researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2021
2022
2023
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
access control
analysis
architecture
data-flow
design
e-science
empirical
meta-model
mobile
open-source
protocol
role-based access control
rule-based
security
source-to-source
systematic-approach
testing
watermarking
Filter by Author
[+]
OR
AND
NOT
1
Ahmad-Reza Sadeghi
Atsuko Miyaji
Bao Li
Bo Qin
Dengguo Feng
Dongdai Lin
Duncan S. Wong
Guomin Yang
Joseph K. Liu
Kunpeng Wang
Lei Hu
Lukasz Krzywiecki
Qianhong Wu
Robert H. Deng
Tsuyoshi Takagi
Wenling Wu
Willy Susilo
Xinyi Huang
Yanjiang Yang
Yi Mu
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
attack
attacks
authentication
data
detection
efficient
encryption
key
model
new
privacy
protocol
scheme
secure
security
signature
signatures
system
using
ISPEC (ispec)
Editions
Publications
Viewing Publication 1 - 100 from 613
2023
IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures
Yohei Watanabe 0001
,
Naoto Yanai
,
Junji Shikata
.
ispec 2023
:
105-122
[doi]
Information Security Practice and Experience - 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings
Weizhi Meng 0001
,
Zheng Yan 0002
,
Vincenzo Piuri
, editors,
Volume 14341 of
Lecture Notes in Computer Science
, Springer,
2023.
[doi]
RTR-Shield: Early Detection of Ransomware Using Registry and Trap Files
P. Mohan Anand
,
P. V. Sai Charan
,
Hrushikesh Chunduri
,
Sandeep K. Shukla
.
ispec 2023
:
209-229
[doi]
Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G
Rabeya Basri
,
Gour C. Karmakar
,
Joarder Kamruzzaman
,
S. H. Shah Newaz
,
Linh V. Nguyen
,
Muhammad Usman 0015
.
ispec 2023
:
194-208
[doi]
DIDO: Data Provenance from Restricted TLS 1.3 Websites
Kwan Yin Chan
,
Handong Cui
,
Tsz Hon Yuen
.
ispec 2023
:
154-169
[doi]
Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities
Sohto Chiku
,
Keisuke Hara
,
Junji Shikata
.
ispec 2023
:
299-314
[doi]
Security Analysis of WAGE Against Division Property Based Cube Attack
Bijoy Das
,
Abhijit Das 0004
,
Dipanwita Roy Chowdhury
.
ispec 2023
:
492-506
[doi]
Isogeny-Based Multi-signature Scheme
Mathieu de Goyon
,
Atsuko Miyaji
.
ispec 2023
:
477-491
[doi]
Cryptanalysis of Human Identification Protocol with Human-Computable Passwords
Maciej Grzeskowiak
,
Lukasz Krzywiecki
,
Karol Niczyj
.
ispec 2023
:
347-364
[doi]
LocKey: Location-Based Key Extraction from the WiFi Environment in the User's Vicinity
Philipp Jakubeit
,
Andreas Peter
,
Maarten van Steen
.
ispec 2023
:
399-418
[doi]
Transparent Security Method for Automating IoT Security Assessments
Rauli Kaksonen
,
Kimmo Halunen
,
Marko Laakso
,
Juha Röning
.
ispec 2023
:
138-153
[doi]
SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain
Ajay Chandra Korlapati
,
Sanjeet Kumar Nayak
,
Partha Sarathi Chakraborty 0001
,
Somanath Tripathy
.
ispec 2023
:
595-613
[doi]
Quantum Key Distribution as a Service and Its Injection into TLS
Sergejs Kozlovics
,
Krisjanis Petrucena
,
Davis Larins
,
Juris Viksna
.
ispec 2023
:
527-545
[doi]
Multimodal Software Defect Severity Prediction Based on Sentiment Probability
Ying Li
,
Yuhao Lin
,
Yongchao Zhong
,
Qiuling Yue
,
Jinglu Hu
,
Wenjie Wang
,
Huiyang Shi
,
Yuqing Zhang 0001
.
ispec 2023
:
250-265
[doi]
Recovering Multi-prime RSA Keys with Erasures and Errors
Guanghui Liu
,
Yuejun Liu
,
Yongbin Zhou
,
Yiwen Gao 0001
.
ispec 2023
:
266-283
[doi]
When MPC in the Head Meets VC
Li Liu
,
Puwen Wei
.
ispec 2023
:
507-526
[doi]
A New Gadget Decomposition Algorithm with Less Noise Growth in HE Schemes
Chao Liu
,
Bozhong Liu
.
ispec 2023
:
315-331
[doi]
FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems Using Autoencoder-Based Latent Space Representations
Tran Duc Luong
,
Vuong Minh Tien
,
Phan The Duy
,
Van-Hau Pham
.
ispec 2023
:
17-35
[doi]
Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition
Samaneh Mohammadi
,
Sima Sinaei
,
Ali Balador
,
Francesco Flammini
.
ispec 2023
:
1-16
[doi]
Malicious Player Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
Tomoya Morooka
,
Yoshifumi Manabe
,
Kazumasa Shinagawa
.
ispec 2023
:
332-346
[doi]
XSS Attack Detection by Attention Mechanism Based on Script Tags in URLs
Yuki Nakagawa
,
Mamoru Mimura
.
ispec 2023
:
562-578
[doi]
Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example
Thomas Prantl
,
Simon Engel
,
Lukas Horn
,
Dennis Kaiser
,
Lukas Iffländer
,
André Bauer 0001
,
Christian Krupitzer
,
Samuel Kounev
.
ispec 2023
:
284-298
[doi]
Tikuna: An Ethereum Blockchain Network Security Monitoring System
Andrés Gómez Ramirez
,
Loui Al Sardy
,
Francis Gomez Ramirez
.
ispec 2023
:
462-476
[doi]
QR-SACP: Quantitative Risk-Based Situational Awareness Calculation and Projection Through Threat Information Sharing
Mahdieh Safarzadehvahed
,
Farzaneh Abazari
,
Fateme Shabani
.
ispec 2023
:
170-193
[doi]
MalXCap: A Method for Malware Capability Extraction
Bikash Saha
,
Nanda Rani
,
Sandeep Kumar Shukla
.
ispec 2023
:
230-249
[doi]
A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS)
Hannes Salin
,
Lukasz Krzywiecki
.
ispec 2023
:
365-379
[doi]
Mitigating Sybil Attacks in Federated Learning
Ahmed E. Samy
,
Sarunas Girdzijauskas
.
ispec 2023
:
36-51
[doi]
Obfuscation Padding Schemes that Minimize Rényi Min-Entropy for Privacy
Sebastian Simon
,
Cezara Petrui
,
Carlos Pinzón
,
Catuscia Palamidessi
.
ispec 2023
:
74-90
[doi]
XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph
Ngo Duc Hoang Son
,
Huynh Thai Thi
,
Phan The Duy
,
Van-Hau Pham
.
ispec 2023
:
546-561
[doi]
BAHS: A Blockchain-Aided Hash-Based Signature Scheme
Yalan Wang
,
Liqun Chen 0002
,
Long Meng
,
Yangguang Tian
.
ispec 2023
:
419-439
[doi]
Lever: Making Intensive Validation Practical on Blockchain
Mingming Wang
,
Qianhong Wu
.
ispec 2023
:
440-461
[doi]
Cross-Border Data Security from the Perspective of Risk Assessment
Na Wang
,
Gaofei Wu
,
Jingfeng Rong
,
Zheng Yan
,
Qiuling Yue
,
Jinglu Hu
,
Yuqing Zhang 0001
.
ispec 2023
:
91-104
[doi]
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics
Jiahui Wang
,
Yulong Fu
,
Mengru Liu
,
Jin Cao
,
Hui Li 0006
,
Zheng Yan 0002
.
ispec 2023
:
52-73
[doi]
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning
Zhen Xia
,
Zhenfu Cao
,
Jiachen Shen
,
Xiaolei Dong
,
Jun Zhou 0018
,
Liming Fang 0001
,
Zhe Liu 0001
,
Chunpeng Ge
,
Chunhua Su
.
ispec 2023
:
579-594
[doi]
A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability
Yuchen Yin
,
Qingqing Gan
,
Cong Zuo
,
Ning Liu
,
Changji Wang
,
Yuning Jiang
.
ispec 2023
:
380-398
[doi]
CVAR-FL IoV Intrusion Detection Framework
Jia Zhao
,
Xinyu Rao
,
Jiqiang Liu
,
Yue Guo
,
Bokai Yang
.
ispec 2023
:
123-137
[doi]
2022
Using API Calls for Sequence-Pattern Feature Mining-Based Malware Detection
Gheorghe Balan
,
Dragos Teodor Gavrilut
,
Henri Luchian
.
ispec 2022
:
233-251
[doi]
LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks
Pegah Nikbakht Bideh
.
ispec 2022
:
213-230
[doi]
Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map System
Bodi Bodi
,
Wei-Yang Chiu
,
Weizhi Meng 0001
.
ispec 2022
:
3-20
[doi]
BADPASS: Bots Taking ADvantage of Proxy as a Service
Elisa Chiapponi
,
Marc Dacier
,
Olivier Thonnard
,
Mohamed Fangar
,
Vincent Rigal
.
ispec 2022
:
327-344
[doi]
A Low-Cost and Cloud Native Solution for Security Orchestration, Automation, and Response
Juan Christian
,
Luis Paulino
,
Alan Oliveira de Sá
.
ispec 2022
:
115-139
[doi]
Continued Fractions Applied to a Family of RSA-like Cryptosystems
Paul Cotan
,
George Teseleanu
.
ispec 2022
:
589-605
[doi]
A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks
Orhan Ermis
,
Christophe Feltus
,
Qiang Tang 0001
,
Hoang Trang
,
Alexandre de Oliveira
,
Cu D. Nguyen
,
Alain Hirtzig
.
ispec 2022
:
345-363
[doi]
Optimal Generic Attack Against Basic Boneh-Boyen Signatures
Yen-Kang Fu
,
Jonathan Chang
,
David Jao
.
ispec 2022
:
505-519
[doi]
Anonymous Authentication Protocols in Vehicular Ad Hoc Network-An Survey
Guiwen Fu
,
Yanan Chen
,
Zhen Wu
,
Qianlin Ye
.
ispec 2022
:
485-501
[doi]
Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems
Tasopoulos George
,
Jinhui Li
,
Apostolos P. Fournaris
,
Raymond K. Zhao
,
Amin Sakzad
,
Ron Steinfeld
.
ispec 2022
:
432-451
[doi]
Techniques for Continuous Touch-Based Authentication
Martin Georgiev
,
Simon Eberz
,
Ivan Martinovic
.
ispec 2022
:
409-431
[doi]
Differential Cryptanalysis of Salsa20 Based on Comprehensive Analysis of PNBs
Nasratullah Ghafoori
,
Atsuko Miyaji
.
ispec 2022
:
520-536
[doi]
Robust Anomaly Detection via Radio Fingerprinting in LoRa-Enabled IIoT
Subir Halder
,
Thomas Newe
.
ispec 2022
:
161-178
[doi]
A New Scalable Mutual Authentication in Fog-Edge Drone Swarm Environment
Kyusuk Han
,
Eiman Al Nuaimi
,
Shamma Al Blooshi
,
Rafail Psiakis
,
Chan Yeob Yeun
.
ispec 2022
:
179-196
[doi]
Sparse Attack on Skeleton-Based Human Action Recognition for Internet of Video Things Systems
Yinqin Huang
,
Cheng Dai
,
Wei-Che Chien
.
ispec 2022
:
197-212
[doi]
Physical Zero-Knowledge Proof Protocol for Topswops
Yuichi Komano
,
Takaaki Mizuki
.
ispec 2022
:
537-553
[doi]
Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance
Yi-Hsiu Lee
,
Zi-Yuan Liu
,
Raylin Tso
,
Yi-Fan Tseng
.
ispec 2022
:
21-38
[doi]
Blockchain-Based Confidential Payment System with Controllable Regulation
Yu-Chen Liao
,
Raylin Tso
,
Zi-Yuan Liu
,
Yi-Fan Tseng
.
ispec 2022
:
39-56
[doi]
Practical Backdoor Attack Against Speaker Recognition System
Yuxiao Luo
,
Jianwei Tai
,
Xiaoqi Jia
,
Shengzhi Zhang
.
ispec 2022
:
468-484
[doi]
Secure Human Identification Protocol with Human-Computable Passwords
Slawomir Matelski
.
ispec 2022
:
452-467
[doi]
Evaluating the Possibility of Evasion Attacks to Machine Learning-Based Models for Malicious PowerShell Detection
Yuki Mezawa
,
Mamoru Mimura
.
ispec 2022
:
252-267
[doi]
Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data
Zheng Yao Ng
,
Iftekhar Salam
.
ispec 2022
:
75-92
[doi]
Preventing Adversarial Attacks Against Deep Learning-Based Intrusion Detection System
Xuan-Ha Nguyen
,
Xuan-Duong Nguyen
,
Le Kim-Hung
.
ispec 2022
:
382-396
[doi]
Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities
Maharage Nisansala Sevwandi Perera
,
Toru Nakamura
,
Takashi Matsunaka
,
Hiroyuki Yokoyama
,
Kouichi Sakurai
.
ispec 2022
:
554-572
[doi]
Detect Compiler Inserted Run-time Security Checks in Binary Software
Koyel Pramanick
,
Prasad A. Kulkarni
.
ispec 2022
:
268-286
[doi]
Federated Intrusion Detection on Non-IID Data for IIoT Networks Using Generative Adversarial Networks and Reinforcement Learning
Nguyen Huu Quyen
,
Phan The Duy
,
Nguyen Chi Vy
,
Do Thi Thu Hien
,
Van-Hau Pham
.
ispec 2022
:
364-381
[doi]
PriApp-Install: Learning User Privacy Preferences on Mobile Apps' Installation
Ha Xuan Son
,
Barbara Carminati
,
Elena Ferrari
.
ispec 2022
:
306-323
[doi]
Information Security Practice and Experience - 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23-25, 2022, Proceedings
Chunhua Su
,
Dimitris Gritzalis
,
Vincenzo Piuri
, editors,
Volume 13620 of
Lecture Notes in Computer Science
, Springer,
2022.
[doi]
Protecting Cyber-Physical System Testbeds from Red-Teaming/Blue-Teaming Experiments Gone Awry
Md Rakibul Hasan Talukder
,
Md. Al-Amin
,
Indrajit Ray
.
ispec 2022
:
140-157
[doi]
Sherlock Holmes Zero-Knowledge Protocols
George Teseleanu
.
ispec 2022
:
573-588
[doi]
Designing Enhanced Robust 6G Connection Strategy with Blockchain
August Lykke Thomsen
,
Bastian Preisel
,
Victor Rodrigues Andersen
,
Wei-Yang Chiu
,
Weizhi Meng 0001
.
ispec 2022
:
57-74
[doi]
Detection of MSOffice-Embedded Malware: Feature Mining and Short- vs. Long-Term Performance
Silviu Vitel
,
Marilena Lupascu
,
Dragos Teodor Gavrilut
,
Henri Luchian
.
ispec 2022
:
287-305
[doi]
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption
Jiaming Yuan
,
Yingjiu Li
,
Jianting Ning
,
Robert H. Deng
.
ispec 2022
:
606-623
[doi]
Detection of Adversarial Examples Based on the Neurons Distribution
Jiang-Yi Zeng
,
Chi-Yuan Chen
,
Hsin-Hung Cho
.
ispec 2022
:
397-405
[doi]
UCC: Universal and Committee-based Cross-chain Framework
Yi Zhang
,
Zhonghui Ge
,
Yu Long 0001
,
Dawu Gu
.
ispec 2022
:
93-111
[doi]
A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios
Yang Zhao
,
Zhaozhong Liu
,
Jingmin An
,
Guobin Zhu
,
Saru Kumari
.
ispec 2022
:
624-639
[doi]
2021
A Novel Certificateless Multi-signature Scheme over NTRU Lattices
Xinjian Chen
,
Qiong Huang
,
Jianye Huang
.
ispec 2021
:
345-362
[doi]
Enhanced Mixup Training: a Defense Method Against Membership Inference Attack
Zongqi Chen
,
Hongwei Li 0001
,
Meng Hao
,
Guowen Xu
.
ispec 2021
:
32-45
[doi]
Information Security Practice and Experience - 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings
Robert H. Deng
,
Feng Bao 0001
,
Guilin Wang
,
Jian Shen 0001
,
Mark Ryan 0001
,
Weizhi Meng 0001
,
Ding Wang
, editors,
Volume 13107 of
Lecture Notes in Computer Science
, Springer,
2021.
[doi]
DenseGAN: A Password Guessing Model Based on DenseNet and PassGAN
Chaohui Fu
,
Ming Duan
,
Xunhai Dai
,
Qiang Wei
,
Qianqiong Wu
,
Rui Zhou
.
ispec 2021
:
296-305
[doi]
Lightweight EdDSA Signature Verification for the Ultra-Low-Power Internet of Things
Johann Großschädl
,
Christian Franck
,
Zhe Liu 0001
.
ispec 2021
:
263-282
[doi]
Isogeny Computation on Twisted Jacobi Intersections
Zhi Hu
,
Lin Wang
,
Zijian Zhou
.
ispec 2021
:
46-56
[doi]
Privacy-Preserving Support Vector Machines with Flexible Deployment and Error Correction
Weican Huang
,
Ning Ding
.
ispec 2021
:
242-262
[doi]
PUOKMS: Password-Protected Updatable Oblivious Key Management System for Cloud Storage
Shanshan Li
,
Chunxiang Xu
.
ispec 2021
:
106-125
[doi]
Cloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector Problem
Xiulan Li
,
Yanbin Pan
,
Chengliang Tian
.
ispec 2021
:
223-241
[doi]
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach
Joseph K. Liu
,
Man Ho Au
,
Tsz Hon Yuen
,
Cong Zuo
,
Jiawei Wang
,
Amin Sakzad
,
Xiapu Luo
,
Li Li 0029
,
Kim-Kwang Raymond Choo
.
ispec 2021
:
327-344
[doi]
Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security
Mriganka Mandal
,
Ramprasad Sarkar
,
Junbeom Hur
,
Koji Nuida
.
ispec 2021
:
168-189
[doi]
Message-Restriction-Free Commitment Scheme Based on Lattice Assumption
Hideaki Miyaji
,
Yuntao Wang 0002
,
Atsuko Miyaji
.
ispec 2021
:
90-105
[doi]
OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control
Yanjun Shen
,
Xingliang Yuan
,
Shifeng Sun
,
Joseph K. Liu
,
Surya Nepal
.
ispec 2021
:
126-146
[doi]
Explore Capabilities and Effectiveness of Reverse Engineering Tools to Provide Memory Safety for Binary Programs
Ruturaj K. Vaidya
,
Prasad A. Kulkarni
,
Michael R. Jantz
.
ispec 2021
:
11-31
[doi]
StrGAN for Generating Enhanced Samples
Junfeng Wu
,
Jinwei Wang
,
JunJie Zhao
,
Xiangyang Luo
.
ispec 2021
:
363-373
[doi]
EPFSTO-ARIMA: Electric Power Forced Stochastic Optimization Predicting Based on ARIMA
Guangxia Xu
,
Yuqing Xu
.
ispec 2021
:
57-68
[doi]
Ring Trapdoor Redactable Signatures from Lattice
Shao-Jun Yang
,
Xinyi Huang
,
Mingmei Zheng
,
Jinhua Ma
.
ispec 2021
:
190-208
[doi]
Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic Matrix
Yunxiao Yang
,
Xuan Shen
,
Bing Sun 0001
.
ispec 2021
:
69-89
[doi]
A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework
Huijie Yang
,
Tianqi Zhou
,
Chen Wang 0015
,
Debiao He
.
ispec 2021
:
374-391
[doi]
A Dummy Location Selection Algorithm Based on Location Semantics and Physical Distance
Dongdong Yang
,
Baopeng Ye
,
Yuling Chen
,
Huiyu Zhou 0001
,
Xiaobin Qian
.
ispec 2021
:
283-295
[doi]
Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class Permutation
Tao Ye
,
Yongzhuang Wei
,
Lingcheng Li
,
Enes Pasalic
.
ispec 2021
:
306-326
[doi]
WADS: A Webshell Attack Defender Assisted by Software-Defined Networks
Beiyuan Yu
,
Jianwei Liu 0001
,
Ziyu Zhou
.
ispec 2021
:
209-222
[doi]
Penetration rate-equivalent inertia time constant function identification method of renewable energy power system
Baoyu Zhai
,
Xing Li
,
Qi Yang
,
Wanru Li
,
Ruizhe Sun
,
Bingtuan Gao
.
ispec 2021
:
1-6
[doi]
Efficient Construction of Public-Key Matrices in Lattice-Based Cryptography: Chaos Strikes Again
Kaiwei Zhang
,
Ailun Ma
,
Shanxiang Lyu
,
Jiabo Wang
,
Shuting Lou
.
ispec 2021
:
1-10
[doi]
Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK
Yingjie Zhang
,
Lijun Lyu
,
Kexin Qiao
,
Zhiyu Zhang
,
Siwei Sun
,
Lei Hu
.
ispec 2021
:
147-167
[doi]
2019
Generating Phishing Emails Using Graph Database
Nasim Maleki
,
Ali A. Ghorbani
.
ispec 2019
:
434-449
[doi]
A Novel and Comprehensive Evaluation Methodology for SIEM
Mahdieh Safarzadeh
,
Hossein Gharaee
,
Amir Hossein Panahi
.
ispec 2019
:
476-488
[doi]
Group-Based Key Exchange Protocol Based on Complete Decomposition Search Problem
Chang Seng Sin
,
Huey Voon Chen
.
ispec 2019
:
413-422
[doi]
Sign in
or
sign up
to see more results.