APA
Click to copy
Zhang, Y., James, M. A., Chen, J., Su, C., & Han, J. (2017). Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper). In J. K. Liu & P. Samarati (Eds.), Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings (Vol. 10701, pp. 566–575). Springer.
Chicago/Turabian
Click to copy
Zhang, Yidan, Marino Anthony James, Jiageng Chen, Chunhua Su, and Jinguang Han. “Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper).” In Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings, edited by Joseph K. Liu and Pierangela Samarati, 10701:566–575. Lecture Notes in Computer Science. Springer, 2017.
MLA
Click to copy
Zhang, Yidan, et al. “Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper).” Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings, edited by Joseph K. Liu and Pierangela Samarati, vol. 10701, Springer, 2017, pp. 566–75.
BibTeX
Click to copy
@inproceedings{zhang2017a,
title = {Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper)},
year = {2017},
pages = {566--575},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {10701},
author = {Zhang, Yidan and James, Marino Anthony and Chen, Jiageng and Su, Chunhua and Han, Jinguang},
editor = {Liu, Joseph K. and Samarati, Pierangela},
booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}
}