Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers (Unknown)
- New search for: Lu, Wei
- New search for: Lu, Wei
- New search for: Li, Chao
- New search for: Yan, Hanbing
- New search for: Lu, Wei
- New search for: Wen, Weiping
- New search for: Zhang, Yuqing
2022
-
ISBN:
- Report / Electronic Resource
-
Title:Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers
-
Contributors:
-
Publisher:
- New search for: Springer Nature
-
Place of publication:Singapore
-
Publication date:2022
-
Size:1 electronic resource (235 pages)
-
ISBN:
-
Type of media:Report
-
Type of material:Electronic Resource
-
Language:Unknown
-
Contract number:10.1007/978-981-16-9229-1
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A Robust and Adaptive Watermarking Technique for Relational DatabaseZhang, Yexing / Wang, Zihou / Wang, Zhaoguo / Liu, Chuanyi et al. | 2022
- 2
-
A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on BlockchainZhao, Yujuan / Cui, Baojiang / Xu, Jie et al. | 2022
- 3
-
Analysis of Address Linkability in Tornado Cash on EthereumTang, Yujia / Xu, Chang / Zhang, Can / Wu, Yan / Zhu, Liehuang et al. | 2022
- 4
-
FPFlow: Detect and Prevent Browser Fingerprinting with Dynamic Taint AnalysisLi, Tianyi / Zheng, Xiaofeng / Shen, Kaiwen / Han, Xinhui et al. | 2022
- 5
-
Deep Learning Based Anomaly Detection for Muti-dimensional Time Series: A SurveyChen, Zhipeng / Peng, Zhang / Zou, Xueqiang / Sun, Haoqi et al. | 2022
- 6
-
ExitSniffer: Towards Comprehensive Security Analysis of Anomalous Binding Relationship of Exit RoutersZhang, Qingfeng / Wang, Xuebin / Shi, Jinqiao / Wang, Meiqi / Gao, Yue / Zhao, Can et al. | 2022
- 7
-
Efficient Classification of Darknet Access Activity with Partial TrafficWang, Xuebin / Wang, Meiqi / Shi, Jinqiao / Li, Zeyu / Zou, Kexin / Fang, Binxing et al. | 2022
- 8
-
Research and Application of Security Situation Awareness Platform for Large EnterprisesWang, Zhanyu et al. | 2022
- 9
-
Research on the Relationship Between Chinese Nicknames and Accounts in Social NetworksHan, Yi / Liu, Xiangyu / Du, Yanhui / Lu, Tianliang et al. | 2022
- 10
-
TFC: Defending Against SMS Fraud via a Two-Stage AlgorithmLi, Gaoxiang / Ye, Yuzhong / Shi, Yangfei / Chen, Jinlin / Chen, Dexing / Li, Anyang et al. | 2022
- 11
-
Research Towards Key Issues of API SecuritySun, Ronghua / Wang, Qianxun / Guo, Liang et al. | 2022
- 12
-
Smart Contract Vulnerability Detection Based on Symbolic Execution TechnologyLiu, Yiping / Xu, Jie / Cui, Baojiang et al. | 2022
- 13
-
A Multi-task Text Classification Model Based on Label Embedding LearningXu, Yuemei / Fan, Zuwei / Cao, Han et al. | 2022
- 14
-
A Review of Machine Learning Algorithms for Text ClassificationLi, Ruiguang / Liu, Ming / Xu, Dawei / Gao, Jiaqi / Wu, Fudong / Zhu, Liehuang et al. | 2022