Carlton Shepherd
Orcid: 0000-0002-7366-9034
According to our database1,
Carlton Shepherd
authored at least 42 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Privacy Preservation Strategies for Malware-Infected Edge Intelligence Systems: A Bayesian Stochastic Game-Based Approach.
IEEE Trans. Mob. Comput., August, 2025
CoRR, February, 2025
Generative AI Misuse Potential in Cyber Security Education: A Case Study of a UK Degree Program.
CoRR, January, 2025
Addressing Network Packet-based Cheats in Multiplayer Games: A Secret Sharing Approach.
CoRR, January, 2025
Integrating Deep Spiking Q-Network Into Hypergame-Theoretic Deceptive Defense for Mitigating Malware Propagation in Edge Intelligence-Enabled IoT Systems.
IEEE Trans. Serv. Comput., 2025
Comput. Secur., 2025
2024
Comparative DQN-Improved Algorithms for Stochastic Games-Based Automated Edge Intelligence-Enabled IoT Malware Spread-Suppression Strategies.
IEEE Internet Things J., June, 2024
SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-Networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2024
A Side-Channel Analysis of Sensor Multiplexing for Covert Channels and Application Profiling on Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2024
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey.
Eng. Appl. Artif. Intell., 2024
Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study.
IEEE Access, 2024
Proceedings of the IEEE Global Conference on Artificial Intelligence and Internet of Things, 2024
Proceedings of the IEEE International Conference on Blockchain, 2024
2023
IEEE Trans. Computers, July, 2023
A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
2021
CoRR, 2021
Exploiting Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices.
CoRR, 2021
Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Survey.
CoRR, 2021
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis.
Comput. Secur., 2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
2019
Techniques for establishing trust in modern constrained sensing platforms with trusted execution environments.
PhD thesis, 2019
Providing Confidential Cloud-based Fall Detection from Remote Sensor Data Using Multi-Party Computation.
CoRR, 2019
Enhancing the Privacy and Computability of Location-Sensitive Data for Context Authentication.
CoRR, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party Computation.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs.
CoRR, 2018
Remote Credential Management with Mutual Attestation for Trusted Execution Environments.
Proceedings of the Information Security Theory and Practice, 2018
2017
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017
Proceedings of the Symposium on Applied Computing, 2017
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data.
CoRR, 2016
Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments.
CoRR, 2016
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
2015
BlobSnake: gamification of feature extraction for 'plug and play' human activity recognition.
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015
2013
Proceedings of the Security Protocols XXI, 2013