A Data Protection Scheme via Isolating Android Partitions

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:CSS (11. : 2019 : Kanton, Stadt) Cyberspace safety and security ; Part 1
1. Verfasser: Yang, Kai (VerfasserIn)
Weitere Verfasser: Ma, Xiaoya (VerfasserIn), Jiang, Hongwei (VerfasserIn), Xue, Yuan (VerfasserIn), Han, Wencong (VerfasserIn), Wang, Lianfang (VerfasserIn), Liu, Lu (VerfasserIn)
Pages:1
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2019
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Encrypting VoLTE Communication via Baseband Firmware Extension 2019 Wang, Yao
BQSV: Protecting SDN Controller Cluster’s Network Topology View Based on Byzantine Quorum System with Verification Function 2019 Zhi, Yifang
A Data Protection Scheme via Isolating Android Partitions 2019 Yang, Kai
Shuffle Dense Networks for Biometric Authentication 2019 Zang, Huaijuan
Cooperative Privacy Preservation for Internet of Vehicles with Mobile Edge Computing 2019 Luo, Jun
Non-linguistic Features for Cyberbullying Detection on a Social Media Platform Using Machine Learning 2019 Liu, YuYi
Cloud Security Solution Based on Software Defined Network 2019 Zhao, Shengli
Research on Logistics Distribution Vehicle Scheduling Algorithm Based on Cloud Computing 2019 Liu, Huwei
Spoofing Attack Detection for Radar Network System State Estimation 2019 Huang, Tianqi
Attribute-Based Signatures for Inner-Product Predicate from Lattices 2019 Zhang, Yanhua
Achieving Data Security, Access Control and Authentication of Controllers in Hierarchical Software Defined Networking with Attribute Based Encryption 2019 Xu, YuHua
A Differentially Private Trajectory Publishing Mechanism Based on Stay Points 2019 Xia, Ying
IMES: An Automatically Scalable Invisible Membrane Image Encryption for Privacy Protection on IoT Sensors 2019 Lv, Songzhan
Efficient Privacy Protection Authentication Scheme in Vehicle Ad Hoc Networks 2019 ShanGuo, Lv
ADS-B Data Attack Detection Based on Generative Adversarial Networks 2019 Li, Tengyao
Stealthy and Sparse False Data Injection Attacks Based on Machine Learning 2019 Tian, Jiwei
An Improvement of the Degradation of Speaker Recognition in Continuous Cold Speech for Home Assistant 2019 Ai, Haojun
Evading PDF Malware Classifiers with Generative Adversarial Network 2019 Wang, Yaxiao
Privacy-Aware Service Migration for Edge Computing in Urban Cities 2019 Liu, Xihua
File Recovery of High-Order Clearing First Cluster Based on FAT32 2019 Chang, Xu
Alle Artikel auflisten