BibTeX records: Shi Bai

download as .bib file

@article{DBLP:journals/joc/BaiGLS19,
  author    = {Shi Bai and
               Steven D. Galbraith and
               Liangze Li and
               Daniel Sheffield},
  title     = {Improved Combinatorial Algorithms for the Inhomogeneous Short Integer
               Solution Problem},
  journal   = {J. Cryptology},
  volume    = {32},
  number    = {1},
  pages     = {35--83},
  year      = {2019},
  url       = {https://doi.org/10.1007/s00145-018-9304-1},
  doi       = {10.1007/s00145-018-9304-1},
  timestamp = {Fri, 18 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/joc/BaiGLS19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BaiMW19,
  author    = {Shi Bai and
               Shaun Miller and
               Weiqiang Wen},
  title     = {A Refined Analysis of the Cost for Solving {LWE} via uSVP},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2019 - 11th International Conference
               on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings},
  pages     = {181--205},
  year      = {2019},
  crossref  = {DBLP:conf/africacrypt/2019},
  url       = {https://doi.org/10.1007/978-3-030-23696-0\_10},
  doi       = {10.1007/978-3-030-23696-0\_10},
  timestamp = {Tue, 02 Jul 2019 13:10:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/BaiMW19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaiBDRWZ19,
  author    = {Shi Bai and
               Katharina Boudgoust and
               Dipayan Das and
               Adeline Roux{-}Langlois and
               Weiqiang Wen and
               Zhenfei Zhang},
  title     = {Middle-Product Learning with Rounding Problem and Its Applications},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
  pages     = {55--81},
  year      = {2019},
  crossref  = {DBLP:conf/asiacrypt/2019-1},
  url       = {https://doi.org/10.1007/978-3-030-34578-5\_3},
  doi       = {10.1007/978-3-030-34578-5\_3},
  timestamp = {Tue, 26 Nov 2019 14:11:51 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BaiBDRWZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiMW19,
  author    = {Shi Bai and
               Shaun Miller and
               Weiqiang Wen},
  title     = {A refined analysis of the cost for solving {LWE} via uSVP},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2019},
  pages     = {502},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/502},
  timestamp = {Fri, 07 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaiMW19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiBDRWZ19,
  author    = {Shi Bai and
               Katharina Boudgoust and
               Dipayan Das and
               Adeline Roux{-}Langlois and
               Weiqiang Wen and
               Zhenfei Zhang},
  title     = {Middle-Product Learning with Rounding Problem and its Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2019},
  pages     = {1001},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/1001},
  timestamp = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaiBDRWZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/FanSLWB18,
  author    = {Cheng{-}Li Fan and
               Yafei Song and
               Lei Lei and
               Xiaodan Wang and
               Shi Bai},
  title     = {Evidence reasoning for temporal uncertain information based on relative
               reliability evaluation},
  journal   = {Expert Syst. Appl.},
  volume    = {113},
  pages     = {264--276},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.eswa.2018.06.048},
  doi       = {10.1016/j.eswa.2018.06.048},
  timestamp = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eswa/FanSLWB18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BaiLRSSS18,
  author    = {Shi Bai and
               Tancr{\`{e}}de Lepoint and
               Adeline Roux{-}Langlois and
               Amin Sakzad and
               Damien Stehl{\'{e}} and
               Ron Steinfeld},
  title     = {Improved Security Proofs in Lattice-Based Cryptography: Using the
               R{\'{e}}nyi Divergence Rather than the Statistical Distance},
  journal   = {J. Cryptology},
  volume    = {31},
  number    = {2},
  pages     = {610--640},
  year      = {2018},
  url       = {https://doi.org/10.1007/s00145-017-9265-9},
  doi       = {10.1007/s00145-017-9265-9},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/BaiLRSSS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaiSW18,
  author    = {Shi Bai and
               Damien Stehl{\'{e}} and
               Weiqiang Wen},
  title     = {Measuring, Simulating and Exploiting the Head Concavity Phenomenon
               in {BKZ}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}},
  pages     = {369--404},
  year      = {2018},
  crossref  = {DBLP:conf/asiacrypt/2018-1},
  url       = {https://doi.org/10.1007/978-3-030-03326-2\_13},
  doi       = {10.1007/978-3-030-03326-2\_13},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BaiSW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-03872,
  author    = {Jinming Wen and
               Chao Tong and
               Shi Bai},
  title     = {Effects of Some Lattice Reductions on the Success Probability of the
               Zero-Forcing Decoder},
  journal   = {CoRR},
  volume    = {abs/1807.03872},
  year      = {2018},
  url       = {http://arxiv.org/abs/1807.03872},
  archivePrefix = {arXiv},
  eprint    = {1807.03872},
  timestamp = {Wed, 20 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1807-03872},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiSW18,
  author    = {Shi Bai and
               Damien Stehl{\'{e}} and
               Weiqiang Wen},
  title     = {Measuring, simulating and exploiting the head concavity phenomenon
               in {BKZ}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {856},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/856},
  timestamp = {Mon, 15 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaiSW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcc/HolmesBIMD17,
  author    = {Sean T. Holmes and
               Shi Bai and
               Robbie J. Iuliucci and
               Karl T. Mueller and
               Cecil Dybowski},
  title     = {Calculations of solid-state \({}^{\mbox{43}}\)Ca {NMR} parameters:
               {A} comparison of periodic and cluster approaches and an evaluation
               of {DFT} functionals},
  journal   = {Journal of Computational Chemistry},
  volume    = {38},
  number    = {13},
  pages     = {949--956},
  year      = {2017},
  url       = {https://doi.org/10.1002/jcc.24763},
  doi       = {10.1002/jcc.24763},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jcc/HolmesBIMD17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/GaoLMBE17,
  author    = {Dengwei Gao and
               Jianjun Luo and
               Weihua Ma and
               Shi Bai and
               Brendan J. Englot},
  title     = {Efficient and robust feedback motion planning under uncertainty using
               the pontryagin difference},
  booktitle = {56th {IEEE} Annual Conference on Decision and Control, {CDC} 2017,
               Melbourne, Australia, December 12-15, 2017},
  pages     = {939--946},
  year      = {2017},
  crossref  = {DBLP:conf/cdc/2017},
  url       = {https://doi.org/10.1109/CDC.2017.8263779},
  doi       = {10.1109/CDC.2017.8263779},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cdc/GaoLMBE17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icra/WangBE17,
  author    = {Jinkun Wang and
               Shi Bai and
               Brendan J. Englot},
  title     = {Underwater localization and 3D mapping of submerged structures with
               a single-beam scanning sonar},
  booktitle = {2017 {IEEE} International Conference on Robotics and Automation, {ICRA}
               2017, Singapore, Singapore, May 29 - June 3, 2017},
  pages     = {4898--4905},
  year      = {2017},
  crossref  = {DBLP:conf/icra/2017},
  url       = {https://doi.org/10.1109/ICRA.2017.7989567},
  doi       = {10.1109/ICRA.2017.7989567},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icra/WangBE17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iros/BaiCE17,
  author    = {Shi Bai and
               Fanfei Chen and
               Brendan J. Englot},
  title     = {Toward autonomous mapping and exploration for mobile robots through
               deep supervised learning},
  booktitle = {2017 {IEEE/RSJ} International Conference on Intelligent Robots and
               Systems, {IROS} 2017, Vancouver, BC, Canada, September 24-28, 2017},
  pages     = {2379--2384},
  year      = {2017},
  crossref  = {DBLP:conf/iros/2017},
  url       = {https://doi.org/10.1109/IROS.2017.8206050},
  doi       = {10.1109/IROS.2017.8206050},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iros/BaiCE17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/WenTB16,
  author    = {Jinming Wen and
               Chao Tong and
               Shi Bai},
  title     = {Effects of Some Lattice Reductions on the Success Probability of the
               Zero-Forcing Decoder},
  journal   = {{IEEE} Communications Letters},
  volume    = {20},
  number    = {10},
  pages     = {2031--2034},
  year      = {2016},
  url       = {https://doi.org/10.1109/LCOMM.2016.2594196},
  doi       = {10.1109/LCOMM.2016.2594196},
  timestamp = {Tue, 29 Oct 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/icl/WenTB16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/BaiBKZ16,
  author    = {Shi Bai and
               Cyril Bouvier and
               Alexander Kruppa and
               Paul Zimmermann},
  title     = {Better polynomials for {GNFS}},
  journal   = {Math. Comput.},
  volume    = {85},
  number    = {298},
  pages     = {861--873},
  year      = {2016},
  url       = {https://doi.org/10.1090/mcom3048},
  doi       = {10.1090/mcom3048},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/moc/BaiBKZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlbrechtBD16,
  author    = {Martin R. Albrecht and
               Shi Bai and
               L{\'{e}}o Ducas},
  title     = {A Subfield Lattice Attack on Overstretched {NTRU} Assumptions - Cryptanalysis
               of Some {FHE} and Graded Encoding Schemes},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {I}},
  pages     = {153--178},
  year      = {2016},
  crossref  = {DBLP:conf/crypto/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-53018-4\_6},
  doi       = {10.1007/978-3-662-53018-4\_6},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/AlbrechtBD16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BaiSW16,
  author    = {Shi Bai and
               Damien Stehl{\'{e}} and
               Weiqiang Wen},
  title     = {Improved Reduction from the Bounded Distance Decoding Problem to the
               Unique Shortest Vector Problem in Lattices},
  booktitle = {43rd International Colloquium on Automata, Languages, and Programming,
               {ICALP} 2016, July 11-15, 2016, Rome, Italy},
  pages     = {76:1--76:12},
  year      = {2016},
  crossref  = {DBLP:conf/icalp/2016},
  url       = {https://doi.org/10.4230/LIPIcs.ICALP.2016.76},
  doi       = {10.4230/LIPIcs.ICALP.2016.76},
  timestamp = {Thu, 02 May 2019 17:40:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/BaiSW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iros/BaiWCE16,
  author    = {Shi Bai and
               Jinkun Wang and
               Fanfei Chen and
               Brendan J. Englot},
  title     = {Information-theoretic exploration with Bayesian optimization},
  booktitle = {2016 {IEEE/RSJ} International Conference on Intelligent Robots and
               Systems, {IROS} 2016, Daejeon, South Korea, October 9-14, 2016},
  pages     = {1816--1822},
  year      = {2016},
  crossref  = {DBLP:conf/iros/2016},
  url       = {https://doi.org/10.1109/IROS.2016.7759289},
  doi       = {10.1109/IROS.2016.7759289},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iros/BaiWCE16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtBD16,
  author    = {Martin R. Albrecht and
               Shi Bai and
               L{\'{e}}o Ducas},
  title     = {A subfield lattice attack on overstretched {NTRU} assumptions: Cryptanalysis
               of some {FHE} and Graded Encoding Schemes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {127},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/127},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AlbrechtBD16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiLS16,
  author    = {Shi Bai and
               Thijs Laarhoven and
               Damien Stehl{\'{e}}},
  title     = {Tuple lattice sieving},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {713},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/713},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaiLS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiSW16,
  author    = {Shi Bai and
               Damien Stehl{\'{e}} and
               Weiqiang Wen},
  title     = {Improved Reduction from the Bounded Distance Decoding Problem to the
               Unique Shortest Vector Problem in Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {753},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/753},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaiSW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/BaiBT15,
  author    = {Shi Bai and
               Richard P. Brent and
               Emmanuel Thom{\'{e}}},
  title     = {Root optimization of polynomials in the number field sieve},
  journal   = {Math. Comput.},
  volume    = {84},
  number    = {295},
  pages     = {2447--2457},
  year      = {2015},
  url       = {https://doi.org/10.1090/S0025-5718-2015-02926-3},
  doi       = {10.1090/S0025-5718-2015-02926-3},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/moc/BaiBT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/FanBWH15,
  author    = {Zuzhi Fan and
               Shi Bai and
               Shuai Wang and
               Tian He},
  title     = {Delay-Bounded Transmission Power Control for Low-Duty-Cycle Sensor
               Networks},
  journal   = {{IEEE} Trans. Wireless Communications},
  volume    = {14},
  number    = {6},
  pages     = {3157--3170},
  year      = {2015},
  url       = {https://doi.org/10.1109/TWC.2015.2402681},
  doi       = {10.1109/TWC.2015.2402681},
  timestamp = {Fri, 13 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/twc/FanBWH15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaiLLSS15,
  author    = {Shi Bai and
               Adeline Langlois and
               Tancr{\`{e}}de Lepoint and
               Damien Stehl{\'{e}} and
               Ron Steinfeld},
  title     = {Improved Security Proofs in Lattice-Based Cryptography: Using the
               R{\'{e}}nyi Divergence Rather Than the Statistical Distance},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {I}},
  pages     = {3--24},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-48797-6\_1},
  doi       = {10.1007/978-3-662-48797-6\_1},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BaiLLSS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isrr/BaiWDE15,
  author    = {Shi Bai and
               Jinkun Wang and
               Kevin Doherty and
               Brendan J. Englot},
  title     = {Inference-Enabled Information-Theoretic Exploration of Continuous
               Action Spaces},
  booktitle = {Robotics Research, Proceedings of the 17th International Symposium
               of Robotics Research, {ISRR} 2015, Sestri Levante, Italy, September
               12-15, 2015, Volume 2},
  pages     = {419--433},
  year      = {2015},
  crossref  = {DBLP:conf/isrr/2015-2},
  url       = {https://doi.org/10.1007/978-3-319-60916-4\_24},
  doi       = {10.1007/978-3-319-60916-4\_24},
  timestamp = {Mon, 11 Dec 2017 19:15:27 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isrr/BaiWDE15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiLLSS15,
  author    = {Shi Bai and
               Adeline Langlois and
               Tancr{\`{e}}de Lepoint and
               Damien Stehl{\'{e}} and
               Ron Steinfeld},
  title     = {Improved security proofs in lattice-based cryptography: using the
               R{\'{e}}nyi divergence rather than the statistical distance},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {483},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/483},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaiLLSS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/BaiLXZO14,
  author    = {Shi Bai and
               Xuan Li and
               Zhaohui Xie and
               Zhi Zhou and
               Jinping Ou},
  title     = {A Wireless Fatigue Monitoring System Utilizing a Bio-Inspired Tree
               Ring Data Tracking Technique},
  journal   = {Sensors},
  volume    = {14},
  number    = {3},
  pages     = {4364--4383},
  year      = {2014},
  url       = {https://doi.org/10.3390/s140304364},
  doi       = {10.3390/s140304364},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sensors/BaiLXZO14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaiG14,
  author    = {Shi Bai and
               Steven D. Galbraith},
  title     = {Lattice Decoding Attacks on Binary {LWE}},
  booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
               2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  pages     = {322--337},
  year      = {2014},
  crossref  = {DBLP:conf/acisp/2014},
  url       = {https://doi.org/10.1007/978-3-319-08344-5\_21},
  doi       = {10.1007/978-3-319-08344-5\_21},
  timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/BaiG14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BaiG14,
  author    = {Shi Bai and
               Steven D. Galbraith},
  title     = {An Improved Compression Technique for Signatures Based on Learning
               with Errors},
  booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
               the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
               2014. Proceedings},
  pages     = {28--47},
  year      = {2014},
  crossref  = {DBLP:conf/ctrsa/2014},
  url       = {https://doi.org/10.1007/978-3-319-04852-9\_2},
  doi       = {10.1007/978-3-319-04852-9\_2},
  timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/BaiG14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiGLS14,
  author    = {Shi Bai and
               Steven D. Galbraith and
               Liangze Li and
               Daniel Sheffield},
  title     = {Improved Exponential-time Algorithms for Inhomogeneous-SIS},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {593},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/593},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaiGLS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/BaiH13,
  author    = {Shi Bai and
               Tian He},
  title     = {Throughput Optimization in Energy Sharing Wireless Sensor Networks},
  booktitle = {{IEEE} 10th International Conference on Mobile Ad-Hoc and Sensor Systems,
               {MASS} 2013, Hangzhou, China, October 14-16, 2013},
  pages     = {254--262},
  year      = {2013},
  crossref  = {DBLP:conf/mass/2013},
  url       = {https://doi.org/10.1109/MASS.2013.76},
  doi       = {10.1109/MASS.2013.76},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mass/BaiH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiG13,
  author    = {Shi Bai and
               Steven D. Galbraith},
  title     = {An improved compression technique for signatures based on learning
               with errors},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {838},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/838},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaiG13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiG13a,
  author    = {Shi Bai and
               Steven D. Galbraith},
  title     = {Lattice Decoding Attacks on Binary {LWE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {839},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/839},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaiG13a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/BaiL12,
  author    = {Shi Bai and
               Xue{-}Liang Liao},
  title     = {A parallel flash translation layer based on page group-block hybrid-mapping
               method},
  journal   = {{IEEE} Trans. Consumer Electronics},
  volume    = {58},
  number    = {2},
  pages     = {441--449},
  year      = {2012},
  url       = {https://doi.org/10.1109/TCE.2012.6227445},
  doi       = {10.1109/TCE.2012.6227445},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tce/BaiL12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/BaiZXTW12,
  author    = {Shi Bai and
               Weiyi Zhang and
               Guoliang Xue and
               Jian Tang and
               Chonggang Wang},
  title     = {{DEAR:} Delay-bounded Energy-constrained Adaptive Routing in wireless
               sensor networks},
  booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
               25-30, 2012},
  pages     = {1593--1601},
  year      = {2012},
  crossref  = {DBLP:conf/infocom/2012},
  url       = {https://doi.org/10.1109/INFCOM.2012.6195528},
  doi       = {10.1109/INFCOM.2012.6195528},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/BaiZXTW12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1212-1958,
  author    = {Shi Bai and
               Richard P. Brent and
               Emmanuel Thom{\'{e}}},
  title     = {Root optimization of polynomials in the number field sieve},
  journal   = {CoRR},
  volume    = {abs/1212.1958},
  year      = {2012},
  url       = {http://arxiv.org/abs/1212.1958},
  archivePrefix = {arXiv},
  eprint    = {1212.1958},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1212-1958},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiTZ12,
  author    = {Shi Bai and
               Emmanuel Thom{\'{e}} and
               Paul Zimmermann},
  title     = {Factorisation of {RSA-704} with {CADO-NFS}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {369},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/369},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaiTZ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiBT12,
  author    = {Shi Bai and
               Richard P. Brent and
               Emmanuel Thom{\'{e}}},
  title     = {Root Optimization of Polynomials in the Number Field Sieve},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {691},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/691},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaiBT12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LiaoBWH11,
  author    = {Xue{-}Liang Liao and
               Shi Bai and
               Yu{-}Ping Wang and
               Shi{-}Min Hu},
  title     = {ISRA-Based Grouping: {A} Disk Reorganization Approach for Disk Energy
               Conservation and Disk Performance Enhancement},
  journal   = {{IEEE} Trans. Computers},
  volume    = {60},
  number    = {2},
  pages     = {292--304},
  year      = {2011},
  url       = {https://doi.org/10.1109/TC.2010.153},
  doi       = {10.1109/TC.2010.153},
  timestamp = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tc/LiaoBWH11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/BaiYTWH11,
  author    = {Shi Bai and
               Jie Yin and
               Gang Tan and
               Yu{-}Ping Wang and
               Shi{-}Min Hu},
  title     = {{FDTL:} a unified flash memory and hard disk translation layer},
  journal   = {{IEEE} Trans. Consumer Electronics},
  volume    = {57},
  number    = {4},
  pages     = {1719--1727},
  year      = {2011},
  url       = {https://doi.org/10.1109/TCE.2011.6131146},
  doi       = {10.1109/TCE.2011.6131146},
  timestamp = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tce/BaiYTWH11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/BaiZLW11,
  author    = {Shi Bai and
               Weiyi Zhang and
               Yang Liu and
               Chonggang Wang},
  title     = {Max-Min Fair Scheduling in OFDMA-Based Multi-Hop WiMAX Mesh Networks},
  booktitle = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2011, Kyoto, Japan, 5-9 June, 2011},
  pages     = {1--5},
  year      = {2011},
  crossref  = {DBLP:conf/icc/2011},
  url       = {https://doi.org/10.1109/icc.2011.5963242},
  doi       = {10.1109/icc.2011.5963242},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/BaiZLW11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiuZBW11,
  author    = {Yang Liu and
               Weiyi Zhang and
               Shi Bai and
               Chonggang Wang},
  title     = {Defending Sensor Worm Attack Using Software Diversity Approach},
  booktitle = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2011, Kyoto, Japan, 5-9 June, 2011},
  pages     = {1--5},
  year      = {2011},
  crossref  = {DBLP:conf/icc/2011},
  url       = {https://doi.org/10.1109/icc.2011.5962857},
  doi       = {10.1109/icc.2011.5962857},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/LiuZBW11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhangBXTW11,
  author    = {Weiyi Zhang and
               Shi Bai and
               Guoliang Xue and
               Jian Tang and
               Chonggang Wang},
  title     = {{DARP:} Distance-aware relay placement in WiMAX mesh networks},
  booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
               Joint Conference of the {IEEE} Computer and Communications Societies,
               10-15 April 2011, Shanghai, China},
  pages     = {2060--2068},
  year      = {2011},
  crossref  = {DBLP:conf/infocom/2011},
  url       = {https://doi.org/10.1109/INFCOM.2011.5935014},
  doi       = {10.1109/INFCOM.2011.5935014},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/ZhangBXTW11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhangBLT10,
  author    = {Weiyi Zhang and
               Shi Bai and
               Yang Liu and
               Jian Tang},
  title     = {Cognitive Radio Scheduling for Overwater Communications},
  booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
               2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages     = {1--5},
  year      = {2010},
  crossref  = {DBLP:conf/globecom/2010},
  url       = {https://doi.org/10.1109/GLOCOM.2010.5683565},
  doi       = {10.1109/GLOCOM.2010.5683565},
  timestamp = {Wed, 22 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/ZhangBLT10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cats/BaiB08,
  author    = {Shi Bai and
               Richard P. Brent},
  title     = {On the Efficiency of Pollard's Rho Method for Discrete Logarithms},
  booktitle = {Theory of Computing 2008. Proc. Fourteenth Computing: The Australasian
               Theory Symposium {(CATS} 2008), Wollongong, NSW, Australia, January
               22-25, 2008. Proceedings},
  pages     = {125--131},
  year      = {2008},
  crossref  = {DBLP:conf/cats/2008},
  url       = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV77Bai.html},
  timestamp = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cats/BaiB08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/SalamB91,
  author    = {Fathi M. A. Salam and
               Shi Bai},
  title     = {A new feedback neural network with supervised learning},
  journal   = {{IEEE} Trans. Neural Networks},
  volume    = {2},
  number    = {1},
  pages     = {170--173},
  year      = {1991},
  url       = {https://doi.org/10.1109/72.80309},
  doi       = {10.1109/72.80309},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tnn/SalamB91},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/SalamBH90,
  author    = {Fathi M. A. Salam and
               Shi Bai and
               J. Hou},
  title     = {Dynamics of feedback neural nets with unsupervised learning},
  booktitle = {{IJCNN} 1990, International Joint Conference on Neural Networks, San
               Diego, CA, USA, June 17-21, 1990},
  pages     = {239--244},
  year      = {1990},
  crossref  = {DBLP:conf/ijcnn/1990},
  url       = {https://doi.org/10.1109/IJCNN.1990.137721},
  doi       = {10.1109/IJCNN.1990.137721},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ijcnn/SalamBH90},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/SalamB90,
  author    = {Fathi M. A. Salam and
               Shi Bai},
  title     = {A feedback neural network with supervised learning},
  booktitle = {{IJCNN} 1990, International Joint Conference on Neural Networks, San
               Diego, CA, USA, June 17-21, 1990},
  pages     = {263--268},
  year      = {1990},
  crossref  = {DBLP:conf/ijcnn/1990},
  url       = {https://doi.org/10.1109/IJCNN.1990.137855},
  doi       = {10.1109/IJCNN.1990.137855},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ijcnn/SalamB90},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2019,
  editor    = {Johannes Buchmann and
               Abderrahmane Nitaj and
               Tajje{-}eddine Rachidi},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2019 - 11th International Conference
               on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11627},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-23696-0},
  doi       = {10.1007/978-3-030-23696-0},
  isbn      = {978-3-030-23695-3},
  timestamp = {Tue, 02 Jul 2019 13:10:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2019-1,
  editor    = {Steven D. Galbraith and
               Shiho Moriai},
  title     = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11921},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-34578-5},
  doi       = {10.1007/978-3-030-34578-5},
  isbn      = {978-3-030-34577-8},
  timestamp = {Tue, 26 Nov 2019 14:11:51 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2019-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2018-1,
  editor    = {Thomas Peyrin and
               Steven D. Galbraith},
  title     = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11272},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-03326-2},
  doi       = {10.1007/978-3-030-03326-2},
  isbn      = {978-3-030-03325-5},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2018-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cdc/2017,
  title     = {56th {IEEE} Annual Conference on Decision and Control, {CDC} 2017,
               Melbourne, Australia, December 12-15, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8253407/proceeding},
  isbn      = {978-1-5090-2873-3},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cdc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icra/2017,
  title     = {2017 {IEEE} International Conference on Robotics and Automation, {ICRA}
               2017, Singapore, Singapore, May 29 - June 3, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7960754/proceeding},
  isbn      = {978-1-5090-4633-1},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icra/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iros/2017,
  title     = {2017 {IEEE/RSJ} International Conference on Intelligent Robots and
               Systems, {IROS} 2017, Vancouver, BC, Canada, September 24-28, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8119304/proceeding},
  isbn      = {978-1-5386-2682-5},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iros/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-1,
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9814},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53018-4},
  doi       = {10.1007/978-3-662-53018-4},
  isbn      = {978-3-662-53017-7},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2016-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2016,
  editor    = {Ioannis Chatzigiannakis and
               Michael Mitzenmacher and
               Yuval Rabani and
               Davide Sangiorgi},
  title     = {43rd International Colloquium on Automata, Languages, and Programming,
               {ICALP} 2016, July 11-15, 2016, Rome, Italy},
  series    = {LIPIcs},
  volume    = {55},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik},
  year      = {2016},
  url       = {http://www.dagstuhl.de/dagpub/978-3-95977-013-2},
  isbn      = {978-3-95977-013-2},
  timestamp = {Thu, 02 May 2019 17:40:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iros/2016,
  title     = {2016 {IEEE/RSJ} International Conference on Intelligent Robots and
               Systems, {IROS} 2016, Daejeon, South Korea, October 9-14, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7743711/proceeding},
  isbn      = {978-1-5090-3762-9},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iros/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-1,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9452},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48797-6},
  doi       = {10.1007/978-3-662-48797-6},
  isbn      = {978-3-662-48796-9},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isrr/2015-2,
  editor    = {Antonio Bicchi and
               Wolfram Burgard},
  title     = {Robotics Research, Proceedings of the 17th International Symposium
               of Robotics Research, {ISRR} 2015, Sestri Levante, Italy, September
               12-15, 2015, Volume 2},
  series    = {Springer Proceedings in Advanced Robotics},
  volume    = {3},
  publisher = {Springer},
  year      = {2018},
  isbn      = {978-3-319-60915-7},
  timestamp = {Mon, 11 Dec 2017 19:15:27 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isrr/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2014,
  editor    = {Willy Susilo and
               Yi Mu},
  title     = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
               2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8544},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-08344-5},
  doi       = {10.1007/978-3-319-08344-5},
  isbn      = {978-3-319-08343-8},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2014,
  editor    = {Josh Benaloh},
  title     = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
               the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
               2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8366},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-04852-9},
  doi       = {10.1007/978-3-319-04852-9},
  isbn      = {978-3-319-04851-2},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mass/2013,
  title     = {{IEEE} 10th International Conference on Mobile Ad-Hoc and Sensor Systems,
               {MASS} 2013, Hangzhou, China, October 14-16, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6679728/proceeding},
  isbn      = {978-1-4799-1454-8},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mass/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infocom/2012,
  editor    = {Albert G. Greenberg and
               Kazem Sohraby},
  title     = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
               25-30, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6189419/proceeding},
  isbn      = {978-1-4673-0773-4},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icc/2011,
  title     = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2011, Kyoto, Japan, 5-9 June, 2011},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5962386/proceeding},
  isbn      = {978-1-61284-232-5},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infocom/2011,
  title     = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
               Joint Conference of the {IEEE} Computer and Communications Societies,
               10-15 April 2011, Shanghai, China},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5888673/proceeding},
  isbn      = {978-1-4244-9921-2},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/globecom/2010,
  title     = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
               2010, 6-10 December 2010, Miami, Florida, {USA}},
  publisher = {{IEEE}},
  year      = {2010},
  isbn      = {978-1-4244-5638-3},
  timestamp = {Tue, 11 Jan 2011 14:55:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cats/2008,
  editor    = {James Harland and
               Prabhu Manyem},
  title     = {Theory of Computing 2008. Proc. Fourteenth Computing: The Australasian
               Theory Symposium {(CATS} 2008), Wollongong, NSW, Australia, January
               22-25, 2008. Proceedings},
  series    = {{CRPIT}},
  volume    = {77},
  publisher = {Australian Computer Society},
  year      = {2008},
  isbn      = {978-1-920682-58-3},
  timestamp = {Thu, 23 Jun 2016 15:53:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cats/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ijcnn/1990,
  title     = {{IJCNN} 1990, International Joint Conference on Neural Networks, San
               Diego, CA, USA, June 17-21, 1990},
  publisher = {{IEEE}},
  year      = {1990},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/148/proceeding},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ijcnn/1990},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics