Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/isi/isi2021.bht:"
@inproceedings{DBLP:conf/isi/Acevedo-Viloria21, author = {Jaime D. Acevedo{-}Viloria and Sebasti{\'{a}}n Soriano P{\'{e}}rez and Jesus Solano and David Zarruk{-}Valencia and Fernando G. Paulin and Alejandro Correa Bahnsen}, title = {Feature-Level Fusion of Super-App and Telecommunication Alternative Data Sources for Credit Card Fraud Detection}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624796}, doi = {10.1109/ISI53945.2021.9624796}, timestamp = {Tue, 07 Dec 2021 17:02:14 +0100}, biburl = {https://dblp.org/rec/conf/isi/Acevedo-Viloria21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Al-QurashiASAA21, author = {Rayah Al{-}Qurashi and Ahmed Aleroud and Ahmad A. Saifan and Mohammad Alsmadi and Izzat Alsmadi}, title = {Generating Optimal Attack Paths in Generative Adversarial Phishing}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624751}, doi = {10.1109/ISI53945.2021.9624751}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/Al-QurashiASAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/AldkheelZW21, author = {Abdulrahman Aldkheel and Lina Zhou and Kanlun Wang}, title = {Characterization of Domestic Violence through Self-disclosure in Social Media: {A} Case Study of the Time of {COVID-19}}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--3}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624676}, doi = {10.1109/ISI53945.2021.9624676}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/AldkheelZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/AmpelC21, author = {Benjamin Ampel and Hsinchun Chen}, title = {Distilling Contextual Embeddings Into {A} Static Word Embedding For Improving Hacker Forum Analytics}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--3}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624848}, doi = {10.1109/ISI53945.2021.9624848}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/AmpelC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BoseSBH21, author = {Avishek Bose and Shreya Gopal Sundari and Vahid Behzadan and William H. Hsu}, title = {Tracing Relevant Twitter Accounts Active in Cyber Threat Intelligence Domain by Exploiting Content and Structure of Twitter Network}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624754}, doi = {10.1109/ISI53945.2021.9624754}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/BoseSBH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/CherqiHGB21, author = {Othmane Cherqi and Hicham Hammouchi and Mounir Ghogho and Houda Benbrahim}, title = {Leveraging Open Threat Exchange {(OTX)} to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624677}, doi = {10.1109/ISI53945.2021.9624677}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/CherqiHGB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChukkapalliPMJ21, author = {Sai Sree Laya Chukkapalli and Nisha Pillai and Sudip Mittal and Anupam Joshi}, title = {Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - {A} Smart Farming Usecase}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624688}, doi = {10.1109/ISI53945.2021.9624688}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/ChukkapalliPMJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/DengZYCZ21, author = {Zizhen Deng and Xiaolong Zheng and Zifan Ye and Zhen Cai and Daniel Dajun Zeng}, title = {Credible Influence Analysis in Mass Media Using Causal Inference}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624679}, doi = {10.1109/ISI53945.2021.9624679}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/DengZYCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/DingBLY21, author = {Zhiyuan Ding and Victor A. Benjamin and Weifeng Li and Xueyan Yin}, title = {Exploring Differences Among Darknet and Surface Internet Hacking Communities}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--3}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624681}, doi = {10.1109/ISI53945.2021.9624681}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/DingBLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/GhadermaziHSS21, author = {Jalal Ghadermazi and Soumyadeep Hore and Dinesh Sharma and Ankit Shah}, title = {Adversarial Deep Reinforcement Learning Enabled Threat Analytics Framework for Constrained Spatio-Temporal Movement Intelligence Data}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624731}, doi = {10.1109/ISI53945.2021.9624731}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/GhadermaziHSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/HarrisonLAMOGM21, author = {Joe Harrison and Joshua Lyons and Lauren Anderson and Lauren Maunder and Paul O'Donnell and Kiernan B. George and Alan J. Michaels}, title = {Quantifying Use and Abuse of Personal Information}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624816}, doi = {10.1109/ISI53945.2021.9624816}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/HarrisonLAMOGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/HuEC21, author = {James Lee Hu and Mohammadreza Ebrahimi and Hsinchun Chen}, title = {Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: {A} Causal Language Model Approach}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624787}, doi = {10.1109/ISI53945.2021.9624787}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/HuEC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/Husak21, author = {Martin Hus{\'{a}}k}, title = {Towards a Data-Driven Recommender System for Handling Ransomware and Similar Incidents}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624774}, doi = {10.1109/ISI53945.2021.9624774}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/Husak21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/IyerWKY21, author = {Vishnuvardhan V. Iyer and Meizhi Wang and Jaydeep Kulkarni and Ali E. Yilmaz}, title = {A Systematic Evaluation of {EM} and Power Side-Channel Analysis Attacks on {AES} Implementations}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624778}, doi = {10.1109/ISI53945.2021.9624778}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/IyerWKY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/JeffersonHCVC21, author = {Brett A. Jefferson and Natalie C. Heller and Joseph A. Cottam and Nhuy Van and George Chin}, title = {The Utility in Conjoint Analysis as a Fast Expert Elicitation Technique}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624683}, doi = {10.1109/ISI53945.2021.9624683}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/JeffersonHCVC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/JonesFCTN21, author = {Rebecca Jones and Daniel Fortin and Samrat Chatterjee and Dennis G. Thomas and Lisa Newburn}, title = {User Role Identification in Software Vulnerability Discussions over Social Networks}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--3}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624857}, doi = {10.1109/ISI53945.2021.9624857}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/JonesFCTN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LimZZ21, author = {Jaewan Lim and Lina Zhou and Dongsong Zhang}, title = {Verbal Deception Cue Training for the Detection of Phishing Emails}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--3}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624738}, doi = {10.1109/ISI53945.2021.9624738}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/LimZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiuLELC21, author = {Yizhi Liu and Fang Yu Lin and Mohammadreza Ebrahimi and Weifeng Li and Hsinchun Chen}, title = {Automated {PII} Extraction from Social Media for Raising Privacy Awareness: {A} Deep Transfer Learning Approach}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624678}, doi = {10.1109/ISI53945.2021.9624678}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiuLELC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LuoCZZZ21, author = {Tianyi Luo and Zhidong Cao and Pengfei Zhao and Daniel Dajun Zeng and Qingpeng Zhang}, title = {Evaluating the Impact of Vaccination on {COVID-19} Pandemic Used a Hierarchical Weighted Contact Network Model}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624841}, doi = {10.1109/ISI53945.2021.9624841}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/LuoCZZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MaunderLAHTOGM21, author = {Lauren Maunder and Joshua Lyons and Lauren Anderson and Joe Harrison and Brian Timana{-}Gomez and Paul O'Donnell and Kiernan B. George and Alan J. Michaels}, title = {Identifying Corporate Political Trends Online}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624686}, doi = {10.1109/ISI53945.2021.9624686}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/MaunderLAHTOGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/OttoASZC21, author = {Kaeli Otto and Benjamin Ampel and Sagar Samtani and Hongyi Zhu and Hsinchun Chen}, title = {Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624846}, doi = {10.1109/ISI53945.2021.9624846}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/OttoASZC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PordelkhakiFJ21, author = {Moojan Pordelkhaki and Shereen Fouad and Mark B. Josephs}, title = {Intrusion Detection for Industrial Control Systems by Machine Learning using Privileged Information}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624757}, doi = {10.1109/ISI53945.2021.9624757}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/PordelkhakiFJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/QianCZ21, author = {Haoda Qian and Liping Chen and Qiwen Zha}, title = {Mining User's Opinion Towards the Rising and Falling Trends of the Stock Market: {A} Hybrid Model}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--3}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624687}, doi = {10.1109/ISI53945.2021.9624687}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/QianCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SikoraFM21, author = {Marek Sikora and Radek Fujdiak and Jiri Misurec}, title = {Analysis and detection of application-independent slow Denial of Service cyber attacks}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624789}, doi = {10.1109/ISI53945.2021.9624789}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/SikoraFM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/StamatoPESTR21, author = {Stefano Z. Stamato and Andrew J. Park and Brian Eng and Valerie Spicer and Herbert H. Tsang and D. Kim Rossmo}, title = {Differences in Geographic Profiles When Using Street Routing Versus Manhattan Distances in Buffer Zone Radii Calculations}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624736}, doi = {10.1109/ISI53945.2021.9624736}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/StamatoPESTR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SunKHP21, author = {Ying Sun and Qingchao Kong and Luwen Huangfu and Jin Pan}, title = {Domain-oriented News Recommendation in Security Applications}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624817}, doi = {10.1109/ISI53945.2021.9624817}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/SunKHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/TianXML21, author = {Yuan Tian and Nan Xu and Wenji Mao and Yin Luo}, title = {A Central Opinion Extraction Framework for Boosting Performance on Sentiment Analysis}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624682}, doi = {10.1109/ISI53945.2021.9624682}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/TianXML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/VahediASC21, author = {Tala Vahedi and Benjamin Ampel and Sagar Samtani and Hsinchun Chen}, title = {Identifying and Categorizing Malicious Content on Paste Sites: {A} Neural Topic Modeling Approach}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624765}, doi = {10.1109/ISI53945.2021.9624765}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/VahediASC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ValeroLSSHZ21, author = {Maria Valero and Lei Li and Hossain Shahriar and Shahriar Sobhan and Michael Steven Handlin and Jinghua Zhang}, title = {Emotional Analysis of Learning Cybersecurity with Games}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624680}, doi = {10.1109/ISI53945.2021.9624680}, timestamp = {Sun, 05 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/ValeroLSSHZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WangCY21, author = {Bo{-}Xiang Wang and Jiann{-}Liang Chen and Chiao{-}Lin Yu}, title = {Cyber Security Threat Intelligence Monitoring and Classification}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--3}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624746}, doi = {10.1109/ISI53945.2021.9624746}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/WangCY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/YangCZZZL21, author = {Yunrong Yang and Zhidong Cao and Pengfei Zhao and Daniel Dajun Zeng and Qingpeng Zhang and Yin Luo}, title = {Extracting Impacts of Non-pharmacological Interventions for {COVID-19} From Modelling Study}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624840}, doi = {10.1109/ISI53945.2021.9624840}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/YangCZZZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/YangKMW21, author = {Hanxuan Yang and Qingchao Kong and Wenji Mao and Lei Wang}, title = {Boosting Hidden Graph Node Classification for Large Social Networks}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624788}, doi = {10.1109/ISI53945.2021.9624788}, timestamp = {Mon, 18 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/YangKMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhangZM21, author = {Xingwei Zhang and Xiaolong Zheng and Wenji Mao}, title = {Attacking DNN-based Cross-modal Retrieval Hashing Framework with Adversarial Perturbations}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624750}, doi = {10.1109/ISI53945.2021.9624750}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/ZhangZM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhouWLZ21, author = {Lina Zhou and Kanlun Wang and Jianwei Lai and Dongsong Zhang}, title = {Behaviors of Unwarranted Password Identification via Shoulder-Surfing during Mobile Authentication}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--3}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624730}, doi = {10.1109/ISI53945.2021.9624730}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/ZhouWLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isi/2021, title = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021}, doi = {10.1109/ISI53945.2021}, isbn = {978-1-6654-3838-4}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.