David Mohaisen

Orcid: 0000-0003-3227-2505

Affiliations:
  • University of Central Florida, Department of Computer Science, Orlando, FL, USA
  • State University of New York at Buffalo, Buffalo, NY, USA (former)
  • University of Minnesota, Minneapolis, MN, USA (former, PhD 2012)
  • Inha University, Information Security Research Laboratory, Incheon, South Korea (former)


According to our database1, David Mohaisen authored at least 302 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality.
IEEE/ACM Trans. Netw., February, 2024

Hierarchical Deep Reinforcement Learning-Based Propofol Infusion Assistant Framework in Anesthesia.
IEEE Trans. Neural Networks Learn. Syst., February, 2024

Learning Location From Shared Elevation Profiles in Fitness Apps: A Privacy Perspective.
IEEE Trans. Mob. Comput., January, 2024

2023
Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auction.
Comput. Networks, April, 2023

Improving the Social Connectivity in Engineering Educational Networks and Implications.
IEEE Trans. Educ., February, 2023

Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications.
IEEE Trans. Intell. Transp. Syst., January, 2023

Exploration of Bitflip's Effect on Deep Neural Network Accuracy in Plaintext and Ciphertext.
IEEE Micro, 2023

Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations.
CoRR, 2023

Measuring and Modeling the Free Content Web.
CoRR, 2023

SHIELD: Thwarting Code Authorship Attribution.
CoRR, 2023

Analyzing In-browser Cryptojacking.
CoRR, 2023

Enriching Vulnerability Reports Through Automated and Augmented Description Summarization.
Proceedings of the Information Security Applications - 24th International Conference, 2023

Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and Evaluation.
Proceedings of the Information Security Applications - 24th International Conference, 2023

Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

A Robust Counting Sketch for Data Plane Intrusion Detection.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Understanding the Privacy Dimension of Wearables through Machine Learning-enabled Inferences.
Proceedings of the 2023 on Systems and Network Telemetry and Analytics, 2023

Understanding the Country-Level Security of Free Content Websites and their Hosting Infrastructure.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

Untargeted Code Authorship Evasion with Seq2Seq Transformation.
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023

The Infrastructure Utilization of Free Contents Websites Reveal Their Security Characteristics.
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023

Understanding the Utilization of Cryptocurrency in the Metaverse and Security Implications.
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023

Entangled Clouds: Measuring the Hosting Infrastructure of the Free Contents Web.
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023

Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability Description.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Exploring Partitioning Attacks on the Bitcoin Network.
IEEE/ACM Trans. Netw., 2022

A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet.
IEEE/ACM Trans. Netw., 2022

A One-Page Text Entry Method Optimized for Rectangle Smartwatches.
IEEE Trans. Mob. Comput., 2022

GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy.
IEEE Trans. Knowl. Data Eng., 2022

Cooperative Multiagent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control.
IEEE Trans. Ind. Informatics, 2022

Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses.
IEEE Trans. Dependable Secur. Comput., 2022

Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM.
IEEE Trans. Dependable Secur. Comput., 2022

DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification.
IEEE Trans. Dependable Secur. Comput., 2022

BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails.
IEEE Syst. J., 2022

ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation.
IEEE Internet Things J., 2022

Do Content Management Systems Impact the Security of Free Content Websites? A Correlation Analysis.
CoRR, 2022

Miners in the Cloud: Measuring and Analyzing Cryptocurrency Mining in Public Clouds.
CoRR, 2022

FAT-PIM: Low-Cost Error Detection for Processing-In-Memory.
CoRR, 2022

Cooperative Multi-Agent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control.
CoRR, 2022

<i>RouteChain</i>: Towards Blockchain-based secure and efficient BGP routing.
Comput. Networks, 2022

Understanding Internet of Things malware by analyzing endpoints in their static artifacts.
Comput. Networks, 2022

WBC image classification and generative models based on convolutional neural network.
BMC Medical Imaging, 2022

Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions.
IEEE Access, 2022

Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches.
IEEE Access, 2022

Making Adversarially-Trained Language Models Forget with Model Retraining: A Case Study on Hate Speech Detection.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

Measuring the Privacy Dimension of Free Content Websites through Automated Privacy Policy Analysis and Annotation.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

AiRType: An Air-tapping Keyboard for Augmented Reality Environments.
Proceedings of the 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2022

A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces, 2022

Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures.
Proceedings of the 2022 IEEE International Parallel and Distributed Processing Symposium, 2022

Filesystem Encryption or Direct-Access for NVM Filesystems? Let's Have Both!
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2022

Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts.
Proceedings of the CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 2022

Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study.
Proceedings of the CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 2022

Do Content Management Systems Impact the Security of Free Content Websites?
Proceedings of the Computational Data and Social Networks - 11th International Conference, 2022

Measuring Cryptocurrency Mining in Public Cloud Services: A Security Perspective.
Proceedings of the Computational Data and Social Networks - 11th International Conference, 2022

AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network Attacks.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Hierarchical Reinforcement Learning using Gaussian Random Trajectory Generation in Autonomous Furniture Assembly.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

AcousticType: Smartwatch-Enabled Cross-Device Text Entry Method Using Keyboard Acoustics.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

A Scalable and Dynamic ACL System for In-Network Defense.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
e-PoS: Making Proof-of-Stake Decentralized and Fair.
IEEE Trans. Parallel Distributed Syst., 2021

Large-scale and Robust Code Authorship Identification with Deep Feature Learning.
ACM Trans. Priv. Secur., 2021

Towards Low-Cost Mechanisms to Enable Restoration of Encrypted Non-Volatile Memories.
IEEE Trans. Dependable Secur. Comput., 2021

SSD-Assisted Ransomware Detection and Data Recovery Techniques.
IEEE Trans. Computers, 2021

Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools.
J. Netw. Comput. Appl., 2021

Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey.
IEEE Internet Things J., 2021

Empirically comparing the performance of blockchain's consensus algorithms.
IET Blockchain, 2021

HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality.
IACR Cryptol. ePrint Arch., 2021

Towards Semantically-Rich Spatial Network Representation Learning via Automated Feature Topic Pairing.
Frontiers Big Data, 2021

Count-Less: A Counting Sketch for the Data Plane of High Speed Switches.
CoRR, 2021

ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation.
CoRR, 2021

ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation.
CoRR, 2021

A network-independent tool-based usable authentication system for Internet of Things devices.
Comput. Secur., 2021

Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699.
Comput. Networks, 2021

Domain name system security and privacy: A contemporary survey.
Comput. Networks, 2021

Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube.
Proceedings of the Companion of The Web Conference 2021, 2021

SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

TLDR: Deep Learning-Based Automated Privacy Policy Annotation with Key Policy Highlights.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

Measuring Healthcare Data Breaches.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

ProMT: optimizing integrity tree updates for write-intensive pages in secure NVMs.
Proceedings of the ICS '21: 2021 International Conference on Supercomputing, 2021

Bitcoin Price Forecasting via Ensemble-based LSTM Deep Learning Networks.
Proceedings of the International Conference on Information Networking, 2021

Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems.
Proceedings of the International Conference on Information Networking, 2021

Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Adversarial Example Detection Using Latent Neighborhood Graph.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Automated Feature-Topic Pairing: Aligning Semantic and Embedding Spaces in Spatial Representation Learning.
Proceedings of the SIGSPATIAL '21: 29th International Conference on Advances in Geographic Information Systems, 2021

Systemically Evaluating the Robustness of ML-based IoT Malware Detectors.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Security Breaches in the Healthcare Domain: A Spatiotemporal Analysis.
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021

SyncAttack: Double-spending in Bitcoin Without Mining Power.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference.
IEEE Trans. Mob. Comput., 2020

A Data-Driven Study of DDoS Attacks and Their Dynamics.
IEEE Trans. Dependable Secur. Comput., 2020

Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation.
IEEE Trans. Dependable Secur. Comput., 2020

Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions.
IEEE Syst. J., 2020

Editorial.
EAI Endorsed Trans. Security Safety, 2020

Measuring the Cost of Software Vulnerabilities.
EAI Endorsed Trans. Security Safety, 2020

Multi-χ: Identifying Multiple Authors from Source Code Files.
Proc. Priv. Enhancing Technol., 2020

Self-adaptive power control with deep reinforcement learning for millimeter-wave Internet-of-vehicles video caching.
J. Commun. Networks, 2020

AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors.
IEEE Internet Things J., 2020

Generating Adversarial Examples with an Optimized Quality.
CoRR, 2020

Domain Name System Security and Privacy: A Contemporary Survey.
CoRR, 2020

A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification.
CoRR, 2020

Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools.
CoRR, 2020

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey.
CoRR, 2020

Exploring the Attack Surface of Blockchain: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2020

Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions.
Comput. Networks, 2020

Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.
IEEE Access, 2020

Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks.
Proceedings of the Information Security Applications - 21st International Conference, 2020

From Blue-Sky to Practical Adversarial Learning.
Proceedings of the Second IEEE International Conference on Trust, 2020

SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Hiding in Plain Sight: A Measurement and Analysis of Kids' Exposure to Malicious URLs on YouTube.
Proceedings of the 5th IEEE/ACM Symposium on Edge Computing, 2020

On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube.
Proceedings of the CIKM 2020 Workshops co-located with 29th ACM International Conference on Information and Knowledge Management (CIKM 2020), 2020

2019
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
IEEE Trans. Netw. Serv. Manag., 2019

Android Malware Detection Using Complex-Flows.
IEEE Trans. Mob. Comput., 2019

Pricing Data Tampering in Automated Fare Collection with NFC-Equipped Smartphones.
IEEE Trans. Mob. Comput., 2019

Secure and transparent audit logs with <i>BlockAudit</i>.
J. Netw. Comput. Appl., 2019

Two-Stage IoT Device Scheduling With Dynamic Programming for Energy Internet Systems.
IEEE Internet Things J., 2019

Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach.
IEEE Internet Things J., 2019

Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT.
Trans. Emerg. Telecommun. Technol., 2019

Phoenix: Towards Persistently Secure, Recoverable, and NVM Friendly Tree of Counters.
CoRR, 2019

You Can Run, But You Cannot Hide: Using Elevation Profiles to Breach Location Privacy through Trajectory Prediction.
CoRR, 2019

W-Net: A CNN-based Architecture for White Blood Cells Image Classification.
CoRR, 2019

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection.
CoRR, 2019

A Privacy-Preserving Longevity Study of Tor's Hidden Services.
CoRR, 2019

Secure and Transparent Audit Logs with BlockAudit.
CoRR, 2019

Exploring the Attack Surface of Blockchain: A Systematic Overview.
CoRR, 2019

Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.
CoRR, 2019

Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table.
CoRR, 2019

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach.
CoRR, 2019

Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network.
CoRR, 2019

Analyzing Endpoints in the Internet of Things Malware.
CoRR, 2019

A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Analyzing endpoints in the internet of things malware: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Breaking graph-based IoT malware detection systems using adversarial examples: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One.
Proceedings of the First IEEE International Conference on Trust, 2019

Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

XLF: A Cross-layer Framework to Secure the Internet of Things (IoT).
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Countering Selfish Mining in Blockchains.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

IoT malware ecosystem in the wild: a glimpse into analysis and exposures.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

Examining the Security of DDoS Detection Systems in Software Defined Networks.
Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, 2019

Investigating DNS Manipulation by Open DNS Resolvers.
Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, 2019

Fighting Fake News Propagation with Blockchains.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
XMSS: eXtended Merkle Signature Scheme.
RFC, May, 2018

Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis.
IEEE/ACM Trans. Netw., 2018

Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering.
EAI Endorsed Trans. Security Safety, 2018

Interference-Aware Adaptive Beam Alignment for Hyper-Dense IEEE 802.11ax Internet-of-Things Networks.
Sensors, 2018

End-to-End Analysis of In-Browser Cryptojacking.
CoRR, 2018

Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks.
Comput. Secur., 2018

Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Proceedings of the Security and Privacy in Communication Networks, 2018

Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

ABC: Enabling Smartphone Authentication with Built-in Camera.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Neural Network Syntax Analyzer for Embedded Standardized Deep Learning.
Proceedings of the 2nd International Workshop on Embedded and Mobile Deep Learning, 2018

Towards Blockchain-Driven, Secure and Transparent Audit Logs.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions.
Proceedings of the IEEE INFOCOM 2018, 2018

Proactive detection of algorithmically generated malicious domains.
Proceedings of the 2018 International Conference on Information Networking, 2018

SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

ShmCaffe: A Distributed Deep Learning Platform with Shared Memory Buffer for HPC Architecture.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

QOI: Assessing Participation in Threat Information Sharing.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Defending Internet of Things Against Malicious Domain Names using D-FENS.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

Graph-Based Comparison of IoT and Android Malware.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Large-Scale and Language-Oblivious Code Authorship Identification.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures.
IEEE/ACM Trans. Netw., 2017

Crime Scene Reconstruction: Online Gold Farming Network Analysis.
IEEE Trans. Inf. Forensics Secur., 2017

Distributed and reliable decision-making for cloud-enabled mobile service platforms.
Int. J. Distributed Sens. Networks, 2017

Rethinking Information Sharing for Actionable Threat Intelligence.
CoRR, 2017

Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence.
CoRR, 2017

Highly-accurate rogue access point detection using intentional channel interference: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Two-level network monitoring and management in WLAN using software-defined networking: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Understanding Adversarial Strategies from Bot Recruitment to Scheduling.
Proceedings of the Security and Privacy in Communication Networks, 2017

Understanding the Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Assessing Quality of Contribution in Information Sharing for Threat Intelligence.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Poster: Android Malware Detection using Multi-Flows and API Patterns.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Large-scale invisible attack on AFC systems with NFC-equipped smartphones.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Performance of deep learning computation with TensorFlow software library in GPU-capable multi-core computing platforms.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

An Adversary-Centric Behavior Modeling of DDoS Attacks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

You've Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Understanding the effectiveness of typosquatting techniques.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

Rethinking information sharing for threat intelligence.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Private Over-Threshold Aggregation Protocols over Distributed Datasets.
IEEE Trans. Knowl. Data Eng., 2016

Advances in Mobile Security Technologies.
Mob. Inf. Syst., 2016

Characterizing Collaboration in Social Network-enabled Routing.
KSII Trans. Internet Inf. Syst., 2016

Domain Name System Security and Privacy: Old Problems and New Challenges.
CoRR, 2016

Multimodal Game Bot Detection using User Behavioral Characteristics.
CoRR, 2016

Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles.
CoRR, 2016

Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph.
CoRR, 2016

Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information.
Comput. Secur., 2016

Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications.
Proceedings of the 25th International Conference on World Wide Web, 2016

Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
Proceedings of the Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, 2016

A user study of the effectiveness of typosquatting techniques.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Automatic alerts annotation for improving DDoS mitigation systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Assessing DNS privacy under partial deployment of special-use Domain Names.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Transparency of the new gTLD's centralized zone data service: A measurement study.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

WHAP: Web-hacking profiling using Case-Based Reasoning.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

The Landscape of Domain Name Typosquatting: Techniques and Countermeasures.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2015

HTTP-based Smart Transportation of DNS Queries and Applications.
Smart Comput. Rev., 2015

Interference impacts on 60 ghz real-time online video streaming in wireless smart tv platforms.
Multim. Tools Appl., 2015

Detecting and Classifying Android Malware Using Static Analysis along with Creator Information.
Int. J. Distributed Sens. Networks, 2015

Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information.
Digit. Investig., 2015

AMAL: High-fidelity, behavior-based automated malware analysis and classification.
Comput. Secur., 2015

Transaction authentication using complementary colors.
Comput. Secur., 2015

Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents.
Proceedings of the Third IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015

Capturing DDoS Attack Dynamics Behind the Scenes.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

Separation of benign and malicious network events for accurate malware family classification.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Measuring Botnets in the Wild: Some New Trends.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Trustworthy Distributed Computing on Social Networks.
IEEE Trans. Serv. Comput., 2014

Keylogging-Resistant Visual Authentication Protocols.
IEEE Trans. Mob. Comput., 2014

Parallel QRD-M encoder for multi-user MIMO systems.
Telecommun. Syst., 2014

Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks.
IEEE Commun. Lett., 2014

Kindred domains: detecting and clustering botnet domains using DNS traffic.
Proceedings of the 23rd International World Wide Web Conference, 2014

Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name system.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

ADAM: Automated Detection and Attribution of Malicious Webpages.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

Characterizing botnets-as-a-service.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

AV-Meter: An Evaluation of Antivirus Scans and Labels.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

Chatter: Classifying malware families using system event ordering.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

POSTER: How Distributed Are Today's DDoS Attacks?
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Trading Optimality for Scalability in Large-Scale Opportunistic Routing.
IEEE Trans. Veh. Technol., 2013

Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs.
IEEE Trans. Dependable Secur. Comput., 2013

The Sybil Attacks and Defenses: A Survey.
Smart Comput. Rev., 2013

Private Over-threshold Aggregation Protocols over Distributed Databases.
IACR Cryptol. ePrint Arch., 2013

Unveiling Zeus
CoRR, 2013

Unveiling Zeus: automated classification of malware samples.
Proceedings of the 22nd International World Wide Web Conference, 2013

Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

Towards a Methodical Evaluation of Antivirus Scans and Labels - "If You're Not Confused, You're Not Paying Attention".
Proceedings of the Information Security Applications - 14th International Workshop, 2013

Babble: Identifying malware by its dialects.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

ADAM: Automated detection and attribution of malicious webpages.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Characterization of the dynamics and interactions of domain names and name server.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Dynamix: anonymity on dynamic social structures.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Private Top-k Aggregation Protocols.
IACR Cryptol. ePrint Arch., 2012

Measuring bias in the mixing time of social graphs due to graph sampling.
Proceedings of the 31st IEEE Military Communications Conference, 2012

DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Private Over-Threshold Aggregation Protocols.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Collaboration in social network-based information dissemination.
Proceedings of IEEE International Conference on Communications, 2012

Protecting access privacy of cached contents in information centric networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

On the mixing time of directed social graphs and security implications.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Attacks and Countermeasures for RFID Mutual Authentication Scheme in Pervasive Computing Environmen.
KSII Trans. Internet Inf. Syst., 2011

SocialCloud: Using Social Networks for Building Distributed Computing Services
CoRR, 2011

Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface
CoRR, 2011

Keep your friends close: Incorporating trust into social network-based Sybil defenses.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Understanding Social Networks Properties for Trustworthy Computing.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Parallel QRD-M Encoder for Decentralized Multi-User MIMO Systems.
Proceedings of IEEE International Conference on Communications, 2011

2010
On the Inefficiency of the Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network.
J. Commun., 2010

Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency.
IEICE Trans. Inf. Syst., 2010

Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering
CoRR, 2010

Measuring the mixing time of social graphs.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

Losing control of the internet: using the data plane to attack the control plane.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Secure encounter-based social networks: requirements, challenges, and designs.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Designs to account for trust in social network-based sybil defenses.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Grid-Based Key Pre-Distribution in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2009

On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2009

Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks.
Int. J. Netw. Secur., 2009

Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering
CoRR, 2009

A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network.
Proceedings of the Advances in Information Security and Assurance, 2009

2008
Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2008

A computationally-efficient construction for the matrix-based key distribution in sensor network
CoRR, 2008

Privacy Preserving Association Rule Mining Revisited
CoRR, 2008

A Survey on Deep Packet Inspection for Intrusion Detection Systems
CoRR, 2008

Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Data Randomization for Lightweight Secure Data Aggregation in Sensor Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Privacy in Location Based Services: Primitives Toward the Solution.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

2007
Secret Key Revocation in Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network.
Proceedings of the Computational Science and Its Applications, 2007

2006
Cooperative Public Key Authentication Protocol in Wireless Sensor Network.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks, Third European Workshop, 2006


  Loading...