default search action
Lihua Yin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Lihua Yin, Sixin Lin, Zhe Sun, Ran Li, Yuanyuan He, Zhiqiang Hao:
A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy. Digit. Commun. Networks 10(2): 389-403 (2024) - [j46]Nan Wei, Lihua Yin, Jingyi Tan, Chuhong Ruan, Chuang Yin, Zhe Sun, Xi Luo:
An Autoencoder-Based Hybrid Detection Model for Intrusion Detection With Small-Sample Problem. IEEE Trans. Netw. Serv. Manag. 21(2): 2402-2412 (2024) - [j45]Xi Luo, Honghui Fan, Lihua Yin, Shijie Jia, Kaiyan Zhao, Hongyu Yang:
CAG-Malconv: A Byte-Level Malware Detection Method With CBAM and Attention-GRU. IEEE Trans. Netw. Serv. Manag. 21(5): 5859-5872 (2024) - [j44]Lihua Yin, Sixin Lin, Zhe Sun, Simin Wang, Ran Li, Yuanyuan He:
PriMonitor: An adaptive tuning privacy-preserving approach for multimodal emotion detection. World Wide Web (WWW) 27(1): 9 (2024) - [c54]Meifan Zhang, Xin Liu, Lihua Yin:
Sketches-Based Join Size Estimation Under Local Differential Privacy. ICDE 2024: 1726-1738 - [i5]Meifan Zhang, Xin Liu, Lihua Yin:
Sketches-based join size estimation under local differential privacy. CoRR abs/2405.11419 (2024) - [i4]Meifan Zhang, Zhanhong Xie, Lihua Yin:
Private and Communication-Efficient Federated Learning based on Differentially Private Sketches. CoRR abs/2410.05733 (2024) - 2023
- [j43]Lihua Yin, Muyijie Zhu, Wenxin Liu, Xi Luo, Chonghua Wang, Yangyang Li:
WaterPurifier: A scalable system to prevent the DNS water torture attack in 5G-enabled SIoT network. Comput. Commun. 199: 186-195 (2023) - [j42]Chaoxiong Wang, Chao Li, Hai Huang, Jing Qiu, Jianfeng Qu, Lihua Yin:
ASNN-FRR: A traffic-aware neural network for fastest route recommendation. GeoInformatica 27(1): 39-60 (2023) - [j41]Nan Wei, Lihua Yin, Xiaoming Zhou, Chuhong Ruan, Yibo Wei, Xi Luo, Youyi Chang, Zhao Li:
A feature enhancement-based model for the malicious traffic detection with small-scale imbalanced dataset. Inf. Sci. 647: 119512 (2023) - [j40]Meifan Zhang, Sixin Lin, Lihua Yin:
Local differentially private frequency estimation based on learned sketches. Inf. Sci. 649: 119667 (2023) - [j39]Yixin Li, Muyijie Zhu, Xi Luo, Lihua Yin, Ye Fu:
A privacy-preserving botnet detection approach in largescale cooperative IoT environment. Neural Comput. Appl. 35(19): 13725-13737 (2023) - [j38]Yuhan Chai, Lei Du, Jing Qiu, Lihua Yin, Zhihong Tian:
Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection. IEEE Trans. Knowl. Data Eng. 35(5): 4754-4766 (2023) - [j37]Jiajie Xu, Jiayu Song, Yu Sang, Lihua Yin:
CDAML: a cluster-based domain adaptive meta-learning model for cross domain recommendation. World Wide Web (WWW) 26(3): 989-1003 (2023) - [i3]Meifan Zhang, Xin Liu, Lihua Yin:
Sensitivity estimation for differentially private query processing. CoRR abs/2304.09546 (2023) - [i2]Meifan Zhang, Dihang Deng, Lihua Yin:
Partition-based differentially private synthetic data generation. CoRR abs/2310.06371 (2023) - 2022
- [j36]Kexiang Qian, Yixin Li, Muyijie Zhu, Lihua Yin, Bin Wang, Xi Luo:
FPMBot: Discovering the frequent pattern of IoT-botnet domain queries in large-scale network. Comput. Commun. 191: 378-385 (2022) - [j35]Zhe Sun, Junping Wan, Lihua Yin, Zhiqiang Cao, Tianjie Luo, Bin Wang:
A blockchain-based audit approach for encrypted data in federated learning. Digit. Commun. Networks 8(5): 614-624 (2022) - [j34]Yuhan Chai, Zhe Sun, Jing Qiu, Lihua Yin, Zhihong Tian:
TPRPF: a preserving framework of privacy relations based on adversarial training for texts in big data. Frontiers Comput. Sci. 16(4): 164618 (2022) - [j33]Ran Li, Yuanfei Zhang, Lihua Yin, Zhe Sun, Zheng Lin, Peng Fu, Weiping Wang, Gang Shi:
EmoMix+: An Approach of Depression Detection Based on Emotion Lexicon for Mobile Application. Secur. Commun. Networks 2022: 1208846:1-1208846:12 (2022) - [j32]Yuhan Chai, Jing Qiu, Lihua Yin, Lejun Zhang, Brij B. Gupta, Zhihong Tian:
From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification. IEEE Trans. Netw. Serv. Manag. 19(4): 4248-4261 (2022) - [c53]Lihua Yin, Yang Lv, Zhe Sun, Fuqiang Tao, Ran Li:
A Quantifying Approach for Evaluating Differential Privacy in Deep Learning. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2272-2278 - [i1]Meifan Zhang, Sixin Lin, Lihua Yin:
Local Differentially Private Frequency Estimation based on Learned Sketches. CoRR abs/2211.01138 (2022) - 2021
- [j31]Lihua Yin, Jiyuan Feng, Sixin Lin, Zhiqiang Cao, Zhe Sun:
A blockchain-based collaborative training method for multi-party data sharing. Comput. Commun. 173: 70-78 (2021) - [j30]Xi Luo, Ye Fu, Lihua Yin, Hao Xun, Yixin Li:
A scalable rule engine system for trigger-action application in large-scale IoT environment. Comput. Commun. 177: 220-229 (2021) - [j29]Xi Luo, Lei Feng, Hao Xun, Yuanfei Zhang, Yixin Li, Lihua Yin:
Rinegan: A Scalable Image Processing Architecture for Large Scale Surveillance Applications. Frontiers Neurorobotics 15: 648101 (2021) - [j28]Jiajie Xu, Jiabao Sun, Rui Zhou, Chengfei Liu, Lihua Yin:
CISK: An interactive framework for conceptual inference based spatial keyword query. Neurocomputing 428: 368-375 (2021) - [j27]Yu Sang, Huimin Sun, Chao Li, Lihua Yin:
LSVP: A visual based deep neural direction learning model for point-of-interest recommendation on sparse check-in data. Neurocomputing 446: 204-210 (2021) - [j26]Shen Su, Zhihong Tian, Shuang Li, Jinxi Deng, Lihua Yin, Xiaojiang Du, Mohsen Guizani:
IoT root union: A decentralized name resolving system for IoT based on blockchain. Inf. Process. Manag. 58(3): 102553 (2021) - [j25]Ning Hu, Zhihong Tian, Yanbin Sun, Lihua Yin, Baokang Zhao, Xiaojiang Du, Nadra Guizani:
Building Agile and Resilient UAV Networks Based on SDN and Blockchain. IEEE Netw. 35(1): 57-63 (2021) - [j24]Chao Li, Fan Li, Lihua Yin, Tianjie Luo, Bin Wang:
A Blockchain-Based IoT Cross-Domain Delegation Access Control Method. Secur. Commun. Networks 2021: 3091104:1-3091104:11 (2021) - [j23]Zhaoquan Gu, Weixiong Hu, Chuanjing Zhang, Hui Lu, Lihua Yin, Le Wang:
Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks. IEEE Trans. Netw. Sci. Eng. 8(2): 921-932 (2021) - [j22]Lihua Yin, Jiyuan Feng, Hao Xun, Zhe Sun, Xiaochun Cheng:
A Privacy-Preserving Federated Learning for Multiparty Data Sharing in Social IoTs. IEEE Trans. Netw. Sci. Eng. 8(3): 2706-2718 (2021) - 2020
- [j21]Xi Luo, Lihua Yin, Chao Li, Chonghua Wang, Fuyang Fang, Chunsheng Zhu, Zhihong Tian:
A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment. IEEE Access 8: 67192-67204 (2020) - [j20]Yuanyuan Chen, Jing Qiu, Xiaojiang Du, Lihua Yin, Zhihong Tian:
Security of Mobile Multimedia Data: The Adversarial Examples for Spatio-temporal Data. Comput. Networks 181: 107432 (2020) - [j19]Zhe Sun, Lihua Yin, Chao Li, Weizhe Zhang, Ang Li, Zhihong Tian:
The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach. Comput. Secur. 96: 101876 (2020) - [j18]Jiajie Xu, Jing Chen, Lihua Yin:
Multi-objective spatial keyword query with semantics: a distance-owner based approach. Distributed Parallel Databases 38(3): 625-647 (2020) - [j17]Lihua Yin, Binxing Fang, Yunchuan Guo, Zhe Sun, Zhihong Tian:
Hierarchically defining Internet of Things security: From CIA to CACA. Int. J. Distributed Sens. Networks 16(1) (2020) - [j16]Lihua Yin, Xi Luo, Chunsheng Zhu, Liming Wang, Zhen Xu, Hui Lu:
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries. IEEE Trans. Ind. Informatics 16(2): 1373-1384 (2020) - [j15]Hanyi Wang, Kun He, Ben Niu, Lihua Yin, Fenghua Li:
Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission. Wirel. Commun. Mob. Comput. 2020: 8836351:1-8836351:10 (2020) - [c52]Xiangyi Kong, Zhaoquan Gu, Le Wang, Lihua Yin, Shudong Li, Weihong Han:
Resume Extraction and Validation from Public Information. CIAT 2020: 355-359 - [c51]Xiangyi Kong, Zhaoquan Gu, Lihua Yin:
A Unified Information Diffusion Model for Social Networks. DSC 2020: 38-44 - [c50]Yushun Xie, Zhaoquan Gu, Bin Zhu, Le Wang, Weihong Han, Lihua Yin:
Adversarial Examples for Chinese Text Classification. DSC 2020: 238-245 - [c49]Yunyi Tang, Wang Le, Xiaolong Chen, Zhaoquan Gu, Lihua Yin, Xin Yi:
Automatic Classification of Matching Rules in Pattern Matching. DSC 2020: 302-306 - [c48]Yunchuan Guo, Han Zhang, Zifu Li, Fenghua Li, Liang Fang, Lihua Yin, Jin Cao:
Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long? ICC 2020: 1-6 - [c47]Yan Sun, Lihua Yin, Zhe Sun, Zhihong Tian, Xiaojiang Du:
An IoT data sharing privacy preserving scheme. INFOCOM Workshops 2020: 984-990 - [c46]Yuhan Chai, Jing Qiu, Shen Su, Chunsheng Zhu, Lihua Yin, Zhihong Tian:
LGMal: A Joint Framework Based on Local and Global Features for Malware Detection. IWCMC 2020: 463-468 - [c45]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Ben Niu, Fenghua Li, Lihua Yin:
A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles. WCNC 2020: 1-7 - [e1]Zhihong Tian, Lihua Yin, Zhaoquan Gu:
CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, Virtual Event / Guangzhou, China, December 5, 2020. ACM 2020, ISBN 978-1-4503-8782-8 [contents]
2010 – 2019
- 2019
- [j14]Jing Qiu, Zirui Xing, Chunsheng Zhu, Kunfeng Lu, Jialuan He, Yanbin Sun, Lihua Yin:
Centralized Fusion Based on Interacting Multiple Model and Adaptive Kalman Filter for Target Tracking in Underwater Acoustic Sensor Networks. IEEE Access 7: 25948-25958 (2019) - [j13]Shuzhuang Zhang, Yu Zhang, Lihua Yin, Tingting Yuan, Zhigang Wu, Hao Luo:
Mining Frequent Items Over the Distributed Hierarchical Continuous Weighted Data Streams in Internet of Things. IEEE Access 7: 74890-74898 (2019) - [j12]Juan Chen, Zhihong Tian, Xiang Cui, Lihua Yin, Xianzhi Wang:
Trust architecture and reputation evaluation for internet of things. J. Ambient Intell. Humaniz. Comput. 10(8): 3099-3107 (2019) - [j11]Lihua Yin, Huiwen Liu:
Searching Activity Trajectories with Semantics. J. Comput. Sci. Technol. 34(4): 775-794 (2019) - [j10]Huibing Zhang, Tong Li, Lihua Yin, Dingke Liu, Ya Zhou, Jingwei Zhang, Fang Pan:
A Novel KGP Algorithm for Improving INS/GPS Integrated Navigation Positioning Accuracy. Sensors 19(7): 1623 (2019) - [c44]Juan Chen, Lihua Yin, Tianle Zhang, Yan Liu, Zhian Deng:
Data Storage Method for Fast Retrieval in IoT. CSPS 2019: 1324-1327 - [c43]Yanwei Sun, Li Chen, Lihua Yin, Yunchuan Guo, Xiangjie Meng, Peng Zhang:
Construction of Situation Assessment Indicator System Based on Latitude and Longitude Lines of Information Security. DSC 2019: 100-105 - [c42]Dongwen Zhang, Yaqi Si, Zhihong Tian, Lihua Yin, Jing Qiu, Xiaojiang Du:
A Genetic-Algorithm Based Method for Storage Location Assignments in Mobile Rack Warehouses. GLOBECOM 2019: 1-6 - [c41]Zhaoquan Gu, Yuexuan Wang, Keke Tang, Chao Li, Mohan Li, Lihua Yin:
A General Framework for Adjustable Neighbor Discovery in Wireless Sensor Networks. iThings/GreenCom/CPSCom/SmartData 2019: 129-134 - 2018
- [j9]Zhihong Tian, Yu Cui, Lun An, Shen Su, Xiaoxia Yin, Lihua Yin, Xiang Cui:
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus. IEEE Access 6: 35355-35364 (2018) - [j8]Lihua Yin, Yanwei Sun, Zhen Wang, Yunchuan Guo, Fenghua Li, Binxing Fang:
Security Measurement for Unknown Threats Based on Attack Preferences. Secur. Commun. Networks 2018: 7412627:1-7412627:13 (2018) - [j7]Lihua Yin, Yunchuan Guo, Fenghua Li, Yanwei Sun, Junyan Qian, Athanasios V. Vasilakos:
A game-theoretic approach to advertisement dissemination in ephemeral networks. World Wide Web 21(2): 241-260 (2018) - [c40]Zhaoquan Gu, Yongcai Wang, Jing Qiu, Lihua Yin, Zhihong Tian:
How to Control Target Nodes in Dynamic Networks. DSC 2018: 266-273 - [c39]Yunchuan Guo, Liang Fang, Kui Geng, Lihua Yin, Fenghua Li, Lihua Chen:
Real-Time Data Incentives for IoT Searches. ICC 2018: 1-6 - [c38]Yanwei Sun, Lihua Yin, Zhen Wang, Yunchuan Guo, Binxing Fang:
Identifying the Propagation Sources of Stealth Worms. ICCS (3) 2018: 811-817 - [c37]Fenghua Li, Yongjun Li, Zhengkun Yang, Yunchuan Guo, Lihua Yin, Zhen Wang:
Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System. ICCCN 2018: 1-9 - [c36]Jingquan Ding, Xiao Li, Yunchuan Guo, Lihua Yin, Huibing Zhang:
Process Calculus for Modeling and Quantifying Location Privacy. IIKI 2018: 407-415 - [c35]Liang Fang, Lihua Yin, Yunchuan Guo, Zhen Wang, Fenghua Li:
Resolving Access Conflicts: An Auction-Based Incentive Approach. MILCOM 2018: 1-6 - 2017
- [c34]Fenghua Li, Fangxin Xiong, Chao Li, Lihua Yin, Guozhen Shi, Boxiu Tian:
SRAM: A State-Aware Risk Assessment Model for Intrusion Response. DSC 2017: 232-237 - [c33]Liang Fang, Lihua Yin, Qiaoduo Zhang, Fenghua Li, Binxing Fang:
Who Is Visible: Resolving Access Policy Conflicts in Online Social Networks. GLOBECOM 2017: 1-6 - [c32]Yanwei Sun, Lihua Yin, Yunchuan Guo, Fenghua Li, Binxing Fang:
Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game. ICA3PP 2017: 313-327 - [c31]Jing Li, Lihua Yin, Yunchuan Guo, Chao Li, Fenghua Li, Lihua Chen:
A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks. NSS 2017: 486-496 - [c30]Ziwen Liu, Liang Fang, Lihua Yin, Yunchuan Guo, Fenghua Li:
Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field. SpaCCS Workshops 2017: 54-63 - 2016
- [c29]Lihua Yin, Liang Fang, Ben Niu, Binxing Fang, Fenghua Li:
Hunting abnormal configurations for permission-sensitive role mining. MILCOM 2016: 1004-1009 - 2015
- [j6]Xiang Cui, Lihua Yin, Shuyuan Jin, Zhiyu Hao, Shuhao Li:
Botnet spoofing: fighting botnet with itself. Secur. Commun. Networks 8(1): 80-89 (2015) - [c28]Lihua Yin, Yunchuan Guo, Yanwei Sun, Junyan Qian, Athanasios V. Vasilakos:
Ad Dissemination Game in Ephemeral Networks. APWeb 2015: 610-622 - [c27]Daiyong Quan, Lihua Yin, Yunchuan Guo:
Assessing the Disclosure of User Profile in Mobile-Aware Services. Inscrypt 2015: 451-467 - [c26]Daiyong Quan, Lihua Yin, Yunchuan Guo:
Enhancing the Trajectory Privacy with Laplace Mechanism. TrustCom/BigDataSE/ISPA (1) 2015: 1218-1223 - 2014
- [j5]Yan Sun, Lihua Yin, Licai Liu, Shuang Xin:
Toward inference attacks for k-anonymity. Pers. Ubiquitous Comput. 18(8): 1871-1880 (2014) - [c25]Chao Lee, Lihua Yin, Lan Dong:
A Modified-k-Anonymity Towards Spatial-Temporal Historical Data in Location-Based Social Network Service. APWeb Workshophs 2014: 301-311 - [c24]Yan Sun, Lihua Yin:
A Security Routing Mechanism against Sybil Attacks in Mobile Social Networks. APWeb Workshophs 2014: 325-332 - [c23]Kaiwen Sun, Lihua Yin:
Attribute-Role-Based Hybrid Access Control in the Internet of Things. APWeb Workshophs 2014: 333-343 - [c22]Licai Liu, Lihua Yin, Yunchuan Guo, Bingxing Fang:
EAC: A Framework of Authentication Property for the IOTs. CyberC 2014: 102-105 - [c21]Yunchuan Guo, Lihua Yin, Li Chao:
Automatically verifying STRAC policy. INFOCOM Workshops 2014: 141-142 - [c20]Yan Sun, Lihua Yin, Wenmao Liu:
Defending sybil attacks in mobile social networks. INFOCOM Workshops 2014: 163-164 - [c19]Licai Liu, Yunchuan Guo, Lihua Yin:
Analyzing asking/bidding price in dynamic game for cooperative authentication. INFOCOM Workshops 2014: 165-166 - [c18]Yunchuan Guo, Lihua Yin, Licai Liu, Binxing Fang:
Utility-based cooperative decision in cooperative authentication. INFOCOM 2014: 1006-1014 - [c17]Licai Liu, Lihua Yin, Yunchuan Guo, Bingxing Fang:
Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs. TrustCom 2014: 212-220 - 2013
- [j4]Lei Zhang, Hongli Zhang, Xiajiong Shen, Lihua Yin:
A bottom-up algorithm of vertical assembling concept lattices. Int. J. Data Min. Bioinform. 7(3): 229-244 (2013) - [c16]Licai Liu, Yunchuan Guo, Lihua Yin, Yan Sun:
Balancing authentication and location privacy in cooperative authentication. ANCS 2013: 107-108 - [c15]Yan Sun, Lihua Yin, Licai Liu:
Towards a Trusted Mobile RFID Network Framework. CyberC 2013: 53-58 - [c14]Yan Sun, Lihua Yin, Shuang Xin:
Privacy Vulnerability Analysis on Routing in Mobile Social Networks. ICPADS 2013: 454-455 - [c13]Chao Lee, Yunchuan Guo, Lihua Yin:
A Framework of Evaluation Location Privacy in Mobile Network. ITQM 2013: 879-887 - 2012
- [j3]Yibao Bao, Lihua Yin, Binxing Fang, Li Guo:
A novel logic-based automatic approach to constructing compliant security policies. Sci. China Inf. Sci. 55(1): 149-164 (2012) - [j2]Zhi Yang, Lihua Yin, Shuyuan Jin, Xingyuan Chen:
Optimal mining on security labels for decentralized information flow control. Comput. Secur. 31(8): 912-924 (2012) - [c12]Jinyu Wu, Lihua Yin, Yunchuan Guo:
Cyber Attacks Prediction Model Based on Bayesian Network. ICPADS 2012: 730-731 - [c11]Chao Lee, Lihua Yin, Yunchuan Guo:
A Cluster-Based Multilevel Security Model for Wireless Sensor Networks. Intelligent Information Processing 2012: 320-330 - [c10]Jinyu Wu, Lihua Yin, Binxing Fang:
A Novel Dynamic Self-adaptive Framework for Network Security Evaluation. ISCTCS 2012: 604-612 - [c9]Jinyu Wu, Lihua Yin, Binxing Fang:
Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract). RAID 2012: 378-379 - 2011
- [c8]Zhi Yang, Lihua Yin, Miyi Duan, Shuyuan Jin:
Poster: towards formal verification of DIFC policies. CCS 2011: 873-876 - [c7]Juan Chen, Hongli Zhang, Binxing Fang, Xiaojiang Du, Lihua Yin, Xiang-Zhan Yu:
Towards Efficient Anonymous Communications in Sensor Networks. GLOBECOM 2011: 1-5 - [c6]Xiang Cui, Binxing Fang, Lihua Yin, Xiaoyi Liu, Tianning Zang:
Andbot: Towards Advanced Mobile Botnets. LEET 2011 - 2010
- [j1]Lihua Yin, Binxing Fang, Yunchuan Guo, Hui He:
Formalization and Quantitative Analysis of Controllability on Internet Information Security. Int. J. Web Appl. 2(2): 109-120 (2010) - [c5]Yunchuan Guo, Lihua Yin, Yuan Zhou, Binxing Fang:
Quantifying Information Leakage for Fully Probabilistic Systems. CIT 2010: 589-595 - [c4]Wenmao Liu, Lihua Yin, Weizhe Zhang, Hongli Zhang:
A General Distributed Object Locating Architecture in the Internet of Things. ICPADS 2010: 730-735
2000 – 2009
- 2009
- [c3]Lihua Yin, Yunchuan Guo:
Research on Quantitative Evaluation for Integrity. IAS 2009: 689-692 - [c2]Yunchuan Guo, Lihua Yin, Yuan Zhou, Chao Li, Li Guo:
Simulation Analysis of Probabilistic Timing Covert Channels. NAS 2009: 325-332 - 2006
- [c1]Lihua Yin, Binxing Fang, Xiang-Zhan Yu:
Distributed Group Membership Algorithm in Intrusion-Tolerant System. APWeb Workshops 2006: 511-515
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint