It looks like you're offline.
Open Library logo
additional options menu
Last edited by ImportBot
November 23, 2009 | History

Xiaofeng Chen

We need a photo of Xiaofeng Chen

22 works Add another?

Showing all works by author. Would you like to see only ebooks?

  • Cover of: Essentials of Blockchain Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part II

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cyber Security Meets Machine Learning

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Introduction to Secure Outsourcing Computation

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Provable Security: 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Data Security and Privacy Protection: Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part-I

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Security and Privacy in Social Networks and Big Data: 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Advances in Secure Outsourcing Comp

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Security and Privacy in New Computing Environments: 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Privacy-Preserving Machine Learning

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Qi ye po chan qing suan fa lü feng xian guan li yu fang fan ce lüe

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Zhongguo fa zhi shi xin bian
    First published in 2007 1 edition

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Information and Communications Security: 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: ASIA CCS'16: Proceedings of the 11th ACM Asia Conference on Computer and Communications Security

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: AuthTech'16: Authentication Techniques CANCELLED

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Qi ye shang shi yun zuo fa lü feng xian guan li yu fang fan ce lüe

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Zhongguo Fubusi luo ma bang: jie shi Zhongguo fu hao luo ma de zhen zheng yuan wei

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Zhongguo shi shi bai: tan xun Zhongguo qi ye shi bai ji yin

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Advances in Cyber Security: Principles, Techniques, and Applications

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: 宋庄疯: Zhongguo yi shu chuang xin di yi xian chang guan cha = Crazy of Song-zhuang China

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today

History

Download catalog record: RDF / JSON
November 23, 2009 Created by ImportBot new author