default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 89 matches
- 2024
- Xinhong Hei, Jianfeng Chen, Yichuan Wang, Xin Song, Lei Zhu:
A Novel Multipath Data Transmission Method with Traffic Obfuscation. NaNA 2024: 293-298 - Guiliang Cai, Qiang Wu, Wei Su:
Enabling Service Continuity Support for Low-Latency Services over Mobile Edge with Ubiquitous Mobility. NaNA 2024: 102-107 - Yizhi Cao, Zewei Guo, Qifeng Miao, Ranran Sun, Ji He, Xiaochen Li:
Minimization of Age of Information for Satellite-Terrestrial Covert Communication with a Full-Duplex Receiver. NaNA 2024: 242-246 - Yanfei Cao, Naijie Gu, Xinyue Shen, Daiyuan Yang, Xingmin Zhang:
Defending Large Language Models Against Jailbreak Attacks Through Chain of Thought Prompting. NaNA 2024: 125-130 - Xin Cao, Yu Han, Liumei Zhang, Yuanjiao Hu:
Research on Malicious Attack Detection and Evaluation Methods based on Entropy Increase Analysis. NaNA 2024: 202-208 - Jia Cao, Jiayue Zhou, Jianan Hong:
UE-detectable Authentication and Key Agreement Method Resisting Serving Network Forging. NaNA 2024: 424-430 - Tianying Chen, Jianfeng Chen, Xiao Li:
Research on Intelligent Big Data Collaborative Supervision System on Quality and Security Properties. NaNA 2024: 405-410 - Huan Chen, Li Li, Yunwang Xu:
Reducing Redundancy of Data Samples Method Based on Data-Importance Analysis. NaNA 2024: 523-528 - Zijian Chen, Limei Peng, Pin-Han Ho:
A Novel GNN-based Decoding Scheme for Sparse Code Multiple Access (SCMA). NaNA 2024: 160-165 - Yu Chen, Guozhu Zhao, Xu Han, Yichen Li, Chun Fang, Chongjie Wang, Yueyue Zhu:
Two-Factor Authentication for IIoT Systems Utilizing Environmental Background Features. NaNA 2024: 465-471 - Zhiyin Chen, Feng Zhou, Youliang Tian, Shuai Wang:
A Blockchain-Based Dynamic Incentive Model in Mobile Edge Computing. NaNA 2024: 54-59 - Shuhui Fang, Xuejun Wan, Jun Wang, Lin Chai, Wenlin Pan, Wu Wang:
HiDS Data clustering algorithm based on differential privacy. NaNA 2024: 131-136 - Keshuang Han, Huangwenqing Shi, Runqing Wang, Pinchang Zhang:
Utilizing Space-Time Coding Metasurface for FMCW Radar Spoofing in RIS-Assisted Communication Systems. NaNA 2024: 108-111 - Huifeng Hao, Shenghui Zhao, Guilin Chen, Shu Zhao, Yong Ge:
Segmentation of multi-residential activities based on spatial correlation and FWC-CPD. NaNA 2024: 444-452 - Zhijie Hu, Qing Kou, RuiBing Shen, PeiQiao Yang:
Smart Garbage Design Based on Voice Recognition. NaNA 2024: 339-344 - Zhao Huang, Xin Gao, Xiao Liu, Lu Fan, Junjun Wang, Quan Wang:
A Dynamic Evolutionary Game-based Defense Method for Mining Pools against DDoS Attacks. NaNA 2024: 299-304 - Junbo Huang, Youliang Tian, Kedi Yang, Linjie Wang:
A Service-Oriented Anonymous Authentication Scheme with Partial-Disclosure in C-ITS. NaNA 2024: 35-41 - Jian Li, Wei Tong, Lingxiao Yang, Xiangshang Gao, Zesong Dong, Chen Wang:
Blockchain and Oracle-Driven Web3 Architecture for Data Interaction. NaNA 2024: 333-338 - Qiaoyang Li, Yanan Sun, Ning Xi:
LFL-COBC: Lightweight Federated Learning On Blockchain-based Device Contribution Allocation. NaNA 2024: 1-7 - Jiaqi Li, Ruoxia Yao, Yiping Tan, Jingwei Xuan, Yan Li:
An HIV/AIDS model with gender differences and awareness differences. NaNA 2024: 48-53 - Han Li, Chuanwei Yang, Baitong Zha, Lifan Liu, Zhiwei Zhang, Shuo Zhong:
A Real-time APT Attack Detection Scheme Based on Fusion Provenance Graph in Private Clouds. NaNA 2024: 490-495 - Xiaoxue Liu, Xinwei Duan, Xinhong Hei, Yichuan Wang, Xin Song:
Compiler Differentiation Detection Method for Binary Similarity. NaNA 2024: 72-77 - Yuanjun Liu, Zhihong Liu, Yong Zeng:
Divide-and-Conquer Based Traffic Classification: Towards A Cascaded Classifier. NaNA 2024: 478-483 - Jin Liu, Zan Li, Qiguang Miao, Li Yang, Peihan Qi, Danyang Wang:
Analog Circuit Design of Normalized Bistable Stochastic Resonance Model and Its Application in Weak Signal Processing. NaNA 2024: 15-20 - Na Liu, Guanghui Shao, Yanbo Yang, Jiawei Zhang, Teng Li:
Review on the Research Progress of Machine Learning in Network Coding. NaNA 2024: 510-515 - Yanni Liu, Ayong Ye, Yuanhuang Liu, Wenting Lu:
Few-Shot Malware Classification using Malware Variant and Model Augmentation. NaNA 2024: 399-404 - Qiaoling Lu, Feng Tian, Jie Ren, Mengdi Li:
Defense Against Membership Inference Attacks on Imbalanced Dataset Using Generated Data. NaNA 2024: 154-159 - Xiaoli Ma, Guangsen Chen, Haoxuan Zhang, Tao Qin:
Towards Hierarchically Extracting Network Topologies. NaNA 2024: 386-392 - Jiarun Ma, Shiling Feng, Jiahao Zeng, Jia Lu, Jie Chen:
Smart Contract Vulnerability Detection Based on Prompt-guided ChatGPT. NaNA 2024: 321-326 - Phavithra Manoharan, Jiao Yin, Hua Wang, Yanchun Zhang, Wenjie Ye:
Insider Threat Detection: A Review. NaNA 2024: 147-153
skipping 59 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-18 01:07 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint