Jian Weng

According to our database1, Jian Weng authored at least 187 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET.
IEEE Trans. Vehicular Technology, 2020

On Low-Complexity Lattice Reduction Algorithms for Large-Scale MIMO Detection: The Blessing of Sequential Reduction.
IEEE Trans. Signal Processing, 2020

Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid.
IEEE Trans. Smart Grid, 2020

Modular segregation of task-dependent brain networks contributes to the development of executive function in children.
NeuroImage, 2020

Scalable revocable identity-based signature over lattices in the standard model.
Inf. Sci., 2020

Key regeneration-free ciphertext-policy attribute-based encryption and its application.
Inf. Sci., 2020

Solving large-scale many-objective optimization problems by covariance matrix adaptation evolution strategy with scalable small subpopulations.
Inf. Sci., 2020

BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain.
IACR Cryptology ePrint Archive, 2020

An overview on smart contracts: Challenges, advances and platforms.
Future Gener. Comput. Syst., 2020

SecEL: Privacy-Preserving, Verifiable and Fault-Tolerant Edge Learning for Autonomous Vehicles.
CoRR, 2020

2019
DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation.
IEEE Trans. Vehicular Technology, 2019

BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based VANET.
IEEE Trans. Vehicular Technology, 2019

Sparse Signal Recovery With Minimization of 1-Norm Minus 2-Norm.
IEEE Trans. Vehicular Technology, 2019

Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular Networks.
IEEE Trans. Vehicular Technology, 2019

False Load Attack to Smart Meters by Synchronously Switching Power Circuits.
IEEE Trans. Smart Grid, 2019

Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing.
IEEE Trans. Services Computing, 2019

CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing.
IEEE Trans. Parallel Distrib. Syst., 2019

Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields.
IEEE Trans. Information Theory, 2019

Novel Properties of Successive Minima and Their Applications to 5G Tactile Internet.
IEEE Trans. Industrial Informatics, 2019

Adaptive population extremal optimization-based PID neural network for multivariable nonlinear control systems.
Swarm Evol. Comput., 2019

Feature selection for text classification: A review.
Multimedia Tools Appl., 2019

RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust.
J. Inf. Sec. Appl., 2019

A hybrid universal blind quantum computation.
Inf. Sci., 2019

Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification.
Inf. Sci., 2019

A Two-Layer Nonlinear Combination Method for Short-Term Wind Speed Prediction Based on ELM, ENN, and LSTM.
IEEE Internet of Things Journal, 2019

Long Optimal or Small-Defect LRC Codes with Unbounded Minimum Distances.
CoRR, 2019

Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based Applications.
CoRR, 2019

On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode.
CoRR, 2019

New Constructions of Subspace Codes Using Subsets of MRD codes in Several Blocks.
CoRR, 2019

Secure Software-Defined Networking Based on Blockchain.
CoRR, 2019

Exploiting Fine-Grain Ordered Parallelism in Dense Matrix Algorithms.
CoRR, 2019

DAEGEN: A Modular Compiler for Exploring Decoupled Spatial Accelerators.
Computer Architecture Letters, 2019

A Comprehensive Survey on Secure Outsourced Computation and Its Applications.
IEEE Access, 2019

CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Towards General Purpose Acceleration by Exploiting Common Data-Dependence Forms.
Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture, 2019

Improved Upper Bounds on the Hermite and KZ Constants.
Proceedings of the IEEE International Symposium on Information Theory, 2019

An In-depth Comparison of Compilers for Deep Neural Networks on Hardware.
Proceedings of the 15th IEEE International Conference on Embedded Software and Systems, 2019

Collision Resistant Hashing from Sub-exponential Learning Parity with Noise.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Position Manipulation Attacks to Balise-Based Train Automatic Stop Control.
IEEE Trans. Vehicular Technology, 2018

Resonance Attacks on Load Frequency Control of Smart Grids.
IEEE Trans. Smart Grid, 2018

Secure Integrated Circuit Design via Hybrid Cloud.
IEEE Trans. Parallel Distrib. Syst., 2018

Triggered-Issuance and Triggered-Execution: A Control Paradigm to Minimize Pipeline Stalls in Distributed Controlled Coarse-Grained Reconfigurable Arrays.
IEEE Trans. Parallel Distrib. Syst., 2018

Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition.
IEEE Trans. Neural Netw. Learning Syst., 2018

Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage.
IEEE Trans. Information Forensics and Security, 2018

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers.
IEEE Trans. Dependable Sec. Comput., 2018

A New Varying-Parameter Recurrent Neural-Network for Online Solution of Time-Varying Sylvester Equation.
IEEE Trans. Cybernetics, 2018

Real-Time Myocontrol of a Human-Computer Interface by Paretic Muscles After Stroke.
IEEE Trans. Cognitive and Developmental Systems, 2018

A Geographic Multicopy Routing Scheme for DTNs With Heterogeneous Mobility.
IEEE Systems Journal, 2018

Adopting secret sharing for reversible data hiding in encrypted images.
Signal Process., 2018

Single-server blind quantum computation with quantum circuit model.
Quantum Information Processing, 2018

Review on mining data from multiple data sources.
Pattern Recognit. Lett., 2018

Multi-Gait Recognition Based on Attribute Discovery.
IEEE Trans. Pattern Anal. Mach. Intell., 2018

The impact of long-term abacus training on modular properties of functional brain network.
NeuroImage, 2018

REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks.
IEEE Network, 2018

Double JPEG compression detection based on block statistics.
Multimedia Tools Appl., 2018

Feedback weight convolutional neural network for gait recognition.
J. Vis. Commun. Image Represent., 2018

Notes on a provably-secure certificate-based encryption against malicious CA attacks.
Inf. Sci., 2018

Enabling verifiable multiple keywords search over encrypted cloud data.
Inf. Sci., 2018

DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive.
IACR Cryptology ePrint Archive, 2018

Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models.
Future Gener. Comput. Syst., 2018

AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo.
Comput. Secur., 2018

Privacy-Preserving Image Processing in the Cloud.
IEEE Cloud Computing, 2018

Fully distributed certificateless threshold signature without random oracles.
SCIENCE CHINA Information Sciences, 2018

Reputation-based Distributed Knowledge Sharing System in Blockchain.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Hybrid optimization/heuristic instruction scheduling for programmable accelerator codesign.
Proceedings of the 27th International Conference on Parallel Architectures and Compilation Techniques, 2018

2017
Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.
IEEE Trans. Smart Grid, 2017

Cloudde: A Heterogeneous Differential Evolution Algorithm and Its Distributed Cloud Version.
IEEE Trans. Parallel Distrib. Syst., 2017

Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems.
IEEE Trans. Intelligent Transportation Systems, 2017

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
IEEE Trans. Information Forensics and Security, 2017

Efficient Elliptic Curve Cryptography for Embedded Devices.
ACM Trans. Embedded Comput. Syst., 2017

Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC.
Security and Communication Networks, 2017

Indistinguishability of pure orthogonal product states by LOCC.
Quantum Information Processing, 2017

Anonymous identity-based broadcast encryption technology for smart city information system.
Personal and Ubiquitous Computing, 2017

Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids.
IEEE Network, 2017

Multi-gait recognition using hypergraph partition.
Mach. Vis. Appl., 2017

Steganalysis of content-adaptive binary image data hiding.
J. Vis. Commun. Image Represent., 2017

CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing.
IACR Cryptology ePrint Archive, 2017

Collision Resistant Hashing from Learning Parity with Noise.
IACR Cryptology ePrint Archive, 2017

Copy-move forgery detection based on hybrid features.
Eng. Appl. Artif. Intell., 2017

HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive.
IEEE Access, 2017

Machine Learning-Based Malicious Application Detection of Android.
IEEE Access, 2017

Tightly Secure IBE Under Constant-Size Master Public Key.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Improved Algorithms for Robust Histogram Shape-Based Image Watermarking.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

New Proof for BKP IBE Scheme and Improvement in the MIMC Setting.
Proceedings of the Information Security Practice and Experience, 2017

New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Steganalysis with CNN Using Multi-channels Filtered Residuals.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Detecting Android Malware Based on Extreme Learning Machine.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Minimizing Pipeline Stalls in Distributed-Controlled Coarse-Grained Reconfigurable Arrays with Triggered Instruction Issue and Execution.
Proceedings of the 54th Annual Design Automation Conference, 2017

Data verification in information-centric networking with efficient revocable certificateless signature.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Vulnerable Implicit Service: A Revisit.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.
IEEE Trans. Multimedia, 2016

DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud.
IEEE Trans. Multimedia, 2016

An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.
IEEE Trans. Information Forensics and Security, 2016

Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption.
IEEE Trans. Dependable Sec. Comput., 2016

On the security of two identity-based conditional proxy re-encryption schemes.
Theor. Comput. Sci., 2016

Verifiable Computation over Large Database with Incremental Updates.
IEEE Trans. Computers, 2016

Cloud-based electronic health record system supporting fuzzy keyword search.
Soft Comput., 2016

Cloud based data sharing with fine-grained proxy re-encryption.
Pervasive Mob. Comput., 2016

Joint image splicing detection in DCT and Contourlet transform domain.
J. Vis. Commun. Image Represent., 2016

Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer.
J. Vis. Commun. Image Represent., 2016

A novel asymmetric three-party based authentication scheme in wearable devices environment.
J. Netw. Comput. Appl., 2016

A Geographic Multi-Copy Routing Scheme for DTNs With Heterogeneous Mobility.
CoRR, 2016

Secure Subway Train-to-Train Communications via GSM-R Communication Systems.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Pyramid stereo matching for spherical panoramas.
Proceedings of the 2016 Visual Communications and Image Processing, 2016

CCA-Secure Keyed-Fully Homomorphic Encryption.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing.
Proceedings of the Network and System Security - 10th International Conference, 2016

Multiple Watermarking Using Multilevel Quantization Index Modulation.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Mobile Authentication System Based on National Regulation and NFC Technology.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Pseudorandom generators from regular one-way functions: New constructions with improved parameters.
Theor. Comput. Sci., 2015

A note on the security of KHL scheme.
Theor. Comput. Sci., 2015

Efficient revocable identity-based encryption from multilinear maps.
Security and Communication Networks, 2015

Signcryption KEM/tag-KEM, revisited.
Security and Communication Networks, 2015

Emerging services and technologies in wireless networks.
J. High Speed Networks, 2015

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack.
IACR Cryptology ePrint Archive, 2015

Congestion-aware message forwarding in delay tolerant networks: a community perspective.
Concurrency and Computation: Practice and Experience, 2015

The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract).
Proceedings of the Algorithms and Computation - 26th International Symposium, 2015

(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Robust password changing and DoS resilience for human-centric password authentication.
Security and Communication Networks, 2014

Towards semantically secure outsourcing of association rule mining on categorical data.
Inf. Sci., 2014

Unforgeability of an improved certificateless signature scheme in the standard model.
IET Information Security, 2014

(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions.
IACR Cryptology ePrint Archive, 2014

Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof.
IACR Cryptology ePrint Archive, 2014

Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext.
SCIENCE CHINA Information Sciences, 2014

Fine-Grained Conditional Proxy Re-Encryption and Application.
Proceedings of the Provable Security - 8th International Conference, 2014

Identity-Embedding Method for Decentralized Public-Key Infrastructure.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Authorized Keyword Search on Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

Verifiable Computation on Outsourced Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Attribute-Based Encryption With Verifiable Outsourced Decryption.
IEEE Trans. Information Forensics and Security, 2013

Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model.
Math. Comput. Model., 2013

Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication.
IACR Cryptology ePrint Archive, 2013

Adaptable Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices.
Proceedings of the Information Security, 16th International Conference, 2013

Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Analyzing and Controlling Information Inference of Fine-Grained Access Control Policies in Relational Databases.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Accountable Authority Identity-Based Encryption with Public Traceability.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Security Model and Analysis of FHMQV, Revisited.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Zero-Knowledge Argument for Simultaneous Discrete Logarithms.
Algorithmica, 2012

A Generic Approach for Providing Revocation Support in Secret Handshake.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme.
J. Syst. Softw., 2011

On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption.
J. Inf. Sci. Eng., 2011

Cryptanalysis of a certificateless signcryption scheme in the standard model.
Inf. Sci., 2011

Cryptanalysis of an identity based broadcast encryption scheme without random oracles.
Inf. Process. Lett., 2011

Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy.
IACR Cryptology ePrint Archive, 2011

On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2011

Multi-User Private Keyword Search for Cloud Computing.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Security Mediated Certificateless Signatures Without Pairing.
JCP, 2010

Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings.
Inf. Sci., 2010

Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme.
IEICE Transactions, 2010

On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010.
IACR Cryptology ePrint Archive, 2010

Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes.
IACR Cryptology ePrint Archive, 2010

Efficient discrete logarithm based multi-signature scheme in the plain public key model.
Des. Codes Cryptogr., 2010

CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles.
SCIENCE CHINA Information Sciences, 2010

Generic Constructions of Parallel Key-Insulated Encryption.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

2009
Efficient Unidirectional Proxy Re-Encryption.
IACR Cryptology ePrint Archive, 2009

Biomolecule-assisted synthesis of 3D structure gold nanocrystals in the presence of cystamine dihydrochloride or cysteamine.
Proceedings of the IEEE International Conference on Virtual Environments, 2009

Self-enforcing Private Inference Control.
Proceedings of the Provable Security, Third International Conference, 2009

Private handshakes with optional accountability.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security, 12th International Conference, 2009

Optionally Identifiable Private Handshakes.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Conditional proxy re-encryption secure against chosen-ciphertext attack.
Proceedings of the 2009 ACM Symposium on Information, 2009

A New Approach for Anonymous Password Authentication.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Conditional Proxy Broadcast Re-Encryption.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Identity-Based Parallel Key-Insulated Signature Without Random Oracles.
J. Inf. Sci. Eng., 2008

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings.
IACR Cryptology ePrint Archive, 2008

Identity-Based Parallel Key-Insulated Signature: Framework and Construction.
Journal of Research and Practice in Information Technology, 2008

Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
Proceedings of the Topics in Cryptology, 2008

Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions.
IACR Cryptology ePrint Archive, 2007

Pirate decoder for the broadcast encryption schemes from Crypto 2005.
Science in China Series F: Information Sciences, 2007

2006
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.
Proceedings of the Progress in Cryptology, 2006

Identity-Based Key-Insulated Signature with Secure Key-Updates.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

Identity-Based Key-Insulated Signature Without Random Oracles.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...