Search concepts
|
Selected Filters
|
- 35,300 - 35,350 out of 40,010 results
Search results
-
Conference contribution
Secret sharing via noisy broadcast channels
Lai, L., Liang, Y., Du, W. & Shamai, S., 2011, 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011. p. 1955-1959 5 p. 6033894. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
4 Scopus citations -
Secure and efficient multi-party directory publication for privacy-preserving data sharing
Areekijseree, K., Tang, Y., Chen, J., Wang, S., Iyengar, A. & Palanisamy, B., 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Li, Y., Chang, B., Zhu, S. & Beyah, R. (eds.). Springer Verlag, p. 71-94 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 254).Research output: Chapter in Book/Entry/Poem › Conference contribution
1 Scopus citations -
Secure and Private Sequence Comparisons
Atallah, M. J., Kerschbaum, F. & Du, W., 2003, Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003. Samarati, P. & Syverson, P. (eds.). Association for Computing Machinery, p. 39-44 6 p. (Proceedings of the ACM Workshop on Privacy in the Electronic Society).Research output: Chapter in Book/Entry/Poem › Conference contribution
145 Scopus citations -
Secure broadcasting over fading channels with statistical QoS constraints
Qiao, D., Gursoy, M. C. & Velipasalar, S., 2010, 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010. 5683470. (GLOBECOM - IEEE Global Telecommunications Conference).Research output: Chapter in Book/Entry/Poem › Conference contribution
5 Scopus citations -
Secure coding over networks
Xu, J. & Chen, B., Nov 19 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2116-2120 5 p. 5205251. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Secure communication in the low-SNR regime: A characterization of the energy-secrecy tradeoff
Gursoy, M. C., 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2291-2295 5 p. 5205914. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
15 Scopus citations -
Secure communication over fading channels
Liang, Y. & Poor, H. V., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 817-823 7 p. (44th Annual Allerton Conference on Communication, Control, and Computing 2006; vol. 2).Research output: Chapter in Book/Entry/Poem › Conference contribution
43 Scopus citations -
Secure communication over fading channels with statistical QoS constraints
Qiao, D., Gursoy, M. C. & Velipasalar, S., 2010, 2010 IEEE International Symposium on Information Theory, ISIT 2010 - Proceedings. p. 2503-2507 5 p. 5513448. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Secure consistency verification for untrusted cloud storage by public blockchains
Li, K., Tang, Y., Kim, B. H. B. & Xu, J., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, p. 39-62 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems
Yoon, M. K., Mohan, S., Choi, J., Kim, J. E. & Sha, L., 2013, 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium, RTAS 2013. p. 21-32 12 p. 6531076. (Real-Time Technology and Applications - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
66 Scopus citations -
Secure distributed detection in the presence of eavesdroppers
Nadendla, V. S. S., Chen, H. & Varshney, P. K., Dec 1 2010, Conference Record of the 44th Asilomar Conference on Signals, Systems and Computers, Asilomar 2010. p. 1437-1441 5 p. 5757773. (Conference Record - Asilomar Conference on Signals, Systems and Computers).Research output: Chapter in Book/Entry/Poem › Conference contribution
18 Scopus citations -
Secured tag identification using EDSA (Enhanced Distributed Scalable Architecture)
Ahamed, S. I., Rahman, F. & Hoque, M. E., Dec 3 2008, Proceedings of the 23rd Annual ACM Symposium on Applied Computing, SAC'08. p. 1902-1907 6 p. (Proceedings of the ACM Symposium on Applied Computing).Research output: Chapter in Book/Entry/Poem › Conference contribution
1 Scopus citations -
Secure multi-party computational geometry
Atallah, M. J. & Du, W., 2001, Algorithms and Data Structures - 7th International Workshop, WADS 2001, Proceedings. Dehne, F., Sack, J-R. & Tamassia, R. (eds.). Springer Verlag, p. 165-179 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2125).Research output: Chapter in Book/Entry/Poem › Conference contribution
101 Scopus citations -
Secure nested codes for type II wiretap channels
Liu, R., Liang, Y., Poor, H. V. & Spasojević, P., 2007, 2007 IEEE Information Theory Workshop, ITW 2007, Proceedings. p. 337-342 6 p. 4313097. (2007 IEEE Information Theory Workshop, ITW 2007, Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
81 Scopus citations -
Secure relay beamforming over cognitive radio channels
Zhang, J. & Gursoy, M. C., 2011, 2011 45th Annual Conference on Information Sciences and Systems, CISS 2011. 5766188. (2011 45th Annual Conference on Information Sciences and Systems, CISS 2011).Research output: Chapter in Book/Entry/Poem › Conference contribution
15 Scopus citations -
Securing app distribution process of iOS exploiting the notion of authentic update
Akter, S., Rahman, F. & Al Islam, A. B. M. A., Feb 5 2016, Proceedings of 2016 International Conference on Networking Systems and Security, NSysS 2016. Institute of Electrical and Electronics Engineers Inc., 7400689. (Proceedings of 2016 International Conference on Networking Systems and Security, NSysS 2016).Research output: Chapter in Book/Entry/Poem › Conference contribution
1 Scopus citations -
Securing BGP through keychain-based signatures
Heng, Y., Bo, S., Haining, W. & Jianping, P., 2007, 2007 Fifteenth IEEE International Workshop on Quality of Service, IWQoS 2007. p. 154-163 10 p. 4262466. (IEEE International Workshop on Quality of Service, IWQoS).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Securing highly-sensitive information in smart mobile devices through difficult-to-mimic and single-time usage analytics
Sarmin, S., Anzum, N., Zubaer, K. H., Rahman, F. & Al Islam, A. B. M. A., Nov 5 2018, Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Mobiquitous 2018. Association for Computing Machinery, p. 322-331 10 p. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Entry/Poem › Conference contribution
Open Access -
Securing Mobile Systems GPS and Camera Functions Using TrustZone Framework
Salman, A. S. & Du, W., 2021, Intelligent Computing - Proceedings of the 2021 Computing Conference. Arai, K. (ed.). Springer Science and Business Media Deutschland GmbH, p. 868-884 17 p. (Lecture Notes in Networks and Systems; vol. 285).Research output: Chapter in Book/Entry/Poem › Conference contribution
3 Scopus citations -
Security analysis and enhancement of model compressed deep learning systems under adversarial attacks
Liu, Q., Liu, T., Liu, Z., Wang, Y., Jin, Y. & Wen, W., Feb 20 2018, ASP-DAC 2018 - 23rd Asia and South Pacific Design Automation Conference, Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 721-726 6 p. (Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC; vol. 2018-January).Research output: Chapter in Book/Entry/Poem › Conference contribution
29 Scopus citations -
Security Automation for Information Security Continuous Monitoring: Research Framework
AlSadhan, T. & Park, J. S., Aug 31 2016, Proceedings - 2016 IEEE World Congress on Services, SERVICES 2016. Institute of Electrical and Electronics Engineers Inc., p. 130-131 2 p. 7557410Research output: Chapter in Book/Entry/Poem › Conference contribution
4 Scopus citations -
Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach
Kwiat, L., Kamhoua, C. A., Kwiat, K. A., Tang, J. & Martin, A., Aug 19 2015, Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015. Pu, C. & Mohindra, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 556-563 8 p. 7214090. (Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015).Research output: Chapter in Book/Entry/Poem › Conference contribution
25 Scopus citations -
Security challenges and countermeasures for trusted virtualized computing environments
Brooks, T., Caicedo, C. & Park, J., Oct 11 2012, World Congress on Internet Security, WorldCIS-2012. p. 117-122 6 p. 6280210. (World Congress on Internet Security, WorldCIS-2012).Research output: Chapter in Book/Entry/Poem › Conference contribution
4 Scopus citations -
Security Issues in IPv6 Networks
Caicedo Bastidas, C. E. & Joshi, J., 2008, Proceedings of the ITERA 2008 Conference. Louisville, KYResearch output: Chapter in Book/Entry/Poem › Conference contribution
-
Security models for contextual based global processing an architecture and overview
Vert, G., Iyengar, S. S. & Phoha, V., 2009, CSIIRW09: Fifth Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies. 53. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Entry/Poem › Conference contribution
1 Scopus citations -
Security relevancy analysis on the registry of windows NT 4.0
Du, W., Garg, P. & Mathur, A. P., 1999, Proceedings - 15th Annual Computer Security Applications Conference, ACSAC 1999. Association for Computing Machinery, p. 331-338 8 p. 816044. (Proceedings - Annual Computer Security Applications Conference, ACSAC; vol. Part F133431).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
SEED: A suite of instructional laboratories for computer SEcurity EDucation
Du, W., Teng, Z. & Wang, R., 2007, SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education. p. 486-490 5 p. (SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education).Research output: Chapter in Book/Entry/Poem › Conference contribution
7 Scopus citations -
SEED Emulator: An Internet Emulator for Research and Education
Du, W., Zeng, H. & Won, K., Nov 14 2022, HotNets 2022 - Proceedings of the 2022 21st ACM Workshop on Hot Topics in Networks. Association for Computing Machinery, Inc, p. 101-107 7 p. (HotNets 2022 - Proceedings of the 2022 21st ACM Workshop on Hot Topics in Networks).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Seeing beyond visibility: A four way fusion of user authentication for efficient usable security on mobile devices
Rahman, F., Gani, M. O., Ahsan, G. M. T. & Ahamed, S. I., Sep 17 2014, Proceedings - 8th International Conference on Software Security and Reliability - Companion, SERE-C 2014. Institute of Electrical and Electronics Engineers Inc., p. 121-129 9 p. 6901649. (Proceedings - 8th International Conference on Software Security and Reliability - Companion, SERE-C 2014).Research output: Chapter in Book/Entry/Poem › Conference contribution
12 Scopus citations -
Segmentation via annealed motion estimates
Abdel-Qader, I. & Bujanovic, T., Jan 1 2004, 2009 IEEE MTT-S International Microwave Workshop Series on Signal Integrity and High-Speed Interconnects, IMWS 2009. IEEE Computer Society, p. 297-301 5 p. 4569396. (2004 IEEE Electro/Information Technology Conference, EIT 2004).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Seismic analysis of solid waste landfills
Del Nero, D. E., Corcoran, B. W. & Bhatia, S. K., 1995, Geotechnical Special Publication. 54 ed. American Society of Civil Engineers (ASCE), p. 61-72 12 p.Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Seismic performance study on the joint of crisscross concrete-filled steel tube column-steel beam in different axial compression ratios
Xu, Y. F., Zhu, S. J., Xu, P. Y. & Aboutaha, R. S., 2014, Advances in Civil Structures IV. Trans Tech Publications Ltd, p. 305-308 4 p. (Applied Mechanics and Materials; vol. 578-579).Research output: Chapter in Book/Entry/Poem › Conference contribution
1 Scopus citations -
Seismic retrofit of R/C columns using steel jackets
Aboutaha, R. S., Engelhardt, M. D., Jirsa, J. O. & Kreger, M. E., Jun 1 1996, Seismic Rehabilitation of Concrete Structures. Sabnis, G. M., Shroff, A. C. & Kahn, L. F. (eds.). American Concrete Institute, p. 59-72 14 p. (American Concrete Institute, ACI Special Publication; vol. SP-160).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Seismic retrofit of R/C columns with inadequate lap splices
Aboutaha, R. S., Engelhardt, M. D., Jisra, J. O. & Kreger, M. E., Jan 1 1994, Structures Congress XII. Publ by ASCE, p. 1502-1507 6 p. (Structures Congress XII).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Seismic strengthening of R/C columns using steel jackets
Aboutaha, R. S., Engelhardt, M. D., Jirsa, J. O. & Kreger, M. E., Jan 1 1993, Structural Engineering in Natural Hazards Mitigation. Publ by ASCE, p. 301-306 6 p. (Structural Engineering in Natural Hazards Mitigation).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Selection, majorization and replicators
Menon, A., Mehrotra, K. G., Mohan, C. K. & Ranka, S., 1996, Proceedings of the IEEE Conference on Evolutionary Computation. IEEE Computer Society, p. 606-610 5 p.Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Selection of conventional generation resources for optimal replacement by wind power generations
Philippe, W. P. J., Iannone, E., Eftekharnejad, S. & Ghosh, P. K., Feb 2020, 2020 IEEE Texas Power and Energy Conference, TPEC 2020. Institute of Electrical and Electronics Engineers Inc., 9042520. (2020 IEEE Texas Power and Energy Conference, TPEC 2020).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Selection of multiple credible contingencies for real time contingency analysis
Eftekharnejad, S., Sep 30 2015, IEEE Power and Energy Society General Meeting. IEEE Computer Society, Vol. 2015-September. 7286593Research output: Chapter in Book/Entry/Poem › Conference contribution
5 Scopus citations -
Selective crossover: Towards fitter offspring
Mohan, C. K., Feb 27 1998, Proceedings of the 1998 ACM Symposium on Applied Computing, SAC 1998. Association for Computing Machinery, p. 374-378 5 p. (Proceedings of the ACM Symposium on Applied Computing; vol. 02-February-1998).Research output: Chapter in Book/Entry/Poem › Conference contribution
5 Scopus citations -
Selective parts-based tracking through occlusions
Cornacchia, M. & Velipasalar, S., Mar 7 2018, 2017 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 171-175 5 p. (2017 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2017 - Proceedings; vol. 2018-January).Research output: Chapter in Book/Entry/Poem › Conference contribution
3 Scopus citations -
Selective water transport across uniform sub-nanometer pores in microfabricated membranes
Humplik, T., Raj, R., Maroo, S. C., Laoui, T. & Wang, E. N., 2014, 2014 Solid-State Sensors, Actuators and Microsystems Workshop, Hilton Head 2014. Allen, M. G. & Mehregany, M. (eds.). Transducer Research Foundation, p. 107-108 2 p. (Technical Digest - Solid-State Sensors, Actuators, and Microsystems Workshop).Research output: Chapter in Book/Entry/Poem › Conference contribution
Open Access -
Self assembled fibrinogen structures film on selected surfaces in molecule level
Bai, Z., Gilbert, J. L. & Gettens, R., Dec 1 2004, Transactions - 7th World Biomaterials Congress. 1 p. (Transactions - 7th World Biomaterials Congress).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Self-awareness in a computer supported collaborative learning environment
Cho, K. & Cho, M. H., 2007, Online Communities and Social Computing - Second International Conference, OCSC 2007. Held as Part of HCI International 2007, Proceedings. Springer Verlag, p. 284-291 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4564 LNCS).Research output: Chapter in Book/Entry/Poem › Conference contribution
Open Access -
Self-induced transition between stable and thermoacoustically excited states in a gas turbine combustor
Boxx, I. G., Geigle, K. P., Carter, C. D., Lewalle, J. & Kumgeh, B. A., 2017, AIAA SciTech Forum - 55th AIAA Aerospace Sciences Meeting. American Institute of Aeronautics and Astronautics Inc., AIAA 2017-1102. (AIAA SciTech Forum - 55th AIAA Aerospace Sciences Meeting).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Self Promotion in US Congressional Tweets
Wang, J., Cui, K. & Yu, B., 2021, NAACL-HLT 2021 - 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Proceedings of the Conference. Association for Computational Linguistics (ACL), p. 4893-4899 7 p. (NAACL-HLT 2021 - 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Proceedings of the Conference).Research output: Chapter in Book/Entry/Poem › Conference contribution
1 Scopus citations -
Self-structured confabulation network for fast anomaly detection and reasoning
Chen, Q., Wu, Q., Bishop, M., Linderman, R. & Qiu, Q., Sep 28 2015, 2015 International Joint Conference on Neural Networks, IJCNN 2015. Institute of Electrical and Electronics Engineers Inc., 7280371. (Proceedings of the International Joint Conference on Neural Networks; vol. 2015-September).Research output: Chapter in Book/Entry/Poem › Conference contribution
5 Scopus citations -
Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks
Hyun, S., Ning, P., Liu, A. & Du, W., 2008, Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008. p. 445-456 12 p. 4505494. (Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008).Research output: Chapter in Book/Entry/Poem › Conference contribution
91 Scopus citations -
Semantics-aware Android malware classification using weighted contextual API dependency graphs
Zhang, M., Duan, Y., Yin, H. & Zhao, Z., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 1105-1116 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).Research output: Chapter in Book/Entry/Poem › Conference contribution
368 Scopus citations -
Semantics-preserving dissection of Javascript exploits via dynamic JS-binary analysis
Hu, X., Prakash, A., Wang, J., Zhou, R., Cheng, Y. & Yin, H., 2016, Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Dacier, M., Monrose, F., Blanc, G. & Garcia-Alfaro, J. (eds.). Springer Verlag, p. 254-276 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Semantics versus syntax versus computations machine models for type-2 polynomial-time bounded functionals
Royer, J. S., 1995, Proceedings of the IEEE Annual Structure in Complexity Theory Conference. Anon (ed.). IEEE Computer Society, p. 37-48 12 p.Research output: Chapter in Book/Entry/Poem › Conference contribution