Information engineering

Results: 31112



#Item
1Computing / Software / Computer architecture / Smartphones / Cloud clients / Personal computing / Android / Benchmark / Google Play / HERE WeGo / IOS / BlackBerry Priv

Towards Measuring Real-World Performance of Android Devices Pascal Bissig, Gino Brunner, Florian Gubler, Roger Wattenhofer, Andreas Zingg Department of Electrical Engineering and Information Technology ETH Zurich, Switze

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2018-09-20 07:32:16
2Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
3Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
4Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 09:17:38
5Music / Computer music / Learning / Artificial intelligence / Unsupervised learning / Machine learning / Cognitive science / Generative adversarial network / Generative model / Artificial neural network / Synthesizer / Algorithmic composition

Symbolic Music Genre Transfer with CycleGAN Gino Brunner, Yuyi Wang, Roger Wattenhofer and Sumu Zhao* Department of Information Technology and Electrical Engineering ETH Z¨urich Switzerland brunnegi,yuwang,wattenhofer,s

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2018-09-17 07:11:23
6Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnets / Intrusion detection system / Server / Cluster analysis / Internet bot / Computer security

Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 13:01:38
7Information science / Collective intelligence / Recommender systems / Information retrieval / Collaboration / Social information processing / Information systems / Collaborative filtering / Matrix factorization / Machine learning / Personalization

TRecSo: Enhancing Top-k Recommendation With Social Information ∗ Chanyoung Park, Donghyun Kim, Jinoh Oh, Hwanjo Yu† Dept. of Computer Science and Engineering

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:59:03
8Automated planning and scheduling / Temporal logic / Computation tree logic / Logic in computer science / STRIPS / Planning Domain Definition Language / Theoretical computer science / Computing

Planning with PDDL3.0 Preferences by Compilation into STRIPS with Action Costs Percassi Francesco University of Brescia Department of Information Engineering

Add to Reading List

Source URL: icaps16.icaps-conference.org

Language: English - Date: 2016-06-09 08:09:37
9Carnegie Mellon Silicon Valley / Education / Carnegie Mellon University / Master of Science in Information Technology / Course credit / Carnegie Mellon School of Computer Science / Tepper School of Business

Carnegie Mellon University Africa Department Information and Communication TechnologyRwanda 2018‐2019 Handbook Master’s Degree in Information Technology (MSIT)

Add to Reading List

Source URL: www.africa.engineering.cmu.edu

Language: English - Date: 2018-09-12 05:46:12
10Cryptography / Public-key cryptography / Transport Layer Security / Cryptographic software / Secure communication / Cryptographic protocols / Mbed TLS / Cipher suite / OpenSSL / Forward secrecy / Post-quantum cryptography / HTTPS

1 Postquantum SSL/TLS for embedded systems Yun-An Chang† , Ming-Shing Chen†‡ , Jong-shian Wu† , Bo-Yin Yang‡ , of Electrical Engineering, National Taiwan University, Taiwan ‡ Institute of Information Science

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2014-12-08 15:44:41
UPDATE