Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part I
暂无分享,去创建一个
Xiao Zhang | Jaideep Vaidya | Jin Li | Jaideep Vaidya | Jin Li | Xiao Zhang
[1] Eike Kiltz,et al. A Modular Analysis of the Fujisaki-Okamoto Transformation , 2017, TCC.
[2] Muhammad Munwar Iqbal,et al. Enhanced Network Anomaly Detection Based on Deep Neural Networks , 2018, IEEE Access.
[3] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[4] Yang Wei,et al. Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN Neural Network , 2006, Sixth International Conference on Intelligent Systems Design and Applications.
[5] Yiqiang Sheng,et al. HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection , 2018, IEEE Access.
[6] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.
[7] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[8] Ruud Pellikaan,et al. On the Efficient Decoding of Algebraic-Geometric Codes , 1993 .
[9] Christiane Peters,et al. Information-Set Decoding for Linear Codes over Fq , 2010, PQCrypto.
[10] Yang Yu,et al. Session-Based Network Intrusion Detection Using a Deep Learning Architecture , 2017, MDAI.
[11] Xin-Wen Wu,et al. Efficient root-finding algorithm with application to list decoding of Algebraic-Geometric codes , 2001, IEEE Trans. Inf. Theory.
[12] Laurence T. Yang,et al. An Improved Stacked Auto-Encoder for Network Traffic Flow Classification , 2018, IEEE Network.
[13] Edgar Martínez-Moro,et al. Computational aspects of retrieving a representation of an algebraic geometry code , 2014, J. Symb. Comput..
[14] Fang Liu,et al. Machine Learning Combining with Visualization for Intrusion Detection: A Survey , 2016, MDAI.
[15] Ruud Pellikaan,et al. On the decoding of algebraic-geometric codes , 1995, IEEE Trans. Inf. Theory.
[16] Zhenlong Yuan,et al. DroidDetector: Android Malware Characterization and Detection Using Deep Learning , 2016 .
[17] R. McEliece. The Guruswami-Sudan Decoding Algorithm for Reed-Solomon Codes , 2003 .
[18] Nan Jiang,et al. Localization Scheme for Wireless Sensor Networks Based on "Shortcut" Constraint , 2015, Ad Hoc Sens. Wirel. Networks.
[19] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[20] Eugene Prange,et al. The use of information sets in decoding cyclic codes , 1962, IRE Trans. Inf. Theory.
[21] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[22] Alain Couvreur,et al. Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and Their Subcodes , 2017, IEEE Transactions on Information Theory.
[23] Ruud Pellikaan,et al. On decoding by error location and dependent sets of error positions , 1992, Discret. Math..
[24] Elwyn R. Berlekamp,et al. On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[25] cedric. faure. Cryptanalysis of the McEliece cryptosystem over hyperelliptic codes , 2008 .
[26] Joseph H. Silverman,et al. The arithmetic of elliptic curves , 1986, Graduate texts in mathematics.
[27] Edgar Martínez-Moro,et al. On the unique representation of very strong algebraic geometry codes , 2014, Des. Codes Cryptogr..
[28] Stanislav Bulygin,et al. On lower bounds for information set decoding over Fq and on the effect of partial knowledge , 2017 .
[29] Oscar Moreno,et al. McEliece public key cryptosystems using algebraic-geometric codes , 1996 .
[30] Christopher Leckie,et al. High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning , 2016, Pattern Recognit..
[31] Ling Gao,et al. A Cooperative Deep Belief Network for Intrusion Detection , 2018, 2018 Sixth International Conference on Advanced Cloud and Big Data (CBD).
[32] José Antonio Lozano,et al. Sensitivity Analysis of k-Fold Cross Validation in Prediction Error Estimation , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[33] V. Sidelnikov,et al. On insecurity of cryptosystems based on generalized Reed-Solomon codes , 1992 .
[34] Virender Ranga,et al. Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning , 2018 .
[35] Yong Wang,et al. Intrusion Detection Method based on Deep Learning , 2021, 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom).
[36] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[37] Morgan Barbier,et al. Key reduction of McEliece's cryptosystem using list decoding , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[38] Amin Shokrollahi,et al. List Decoding of Algebraic-Geometric Codes , 1999, IEEE Trans. Inf. Theory.
[39] Tanja Lange,et al. Attacking and defending the McEliece cryptosystem , 2008, IACR Cryptol. ePrint Arch..
[40] Qi Cheng,et al. Hard Problems of Algebraic Geometry Codes , 2005, IEEE Transactions on Information Theory.
[41] Venkatesan Guruswami,et al. On Representations of Algebraic-Geometric Codes for List Decoding , 2000, ESA.
[42] Madhu Sudan,et al. Decoding of Reed Solomon Codes beyond the Error-Correction Bound , 1997, J. Complex..
[43] Adel Sabry Eesa,et al. A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems , 2015, Expert Syst. Appl..
[44] Bin Li,et al. C-POEM: comprehensive performance optimization evaluation model for wireless sensor networks , 2017, Soft Comput..
[45] Lorenz Minder,et al. Cryptography based on error correcting codes , 2007 .