Search dblp for Publications

export results for "toc:db/conf/ml4cs/ml4cs2019.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ml4cs/0001CFM19,
  author       = {Cong Sun and
                  Jun Chen and
                  Pengbin Feng and
                  Jianfeng Ma},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {CatraDroid: {A} Call Trace Driven Detection of Malicious Behaiviors
                  in Android Applications},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {63--77},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_6},
  doi          = {10.1007/978-3-030-30619-9\_6},
  timestamp    = {Tue, 27 Sep 2022 14:19:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/0001CFM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/ChenLWX19,
  author       = {Kai Chen and
                  Zhongrui Lin and
                  Jian Wan and
                  Chungen Xu},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Interpretable Encrypted Searchable Neural Networks},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {279--289},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_20},
  doi          = {10.1007/978-3-030-30619-9\_20},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/ChenLWX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/ChowSWBBK019,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Jianfeng Wang and
                  Richard Buckland and
                  Joonsang Baek and
                  Jongkil Kim and
                  Nan Li},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Protecting the Visual Fidelity of Machine Learning Datasets Using
                  {QR} Codes},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {320--335},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_23},
  doi          = {10.1007/978-3-030-30619-9\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/ChowSWBBK019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/Coulter0Z019,
  author       = {Rory Coulter and
                  Lei Pan and
                  Jun Zhang and
                  Yang Xiang},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {A Visualization-Based Analysis on Classifying Android Malware},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {304--319},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_22},
  doi          = {10.1007/978-3-030-30619-9\_22},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/Coulter0Z019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/HamzaHP19,
  author       = {Rafik Hamza and
                  Alzubair Hassan and
                  Akash Suresh Patil},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {A Lightweight Secure IoT Surveillance Framework Based on {DCT-DFRT}
                  Algorithms},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {271--278},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_19},
  doi          = {10.1007/978-3-030-30619-9\_19},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/HamzaHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/HassanHMPL19,
  author       = {Alzubair Hassan and
                  Rafik Hamza and
                  Vittor Gift Mawutor and
                  Akash Suresh Patil and
                  Fagen Li},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {A Lightweight Certificateless User Authentication Scheme for Mobile
                  Environment},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {112--122},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_9},
  doi          = {10.1007/978-3-030-30619-9\_9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/HassanHMPL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/LiCYJL19,
  author       = {Hang Li and
                  Mengqi Chen and
                  Shengbo Yan and
                  Chunfu Jia and
                  Zhaohui Li},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Password Guessing via Neural Language Modeling},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {78--93},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_7},
  doi          = {10.1007/978-3-030-30619-9\_7},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/LiCYJL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/LiFYH19,
  author       = {Guoquan Li and
                  Yulong Fu and
                  Zheng Yan and
                  Weilin Hao},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Quantifiable Network Security Measurement: {A} Study Based on an Index
                  System},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {47--62},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_5},
  doi          = {10.1007/978-3-030-30619-9\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/LiFYH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/LiTM0L19,
  author       = {Wenjuan Li and
                  Jiao Tan and
                  Weizhi Meng and
                  Yu Wang and
                  Jing Li},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {SwipeVLock: {A} Supervised Unlocking Mechanism Based on Swipe Behavior
                  on Smartphones},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {140--153},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_11},
  doi          = {10.1007/978-3-030-30619-9\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/LiTM0L19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/LiangMMYZLL19,
  author       = {Chen Liang and
                  Meixia Miao and
                  Jianfeng Ma and
                  Hongyan Yan and
                  Qun Zhang and
                  Xinghua Li and
                  Teng Li},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Detection of {GPS} Spoofing Attack on Unmanned Aerial Vehicle System},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {123--139},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_10},
  doi          = {10.1007/978-3-030-30619-9\_10},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/LiangMMYZLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/LiangXFTM19,
  author       = {Yu Liang and
                  Yi Xie and
                  Xingrui Fei and
                  Xincheng Tan and
                  Haishou Ma},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Content Recognition of Network Traffic Using Wavelet Transform and
                  {CNN}},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {224--238},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_16},
  doi          = {10.1007/978-3-030-30619-9\_16},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/LiangXFTM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/LinLDS019,
  author       = {Zihan Lin and
                  Xiaozhen Lu and
                  Canhuang Dai and
                  Geyi Sheng and
                  Liang Xiao},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Reinforcement Learning Based {UAV} Trajectory and Power Control Against
                  Jamming},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {336--347},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_24},
  doi          = {10.1007/978-3-030-30619-9\_24},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/LinLDS019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/LinWYLLZ19,
  author       = {Yue Lin and
                  He Wang and
                  Bowen Yang and
                  Mingrui Liu and
                  Yin Li and
                  Yuqing Zhang},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {A Blackboard Sharing Mechanism for Community Cyber Threat Intelligence
                  Based on Multi-Agent System},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {253--270},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_18},
  doi          = {10.1007/978-3-030-30619-9\_18},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/LinWYLLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/LiuSCCSL19,
  author       = {Lin Liu and
                  Jinshu Su and
                  Rongmao Chen and
                  Jinrong Chen and
                  Guangliang Sun and
                  Jie Li},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {361--377},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_26},
  doi          = {10.1007/978-3-030-30619-9\_26},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/LiuSCCSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/LuanGZ19,
  author       = {Luan Luan and
                  Chunxiang Gu and
                  Yonghui Zheng},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {An Enumeration-Like Vector Sampling Method for Solving Approximate
                  {SVP}},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {154--172},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_12},
  doi          = {10.1007/978-3-030-30619-9\_12},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/LuanGZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/MaJZWLL19,
  author       = {Xu Ma and
                  Cunmei Ji and
                  Xiaoyu Zhang and
                  Jianfeng Wang and
                  Jin Li and
                  Kuan{-}Ching Li},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Secure Multiparty Learning from Aggregation of Locally Trained Models},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {173--182},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_13},
  doi          = {10.1007/978-3-030-30619-9\_13},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/MaJZWLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/MaoZZF19,
  author       = {Deming Mao and
                  Shuwen Zhang and
                  Ling Zhang and
                  Yu Feng},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Game Theory Based Dynamic Defense Mechanism for {SDN}},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {290--303},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_21},
  doi          = {10.1007/978-3-030-30619-9\_21},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/MaoZZF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/QiuNL0T0019,
  author       = {Junyang Qiu and
                  Surya Nepal and
                  Wei Luo and
                  Lei Pan and
                  Yonghang Tai and
                  Jun Zhang and
                  Yang Xiang},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Data-Driven Android Malware Intelligence: {A} Survey},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {183--202},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_14},
  doi          = {10.1007/978-3-030-30619-9\_14},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/QiuNL0T0019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/Rao0LF19,
  author       = {Xue Rao and
                  Ning Xi and
                  Jing Lv and
                  Pengbin Feng},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Compositional Information Flow Verification for Inter Application
                  Communications in Android System},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {239--252},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_17},
  doi          = {10.1007/978-3-030-30619-9\_17},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/Rao0LF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/RongZL19,
  author       = {Wei Rong and
                  Bowen Zhang and
                  Xixiang Lv},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Malicious Web Request Detection Using Character-Level {CNN}},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {6--16},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_2},
  doi          = {10.1007/978-3-030-30619-9\_2},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/RongZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/TanuwidjajaCK19,
  author       = {Harry Chandra Tanuwidjaja and
                  Rakyong Choi and
                  Kwangjo Kim},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {A Survey on Deep Learning Techniques for Privacy-Preserving},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {29--46},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_4},
  doi          = {10.1007/978-3-030-30619-9\_4},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/TanuwidjajaCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/Yan19,
  author       = {Zheng Yan},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Network Data Collection, Fusion, Mining and Analytics for Cyber Security},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_1},
  doi          = {10.1007/978-3-030-30619-9\_1},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/Yan19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/YangLLW19,
  author       = {Zhiqiong Yang and
                  Qiuheng Li and
                  Yan Li and
                  Zilong Wang},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {A {LBP} Texture Analysis Based Liveness Detection for Face Authentication},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {17--28},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_3},
  doi          = {10.1007/978-3-030-30619-9\_3},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/YangLLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/Zhang0WZ19,
  author       = {Rongjunchen Zhang and
                  Xiao Chen and
                  Sheng Wen and
                  James Zheng},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Who Activated My Voice Assistant? {A} Stealthy Attack on Android Phones
                  Without Users' Awareness},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {378--396},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_27},
  doi          = {10.1007/978-3-030-30619-9\_27},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/Zhang0WZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/ZhangCS019,
  author       = {Mingwu Zhang and
                  Xiao Chen and
                  Gang Shen and
                  Yong Ding},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {A Fair and Efficient Secret Sharing Scheme Based on Cloud Assisting},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {348--360},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_25},
  doi          = {10.1007/978-3-030-30619-9\_25},
  timestamp    = {Wed, 18 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/ZhangCS019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/ZhangWZ19,
  author       = {Lili Zhang and
                  Wenjie Wang and
                  Yuqing Zhang},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {203--223},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_15},
  doi          = {10.1007/978-3-030-30619-9\_15},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/ZhangWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ml4cs/2019,
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9},
  doi          = {10.1007/978-3-030-30619-9},
  isbn         = {978-3-030-30618-2},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/JiangKJS19,
  title        = {A Cooperative Placement Method for Machine Learning Workflows and
                  Meteorological Big Data Security Protection in Cloud Computing},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {94--111},
  publisher    = {Springer},
  year         = {2019},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_8},
  doi          = {10.1007/978-3-030-30619-9\_8},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/JiangKJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics