Pub Date : 2019-12-15DOI: 10.1007/978-3-030-41579-2_38
Wenjuan Liang, Hong Chen, Yuncheng Wu, Cuiping Li
{"title":"Differentially Private Frequent Itemset Mining Against Incremental Updates","authors":"Wenjuan Liang, Hong Chen, Yuncheng Wu, Cuiping Li","doi":"10.1007/978-3-030-41579-2_38","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_38","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129350477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-15DOI: 10.1007/978-3-030-41579-2_39
Pingchuan Ma, Zhiqiang Wang, Le Zhang, Ruming Wang, X. Zou, Tao Yang
{"title":"Differentially Private Reinforcement Learning","authors":"Pingchuan Ma, Zhiqiang Wang, Le Zhang, Ruming Wang, X. Zou, Tao Yang","doi":"10.1007/978-3-030-41579-2_39","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_39","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127320146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-15DOI: 10.1007/978-3-030-41579-2_18
Andreas Abraham, Felix Hörandner, O. Omolola, Sebastian Ramacher
{"title":"Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems","authors":"Andreas Abraham, Felix Hörandner, O. Omolola, Sebastian Ramacher","doi":"10.1007/978-3-030-41579-2_18","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_18","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128448005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-15DOI: 10.1007/978-3-030-41579-2_43
L. Yuan, Zhiyong Zeng, Yikang Lu, Xiaofeng Ou, Tao Feng
{"title":"A Character-Level BiGRU-Attention for Phishing Classification","authors":"L. Yuan, Zhiyong Zeng, Yikang Lu, Xiaofeng Ou, Tao Feng","doi":"10.1007/978-3-030-41579-2_43","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_43","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122260273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-26DOI: 10.1007/978-3-030-41579-2_28
Qiang Tang
{"title":"Towards Blockchain-enabled Searchable Encryption","authors":"Qiang Tang","doi":"10.1007/978-3-030-41579-2_28","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_28","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114123535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-29DOI: 10.1007/978-3-030-01950-1_27
Henning Kopp, F. Kargl, Christoph Bösch
{"title":"Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons","authors":"Henning Kopp, F. Kargl, Christoph Bösch","doi":"10.1007/978-3-030-01950-1_27","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_27","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114515805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-29DOI: 10.1007/978-3-030-01950-1_38
Yang Han, Yongqiang Li, Mingsheng Wang
{"title":"Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets","authors":"Yang Han, Yongqiang Li, Mingsheng Wang","doi":"10.1007/978-3-030-01950-1_38","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_38","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129470715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local Revocation","authors":"Maharage Nisansala Sevwandi Perera, Takeshi Koshiba","doi":"10.1007/978-3-030-01950-1_17","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_17","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124002090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-29DOI: 10.1007/978-3-030-01950-1_43
L. Wang, Min Zhu, Qing Li, Bibo Tu
{"title":"Simau: A Dynamic Privilege Management Mechanism for Host in Cloud Datacenters","authors":"L. Wang, Min Zhu, Qing Li, Bibo Tu","doi":"10.1007/978-3-030-01950-1_43","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_43","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123679411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-29DOI: 10.1007/978-3-030-01950-1_3
Xi Luo, Liming Wang, Zhen Xu, W. An
{"title":"LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains","authors":"Xi Luo, Liming Wang, Zhen Xu, W. An","doi":"10.1007/978-3-030-01950-1_3","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_3","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125632019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}