Aziz Mohaisen

According to our database1, Aziz Mohaisen authored at least 207 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2015, "For leadership and contributions to the development of high power microwave and millimeter wave vacuum electronic devices".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference.
IEEE Trans. Mob. Comput., 2020

A Data-Driven Study of DDoS Attacks and Their Dynamics.
IEEE Trans. Dependable Secur. Comput., 2020

Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation.
IEEE Trans. Dependable Secur. Comput., 2020

Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions.
IEEE Syst. J., 2020

Editorial.
EAI Endorsed Trans. Security Safety, 2020

Measuring the Cost of Software Vulnerabilities.
EAI Endorsed Trans. Security Safety, 2020

Multi-χ: Identifying Multiple Authors from Source Code Files.
Proc. Priv. Enhancing Technol., 2020

Self-adaptive power control with deep reinforcement learning for millimeter-wave Internet-of-vehicles video caching.
J. Commun. Networks, 2020

AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors.
IEEE Internet Things J., 2020

Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles.
CoRR, 2020

On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study.
CoRR, 2020

Hiding in Plain Sight: A Measurement and Analysis of Kids' Exposure to Malicious URLs on YouTube.
CoRR, 2020

Generating Adversarial Examples with an Optimized Quality.
CoRR, 2020

Domain Name System Security and Privacy: A Contemporary Survey.
CoRR, 2020

Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses.
CoRR, 2020

A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification.
CoRR, 2020

Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools.
CoRR, 2020

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey.
CoRR, 2020

Exploring the Attack Surface of Blockchain: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2020

Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions.
Comput. Networks, 2020

Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.
IEEE Access, 2020

SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube.
Proceedings of the CIKM 2020 Workshops co-located with 29th ACM International Conference on Information and Knowledge Management (CIKM 2020), 2020

2019
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
IEEE Trans. Netw. Serv. Manag., 2019

Android Malware Detection Using Complex-Flows.
IEEE Trans. Mob. Comput., 2019

Pricing Data Tampering in Automated Fare Collection with NFC-Equipped Smartphones.
IEEE Trans. Mob. Comput., 2019

Secure and transparent audit logs with <i>BlockAudit</i>.
J. Netw. Comput. Appl., 2019

Two-Stage IoT Device Scheduling With Dynamic Programming for Energy Internet Systems.
IEEE Internet Things J., 2019

Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach.
IEEE Internet Things J., 2019

Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT.
Trans. Emerg. Telecommun. Technol., 2019

Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One.
CoRR, 2019

Phoenix: Towards Persistently Secure, Recoverable, and NVM Friendly Tree of Counters.
CoRR, 2019

You Can Run, But You Cannot Hide: Using Elevation Profiles to Breach Location Privacy through Trajectory Prediction.
CoRR, 2019

W-Net: A CNN-based Architecture for White Blood Cells Image Classification.
CoRR, 2019

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection.
CoRR, 2019

A Privacy-Preserving Longevity Study of Tor's Hidden Services.
CoRR, 2019

Secure and Transparent Audit Logs with BlockAudit.
CoRR, 2019

Exploring the Attack Surface of Blockchain: A Systematic Overview.
CoRR, 2019

Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.
CoRR, 2019

Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table.
CoRR, 2019

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach.
CoRR, 2019

Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network.
CoRR, 2019

Analyzing Endpoints in the Internet of Things Malware.
CoRR, 2019

A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Analyzing endpoints in the internet of things malware: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Breaking graph-based IoT malware detection systems using adversarial examples: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

XLF: A Cross-layer Framework to Secure the Internet of Things (IoT).
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Countering Selfish Mining in Blockchains.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

IoT malware ecosystem in the wild: a glimpse into analysis and exposures.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

Examining the Security of DDoS Detection Systems in Software Defined Networks.
Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, 2019

Investigating DNS Manipulation by Open DNS Resolvers.
Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, 2019

Fighting Fake News Propagation with Blockchains.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
XMSS: eXtended Merkle Signature Scheme.
RFC, May, 2018

Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis.
IEEE/ACM Trans. Netw., 2018

Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering.
EAI Endorsed Trans. Security Safety, 2018

Interference-Aware Adaptive Beam Alignment for Hyper-Dense IEEE 802.11ax Internet-of-Things Networks.
Sensors, 2018

End-to-End Analysis of In-Browser Cryptojacking.
CoRR, 2018

Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks.
Comput. Secur., 2018

Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Proceedings of the Security and Privacy in Communication Networks, 2018

Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

ABC: Enabling Smartphone Authentication with Built-in Camera.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Neural Network Syntax Analyzer for Embedded Standardized Deep Learning.
Proceedings of the 2nd International Workshop on Embedded and Mobile Deep Learning, 2018

Towards Blockchain-Driven, Secure and Transparent Audit Logs.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions.
Proceedings of the IEEE INFOCOM 2018, 2018

Proactive detection of algorithmically generated malicious domains.
Proceedings of the 2018 International Conference on Information Networking, 2018

SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

ShmCaffe: A Distributed Deep Learning Platform with Shared Memory Buffer for HPC Architecture.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

QOI: Assessing Participation in Threat Information Sharing.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Defending Internet of Things Against Malicious Domain Names using D-FENS.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

Graph-Based Comparison of IoT and Android Malware.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Large-Scale and Language-Oblivious Code Authorship Identification.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures.
IEEE/ACM Trans. Netw., 2017

Crime Scene Reconstruction: Online Gold Farming Network Analysis.
IEEE Trans. Inf. Forensics Secur., 2017

Distributed and reliable decision-making for cloud-enabled mobile service platforms.
Int. J. Distributed Sens. Networks, 2017

Rethinking Information Sharing for Actionable Threat Intelligence.
CoRR, 2017

Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence.
CoRR, 2017

Highly-accurate rogue access point detection using intentional channel interference: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Two-level network monitoring and management in WLAN using software-defined networking: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Understanding Adversarial Strategies from Bot Recruitment to Scheduling.
Proceedings of the Security and Privacy in Communication Networks, 2017

Understanding the Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Assessing Quality of Contribution in Information Sharing for Threat Intelligence.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Poster: Android Malware Detection using Multi-Flows and API Patterns.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Large-scale invisible attack on AFC systems with NFC-equipped smartphones.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Performance of deep learning computation with TensorFlow software library in GPU-capable multi-core computing platforms.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

An Adversary-Centric Behavior Modeling of DDoS Attacks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

You've Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Understanding the effectiveness of typosquatting techniques.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

Rethinking information sharing for threat intelligence.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Private Over-Threshold Aggregation Protocols over Distributed Datasets.
IEEE Trans. Knowl. Data Eng., 2016

Advances in Mobile Security Technologies.
Mob. Inf. Syst., 2016

Characterizing Collaboration in Social Network-enabled Routing.
KSII Trans. Internet Inf. Syst., 2016

Domain Name System Security and Privacy: Old Problems and New Challenges.
CoRR, 2016

Multimodal Game Bot Detection using User Behavioral Characteristics.
CoRR, 2016

Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles.
CoRR, 2016

Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph.
CoRR, 2016

Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information.
Comput. Secur., 2016

Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications.
Proceedings of the 25th International Conference on World Wide Web, 2016

Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
Proceedings of the Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, 2016

A user study of the effectiveness of typosquatting techniques.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Automatic alerts annotation for improving DDoS mitigation systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Assessing DNS privacy under partial deployment of special-use Domain Names.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Transparency of the new gTLD's centralized zone data service: A measurement study.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

WHAP: Web-hacking profiling using Case-Based Reasoning.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

The Landscape of Domain Name Typosquatting: Techniques and Countermeasures.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2015

HTTP-based Smart Transportation of DNS Queries and Applications.
Smart Comput. Rev., 2015

Interference impacts on 60 ghz real-time online video streaming in wireless smart tv platforms.
Multim. Tools Appl., 2015

Detecting and Classifying Android Malware Using Static Analysis along with Creator Information.
Int. J. Distributed Sens. Networks, 2015

AMAL: High-fidelity, behavior-based automated malware analysis and classification.
Comput. Secur., 2015

Transaction authentication using complementary colors.
Comput. Secur., 2015

Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents.
Proceedings of the Third IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015

Capturing DDoS Attack Dynamics Behind the Scenes.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

Separation of benign and malicious network events for accurate malware family classification.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Measuring Botnets in the Wild: Some New Trends.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Trustworthy Distributed Computing on Social Networks.
IEEE Trans. Serv. Comput., 2014

Keylogging-Resistant Visual Authentication Protocols.
IEEE Trans. Mob. Comput., 2014

Parallel QRD-M encoder for multi-user MIMO systems.
Telecommun. Syst., 2014

Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks.
IEEE Commun. Lett., 2014

Kindred domains: detecting and clustering botnet domains using DNS traffic.
Proceedings of the 23rd International World Wide Web Conference, 2014

Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name system.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

ADAM: Automated Detection and Attribution of Malicious Webpages.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

Characterizing botnets-as-a-service.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

AV-Meter: An Evaluation of Antivirus Scans and Labels.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

Chatter: Classifying malware families using system event ordering.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

POSTER: How Distributed Are Today's DDoS Attacks?
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Trading Optimality for Scalability in Large-Scale Opportunistic Routing.
IEEE Trans. Veh. Technol., 2013

Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs.
IEEE Trans. Dependable Secur. Comput., 2013

The Sybil Attacks and Defenses: A Survey.
Smart Comput. Rev., 2013

Private Over-threshold Aggregation Protocols over Distributed Databases.
IACR Cryptol. ePrint Arch., 2013

Unveiling Zeus
CoRR, 2013

Unveiling Zeus: automated classification of malware samples.
Proceedings of the 22nd International World Wide Web Conference, 2013

Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

Towards a Methodical Evaluation of Antivirus Scans and Labels - "If You're Not Confused, You're Not Paying Attention".
Proceedings of the Information Security Applications - 14th International Workshop, 2013

Babble: Identifying malware by its dialects.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

ADAM: Automated detection and attribution of malicious webpages.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Characterization of the dynamics and interactions of domain names and name server.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Dynamix: anonymity on dynamic social structures.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Private Top-k Aggregation Protocols.
IACR Cryptol. ePrint Arch., 2012

Measuring bias in the mixing time of social graphs due to graph sampling.
Proceedings of the 31st IEEE Military Communications Conference, 2012

DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Private Over-Threshold Aggregation Protocols.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Collaboration in social network-based information dissemination.
Proceedings of IEEE International Conference on Communications, 2012

Protecting access privacy of cached contents in information centric networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

On the mixing time of directed social graphs and security implications.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Attacks and Countermeasures for RFID Mutual Authentication Scheme in Pervasive Computing Environmen.
KSII Trans. Internet Inf. Syst., 2011

SocialCloud: Using Social Networks for Building Distributed Computing Services
CoRR, 2011

Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface
CoRR, 2011

Keep your friends close: Incorporating trust into social network-based Sybil defenses.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Understanding Social Networks Properties for Trustworthy Computing.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Parallel QRD-M Encoder for Decentralized Multi-User MIMO Systems.
Proceedings of IEEE International Conference on Communications, 2011

2010
On the Inefficiency of the Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network.
J. Commun., 2010

Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency.
IEICE Trans. Inf. Syst., 2010

Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering
CoRR, 2010

Measuring the mixing time of social graphs.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

Losing control of the internet: using the data plane to attack the control plane.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Secure encounter-based social networks: requirements, challenges, and designs.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Designs to account for trust in social network-based sybil defenses.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Grid-Based Key Pre-Distribution in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2009

On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2009

Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks.
Int. J. Netw. Secur., 2009

Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering
CoRR, 2009

A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network.
Proceedings of the Advances in Information Security and Assurance, 2009

2008
Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2008

A computationally-efficient construction for the matrix-based key distribution in sensor network
CoRR, 2008

Privacy Preserving Association Rule Mining Revisited
CoRR, 2008

A Survey on Deep Packet Inspection for Intrusion Detection Systems
CoRR, 2008

Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Data Randomization for Lightweight Secure Data Aggregation in Sensor Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Privacy in Location Based Services: Primitives Toward the Solution.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

2007
Secret Key Revocation in Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network.
Proceedings of the Computational Science and Its Applications, 2007

2006
Cooperative Public Key Authentication Protocol in Wireless Sensor Network.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks, Third European Workshop, 2006


  Loading...