Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ml4cs/ml4cs2019.bht:"
@inproceedings{DBLP:conf/ml4cs/0001CFM19, author = {Cong Sun and Jun Chen and Pengbin Feng and Jianfeng Ma}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {CatraDroid: {A} Call Trace Driven Detection of Malicious Behaiviors in Android Applications}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {63--77}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_6}, doi = {10.1007/978-3-030-30619-9\_6}, timestamp = {Tue, 27 Sep 2022 14:19:43 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/0001CFM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/ChenLWX19, author = {Kai Chen and Zhongrui Lin and Jian Wan and Chungen Xu}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Interpretable Encrypted Searchable Neural Networks}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {279--289}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_20}, doi = {10.1007/978-3-030-30619-9\_20}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/ChenLWX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/ChowSWBBK019, author = {Yang{-}Wai Chow and Willy Susilo and Jianfeng Wang and Richard Buckland and Joonsang Baek and Jongkil Kim and Nan Li}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Protecting the Visual Fidelity of Machine Learning Datasets Using {QR} Codes}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {320--335}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_23}, doi = {10.1007/978-3-030-30619-9\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/ChowSWBBK019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/Coulter0Z019, author = {Rory Coulter and Lei Pan and Jun Zhang and Yang Xiang}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {A Visualization-Based Analysis on Classifying Android Malware}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {304--319}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_22}, doi = {10.1007/978-3-030-30619-9\_22}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/Coulter0Z019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/HamzaHP19, author = {Rafik Hamza and Alzubair Hassan and Akash Suresh Patil}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {A Lightweight Secure IoT Surveillance Framework Based on {DCT-DFRT} Algorithms}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {271--278}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_19}, doi = {10.1007/978-3-030-30619-9\_19}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/HamzaHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/HassanHMPL19, author = {Alzubair Hassan and Rafik Hamza and Vittor Gift Mawutor and Akash Suresh Patil and Fagen Li}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {A Lightweight Certificateless User Authentication Scheme for Mobile Environment}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {112--122}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_9}, doi = {10.1007/978-3-030-30619-9\_9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/HassanHMPL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/LiCYJL19, author = {Hang Li and Mengqi Chen and Shengbo Yan and Chunfu Jia and Zhaohui Li}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Password Guessing via Neural Language Modeling}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {78--93}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_7}, doi = {10.1007/978-3-030-30619-9\_7}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/LiCYJL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/LiFYH19, author = {Guoquan Li and Yulong Fu and Zheng Yan and Weilin Hao}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Quantifiable Network Security Measurement: {A} Study Based on an Index System}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {47--62}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_5}, doi = {10.1007/978-3-030-30619-9\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/LiFYH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/LiTM0L19, author = {Wenjuan Li and Jiao Tan and Weizhi Meng and Yu Wang and Jing Li}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {SwipeVLock: {A} Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {140--153}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_11}, doi = {10.1007/978-3-030-30619-9\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/LiTM0L19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/LiangMMYZLL19, author = {Chen Liang and Meixia Miao and Jianfeng Ma and Hongyan Yan and Qun Zhang and Xinghua Li and Teng Li}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Detection of {GPS} Spoofing Attack on Unmanned Aerial Vehicle System}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {123--139}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_10}, doi = {10.1007/978-3-030-30619-9\_10}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/LiangMMYZLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/LiangXFTM19, author = {Yu Liang and Yi Xie and Xingrui Fei and Xincheng Tan and Haishou Ma}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Content Recognition of Network Traffic Using Wavelet Transform and {CNN}}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {224--238}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_16}, doi = {10.1007/978-3-030-30619-9\_16}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/LiangXFTM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/LinLDS019, author = {Zihan Lin and Xiaozhen Lu and Canhuang Dai and Geyi Sheng and Liang Xiao}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Reinforcement Learning Based {UAV} Trajectory and Power Control Against Jamming}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {336--347}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_24}, doi = {10.1007/978-3-030-30619-9\_24}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/LinLDS019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/LinWYLLZ19, author = {Yue Lin and He Wang and Bowen Yang and Mingrui Liu and Yin Li and Yuqing Zhang}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {A Blackboard Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {253--270}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_18}, doi = {10.1007/978-3-030-30619-9\_18}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/LinWYLLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/LiuSCCSL19, author = {Lin Liu and Jinshu Su and Rongmao Chen and Jinrong Chen and Guangliang Sun and Jie Li}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {361--377}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_26}, doi = {10.1007/978-3-030-30619-9\_26}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/LiuSCCSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/LuanGZ19, author = {Luan Luan and Chunxiang Gu and Yonghui Zheng}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {An Enumeration-Like Vector Sampling Method for Solving Approximate {SVP}}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {154--172}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_12}, doi = {10.1007/978-3-030-30619-9\_12}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/LuanGZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/MaJZWLL19, author = {Xu Ma and Cunmei Ji and Xiaoyu Zhang and Jianfeng Wang and Jin Li and Kuan{-}Ching Li}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Secure Multiparty Learning from Aggregation of Locally Trained Models}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {173--182}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_13}, doi = {10.1007/978-3-030-30619-9\_13}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/MaJZWLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/MaoZZF19, author = {Deming Mao and Shuwen Zhang and Ling Zhang and Yu Feng}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Game Theory Based Dynamic Defense Mechanism for {SDN}}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {290--303}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_21}, doi = {10.1007/978-3-030-30619-9\_21}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/MaoZZF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/QiuNL0T0019, author = {Junyang Qiu and Surya Nepal and Wei Luo and Lei Pan and Yonghang Tai and Jun Zhang and Yang Xiang}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Data-Driven Android Malware Intelligence: {A} Survey}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {183--202}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_14}, doi = {10.1007/978-3-030-30619-9\_14}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/QiuNL0T0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/Rao0LF19, author = {Xue Rao and Ning Xi and Jing Lv and Pengbin Feng}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Compositional Information Flow Verification for Inter Application Communications in Android System}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {239--252}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_17}, doi = {10.1007/978-3-030-30619-9\_17}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/Rao0LF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/RongZL19, author = {Wei Rong and Bowen Zhang and Xixiang Lv}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Malicious Web Request Detection Using Character-Level {CNN}}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {6--16}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_2}, doi = {10.1007/978-3-030-30619-9\_2}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/RongZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/TanuwidjajaCK19, author = {Harry Chandra Tanuwidjaja and Rakyong Choi and Kwangjo Kim}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {A Survey on Deep Learning Techniques for Privacy-Preserving}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {29--46}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_4}, doi = {10.1007/978-3-030-30619-9\_4}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/TanuwidjajaCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/Yan19, author = {Zheng Yan}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Network Data Collection, Fusion, Mining and Analytics for Cyber Security}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {1--5}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_1}, doi = {10.1007/978-3-030-30619-9\_1}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/Yan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/YangLLW19, author = {Zhiqiong Yang and Qiuheng Li and Yan Li and Zilong Wang}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {A {LBP} Texture Analysis Based Liveness Detection for Face Authentication}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {17--28}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_3}, doi = {10.1007/978-3-030-30619-9\_3}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/YangLLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/Zhang0WZ19, author = {Rongjunchen Zhang and Xiao Chen and Sheng Wen and James Zheng}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Who Activated My Voice Assistant? {A} Stealthy Attack on Android Phones Without Users' Awareness}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {378--396}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_27}, doi = {10.1007/978-3-030-30619-9\_27}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/Zhang0WZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/ZhangCS019, author = {Mingwu Zhang and Xiao Chen and Gang Shen and Yong Ding}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {A Fair and Efficient Secret Sharing Scheme Based on Cloud Assisting}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {348--360}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_25}, doi = {10.1007/978-3-030-30619-9\_25}, timestamp = {Wed, 18 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/ZhangCS019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/ZhangWZ19, author = {Lili Zhang and Wenjie Wang and Yuqing Zhang}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {203--223}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_15}, doi = {10.1007/978-3-030-30619-9\_15}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/ZhangWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ml4cs/2019, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9}, doi = {10.1007/978-3-030-30619-9}, isbn = {978-3-030-30618-2}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/JiangKJS19, title = {A Cooperative Placement Method for Machine Learning Workflows and Meteorological Big Data Security Protection in Cloud Computing}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {94--111}, publisher = {Springer}, year = {2019}, note = {Withdrawn.}, url = {https://doi.org/10.1007/978-3-030-30619-9\_8}, doi = {10.1007/978-3-030-30619-9\_8}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/JiangKJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.