User Identity Linkage Across Social Networks via Community Preserving Network Embedding

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACISP (25. : 2020 : Perth, Western Australia; Online) Information security and privacy
1. Verfasser: Guo, Xiaoyu (VerfasserIn)
Weitere Verfasser: Liu, Yan (VerfasserIn), Liu, Lian (VerfasserIn), Zhang, Guangsheng (VerfasserIn), Chen, Jing (VerfasserIn), Zhao, Yuan (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
SKCN: Practical and Flexible Digital Signature from Module Lattice 2020 Gong, Boru
Optimized Arithmetic Operations for Isogeny-Based Cryptography on Huff Curves 2020 Huang, Yan
Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers 2020 Lu, Jinyu
From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption 2020 Chatterjee, Sanjit
Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme 2020 Tezuka, Masayuki
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol 2020 Zhao, Xiaopeng
Multi-input Laconic Function Evaluation 2020 Pang, Bo
Arbitrary-Centered Discrete Gaussian Sampling over the Integers 2020 Du, Yusong
DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation 2020 Kim, Bedeuro
Design and Evaluation of Enumeration Attacks on Package Tracking Systems 2020 Jang, Hanbin
Secure and Compact Elliptic Curve LR Scalar Multiplication 2020 Jin, Yaoan
Unlinkable Updatable Databases and Oblivious Transfer with Access Control 2020 Damodaran, Aditya
Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications 2020 Liu, Xiangyu
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm 2020 Yeoh, Wei-Zhu
A Blockchain-Based Resource Supervision Scheme for Edge Devices Under Cloud-Fog-End Computing Models 2020 Wang, Tongchen
Efficient Forward-Secure Threshold Public Key Encryption 2020 Kurek, Rafael
A New Targeted Password Guessing Model 2020 Xie, Zhijie
Revisiting the Hardness of Binary Error LWE 2020 Sun, Chao
PALOR: Machine Learning Security Poisoning Attacks Against Logistic Regression 2020 Wen, Jialin
Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method 2020 Oonishi, Kento
Alle Artikel auflisten