mohona Ghosh, Niyati Baliyan","doi":"10.1007/978-981-99-5177-2_14","DOIUrl":"https://doi.org/10.1007/978-981-99-5177-2_14","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126671271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信