% csauthors.net - beta - BibTeX bibliography of Kim-Kwang Raymond Choo
@inproceedings{conf/ACMicec/AuVCL04,
title = {A user-centric anonymous authorisation framework in e-commerce environment.},
year = {2004},
booktitle = {ICEC},
author = {{Richard Au} and {Harikrishna Vasanta} and {Kim-Kwang Raymond Choo} and {Mark Looi}},
publisher = {ACM},
booktitle = {Proceedings of the 6th International Conference on Electronic Commerce, ICEC 2004, Delft, The Netherlands, October 25-27, 2004}
}
@inproceedings{conf/ifip1-7/ChooBHM04,
title = {Complementing Computational Protocol Analysis with Formal Specifications.},
year = {2004},
booktitle = {Formal Aspects in Security and Trust},
author = {{Kim-Kwang Raymond Choo} and {Colin Boyd} and {Yvonne Hitchcock} and {Greg Maitland}},
publisher = {Springer},
booktitle = {Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France}
}
@article{journals/iacr/ChooBHM04,
title = {On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Kim-Kwang Raymond Choo} and {Colin Boyd} and {Yvonne Hitchcock} and {Greg Maitland}}
}
@inproceedings{conf/acisp/ChooH05,
title = {Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols.},
year = {2005},
booktitle = {ACISP},
author = {{Kim-Kwang Raymond Choo} and {Yvonne Hitchcock}},
publisher = {Springer},
booktitle = {Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}
}
@inproceedings{conf/eee/AuCL05,
title = {A Secure Anonymous Authorisation Architecture for E-Commerce.},
year = {2005},
booktitle = {EEE},
author = {{Wai-Ki Richard Au} and {Kim-Kwang Raymond Choo} and {Mark Looi}},
publisher = {IEEE Computer Society},
booktitle = {2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March - 1 April 2005, Hong Kong, China}
}
@inproceedings{conf/mycrypt/BoydC05,
title = {Security of Two-Party Identity-Based Key Agreement.},
year = {2005},
booktitle = {Mycrypt},
author = {{Colin Boyd} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}
}
@inproceedings{conf/mycrypt/ChooBH05,
title = {On Session Key Construction in Provably-Secure Key Establishment Protocols.},
year = {2005},
booktitle = {Mycrypt},
author = {{Kim-Kwang Raymond Choo} and {Colin Boyd} and {Yvonne Hitchcock}},
publisher = {Springer},
booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}
}
@article{journals/iacr/ChooBH05,
title = {On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols.},
year = {2005},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Kim-Kwang Raymond Choo} and {Colin Boyd} and {Yvonne Hitchcock}}
}
@article{journals/iacr/ChooBH05a,
title = {Examining Indistinguishability-Based Proof Models for Key Establishment Protocols.},
year = {2005},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Kim-Kwang Raymond Choo} and {Colin Boyd} and {Yvonne Hitchcock}}
}
@article{journals/iacr/ChooBH05b,
title = {Errors in Computational Complexity Proofs for Protocols.},
year = {2005},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Kim-Kwang Raymond Choo} and {Colin Boyd} and {Yvonne Hitchcock}}
}
@article{journals/ijnsec/Choo05,
title = {Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols.},
year = {2005},
journal = {Int. J. Netw. Secur.},
author = {{Kim-Kwang Raymond Choo}}
}
@inproceedings{conf/acisp/BoydCM06,
title = {An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.},
year = {2006},
booktitle = {ACISP},
author = {{Colin Boyd} and {Kim-Kwang Raymond Choo} and {Anish Mathuria}},
publisher = {Springer},
booktitle = {Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}
}
@inproceedings{conf/acns/TangC06,
title = {Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks.},
year = {2006},
booktitle = {ACNS},
author = {{Qiang Tang 001} and {Kim-Kwang Raymond Choo}},
booktitle = {Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings}
}
@inproceedings{conf/acsw/DuFBC06,
title = {Formal analysis of secure contracting protocol for e-tendering.},
year = {2006},
booktitle = {ACSW},
author = {{Rong Du} and {Ernest Foo} and {Colin Boyd} and {Kim-Kwang Raymond Choo}},
publisher = {Australian Computer Society},
booktitle = {The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006}
}
@inproceedings{conf/csfw/Choo06,
title = {Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting.},
year = {2006},
booktitle = {CSFW},
author = {{Kim-Kwang Raymond Choo}},
publisher = {IEEE Computer Society},
booktitle = {19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy}
}
@article{journals/comcom/ChooBH06,
title = {The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols.},
year = {2006},
journal = {Comput. Commun.},
author = {{Kim-Kwang Raymond Choo} and {Colin Boyd} and {Yvonne Hitchcock}}
}
@article{journals/iacr/WangCC06,
title = {New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles).},
year = {2006},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Shengbao Wang} and {Zhenfu Cao} and {Kim-Kwang Raymond Choo}}
}
@article{journals/ijnsec/Choo06,
title = {On the Security of Lee, Kim, Kim, & Oh Key Agreement Protocol.},
year = {2006},
journal = {Int. J. Netw. Secur.},
author = {{Kim-Kwang Raymond Choo}}
}
@article{journals/ijnsec/Choo06a,
title = {Revisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol.},
year = {2006},
journal = {Int. J. Netw. Secur.},
author = {{Kim-Kwang Raymond Choo}}
}
@article{journals/imcs/Choo06,
title = {Issue report on business adoption of Microsoft Passport.},
year = {2006},
journal = {Inf. Manag. Comput. Secur.},
author = {{Kim-Kwang Raymond Choo}}
}
@article{journals/informaticaLT/Choo06,
title = {On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols.},
year = {2006},
journal = {Informatica},
author = {{Kim-Kwang Raymond Choo}}
}
@inproceedings{conf/provsec/PhanCH07,
title = {Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.},
year = {2007},
booktitle = {ProvSec},
author = {{Raphael C.-W. Phan} and {Kim-Kwang Raymond Choo} and {Swee-Huay Heng}},
publisher = {Springer},
booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings}
}
@inproceedings{conf/wisa/LeeCYY07,
title = {Secret Signatures: How to Achieve Business Privacy Efficiently?},
year = {2007},
booktitle = {WISA},
author = {{Byoungcheon Lee} and {Kim-Kwang Raymond Choo} and {Jeongmo Yang} and {Seungjae Yoo}},
publisher = {Springer},
booktitle = {Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}
}
@article{journals/iacr/Choo07,
title = {A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model.},
year = {2007},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Kim-Kwang Raymond Choo}}
}
@article{journals/iacr/ChowC07,
title = {Strongly-Secure Identity-based Key Agreement and Anonymous Extension.},
year = {2007},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Sherman S. M. Chow} and {Kim-Kwang Raymond Choo}}
}
@article{journals/informaticaLT/Choo07,
title = {An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker.},
year = {2007},
journal = {Informatica},
author = {{Kim-Kwang Raymond Choo}}
}
@article{journals/cj/Choo08,
title = {Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition.},
year = {2008},
journal = {Comput. J.},
author = {{Kim-Kwang Raymond Choo}}
}
@article{journals/iacr/WangCCW08,
title = {Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol.},
year = {2008},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Shengbao Wang} and {Zhenfu Cao} and {Kim-Kwang Raymond Choo} and {Lihua Wang 001}}
}
@article{journals/ijnsec/Choo08,
title = {Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols.},
year = {2008},
journal = {Int. J. Netw. Secur.},
author = {{Kim-Kwang Raymond Choo}}
}
@article{journals/chinaf/WangCCC09,
title = {Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode.},
year = {2009},
journal = {Sci. China Ser. F Inf. Sci.},
author = {{Shengbao Wang} and {Zhenfu Cao} and {ZhaoHui Cheng} and {Kim-Kwang Raymond Choo}}
}
@article{journals/icl/ZengCCW09,
title = {On the anonymity of some authentication schemes for wireless communications.},
year = {2009},
journal = {IEEE Commun. Lett.},
author = {{Peng Zeng 002} and {Zhenfu Cao} and {Kim-Kwang Raymond Choo} and {Shengbao Wang}}
}
@article{journals/icl/ZengCCW09a,
title = {Security weakness in a dynamic program update protocol for wireless sensor networks.},
year = {2009},
journal = {IEEE Commun. Lett.},
author = {{Peng Zeng 002} and {Zhenfu Cao} and {Kim-Kwang Raymond Choo} and {Shengbao Wang}}
}
@article{journals/isci/WangCCW09,
title = {An improved identity-based key agreement protocol and its security proof.},
year = {2009},
journal = {Inf. Sci.},
author = {{Shengbao Wang} and {Zhenfu Cao} and {Kim-Kwang Raymond Choo} and {Lihua Wang 001}}
}
@book{series/ais/Choo09,
title = {Secure Key Establishment},
year = {2009},
isbn = {978-0-387-87968-0},
publisher = {Springer},
series = {Advances in Information Security},
author = {{Kim-Kwang Raymond Choo}}
}
@inproceedings{conf/itng/TeoC10,
title = {Security Improvements to Anonymous ID-Based Group Key Agreement for Wireless Networks.},
year = {2010},
booktitle = {ITNG},
author = {{Joseph Chee Ming Teo} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE Computer Society},
booktitle = {Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010}
}
@article{journals/istr/Choo10,
title = {High tech criminal threats to the national information infrastructure.},
year = {2010},
journal = {Inf. Secur. Tech. Rep.},
author = {{Kim-Kwang Raymond Choo}}
}
@article{journals/tce/ZengCS10,
title = {On the security of an enhanced novel access control protocol for wireless sensor networks.},
year = {2010},
journal = {IEEE Trans. Consumer Electron.},
author = {{Peng Zeng 002} and {Kim-Kwang Raymond Choo} and {Da-Zhi Sun}}
}
@article{journals/cee/ZengCC11,
title = {An ID-based digital watermarking protocol for copyright protection.},
year = {2011},
journal = {Comput. Electr. Eng.},
author = {{Peng Zeng 002} and {Zhenfu Cao} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/Choo11,
title = {The cyber threat landscape: Challenges and future research directions.},
year = {2011},
journal = {Comput. Secur.},
author = {{Kim-Kwang Raymond Choo}}
}
@article{journals/di/MartiniC12,
title = {An integrated conceptual digital forensic framework for cloud computing.},
year = {2012},
journal = {Digit. Investig.},
author = {{Ben Martini} and {Kim-Kwang Raymond Choo}}
}
@article{journals/sigact/Choo12,
title = {Review of insider threats in cyber security by Probst, Hunker, Gollman, Bishop.},
year = {2012},
journal = {SIGACT News},
author = {{Kim-Kwang Raymond Choo}}
}
@inproceedings{conf/IEEEares/AriffinDCS13,
title = {iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner?},
year = {2013},
booktitle = {ARES},
author = {{Aswami Ariffin} and {Christian D'Orazio} and {Kim-Kwang Raymond Choo} and {Jill Slay}},
publisher = {IEEE Computer Society},
booktitle = {2013 International Conference on Availability, Reliability and Security, ARES 2013, Regensburg, Germany, September 2-6, 2013}
}
@inproceedings{conf/auisc/AriffinCS13,
title = {Digital Camcorder Forensics.},
year = {2013},
booktitle = {AISC},
author = {{Aswami Ariffin} and {Kim-Kwang Raymond Choo} and {Jill Slay}},
publisher = {Australian Computer Society},
booktitle = {Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013}
}
@inproceedings{conf/ifip11-9/AriffinSC13,
title = {Data Recovery from Proprietary Formatted Cctv Hard Disks.},
year = {2013},
booktitle = {IFIP Int. Conf. Digital Forensics},
author = {{Aswami Ariffin} and {Jill Slay} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Advances in Digital Forensics IX - 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers}
}
@article{journals/clsr/HooperMC13,
title = {Cloud computing and its implications for cybercrime investigations in Australia.},
year = {2013},
journal = {Comput. Law Secur. Rev.},
author = {{Christopher Hooper} and {Ben Martini} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/Choo13,
title = {New payment methods: A review of 2010-2012 FATF mutual evaluation reports.},
year = {2013},
journal = {Comput. Secur.},
author = {{Kim-Kwang Raymond Choo}}
}
@article{journals/di/MartiniC13,
title = {Cloud storage forensics: ownCloud as a case study.},
year = {2013},
journal = {Digit. Investig.},
author = {{Ben Martini} and {Kim-Kwang Raymond Choo}}
}
@article{journals/di/QuickC13,
title = {Dropbox analysis: Data remnants on user machines.},
year = {2013},
journal = {Digit. Investig.},
author = {{Darren Quick} and {Kim-Kwang Raymond Choo}}
}
@article{journals/di/QuickC13a,
title = {Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?},
year = {2013},
journal = {Digit. Investig.},
author = {{Darren Quick} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/QuickC13,
title = {Digital droplets: Microsoft SkyDrive forensic data remnants.},
year = {2013},
journal = {Future Gener. Comput. Syst.},
author = {{Darren Quick} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iacr/NamCPW13,
title = {On the security of a password-only authenticated three-party key exchange protocol.},
year = {2013},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Junghyun Nam} and {Kim-Kwang Raymond Choo} and {Juryon Paik} and {Dongho Won}}
}
@article{journals/iacr/NamCPW13a,
title = {An Offline Dictionary Attack against a Three-Party Key Exchange Protocol.},
year = {2013},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Junghyun Nam} and {Kim-Kwang Raymond Choo} and {Juryon Paik} and {Dongho Won}}
}
@article{journals/itiis/NamCKPW13,
title = {Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols.},
year = {2013},
journal = {KSII Trans. Internet Inf. Syst.},
author = {{Junghyun Nam} and {Kim-Kwang Raymond Choo} and {Moonseong Kim} and {Juryon Paik} and {Dongho Won}}
}
@book{books/daglib/0032809,
title = {Cloud Storage Forensics.},
year = {2014},
isbn = {978-0-12-419970-5},
publisher = {Syngress Publishing / Elsevier},
author = {{Darren Quick} and {Ben Martini} and {Kim-Kwang Raymond Choo}}
}
@inproceedings{conf/amcis/ManiMC14,
title = {Understanding the Information Security Awareness Process in Real Estate Organizations Using the SECI Model.},
year = {2014},
booktitle = {AMCIS},
author = {{Deepa Mani} and {Sameera Mubarak} and {Kim-Kwang Raymond Choo}},
publisher = {Association for Information Systems},
booktitle = {20th Americas Conference on Information Systems, AMCIS 2014, Savannah, Georgia, USA, August 7-9, 2014}
}
@inproceedings{conf/amcis/OMalleyC14,
title = {Bridging the Air Gap: Inaudible Data Exfiltration by Insiders.},
year = {2014},
booktitle = {AMCIS},
author = {{Samuel O'Malley} and {Kim-Kwang Raymond Choo}},
publisher = {Association for Information Systems},
booktitle = {20th Americas Conference on Information Systems, AMCIS 2014, Savannah, Georgia, USA, August 7-9, 2014}
}
@inproceedings{conf/amcis/QuickTC14,
title = {Forensic Analysis of Windows Thumbcache files.},
year = {2014},
booktitle = {AMCIS},
author = {{Darren Quick} and {Christopher Tassone} and {Kim-Kwang Raymond Choo}},
publisher = {Association for Information Systems},
booktitle = {20th Americas Conference on Information Systems, AMCIS 2014, Savannah, Georgia, USA, August 7-9, 2014}
}
@inproceedings{conf/cis/GaoZC14,
title = {Multi-sender Broadcast Authentication in Wireless Sensor Networks.},
year = {2014},
booktitle = {CIS},
author = {{Ya Gao} and {Peng Zeng 002} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE Computer Society},
booktitle = {Tenth International Conference on Computational Intelligence and Security, CIS 2014, Kunming, Yunnan, China, November 15-16, 2014}
}
@inproceedings{conf/ecis/JonesC14,
title = {Should there be a New Body of Law for Cyber Space?},
year = {2014},
booktitle = {ECIS},
author = {{Doone Jones} and {Kim-Kwang Raymond Choo}},
booktitle = {22st European Conference on Information Systems, ECIS 2014, Tel Aviv, Israel, June 9-11, 2014}
}
@inproceedings{conf/ecis/MartiniC14,
title = {Building the Next Generation of Cyber Security Professionals.},
year = {2014},
booktitle = {ECIS},
author = {{Ben Martini} and {Kim-Kwang Raymond Choo}},
booktitle = {22st European Conference on Information Systems, ECIS 2014, Tel Aviv, Israel, June 9-11, 2014}
}
@inproceedings{conf/hicss/AzfarCL14,
title = {A Study of Ten Popular Android Mobile VoIP Applications: Are the Communications Encrypted?},
year = {2014},
booktitle = {HICSS},
author = {{Abdullah Azfar} and {Kim-Kwang Raymond Choo} and {Lin Liu 003}},
publisher = {IEEE Computer Society},
booktitle = {47th Hawaii International Conference on System Sciences, HICSS 2014, Waikoloa, HI, USA, January 6-9, 2014}
}
@inproceedings{conf/hicss/DOrazioAC14,
title = {iOS Anti-forensics: How Can We Securely Conceal, Delete and Insert Data?},
year = {2014},
booktitle = {HICSS},
author = {{Christian D'Orazio} and {Aswami Ariffin} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE Computer Society},
booktitle = {47th Hawaii International Conference on System Sciences, HICSS 2014, Waikoloa, HI, USA, January 6-9, 2014}
}
@inproceedings{conf/hicss/DoMC14,
title = {Enhancing User Privacy on Android Mobile Devices via Permissions Removal.},
year = {2014},
booktitle = {HICSS},
author = {{Quang Do} and {Ben Martini} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE Computer Society},
booktitle = {47th Hawaii International Conference on System Sciences, HICSS 2014, Waikoloa, HI, USA, January 6-9, 2014}
}
@inproceedings{conf/ifip11-9/DoMLWC14,
title = {Windows Event Forensic Process.},
year = {2014},
booktitle = {IFIP Int. Conf. Digital Forensics},
author = {{Quang Do} and {Ben Martini} and {Jonathan Looi} and {Yu Wang} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Advances in Digital Forensics X - 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers}
}
@inproceedings{conf/nss/GeC14,
title = {A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks.},
year = {2014},
booktitle = {NSS},
author = {{Mengmeng Ge} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Network and System Security - 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014, Proceedings}
}
@inproceedings{conf/securecomm/AburummanC14,
title = {A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc Network.},
year = {2014},
booktitle = {SecureComm (2)},
author = {{Ala' F. A. Aburumman} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II}
}
@inproceedings{conf/trustcom/DoMC14,
title = {Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud.},
year = {2014},
booktitle = {TrustCom},
author = {{Quang Do} and {Ben Martini} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE Computer Society},
booktitle = {13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014}
}
@inproceedings{conf/trustcom/MartiniC14,
title = {Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept.},
year = {2014},
booktitle = {TrustCom},
author = {{Ben Martini} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE Computer Society},
booktitle = {13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014}
}
@article{journals/behaviourIT/ImgrabenEC14,
title = {Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users.},
year = {2014},
journal = {Behav. Inf. Technol.},
author = {{James Imgraben} and {Alewyn Engelbrecht} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/Choo14,
title = {Legal Issues in the Cloud.},
year = {2014},
journal = {IEEE Cloud Comput.},
author = {{Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/Choo14a,
title = {A Cloud Security Risk-Management Strategy.},
year = {2014},
journal = {IEEE Cloud Comput.},
author = {{Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/Choo14b,
title = {Mobile Cloud Storage Users.},
year = {2014},
journal = {IEEE Cloud Comput.},
author = {{Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/MartiniC14,
title = {Cloud Forensic Technical Challenges and Solutions: A Snapshot.},
year = {2014},
journal = {IEEE Cloud Comput.},
author = {{Ben Martini} and {Kim-Kwang Raymond Choo}}
}
@article{journals/clsr/HillmanHC14,
title = {Online child exploitation: Challenges and future research directions.},
year = {2014},
journal = {Comput. Law Secur. Rev.},
author = {{Henry Hillman} and {Christopher Hooper} and {Kim-Kwang Raymond Choo}}
}
@article{journals/di/MartiniC14,
title = {Distributed filesystem forensics: XtreemFS as a case study.},
year = {2014},
journal = {Digit. Investig.},
author = {{Ben Martini} and {Kim-Kwang Raymond Choo}}
}
@article{journals/di/QuickC14,
title = {Impacts of increasing volume of digital forensic data: A survey and future research challenges.},
year = {2014},
journal = {Digit. Investig.},
author = {{Darren Quick} and {Kim-Kwang Raymond Choo}}
}
@article{journals/imcs/ManiCM14,
title = {Information security in the South Australian real estate industry: A study of 40 real estate organisations.},
year = {2014},
journal = {Inf. Manag. Comput. Secur.},
author = {{Deepa Mani} and {Kim-Kwang Raymond Choo} and {Sameera Mubarak}}
}
@article{journals/isci/ChooNW14,
title = {A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols.},
year = {2014},
journal = {Inf. Sci.},
author = {{Kim-Kwang Raymond Choo} and {Junghyun Nam} and {Dongho Won}}
}
@article{journals/jnca/QuickC14,
title = {Google Drive: Forensic analysis of data remnants.},
year = {2014},
journal = {J. Netw. Comput. Appl.},
author = {{Darren Quick} and {Kim-Kwang Raymond Choo}}
}
@article{journals/scn/WangZC14,
title = {MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption.},
year = {2014},
journal = {Secur. Commun. Networks},
author = {{Hongbing Wang} and {Peng Zeng 002} and {Kim-Kwang Raymond Choo}}
}
@incollection{books/el/15/JuliadotterC15,
title = {CATRA: Conceptual cloud attack taxonomy and risk assessment framework.},
year = {2015},
booktitle = {The Cloud Security Ecosystem},
author = {{Nina Viktoria Juliadotter} and {Kim-Kwang Raymond Choo}},
publisher = {Elsevier},
booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues.}
}
@incollection{books/el/15/KoC15,
title = {Cloud security ecosystem.},
year = {2015},
booktitle = {The Cloud Security Ecosystem},
author = {{Ryan K. L. Ko} and {Kim-Kwang Raymond Choo}},
publisher = {Elsevier},
booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues.}
}
@incollection{books/el/15/MartiniDC15,
title = {Conceptual evidence collection and analysis methodology for Android devices.},
year = {2015},
booktitle = {The Cloud Security Ecosystem},
author = {{Ben Martini} and {Quang Do} and {Kim-Kwang Raymond Choo}},
publisher = {Elsevier},
booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues.}
}
@incollection{books/el/15/MartiniDC15a,
title = {Mobile cloud forensics: An analysis of seven popular Android apps.},
year = {2015},
booktitle = {The Cloud Security Ecosystem},
author = {{Ben Martini} and {Quang Do} and {Kim-Kwang Raymond Choo}},
publisher = {Elsevier},
booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues.}
}
@incollection{books/el/15/RahmanC15,
title = {Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling Model.},
year = {2015},
booktitle = {The Cloud Security Ecosystem},
author = {{Nurul Hidayah Ab Rahman} and {Kim-Kwang Raymond Choo}},
publisher = {Elsevier},
booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues.}
}
@incollection{books/el/15/ShariatiDMC15,
title = {Ubuntu One investigation: Detecting evidences on client machines.},
year = {2015},
booktitle = {The Cloud Security Ecosystem},
author = {{Mohammad Shariati} and {Ali Dehghantanha} and {Ben Martini} and {Kim-Kwang Raymond Choo}},
publisher = {Elsevier},
booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues.}
}
@incollection{books/el/15/VidalC15,
title = {Cloud security and forensic readiness: The current state of an IaaS provider.},
year = {2015},
booktitle = {The Cloud Security Ecosystem},
author = {{Chaz Vidal} and {Kim-Kwang Raymond Choo}},
publisher = {Elsevier},
booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues.}
}
@inproceedings{conf/acis/CahyaniMC15,
title = {Using Multimedia Presentations to Improve Digital Forensic Understanding: A Pilot Study.},
year = {2015},
booktitle = {ACIS},
author = {{Niken Dwi Wahyu Cahyani} and {Ben Martini} and {Kim-Kwang Raymond Choo}},
booktitle = {Australasian Conference on Information Systems, ACIS 2015, Adelaide, SA, Australia, 30 November - 4 December 2015.}
}
@inproceedings{conf/acis/HeraviMC15,
title = {Online Social Networking Has a Greater Effect on Others than on Me: A Third-Person Effect Perspective.},
year = {2015},
booktitle = {ACIS},
author = {{Alireza Heravi} and {Sameera Mubarak} and {Kim-Kwang Raymond Choo}},
booktitle = {Australasian Conference on Information Systems, ACIS 2015, Adelaide, SA, Australia, 30 November - 4 December 2015.}
}
@inproceedings{conf/amcis/AzfarC015,
title = {Forensic Taxonomy of Popular Android mHealth Apps.},
year = {2015},
booktitle = {AMCIS},
author = {{Abdullah Azfar} and {Kim-Kwang Raymond Choo} and {Lin Liu 003}},
publisher = {Association for Information Systems},
booktitle = {21st Americas Conference on Information Systems, AMCIS 2015, Puerto Rico, August 13-15, 2015}
}
@inproceedings{conf/amcis/ChinCE15,
title = {Enterprise Social Networks: A Successful Implementation within a Telecommunication Company.},
year = {2015},
booktitle = {AMCIS},
author = {{Christie Pei-Yee Chin} and {Kim-Kwang Raymond Choo} and {Nina Evans}},
publisher = {Association for Information Systems},
booktitle = {21st Americas Conference on Information Systems, AMCIS 2015, Puerto Rico, August 13-15, 2015}
}
@inproceedings{conf/amcis/ChooFM15,
title = {Privacy Risks in Mobile Dating Apps.},
year = {2015},
booktitle = {AMCIS},
author = {{Kim-Kwang Raymond Choo} and {Jody Farnden} and {Ben Martini}},
publisher = {Association for Information Systems},
booktitle = {21st Americas Conference on Information Systems, AMCIS 2015, Puerto Rico, August 13-15, 2015}
}
@inproceedings{conf/amcis/ChooHMM15,
title = {Employees' Intended Information Security Behaviour in Real Estate Organisations: a Protection Motivation Perspective.},
year = {2015},
booktitle = {AMCIS},
author = {{Kim-Kwang Raymond Choo} and {Alireza Heravi} and {Deepa Mani} and {Sameera Mubarak}},
publisher = {Association for Information Systems},
booktitle = {21st Americas Conference on Information Systems, AMCIS 2015, Puerto Rico, August 13-15, 2015}
}
@inproceedings{conf/amcis/RahmanC15,
title = {Factors Influencing the Adoption of Cloud Incident Handling Strategy: A Preliminary Study in Malaysia.},
year = {2015},
booktitle = {AMCIS},
author = {{Nurul Hidayah Ab Rahman} and {Kim-Kwang Raymond Choo}},
publisher = {Association for Information Systems},
booktitle = {21st Americas Conference on Information Systems, AMCIS 2015, Puerto Rico, August 13-15, 2015}
}
@inproceedings{conf/auisc/ManiHCM15,
title = {Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis.},
year = {2015},
booktitle = {AISC},
author = {{Deepa Mani} and {Alireza Heravi} and {Kim-Kwang Raymond Choo} and {Sameera Mubarak}},
publisher = {Australian Computer Society},
booktitle = {13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015}
}
@inproceedings{conf/esorics/YangLLCZ15,
title = {Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.},
year = {2015},
booktitle = {ESORICS (2)},
author = {{Yanjiang Yang} and {Joseph K. Liu} and {Kaitai Liang} and {Kim-Kwang Raymond Choo} and {Jianying Zhou 001}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II}
}
@inproceedings{conf/hicss/DOrazioC15,
title = {A Generic Process to Identify Vulnerabilities and Design Weaknesses in iOS Healthcare Apps.},
year = {2015},
booktitle = {HICSS},
author = {{Christian D'Orazio} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE Computer Society},
booktitle = {48th Hawaii International Conference on System Sciences, HICSS 2015, Kauai, Hawaii, USA, January 5-8, 2015}
}
@inproceedings{conf/icics/LaiLCL15,
title = {Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN.},
year = {2015},
booktitle = {ICICS},
author = {{Shangqi Lai} and {Joseph K. Liu} and {Kim-Kwang Raymond Choo} and {Kaitai Liang}},
publisher = {Springer},
booktitle = {Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers}
}
@inproceedings{conf/lightsec/YangLCL15,
title = {On Lightweight Security Enforcement in Cyber-Physical Systems.},
year = {2015},
booktitle = {LightSec},
author = {{Yanjiang Yang} and {Jiqiang Lu} and {Kim-Kwang Raymond Choo} and {Joseph K. Liu}},
publisher = {Springer},
booktitle = {Lightweight Cryptography for Security and Privacy - 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers}
}
@inproceedings{conf/pacis/ChinECT15,
title = {What Influences Employees to Use Enterprise Social Networks? A Socio-Technical Perspective.},
year = {2015},
booktitle = {PACIS},
author = {{Christie Pei-Yee Chin} and {Nina Evans} and {Kim-Kwang Raymond Choo} and {Felix B. Tan}},
booktitle = {19th Pacific Asia Conference on Information Systems, PACIS 2015, Singapore, July 5-9, 2015}
}
@inproceedings{conf/securecomm/AburummanS0KC15,
title = {A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering.},
year = {2015},
booktitle = {SecureComm},
author = {{Ala' F. A. Aburumman} and {Wei Jye Seo} and {Md. Rafiqul Islam 001} and {Muhammad Khurram Khan} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}
}
@inproceedings{conf/trustcom/ImmanuelMC15,
title = {Android Cache Taxonomy and Forensic Process.},
year = {2015},
booktitle = {TrustCom/BigDataSE/ISPA (1)},
author = {{Felix Immanuel} and {Ben Martini} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {2015 IEEE TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}
}
@inproceedings{conf/trustcom/LeomDDC15,
title = {Forensic Collection and Analysis of Thumbnails in Android.},
year = {2015},
booktitle = {TrustCom/BigDataSE/ISPA (1)},
author = {{Ming Di Leom} and {Christian Javier D'Orazio} and {Gaye Deegan} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {2015 IEEE TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}
}
@inproceedings{conf/trustcom/TepMHC15,
title = {A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management.},
year = {2015},
booktitle = {TrustCom/BigDataSE/ISPA (1)},
author = {{Kin Suntana Tep} and {Ben Martini} and {Ray Hunt} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {2015 IEEE TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}
}
@inproceedings{conf/trustcom/WallsC15,
title = {A Review of Free Cloud-Based Anti-Malware Apps for Android.},
year = {2015},
booktitle = {TrustCom/BigDataSE/ISPA (1)},
author = {{Jason Walls} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {2015 IEEE TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}
}
@article{journals/cloudcomp/ChooS15,
title = {Balancing Privacy with Legitimate Surveillance and Lawful Data Access.},
year = {2015},
journal = {IEEE Cloud Comput.},
author = {{Kim-Kwang Raymond Choo} and {Rick Sarre}}
}
@article{journals/cloudcomp/DoMC15,
title = {A Cloud-Focused Mobile Forensics Methodology.},
year = {2015},
journal = {IEEE Cloud Comput.},
author = {{Quang Do} and {Ben Martini} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/JuliadotterC15,
title = {Cloud Attack and Risk Assessment Taxonomy.},
year = {2015},
journal = {IEEE Cloud Comput.},
author = {{Nina Viktoria Juliadotter} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/NepalRC15,
title = {Trustworthy Processing of Healthcare Big Data in Hybrid Clouds.},
year = {2015},
journal = {IEEE Cloud Comput.},
author = {{Surya Nepal} and {Rajiv Ranjan 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/DoMC15,
title = {Exfiltrating data from Android devices.},
year = {2015},
journal = {Comput. Secur.},
author = {{Quang Do} and {Ben Martini} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/RahmanC15,
title = {A survey of information security incident handling in the cloud.},
year = {2015},
journal = {Comput. Secur.},
author = {{Nurul Hidayah Ab Rahman} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/DoMC15,
title = {A Forensically Sound Adversary Model for Mobile Devices.},
year = {2015},
journal = {CoRR},
author = {{Quang Do} and {Ben Martini} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/MartiniDC15,
title = {Conceptual evidence collection and analysis methodology for Android devices.},
year = {2015},
journal = {CoRR},
author = {{Ben Martini} and {Quang Do} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/MartiniDC15a,
title = {Mobile Cloud Forensics: An Analysis of Seven Popular Android Apps.},
year = {2015},
journal = {CoRR},
author = {{Ben Martini} and {Quang Do} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/NamCHKPW15,
title = {Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.},
year = {2015},
journal = {CoRR},
author = {{Junghyun Nam} and {Kim-Kwang Raymond Choo} and {Sangchul Han} and {Moonseong Kim} and {Juryon Paik} and {Dongho Won}}
}
@article{journals/csi/BorgmanMC15,
title = {Cyber security readiness in the South Australian Government.},
year = {2015},
journal = {Comput. Stand. Interfaces},
author = {{Brenton Borgman} and {Sameera Mubarak} and {Kim-Kwang Raymond Choo}}
}
@article{journals/eait/AmosunIC15,
title = {Impact of a participatory cyber crime prevention programme on secondary school students' attainment in crime prevention concepts in civic education and social studies.},
year = {2015},
journal = {Educ. Inf. Technol.},
author = {{Peter Adewale Amosun} and {Olugbenga Adedayo Ige} and {Kim-Kwang Raymond Choo}}
}
@article{journals/ieicet/NamCPW15,
title = {An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting.},
year = {2015},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
author = {{Junghyun Nam} and {Kim-Kwang Raymond Choo} and {Juryon Paik} and {Dongho Won}}
}
@article{journals/informaticaLT/WangZCW15,
title = {A CCA2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles.},
year = {2015},
journal = {Informatica},
author = {{Shengbao Wang} and {Peng Zeng 002} and {Kim-Kwang Raymond Choo} and {Hongbing Wang}}
}
@article{journals/jocec/ChinEC15,
title = {Exploring Factors Influencing the Use of Enterprise Social Networks in Multinational Professional Service Firms.},
year = {2015},
journal = {J. Organ. Comput. Electron. Commer.},
author = {{Christie Pei-Yee Chin} and {Nina Evans} and {Kim-Kwang Raymond Choo}}
}
@article{journals/symmetry/NamCHPW15,
title = {Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting.},
year = {2015},
journal = {Symmetry},
author = {{Junghyun Nam} and {Kim-Kwang Raymond Choo} and {Sangchul Han} and {Juryon Paik} and {Dongho Won}}
}
@inproceedings{conf/acisp/YangCWLC16,
title = {Towards Lightweight Anonymous Entity Authentication for IoT Applications.},
year = {2016},
booktitle = {ACISP (1)},
author = {{Yanjiang Yang} and {Haibin Cai} and {Zhuo Wei} and {Haibing Lu} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I}
}
@inproceedings{conf/acisp/YuLASCZ16,
title = {Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.},
year = {2016},
booktitle = {ACISP (1)},
author = {{Yong Yu 002} and {Yannan Li} and {Man Ho Au} and {Willy Susilo} and {Kim-Kwang Raymond Choo} and {Xinpeng Zhang}},
publisher = {Springer},
booktitle = {Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I}
}
@inproceedings{conf/aina/MansooriHWC16,
title = {Empirical Analysis of Impact of HTTP Referer on Malicious Website Behaviour and Delivery.},
year = {2016},
booktitle = {AINA},
author = {{Masood Mansoori} and {Yuichi Hirose} and {Ian Welch} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE Computer Society},
booktitle = {30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016, Crans-Montana, Switzerland, 23-25 March, 2016}
}
@inproceedings{conf/aina/MansooriWCM16,
title = {Application of HAZOP to the Design of Cyber Security Experiments.},
year = {2016},
booktitle = {AINA},
author = {{Masood Mansoori} and {Ian Welch} and {Kim-Kwang Raymond Choo} and {Roy A. Maxion}},
publisher = {IEEE Computer Society},
booktitle = {30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016, Crans-Montana, Switzerland, 23-25 March, 2016}
}
@inproceedings{conf/amcis/MinkYCG16,
title = {Next Generation Aircraft Architecture and Digital Forensic.},
year = {2016},
booktitle = {AMCIS},
author = {{Dustin Mink} and {Alec Yasinsac} and {Kim-Kwang Raymond Choo} and {William Bradley Glisson}},
publisher = {Association for Information Systems},
booktitle = {22nd Americas Conference on Information Systems, AMCIS 2016, San Diego, CA, USA, August 11-14, 2016}
}
@inproceedings{conf/ceec/OsanaiyeCD16,
title = {Change-point cloud DDoS detection using packet inter-arrival time.},
year = {2016},
booktitle = {CEEC},
author = {{Opeyemi A. Osanaiye} and {Kim-Kwang Raymond Choo} and {Mqhele E. Dlodlo}},
publisher = {IEEE},
booktitle = {2016 8th Computer Science and Electronic Engineering Conference, CEEC 2016, Colchester, UK, September 28-30, 2016}
}
@inproceedings{conf/cis/ChenZCW16,
title = {An Efficient Ring Signature Scheme Based on Syndrome Decoding Problem.},
year = {2016},
booktitle = {CIS},
author = {{Siyuan Chen} and {Peng Zeng 002} and {Kim-Kwang Raymond Choo} and {Qin Wang}},
publisher = {IEEE Computer Society},
booktitle = {12th International Conference on Computational Intelligence and Security, CIS 2016, Wuxi, China, December 16-19, 2016}
}
@inproceedings{conf/dasc/EspositoCPFC16,
title = {A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things.},
year = {2016},
booktitle = {DASC/PiCom/DataCom/CyberSciTech},
author = {{Christian Esposito 001} and {Aniello Castiglione} and {Francesco Palmieri 002} and {Massimo Ficco} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE Computer Society},
booktitle = {2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2016, Auckland, New Zealand, August 8-12, 2016}
}
@inproceedings{conf/dasc/MaCHJLWWZ16,
title = {Perspectives on Cyber Science and Technology for Cyberization and Cyber-Enabled Worlds.},
year = {2016},
booktitle = {DASC/PiCom/DataCom/CyberSciTech},
author = {{Jianhua Ma 002} and {Kim-Kwang Raymond Choo} and {Hui-Huang Hsu} and {Qun Jin} and {William Liu} and {Kevin I-Kai Wang} and {Yufeng Wang 001} and {Xiaokang Zhou}},
publisher = {IEEE Computer Society},
booktitle = {2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2016, Auckland, New Zealand, August 8-12, 2016}
}
@inproceedings{conf/dgo/AmjadNZZC16,
title = {Improving Security Awareness in the Government Sector.},
year = {2016},
booktitle = {DG.O},
author = {{Hafiz Abdur Rehman Amjad} and {Umer Naeem} and {Muhammad Adeel Zaffar} and {Muhammad Fareed Zaffar} and {Kim-Kwang Raymond Choo}},
publisher = {ACM},
booktitle = {Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, DG.O 2016, Shanghai, China, June 08 - 10, 2016}
}
@inproceedings{conf/hicss/AzfarC016,
title = {An Android Social App Forensics Adversary Model.},
year = {2016},
booktitle = {HICSS},
author = {{Abdullah Azfar} and {Kim-Kwang Raymond Choo} and {Lin Liu 003}},
publisher = {IEEE Computer Society},
booktitle = {49th Hawaii International Conference on System Sciences, HICSS 2016, Koloa, HI, USA, January 5-8, 2016}
}
@inproceedings{conf/hicss/CahyaniMC16,
title = {Using Multimedia Presentations to Enhance the Judiciary's Technical Understanding of Digital Forensic Concepts: An Indonesian Case Study.},
year = {2016},
booktitle = {HICSS},
author = {{Niken Dwi Wahyu Cahyani} and {Ben Martini} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE Computer Society},
booktitle = {49th Hawaii International Conference on System Sciences, HICSS 2016, Koloa, HI, USA, January 5-8, 2016}
}
@inproceedings{conf/hicss/GlissonC16,
title = {Introduction to the Cybercrimes, Cyber-Physical Innovations, and Emerging Investigation Challenges Minitrack.},
year = {2016},
booktitle = {HICSS},
author = {{William Bradley Glisson} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE Computer Society},
booktitle = {49th Hawaii International Conference on System Sciences, HICSS 2016, Koloa, HI, USA, January 5-8, 2016}
}
@inproceedings{conf/hpcc/BhuiyanWC16,
title = {Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System.},
year = {2016},
booktitle = {HPCC/SmartCity/DSS},
author = {{Md. Zakirul Alam Bhuiyan} and {Guojun Wang 001} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE Computer Society},
booktitle = {18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016}
}
@inproceedings{conf/icpads/ChenZC16,
title = {A Provably Secure Blind Signature Based on Coding Theory.},
year = {2016},
booktitle = {ICPADS},
author = {{Siyuan Chen} and {Peng Zeng 002} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE Computer Society},
booktitle = {22nd IEEE International Conference on Parallel and Distributed Systems, ICPADS 2016, Wuhan, China, December 13-16, 2016}
}
@inproceedings{conf/mobimedia/CahyaniR0GC16,
title = {The role of mobile forensics in terrorism investigations involving the use of cloud apps.},
year = {2016},
booktitle = {MobiMedia},
author = {{Niken Dwi Wahyu Cahyani} and {Nurul Hidayah Ab Rahman} and {Zheng Xu 001} and {William Bradley Glisson} and {Kim-Kwang Raymond Choo}},
publisher = {ACM},
booktitle = {Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2016, Xi'an, China, June 18-20, 2016}
}
@inproceedings{conf/nss/LinZWLC16,
title = {A New Transitive Signature Scheme.},
year = {2016},
booktitle = {NSS},
author = {{Chao Lin} and {Fei Zhu} and {Wei Wu 001} and {Kaitai Liang} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings}
}
@inproceedings{conf/rfidsec/LiNC16,
title = {A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks.},
year = {2016},
booktitle = {RFIDSec},
author = {{Xiong Li 002} and {Jianwei Niu 002} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers}
}
@inproceedings{conf/secrypt/AlcarazLC16,
title = {Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems.},
year = {2016},
booktitle = {SECRYPT},
author = {{Cristina Alcaraz} and {Javier López 001} and {Kim-Kwang Raymond Choo}},
publisher = {SciTePress},
booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016.}
}
@inproceedings{conf/securecomm/CarmanC16,
title = {Tinder Me Softly - How Safe Are You Really on Tinder?},
year = {2016},
booktitle = {SecureComm},
author = {{Mark J. Carman} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings}
}
@inproceedings{conf/securecomm/Gonzalez-Manzano16,
title = {ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments.},
year = {2016},
booktitle = {SecureComm},
author = {{Lorena González-Manzano} and {José María de Fuentes} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings}
}
@inproceedings{conf/spaccs/TeingDCMAC16,
title = {A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts.},
year = {2016},
booktitle = {SpaCCS Workshops},
author = {{Yee-Yang Teing} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo} and {Zaiton Muda} and {Mohd Taufik Abdullah} and {Wee-Chiat Chai}},
booktitle = {Security, Privacy and Anonymity in Computation, Communication and Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings}
}
@inproceedings{conf/trustcom/PengCA16,
title = {Astroturfing Detection in Social Media: Using Binary n-Gram Analysis for Authorship Attribution.},
year = {2016},
booktitle = {Trustcom/BigDataSE/ISPA},
author = {{Jian Peng} and {Kim-Kwang Raymond Choo} and {Helen Ashman}},
publisher = {IEEE},
booktitle = {2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}
}
@inproceedings{conf/trustcom/YangJXHWZC16,
title = {A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol.},
year = {2016},
booktitle = {Trustcom/BigDataSE/ISPA},
author = {{Xiaoyan Yang} and {Han Jiang 001} and {Qiuliang Xu} and {Mengbo Hou} and {Xiaochao Wei} and {Minghao Zhao 001} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}
}
@article{journals/amc/ProkhorenkoCA16,
title = {Context-oriented web application protection model.},
year = {2016},
journal = {Appl. Math. Comput.},
author = {{Victor Prokhorenko} and {Kim-Kwang Raymond Choo} and {Helen Ashman}}
}
@article{journals/cloudcomp/CasolaCCE16,
title = {Healthcare-Related Data in the Cloud: Challenges and Opportunities.},
year = {2016},
journal = {IEEE Cloud Comput.},
author = {{Valentina Casola} and {Aniello Castiglione} and {Kim-Kwang Raymond Choo} and {Christian Esposito 001}}
}
@article{journals/cloudcomp/CastiglionePC16,
title = {Enhanced Network Support for Federated Cloud Infrastructures.},
year = {2016},
journal = {IEEE Cloud Comput.},
author = {{Aniello Castiglione} and {Francesco Palmieri 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/EspositoCC16,
title = {Encryption-Based Solution for Data Sovereignty in Federated Clouds.},
year = {2016},
journal = {IEEE Cloud Comput.},
author = {{Christian Esposito 001} and {Aniello Castiglione} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/EspositoCC16a,
title = {Challenges in Delivering Software in the Cloud as Microservices.},
year = {2016},
journal = {IEEE Cloud Comput.},
author = {{Christian Esposito 001} and {Aniello Castiglione} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/EspositoCMC16,
title = {Cloud Manufacturing: Security, Privacy, and Forensic Concerns.},
year = {2016},
journal = {IEEE Cloud Comput.},
author = {{Christian Esposito 001} and {Aniello Castiglione} and {Ben Martini} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/FiccoECC16,
title = {Live Migration in Emerging Cloud Paradigms.},
year = {2016},
journal = {IEEE Cloud Comput.},
author = {{Massimo Ficco} and {Christian Esposito 001} and {Henry Chang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/RahmanGYC16,
title = {Forensic-by-Design Framework for Cyber-Physical Cloud Systems.},
year = {2016},
journal = {IEEE Cloud Comput.},
author = {{Nurul Hidayah Ab Rahman} and {William Bradley Glisson} and {Yanjiang Yang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cluster/HuYC16,
title = {PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment.},
year = {2016},
journal = {Clust. Comput.},
author = {{Yan Hu} and {Jun Yan 009} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cluster/QuickC16,
title = {Big forensic data reduction: digital forensic images and electronic evidence.},
year = {2016},
journal = {Clust. Comput.},
author = {{Darren Quick} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cluster/ZhaoCRCH16,
title = {Geographical information system parallelization for spatial big data processing: a review.},
year = {2016},
journal = {Clust. Comput.},
author = {{Lingjun Zhao} and {Lajiao Chen} and {Rajiv Ranjan 001} and {Kim-Kwang Raymond Choo} and {Jijun He}}
}
@article{journals/compsec/DOrazioC16,
title = {An adversary model to evaluate DRM protection of video contents on iOS devices.},
year = {2016},
journal = {Comput. Secur.},
author = {{Christian D'Orazio} and {Kim-Kwang Raymond Choo}}
}
@article{journals/concurrency/XuZHMXCSZ16,
title = {Building knowledge base of urban emergency events based on crowdsourcing of social media.},
year = {2016},
journal = {Concurr. Comput. Pract. Exp.},
author = {{Zheng Xu 001} and {Hui Zhang 016} and {Chuanping Hu} and {Lin Mei 001} and {Junyu Xuan} and {Kim-Kwang Raymond Choo} and {Vijayan Sugumaran} and {Yiwei Zhu}}
}
@article{journals/corr/YangDCM16,
title = {Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies.},
year = {2016},
journal = {CoRR},
author = {{Yee-Yang Teing} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo} and {Zaiton Muda}}
}
@article{journals/di/BagiwaWIKC16,
title = {Chroma key background detection for digital video using statistical correlation of blurring artifact.},
year = {2016},
journal = {Digit. Investig.},
author = {{Mustapha Aminu Bagiwa} and {Ainuddin Wahid Abdul Wahab} and {Mohd Yamani Idna Bin Idris} and {Suleman Khan 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/di/ChooHIM16,
title = {Cloud forensics: State-of-the-art and future directions.},
year = {2016},
journal = {Digit. Investig.},
author = {{Kim-Kwang Raymond Choo} and {Martin Herman} and {Michaela Iorga} and {Ben Martini}}
}
@article{journals/ecr/AzfarC016,
title = {Android mobile VoIP apps: a survey and examination of their security and privacy.},
year = {2016},
journal = {Electron. Commer. Res.},
author = {{Abdullah Azfar} and {Kim-Kwang Raymond Choo} and {Lin Liu 003}}
}
@article{journals/ejwcn/OsanaiyeCCDXD16,
title = {Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing.},
year = {2016},
journal = {EURASIP J. Wirel. Commun. Netw.},
author = {{Opeyemi A. Osanaiye} and {Haibin Cai} and {Kim-Kwang Raymond Choo} and {Ali Dehghantanha} and {Zheng Xu 001} and {Mqhele E. Dlodlo}}
}
@article{journals/ejwcn/RahmanPRHAAC16,
title = {Internet data budget allocation policies for diverse smartphone applications.},
year = {2016},
journal = {EURASIP J. Wirel. Commun. Netw.},
author = {{Saidur Rahman} and {Anika Anzum Prima} and {Md. Abdur Razzaque} and {Mohammad Mehedi Hassan} and {Abdulhameed Alelaiwi} and {Majed A. AlRubaian} and {Kim-Kwang Raymond Choo}}
}
@article{journals/ejwcn/XuZSCMZ16,
title = {Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media.},
year = {2016},
journal = {EURASIP J. Wirel. Commun. Netw.},
author = {{Zheng Xu 001} and {Hui Zhang 016} and {Vijayan Sugumaran} and {Kim-Kwang Raymond Choo} and {Lin Mei 001} and {Yiwei Zhu}}
}
@article{journals/fgcs/ChooDZ16,
title = {Cloud Cryptography: Theory, Practice and Future Research Directions.},
year = {2016},
journal = {Future Gener. Comput. Syst.},
author = {{Kim-Kwang Raymond Choo} and {Josep Domingo-Ferrer} and {Lei Zhang 009}}
}
@article{journals/ijnsec/GaoZCS16,
title = {An Improved Online/Offline Identity-Based Signature Scheme for WSNs.},
year = {2016},
journal = {Int. J. Netw. Secur.},
author = {{Ya Gao} and {Peng Zeng 002} and {Kim-Kwang Raymond Choo} and {Fu Song}}
}
@article{journals/ijwgs/XuWLMHCZS16,
title = {Building the search pattern of web users using conceptual semantic space model.},
year = {2016},
journal = {Int. J. Web Grid Serv.},
author = {{Zheng Xu 001} and {Xiao Wei 002} and {Yunhuai Liu} and {Lin Mei 001} and {Chuanping Hu} and {Kim-Kwang Raymond Choo} and {Yiwei Zhu} and {Vijayan Sugumaran}}
}
@article{journals/jms/GuoZJRWC16,
title = {Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.},
year = {2016},
journal = {J. Medical Syst.},
author = {{Cheng Guo 001} and {Ruhan Zhuang} and {Yingmo Jie} and {Yizhi Ren} and {Ting Wu 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jnca/GeCWY16,
title = {Survey on key revocation mechanisms in wireless sensor networks.},
year = {2016},
journal = {J. Netw. Comput. Appl.},
author = {{Mengmeng Ge} and {Kim-Kwang Raymond Choo} and {Huai Wu} and {Yong Yu 002}}
}
@article{journals/jnca/IqbalKDHKKC16,
title = {On cloud security attacks: A taxonomy and intrusion detection and prevention as a service.},
year = {2016},
journal = {J. Netw. Comput. Appl.},
author = {{Salman Iqbal} and {Miss Laiha Mat Kiah} and {Babak Dhaghighi} and {Muzammil Hussain} and {Suleman Khan 001} and {Muhammad Khurram Khan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jnca/OsanaiyeCD16,
title = {Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework.},
year = {2016},
journal = {J. Netw. Comput. Appl.},
author = {{Opeyemi A. Osanaiye} and {Kim-Kwang Raymond Choo} and {Mqhele E. Dlodlo}}
}
@article{journals/jnca/PengCA16,
title = {Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles.},
year = {2016},
journal = {J. Netw. Comput. Appl.},
author = {{Jian Peng} and {Kim-Kwang Raymond Choo} and {Helen Ashman}}
}
@article{journals/jnca/PengCA16a,
title = {User profiling in intrusion detection: A review.},
year = {2016},
journal = {J. Netw. Comput. Appl.},
author = {{Jian Peng} and {Kim-Kwang Raymond Choo} and {Helen Ashman}}
}
@article{journals/jnca/ProkhorenkoCA16,
title = {Web application protection techniques: A taxonomy.},
year = {2016},
journal = {J. Netw. Comput. Appl.},
author = {{Victor Prokhorenko} and {Kim-Kwang Raymond Choo} and {Helen Ashman}}
}
@article{journals/jnca/WarifWIRSSC16,
title = {Copy-move forgery detection: Survey, challenges and future directions.},
year = {2016},
journal = {J. Netw. Comput. Appl.},
author = {{Nor Bakiah Abd Warif} and {Ainuddin Wahid Abdul Wahab} and {Mohd Yamani Idna Bin Idris} and {Roziana Ramli} and {Rosli Salleh} and {Shahaboddin Shamshirband} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jucs/KarimSKSC16,
title = {On the Analysis and Detection of Mobile Botnet Applications.},
year = {2016},
journal = {J. Univers. Comput. Sci.},
author = {{Ahmad Karim} and {Rosli Salleh} and {Muhammad Khurram Khan} and {Aisha Siddiqa} and {Kim-Kwang Raymond Choo}}
}
@article{journals/network/LinCLM16,
title = {Guest Editorial: Network Forensics and Surveillance for Emerging Networks.},
year = {2016},
journal = {IEEE Netw.},
author = {{Xiaodong Lin 001} and {Kim-Kwang Raymond Choo} and {Ying-Dar Lin} and {Peter Mueller}}
}
@article{journals/percom/ChooRB16,
title = {Mobile security and privacy: Advances, challenges and future research directions.},
year = {2016},
journal = {Pervasive Mob. Comput.},
author = {{Kim-Kwang Raymond Choo} and {Lior Rokach} and {Claudio Bettini}}
}
@article{journals/percom/YangZLWZC16,
title = {Cloud based data sharing with fine-grained proxy re-encryption.},
year = {2016},
journal = {Pervasive Mob. Comput.},
author = {{Yanjiang Yang} and {Haiyan Zhu} and {Haibing Lu} and {Jian Weng 001} and {Youcheng Zhang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/DoMC16,
title = {A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers.},
year = {2016},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Quang Do} and {Ben Martini} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/LiLCDS16,
title = {Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases.},
year = {2016},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Lichun Li} and {Rongxing Lu} and {Kim-Kwang Raymond Choo} and {Anwitaman Datta} and {Jun Shao 001}}
}
@article{journals/tifs/LiLWC16,
title = {DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System.},
year = {2016},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Beibei Li 002} and {Rongxing Lu} and {Wei Wang 100} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/LiuDCW16,
title = {An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.},
year = {2016},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Ximeng Liu} and {Robert H. Deng} and {Kim-Kwang Raymond Choo} and {Jian Weng 001}}
}
@article{journals/tifs/ProkhorenkoCA16,
title = {Intent-Based Extensible Real-Time PHP Supervision Framework.},
year = {2016},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Victor Prokhorenko} and {Kim-Kwang Raymond Choo} and {Helen Ashman}}
}
@article{journals/toit/BertinoCGN16,
title = {Internet of Things (IoT): Smart and Secure Service Delivery.},
year = {2016},
journal = {ACM Trans. Internet Techn.},
author = {{Elisa Bertino} and {Kim-Kwang Raymond Choo} and {Dimitrios Georgakopoulos 001} and {Surya Nepal}}
}
@incollection{books/el/17/AriffinCY17,
title = {Forensic Readiness: A Case Study on Digital CCTV Systems Antiforensics.},
year = {2017},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications},
author = {{Aswami Ariffin} and {Kim-Kwang Raymond Choo} and {Zahri Yunos}},
publisher = {Elsevier},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications}
}
@incollection{books/el/17/AuC17,
title = {Mobile Security and Privacy.},
year = {2017},
booktitle = {Mobile Security and Privacy},
author = {{Man Ho Au} and {Kim-Kwang Raymond Choo}},
publisher = {Elsevier},
booktitle = {Mobile Security and Privacy - Advances, Challenges and Future Research Directions}
}
@incollection{books/el/17/ChiaCF17,
title = {How Cyber-Savvy are Older Mobile Device Users?},
year = {2017},
booktitle = {Mobile Security and Privacy},
author = {{C. Chia} and {Kim-Kwang Raymond Choo} and {Dennis D. Fehrenbacher}},
publisher = {Elsevier},
booktitle = {Mobile Security and Privacy - Advances, Challenges and Future Research Directions}
}
@incollection{books/el/17/ChooD17,
title = {Contemporary Digital Forensics Investigations of Cloud and Mobile Applications.},
year = {2017},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications},
author = {{Kim-Kwang Raymond Choo} and {Ali Dehghantanha}},
publisher = {Elsevier},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications}
}
@incollection{books/el/17/ChristopherCD17,
title = {Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model.},
year = {2017},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications},
author = {{Lek Christopher} and {Kim-Kwang Raymond Choo} and {Ali Dehghantanha}},
publisher = {Elsevier},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications}
}
@incollection{books/el/17/MohtasebiDC17,
title = {Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud.},
year = {2017},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications},
author = {{Seyed Hossein Mohtasebi} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}},
publisher = {Elsevier},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications}
}
@incollection{books/el/17/Ogazi-OnyemaechiDC17,
title = {Performance of Android Forensics Data Recovery Tools.},
year = {2017},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications},
author = {{Bernard Chukwuemeka Ogazi-Onyemaechi} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}},
publisher = {Elsevier},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications}
}
@incollection{books/el/17/RahmanKC17,
title = {Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory.},
year = {2017},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications},
author = {{Nurul Hidayah Ab Rahman} and {Gary C. Kessler} and {Kim-Kwang Raymond Choo}},
publisher = {Elsevier},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications}
}
@incollection{books/el/17/SchiliroC17,
title = {The Role of Mobile Devices in Enhancing the Policing System to Improve Efficiency and Effectiveness.},
year = {2017},
booktitle = {Mobile Security and Privacy},
author = {{Francesco Schiliro} and {Kim-Kwang Raymond Choo}},
publisher = {Elsevier},
booktitle = {Mobile Security and Privacy - Advances, Challenges and Future Research Directions}
}
@incollection{books/el/17/TassoneMC17,
title = {Forensic Visualization: Survey and Future Research Directions.},
year = {2017},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications},
author = {{Christopher Tassone} and {Ben Martini} and {Kim-Kwang Raymond Choo}},
publisher = {Elsevier},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications}
}
@incollection{books/el/17/TeingDCM17,
title = {Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine.},
year = {2017},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications},
author = {{Yee-Yang Teing} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo} and {Zaiton Muda}},
publisher = {Elsevier},
booktitle = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications}
}
@incollection{books/el/17/WallsC17,
title = {A Study of the Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps.},
year = {2017},
booktitle = {Mobile Security and Privacy},
author = {{Jason Walls} and {Kim-Kwang Raymond Choo}},
publisher = {Elsevier},
booktitle = {Mobile Security and Privacy - Advances, Challenges and Future Research Directions}
}
@inproceedings{conf/amcis/LiuJC17,
title = {The Effect of the Recommendation System in the Mobile App Market.},
year = {2017},
booktitle = {AMCIS},
author = {{Charles Zhechao Liu} and {Mohsen M. Jozani} and {Kim-Kwang Raymond Choo}},
publisher = {Association for Information Systems},
booktitle = {23rd Americas Conference on Information Systems, AMCIS 2017, Boston, MA, USA, August 10-12, 2017}
}
@inproceedings{conf/amcis/SainiGLC17,
title = {Back to Pen and Paper: Recovering Assessment Questions from Computer-Based Examination Applications.},
year = {2017},
booktitle = {AMCIS},
author = {{Shalabh Saini} and {George Grispos} and {Charles Zhechao Liu} and {Kim-Kwang Raymond Choo}},
publisher = {Association for Information Systems},
booktitle = {23rd Americas Conference on Information Systems, AMCIS 2017, Boston, MA, USA, August 10-12, 2017}
}
@inproceedings{conf/ccs/Choo17,
title = {Research Challenges and Opportunities in Big Forensic Data.},
year = {2017},
booktitle = {MIST@CCS},
author = {{Kim-Kwang Raymond Choo}},
publisher = {ACM},
booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}
}
@inproceedings{conf/chase/GrisposGC17,
title = {Medical Cyber-Physical Systems Development: A Forensics-Driven Approach.},
year = {2017},
booktitle = {CHASE},
author = {{George Grispos} and {William Bradley Glisson} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE Computer Society / ACM},
booktitle = {Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2017, Philadelphia, PA, USA, July 17-19, 2017}
}
@inproceedings{conf/chiir/FardousDCH17,
title = {Investigating Mobile Social Media Users? Behaviors in Tourism Collaborative Information Seeking.},
year = {2017},
booktitle = {CHIIR},
author = {{Jannatul Fardous} and {Jia Tina Du} and {Kim-Kwang Raymond Choo} and {Songshan (Sam) Huang}},
publisher = {ACM},
booktitle = {Proceedings of the 2017 Conference on Conference Human Information Interaction and Retrieval, CHIIR 2017, Oslo, Norway, March 7-11, 2017}
}
@inproceedings{conf/cisis/PanZC17,
title = {An Efficient Data Aggregation Scheme in Privacy-Preserving Smart Grid Communications with a High Practicability.},
year = {2017},
booktitle = {CISIS},
author = {{Bofeng Pan} and {Peng Zeng 002} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Complex, Intelligent, and Software Intensive Systems - Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2017), Torino, Italy, July 10-12, 2017}
}
@inproceedings{conf/hicss/GlissonC17,
title = {Introduction to Cyber-of-Things: Cyber-crimes and Cyber-Security Minitrack.},
year = {2017},
booktitle = {HICSS},
author = {{William Bradley Glisson} and {Kim-Kwang Raymond Choo}},
publisher = {ScholarSpace / AIS Electronic Library (AISeL)},
booktitle = {50th Hawaii International Conference on System Sciences, HICSS 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017}
}
@inproceedings{conf/hicss/HeraviMCM17,
title = {Making Decisions about Self-Disclosure in Online Social Networks.},
year = {2017},
booktitle = {HICSS},
author = {{Alireza Heravi} and {Deepa Mani} and {Kim-Kwang Raymond Choo} and {Sameera Mubarak}},
publisher = {ScholarSpace / AIS Electronic Library (AISeL)},
booktitle = {50th Hawaii International Conference on System Sciences, HICSS 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017}
}
@inproceedings{conf/icdf2c/JiangCCLLY17,
title = {A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph.},
year = {2017},
booktitle = {ICDF2C},
author = {{Jianguo Jiang} and {Jiuming Chen} and {Kim-Kwang Raymond Choo} and {Chao Liu 020} and {Kunying Liu} and {Min Yu 001}},
publisher = {Springer},
booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}
}
@inproceedings{conf/securecomm/JiangCCLLYW17,
title = {A Deep Learning Based Online Malicious URL and DNS Detection Scheme.},
year = {2017},
booktitle = {SecureComm},
author = {{Jianguo Jiang} and {Jiuming Chen} and {Kim-Kwang Raymond Choo} and {Chao Liu 020} and {Kunying Liu} and {Min Yu 001} and {Yongjian Wang}},
publisher = {Springer},
booktitle = {Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}
}
@inproceedings{conf/securecomm/MinkGBC17,
title = {Manipulating the Five V's in the Next Generation Air Transportation System.},
year = {2017},
booktitle = {ATCS/SePrIoT@SecureComm},
author = {{Dustin Mink} and {William Bradley Glisson} and {Ryan Benton} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}
}
@inproceedings{conf/securecomm/SmithDC17,
title = {Identification of Forensic Artifacts in VMWare Virtualized Computing.},
year = {2017},
booktitle = {ATCS/SePrIoT@SecureComm},
author = {{Cory Smith} and {Glenn Dietrich} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}
}
@inproceedings{conf/securecomm/VidalC17,
title = {Situational Crime Prevention and the Mitigation of Cloud Computing Threats.},
year = {2017},
booktitle = {ATCS/SePrIoT@SecureComm},
author = {{Chaz Vidal} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}
}
@inproceedings{conf/trustcom/JacobsCKL17,
title = {Volkswagen Car Entertainment System Forensics.},
year = {2017},
booktitle = {TrustCom/BigDataSE/ICESS},
author = {{Daniel Jacobs} and {Kim-Kwang Raymond Choo} and {M. Tahar Kechadi} and {Nhien-An Le-Khac}},
publisher = {IEEE Computer Society},
booktitle = {2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}
}
@inproceedings{conf/trustcom/MeerCKL17,
title = {Investigation and Automating Extraction of Thumbnails Produced by Image Viewers.},
year = {2017},
booktitle = {TrustCom/BigDataSE/ICESS},
author = {{Wybren van der Meer} and {Kim-Kwang Raymond Choo} and {M. Tahar Kechadi} and {Nhien-An Le-Khac}},
publisher = {IEEE Computer Society},
booktitle = {2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}
}
@article{journals/access/Al-DhaqmROCGAA17,
title = {CDBFIP: Common Database Forensic Investigation Processes for Internet of Things.},
year = {2017},
journal = {IEEE Access},
author = {{Arafat Mohammed Rashad Al-Dhaqm} and {Shukor Abd Razak} and {Siti Hajar Othman} and {Kim-Kwang Raymond Choo} and {William Bradley Glisson} and {Abdul-Rahman Al-Ali} and {Mohammad Al-Rousan}}
}
@article{journals/access/HorstCL17,
title = {Process Memory Investigation of the Bitcoin Clients Electrum and Bitcoin Core.},
year = {2017},
journal = {IEEE Access},
author = {{Luuc Van Der Horst} and {Kim-Kwang Raymond Choo} and {Nhien-An Le-Khac}}
}
@article{journals/access/HuKRC17,
title = {A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution.},
year = {2017},
journal = {IEEE Access},
author = {{Yan Hu} and {Weiqiang Kong} and {Yizhi Ren} and {Kim-Kwang Raymond Choo}}
}
@article{journals/access/LinXLYCS17,
title = {IEEE Access Special Section Editorial: Intelligent Sensing On Mobile and Social Media Analytics.},
year = {2017},
journal = {IEEE Access},
author = {{Weiyao Lin} and {Zheng Xu 001} and {Yunhuai Liu} and {Neil Y. Yen} and {Kim-Kwang Raymond Choo} and {Vijayan Sugumaran}}
}
@article{journals/access/LuoZLCH17,
title = {Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols.},
year = {2017},
journal = {IEEE Access},
author = {{Min Luo 002} and {Xiaotong Zhou} and {Li Li 073} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/access/OdeluDCKP17,
title = {Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices.},
year = {2017},
journal = {IEEE Access},
author = {{Vanga Odelu} and {Ashok Kumar Das} and {Kim-Kwang Raymond Choo} and {Neeraj Kumar 001} and {Youngho Park 005}}
}
@article{journals/access/OdeluDKCJ17,
title = {Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts.},
year = {2017},
journal = {IEEE Access},
author = {{Vanga Odelu} and {Ashok Kumar Das} and {Muhammad Khurram Khan} and {Kim-Kwang Raymond Choo} and {Minho Jo 001}}
}
@article{journals/access/OsanaiyeCYLCD17,
title = {From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework.},
year = {2017},
journal = {IEEE Access},
author = {{Opeyemi A. Osanaiye} and {Shuo Chen 006} and {Zheng Yan 002} and {Rongxing Lu} and {Kim-Kwang Raymond Choo} and {Mqhele E. Dlodlo}}
}
@article{journals/access/RoutDCBJ17,
title = {Revisiting Semi-Supervised Learning for Online Deceptive Review Detection.},
year = {2017},
journal = {IEEE Access},
author = {{Jitendra Kumar Rout} and {Anmol Dalmia} and {Kim-Kwang Raymond Choo} and {Sambit Bakshi} and {Sanjay Kumar Jena}}
}
@article{journals/amc/DOrazioLCV17,
title = {A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps.},
year = {2017},
journal = {Appl. Math. Comput.},
author = {{Christian Javier D'Orazio} and {Rongxing Lu} and {Kim-Kwang Raymond Choo} and {Athanasios V. Vasilakos}}
}
@article{journals/amc/FangXC17,
title = {Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks.},
year = {2017},
journal = {Appl. Math. Comput.},
author = {{He Fang} and {Li Xu 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/amc/HeKWWC17,
title = {Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.},
year = {2017},
journal = {Appl. Math. Comput.},
author = {{Debiao He} and {Neeraj Kumar 001} and {Huaqun Wang} and {Lina Wang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cee/HeCK17,
title = {Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies.},
year = {2017},
journal = {Comput. Electr. Eng.},
author = {{Debiao He} and {Kim-Kwang Raymond Choo} and {Neeraj Kumar 001}}
}
@article{journals/cee/LiPKWKC17,
title = {An enhanced 1-round authentication protocol for wireless body area networks with user anonymity.},
year = {2017},
journal = {Comput. Electr. Eng.},
author = {{Xiong Li 002} and {Jieyao Peng} and {Saru Kumari} and {Fan Wu 003} and {Marimuthu Karuppiah} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cee/MilosevicDC17,
title = {Machine learning aided Android malware classification.},
year = {2017},
journal = {Comput. Electr. Eng.},
author = {{Nikola Milosevic} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cee/TeingDCY17,
title = {Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study.},
year = {2017},
journal = {Comput. Electr. Eng.},
author = {{Yee-Yang Teing} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo} and {Laurence T. Yang}}
}
@article{journals/cee/UmarMSC17,
title = {I-Marks: An iris code embedding system for ownership identification of multimedia content.},
year = {2017},
journal = {Comput. Electr. Eng.},
author = {{Muhammad Muneer Umar} and {Amjad Mehmood} and {Houbing Song} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/CastiglioneCNN17,
title = {Biometrics in the Cloud: Challenges and Research Opportunities.},
year = {2017},
journal = {IEEE Cloud Comput.},
author = {{Aniello Castiglione} and {Kim-Kwang Raymond Choo} and {Michele Nappi} and {Fabio Narducci}}
}
@article{journals/cloudcomp/CastiglioneCNR18,
title = {Context Aware Ubiquitous Biometrics in Edge of Military Things.},
year = {2017},
journal = {IEEE Cloud Comput.},
author = {{Aniello Castiglione} and {Kim-Kwang Raymond Choo} and {Michele Nappi} and {Stefano Ricciardi}}
}
@article{journals/cloudcomp/ChooEC17,
title = {Evidence and Forensics in the Cloud: Challenges and Future Research Directions.},
year = {2017},
journal = {IEEE Cloud Comput.},
author = {{Kim-Kwang Raymond Choo} and {Christian Esposito 001} and {Aniello Castiglione}}
}
@article{journals/cloudcomp/EspositoCPC17,
title = {Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective.},
year = {2017},
journal = {IEEE Cloud Comput.},
author = {{Christian Esposito 001} and {Aniello Castiglione} and {Florin Pop} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/RoopaeiRC17,
title = {Cloud of Things in Smart Agriculture: Intelligent Irrigation Monitoring by Thermal Imaging.},
year = {2017},
journal = {IEEE Cloud Comput.},
author = {{Mehdi Roopaei} and {Paul Rad} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cm/HuangLC17,
title = {Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges.},
year = {2017},
journal = {IEEE Commun. Mag.},
author = {{Cheng Huang 001} and {Rongxing Lu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cn/LiIKSGC17,
title = {Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks.},
year = {2017},
journal = {Comput. Networks},
author = {{Xiong Li 002} and {Maged Hamada Ibrahim} and {Saru Kumari} and {Arun Kumar Sangaiah} and {Vidushi Gupta} and {Kim-Kwang Raymond Choo}}
}
@article{journals/comcom/FangXLC17,
title = {An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks.},
year = {2017},
journal = {Comput. Commun.},
author = {{He Fang} and {Li Xu 002} and {Jie Li 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/comcom/ZhangLLJYC17,
title = {Secure hitch in location based social networks.},
year = {2017},
journal = {Comput. Commun.},
author = {{Shiwen Zhang} and {Yaping Lin} and {Qin Liu 001} and {Junqiang Jiang} and {Bo Yin 004} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/AlcarazLC17,
title = {Resilient interconnection in cyber-physical control systems.},
year = {2017},
journal = {Comput. Secur.},
author = {{Cristina Alcaraz} and {Javier López 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/Eterovic-SoricC17,
title = {Stalking the stalkers - detecting and deterring stalking behaviours using technology: A review.},
year = {2017},
journal = {Comput. Secur.},
author = {{Brett Eterovic-Soric} and {Kim-Kwang Raymond Choo} and {Helen Ashman} and {Sameera Mubarak}}
}
@article{journals/compsec/LiuCZ17,
title = {Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions.},
year = {2017},
journal = {Comput. Secur.},
author = {{Zhe Liu 001} and {Kim-Kwang Raymond Choo} and {Minghao Zhao 001}}
}
@article{journals/compsec/MengLKC17,
title = {Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones.},
year = {2017},
journal = {Comput. Secur.},
author = {{Weizhi Meng 001} and {Wenjuan Li 001} and {Lam-for Kwok} and {Kim-Kwang Raymond Choo}}
}
@article{journals/concurrency/AburummanSECIC17,
title = {A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy.},
year = {2017},
journal = {Concurr. Comput. Pract. Exp.},
author = {{Ala' F. A. Aburumman} and {Wei Jye Seo} and {Christian Esposito 001} and {Aniello Castiglione} and {Md. Rafiqul Islam 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/concurrency/CahyaniMCA17,
title = {Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study.},
year = {2017},
journal = {Concurr. Comput. Pract. Exp.},
author = {{Niken Dwi Wahyu Cahyani} and {Ben Martini} and {Kim-Kwang Raymond Choo} and {AKBP Muhammad Nuh Al-Azhar}}
}
@article{journals/concurrency/KumariDWL0CK17,
title = {On the design of a secure user authentication and key agreement scheme for wireless sensor networks.},
year = {2017},
journal = {Concurr. Comput. Pract. Exp.},
author = {{Saru Kumari} and {Ashok Kumar Das} and {Mohammad Wazid} and {Xiong Li 002} and {Fan Wu 003} and {Kim-Kwang Raymond Choo} and {Muhammad Khurram Khan}}
}
@article{journals/concurrency/PengDCA17,
title = {Astroturfing detection in social media: a binary n-gram-based approach.},
year = {2017},
journal = {Concurr. Comput. Pract. Exp.},
author = {{Jian Peng} and {Sam Detchon} and {Kim-Kwang Raymond Choo} and {Helen Ashman}}
}
@article{journals/concurrency/PokharelCL17,
title = {Can Android VoIP voice conversations be decoded? I can eavesdrop on your Android VoIP communication.},
year = {2017},
journal = {Concurr. Comput. Pract. Exp.},
author = {{Shasi Pokharel} and {Kim-Kwang Raymond Choo} and {Jixue Liu}}
}
@article{journals/concurrency/RahmanCC17,
title = {Cloud incident handling and forensic-by-design: cloud storage as a case study.},
year = {2017},
journal = {Concurr. Comput. Pract. Exp.},
author = {{Nurul Hidayah Ab Rahman} and {Niken Dwi Wahyu Cahyani} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/ChristopherCD17,
title = {Honeypots for employee information security awareness and education training: A conceptual EASY training model.},
year = {2017},
journal = {CoRR},
author = {{Lek Christopher} and {Kim-Kwang Raymond Choo} and {Ali Dehghantanha}}
}
@article{journals/corr/MohtasebiDC17,
title = {Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud.},
year = {2017},
journal = {CoRR},
author = {{Seyed Hossein Mohtasebi} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/TeingDCM17,
title = {Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine.},
year = {2017},
journal = {CoRR},
author = {{Yee-Yang Teing} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo} and {Zaiton Muda}}
}
@article{journals/corr/TeingDCM17aa,
title = {Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study.},
year = {2017},
journal = {CoRR},
author = {{Yee-Yang Teing} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo} and {Zaiton Muda}}
}
@article{journals/corr/abs-1709-05144,
title = {Performance of Android Forensics Data Recovery Tools.},
year = {2017},
journal = {CoRR},
author = {{Bernard Chukwuemeka Ogazi-Onyemaechi} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/csi/OdeluDRKKC17,
title = {Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.},
year = {2017},
journal = {Comput. Stand. Interfaces},
author = {{Vanga Odelu} and {Ashok Kumar Das} and {Y. Sreenivasa Rao} and {Saru Kumari} and {Muhammad Khurram Khan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/csi/PokharelCL17,
title = {Mobile cloud security: An adversary model for lightweight browser security.},
year = {2017},
journal = {Comput. Stand. Interfaces},
author = {{Shasi Pokharel} and {Kim-Kwang Raymond Choo} and {Jixue Liu}}
}
@article{journals/csi/RenLLC17,
title = {SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing.},
year = {2017},
journal = {Comput. Stand. Interfaces},
author = {{Wei Ren 002} and {Ran Liu} and {Min Lei} and {Kim-Kwang Raymond Choo}}
}
@article{journals/csur/PohCYCM17,
title = {Searchable Symmetric Encryption: Designs and Challenges.},
year = {2017},
journal = {ACM Comput. Surv.},
author = {{Geong Sen Poh} and {Ji-Jian Chin} and {Wei-Chuen Yau} and {Kim-Kwang Raymond Choo} and {Moesfa Soeheila Mohamad}}
}
@article{journals/di/ShiXJQYZXC17,
title = {A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics.},
year = {2017},
journal = {Digit. Investig.},
author = {{Kai Shi} and {Ming Xu 001} and {Haoxia Jin} and {Tong Qiao} and {Xue Yang} and {Ning Zheng 001} and {Jian Xu 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/DOrazioC17,
title = {A technique to circumvent SSL/TLS validations on iOS devices.},
year = {2017},
journal = {Future Gener. Comput. Syst.},
author = {{Christian Javier D'Orazio} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/KumariLWDCS17,
title = {Design of a provably secure biometrics-based multi-cloud-server authentication scheme.},
year = {2017},
journal = {Future Gener. Comput. Syst.},
author = {{Saru Kumari} and {Xiong Li 002} and {Fan Wu 003} and {Ashok Kumar Das} and {Kim-Kwang Raymond Choo} and {Jian Shen 001}}
}
@article{journals/fgcs/LiXLSC17,
title = {An optimized approach for massive web page classification using entity similarity based on semantic network.},
year = {2017},
journal = {Future Gener. Comput. Syst.},
author = {{Huakang Li} and {Zheng Xu 001} and {Tao Li} and {Guozi Sun} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/SunSZXCSW17,
title = {Associative retrieval in spatial big data based on spreading activation with semantic ontology.},
year = {2017},
journal = {Future Gener. Comput. Syst.},
author = {{Shengtao Sun} and {Weijing Song} and {Albert Y. Zomaya} and {Yang Xiang 001} and {Kim-Kwang Raymond Choo} and {Tejal Shah} and {Lizhe Wang 001}}
}
@article{journals/fgcs/WuZCH17,
title = {Efficient and secure identity-based encryption scheme with equality test in cloud computing.},
year = {2017},
journal = {Future Gener. Comput. Syst.},
author = {{Libing Wu} and {Yubo Zhang 003} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/iacr/XuHCC17,
title = {Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error.},
year = {2017},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Dongqing Xu} and {Debiao He} and {Kim-Kwang Raymond Choo} and {Jianhua Chen 002}}
}
@article{journals/inffus/ChenWLDCHQ17,
title = {Air quality data clustering using EPLS method.},
year = {2017},
journal = {Inf. Fusion},
author = {{Yunliang Chen} and {Lizhe Wang 001} and {Fangyuan Li} and {Bo Du 006} and {Kim-Kwang Raymond Choo} and {Houcine Hassan} and {Wenjian Qin}}
}
@article{journals/iotj/DOrazioCY17,
title = {Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies.},
year = {2017},
journal = {IEEE Internet Things J.},
author = {{Christian D'Orazio} and {Kim-Kwang Raymond Choo} and {Laurence T. Yang}}
}
@article{journals/isf/XuXLCMH17,
title = {Building spatial temporal relation graph of concepts pair using web repository.},
year = {2017},
journal = {Inf. Syst. Frontiers},
author = {{Zheng Xu 001} and {Junyu Xuan} and {Yunhuai Liu} and {Kim-Kwang Raymond Choo} and {Lin Mei 001} and {Chuanping Hu}}
}
@article{journals/istr/WuWCLH17,
title = {An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network.},
year = {2017},
journal = {J. Inf. Secur. Appl.},
author = {{Libing Wu} and {Jing Wang 036} and {Kim-Kwang Raymond Choo} and {Yuangang Li} and {Debiao He}}
}
@article{journals/jcss/ChooAI17,
title = {Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions.},
year = {2017},
journal = {J. Comput. Syst. Sci.},
author = {{Kim-Kwang Raymond Choo} and {Jemal H. Abawajy} and {Md. Rafiqul Islam 001}}
}
@article{journals/jcss/DingXYC17,
title = {Secure outsourcing of modular exponentiations under single untrusted programme model.},
year = {2017},
journal = {J. Comput. Syst. Sci.},
author = {{Yong Ding 005} and {Zheng Xu 001} and {Jun Ye} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jcss/HuangLC17,
title = {Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases.},
year = {2017},
journal = {J. Comput. Syst. Sci.},
author = {{Cheng Huang 001} and {Rongxing Lu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jnca/MengLXC17,
title = {A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks.},
year = {2017},
journal = {J. Netw. Comput. Appl.},
author = {{Weizhi Meng 001} and {Wenjuan Li 001} and {Yang Xiang 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jnca/QuickC17,
title = {Pervasive social networking forensics: Intelligence and evidence from mobile device extracts.},
year = {2017},
journal = {J. Netw. Comput. Appl.},
author = {{Darren Quick} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jnca/WuXKLSCWD17,
title = {An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.},
year = {2017},
journal = {J. Netw. Comput. Appl.},
author = {{Fan Wu 003} and {Lili Xu} and {Saru Kumari} and {Xiong Li 002} and {Jian Shen 001} and {Kim-Kwang Raymond Choo} and {Mohammad Wazid} and {Ashok Kumar Das}}
}
@article{journals/jnca/YangWBC17,
title = {Hypergraph partitioning for social networks based on information entropy modularity.},
year = {2017},
journal = {J. Netw. Comput. Appl.},
author = {{Wenyin Yang} and {Guojun Wang 001} and {Md. Zakirul Alam Bhuiyan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jpdc/ChenLCDCH17,
title = {EPLS: A novel feature extraction method for migration data clustering.},
year = {2017},
journal = {J. Parallel Distributed Comput.},
author = {{Yunliang Chen} and {Fangyuan Li} and {Jia Chen} and {Bo Du 006} and {Kim-Kwang Raymond Choo} and {Houcine Hassan}}
}
@article{journals/jpdc/LiLWC17,
title = {Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system.},
year = {2017},
journal = {J. Parallel Distributed Comput.},
author = {{Beibei Li 002} and {Rongxing Lu} and {Wei Wang 100} and {Kim-Kwang Raymond Choo}}
}
@article{journals/monet/CahyaniRGC17,
title = {The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps.},
year = {2017},
journal = {Mob. Networks Appl.},
author = {{Niken Dwi Wahyu Cahyani} and {Nurul Hidayah Ab Rahman} and {William Bradley Glisson} and {Kim-Kwang Raymond Choo}}
}
@article{journals/mta/AzfarCL17,
title = {Forensic taxonomy of android productivity apps.},
year = {2017},
journal = {Multim. Tools Appl.},
author = {{Abdullah Azfar} and {Kim-Kwang Raymond Choo} and {Lin Liu 003}}
}
@article{journals/mta/DoshiKMLCS17,
title = {A password based authentication scheme for wireless multimedia systems.},
year = {2017},
journal = {Multim. Tools Appl.},
author = {{Nishant Doshi} and {Saru Kumari} and {Dheerendra Mishra} and {Xiong Li 002} and {Kim-Kwang Raymond Choo} and {Arun Kumar Sangaiah}}
}
@article{journals/mta/HuCC17,
title = {Tamper detection and image recovery for BTC-compressed images.},
year = {2017},
journal = {Multim. Tools Appl.},
author = {{Yu-Chen Hu} and {Kim-Kwang Raymond Choo} and {Wu-Lin Chen}}
}
@article{journals/mta/TianZCS17,
title = {A biologically inspired spatio-chromatic feature for color object recognition.},
year = {2017},
journal = {Multim. Tools Appl.},
author = {{Tian Tian} and {Yun Zhang} and {Kim-Kwang Raymond Choo} and {Weijing Song}}
}
@article{journals/mta/ZhangC17,
title = {Guest Editorial: Multimedia Social Network Security and Applications.},
year = {2017},
journal = {Multim. Tools Appl.},
author = {{Zhiyong Zhang 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/percom/YangWZLCC17,
title = {V2X security: A case study of anonymous authentication.},
year = {2017},
journal = {Pervasive Mob. Comput.},
author = {{Yanjiang Yang} and {Zhuo Wei} and {Youcheng Zhang} and {Haibing Lu} and {Kim-Kwang Raymond Choo} and {Haibin Cai}}
}
@article{journals/puc/LiuCHA17,
title = {Special issue on security and privacy for smart cities.},
year = {2017},
journal = {Pers. Ubiquitous Comput.},
author = {{Joseph K. Liu} and {Kim-Kwang Raymond Choo} and {Xinyi Huang 001} and {Man Ho Au}}
}
@article{journals/puc/LiuCHA17a,
title = {Erratum to: Special issue on security and privacy for smart cities.},
year = {2017},
journal = {Pers. Ubiquitous Comput.},
author = {{Joseph K. Liu} and {Kim-Kwang Raymond Choo} and {Xinyi Huang 001} and {Man Ho Au}}
}
@article{journals/scn/HuaTPCDR17,
title = {Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party.},
year = {2017},
journal = {Secur. Commun. Networks},
author = {{Jingyu Hua} and {An Tang} and {Qingyun Pan} and {Kim-Kwang Raymond Choo} and {Hong Ding} and {Yizhi Ren}}
}
@article{journals/scn/ZhouZYCC17,
title = {An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model.},
year = {2017},
journal = {Secur. Commun. Networks},
author = {{Guomin Zhou} and {Peng Zeng 002} and {Xiaohui Yuan 001} and {Siyuan Chen} and {Kim-Kwang Raymond Choo}}
}
@article{journals/scn/ZhouZYCC17a,
title = {Erratum to "An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model".},
year = {2017},
journal = {Secur. Commun. Networks},
author = {{Guomin Zhou} and {Peng Zeng 002} and {Xiaohui Yuan 001} and {Siyuan Chen} and {Kim-Kwang Raymond Choo}}
}
@article{journals/sensors/YehSCC17,
title = {A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.},
year = {2017},
journal = {Sensors},
author = {{Kuo-Hui Yeh} and {Chunhua Su} and {Kim-Kwang Raymond Choo} and {Wayne Chiu}}
}
@article{journals/soco/LiuCWH17,
title = {SVM or deep learning? A comparative study on remote sensing image classification.},
year = {2017},
journal = {Soft Comput.},
author = {{Peng Liu 024} and {Kim-Kwang Raymond Choo} and {Lizhe Wang 001} and {Fang Huang 001}}
}
@article{journals/soco/WangZLCH17,
title = {Spectral-spatial multi-feature-based deep learning for hyperspectral remote sensing image classification.},
year = {2017},
journal = {Soft Comput.},
author = {{Lizhe Wang 001} and {Jiabin Zhang} and {Peng Liu 024} and {Kim-Kwang Raymond Choo} and {Fang Huang 001}}
}
@article{journals/spe/DoMC17,
title = {Is the data on your wearable device secure? An Android Wear smartwatch case study.},
year = {2017},
journal = {Softw. Pract. Exp.},
author = {{Quang Do} and {Ben Martini} and {Kim-Kwang Raymond Choo}}
}
@article{journals/spe/LiuYXCHC17,
title = {A cloud-based taxi trace mining framework for smart city.},
year = {2017},
journal = {Softw. Pract. Exp.},
author = {{Jin Liu 016} and {Xiao Yu} and {Zheng Xu 001} and {Kim-Kwang Raymond Choo} and {Liang Hong} and {Xiaohui Cui}}
}
@article{journals/spe/QuickC17,
title = {Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data.},
year = {2017},
journal = {Softw. Pract. Exp.},
author = {{Darren Quick} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcc/ChooRR17,
title = {Cloud Security Engineering: Theory, Practice and Future Research.},
year = {2017},
journal = {IEEE Trans. Cloud Comput.},
author = {{Kim-Kwang Raymond Choo} and {Omer F. Rana} and {Muttukrishnan Rajarajan}}
}
@article{journals/tdsc/ChooKAG17,
title = {Emerging Embedded and Cyber Physical System Security Challenges and Innovations.},
year = {2017},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Kim-Kwang Raymond Choo} and {Mehran Mozaffari Kermani} and {Reza Azarderakhsh} and {Manimaran Govindarasu}}
}
@article{journals/tecs/ChooFXY17,
title = {Embedded Device Forensics and Security.},
year = {2017},
journal = {ACM Trans. Embed. Comput. Syst.},
author = {{Kim-Kwang Raymond Choo} and {Yunsi Fei} and {Yang Xiang 001} and {Yu Yu 001}}
}
@article{journals/tecs/SongYCZW17,
title = {SIPF: A Secure Installment Payment Framework for Drive-Thru Internet.},
year = {2017},
journal = {ACM Trans. Embed. Comput. Syst.},
author = {{Jun Song 003} and {Fan Yang} and {Kim-Kwang Raymond Choo} and {Zhijian Zhuang} and {Lizhe Wang 001}}
}
@article{journals/tetc/XuYZWLCML17,
title = {Social Sensors Based Online Attention Computing of Public Safety Events.},
year = {2017},
journal = {IEEE Trans. Emerg. Top. Comput.},
author = {{Zheng Xu 001} and {Neil Y. Yen} and {Hui Zhang 016} and {Xiao Wei 002} and {Zhihan Lv} and {Kim-Kwang Raymond Choo} and {Lin Mei 001} and {Xiangfeng Luo}}
}
@article{journals/tifs/AlamMACTA17,
title = {A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification.},
year = {2017},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Quratulain Alam} and {Saif Ur Rehman Malik} and {Adnan Akhunzada} and {Kim-Kwang Raymond Choo} and {Saher Tabbasum} and {Masoom Alam}}
}
@article{journals/tifs/HeKCW17,
title = {Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.},
year = {2017},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Debiao He} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo} and {Wei Wu 001}}
}
@article{journals/tii/XuZCMWLHL17,
title = {Hierarchy-Cutting Model Based Association Semantic for Analyzing Domain Topic on the Web.},
year = {2017},
journal = {IEEE Trans. Ind. Informatics},
author = {{Zheng Xu 001} and {Shunxiang Zhang} and {Kim-Kwang Raymond Choo} and {Lin Mei 001} and {Xiao Wei 002} and {Xiangfeng Luo} and {Chuanping Hu} and {Yunhuai Liu}}
}
@article{journals/tjs/XuWKCH17,
title = {A secure and efficient public auditing scheme using RSA algorithm for cloud storage.},
year = {2017},
journal = {J. Supercomput.},
author = {{Zhiyan Xu} and {Libing Wu} and {Muhammad Khurram Khan} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/wpc/XuLCY17,
title = {Special Issue on Big Data Analytics and Network Applications for Cyber-Physical Systems Wireless Personal Communications.},
year = {2017},
journal = {Wirel. Pers. Commun.},
author = {{Zheng Xu 001} and {Yunhuai Liu} and {Kim-Kwang Raymond Choo} and {Neil Y. Yen}}
}
@book{books/sp/QuickC18,
title = {Big Digital Forensic Data - Volume 1: Data Reduction Framework and Selective Imaging},
year = {2018},
isbn = {978-981-10-7762-3},
publisher = {Springer},
series = {SpringerBriefs on Cyber Security Systems and Networks},
author = {{Darren Quick} and {Kim-Kwang Raymond Choo}}
}
@book{books/sp/QuickC18a,
title = {Big Digital Forensic Data - Volume 2: Quick Analysis for Evidence and Intelligence},
year = {2018},
isbn = {978-981-13-0262-6},
publisher = {Springer},
series = {SpringerBriefs on Cyber Security Systems and Networks},
author = {{Darren Quick} and {Kim-Kwang Raymond Choo}}
}
@inproceedings{conf/amcis/CrosslerBC18,
title = {Intelligent Home Assistant Use in the Home Environment.},
year = {2018},
booktitle = {AMCIS},
author = {{Robert E. Crossler} and {France Bélanger} and {Kim-Kwang Raymond Choo}},
publisher = {Association for Information Systems},
booktitle = {24th Americas Conference on Information Systems, AMCIS 2018, New Orleans, LA, USA, August 16-18, 2018}
}
@inproceedings{conf/amcis/JozaniAKC18,
title = {A Conceptual Model to Understand Privacy Concerns in a Social P2P Payment App.},
year = {2018},
booktitle = {AMCIS},
author = {{Mohsen M. Jozani} and {Emmanuel Ayaburi} and {Myung Ko 001} and {Kim-Kwang Raymond Choo}},
publisher = {Association for Information Systems},
booktitle = {24th Americas Conference on Information Systems, AMCIS 2018, New Orleans, LA, USA, August 16-18, 2018}
}
@inproceedings{conf/amcis/VempralaLXC18,
title = {Using Social Media Data to Improve Situational Awareness during Emergent Events.},
year = {2018},
booktitle = {AMCIS},
author = {{Naga Vemprala} and {Charles Zhechao Liu} and {Rachael Ruizhu Xiong} and {Kim-Kwang Raymond Choo}},
publisher = {Association for Information Systems},
booktitle = {24th Americas Conference on Information Systems, AMCIS 2018, New Orleans, LA, USA, August 16-18, 2018}
}
@inproceedings{conf/cascon/PariziDCS08,
title = {Empirical vulnerability analysis of automated smart contracts security testing on blockchains.},
year = {2018},
booktitle = {CASCON},
author = {{Reza M. Parizi} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo} and {Amritraj Singh}},
publisher = {ACM},
booktitle = {Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, CASCON 2018, Markham, Ontario, Canada, October 29-31, 2018.}
}
@inproceedings{conf/chase/PariziGBDC18,
title = {CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction.},
year = {2018},
booktitle = {CHASE},
author = {{Reza M. Parizi} and {Liang Guo} and {Yao Bian} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}},
publisher = {ACM / IEEE},
booktitle = {Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2018, Washington, DC, USA, September 26-28, 2018}
}
@inproceedings{conf/globecom/MishraOPTC18,
title = {Graph-Based Symmetric Crypto-System for Data Confidentiality.},
year = {2018},
booktitle = {GLOBECOM},
author = {{Alekha Kumar Mishra} and {Mohammad S. Obaidat} and {Deepak Puthal} and {Asis Kumar Tripathy} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {IEEE Global Communications Conference, GLOBECOM 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018}
}
@inproceedings{conf/hicss/GlissonC18,
title = {Introduction to the Minitrack on Cyber-of-Things: Cyber Crimes, Cyber Security and Cyber Forensics.},
year = {2018},
booktitle = {HICSS},
author = {{William Bradley Glisson} and {Kim-Kwang Raymond Choo}},
publisher = {ScholarSpace / AIS Electronic Library (AISeL)},
booktitle = {51st Hawaii International Conference on System Sciences, HICSS 2018, Hilton Waikoloa Village, Hawaii, USA, January 3-6, 2018}
}
@inproceedings{conf/hicss/LiuJC18,
title = {Canalization or Increased Diffusion? An Empirical Analysis on the Impact of the Recommendation System in the Mobile App Market.},
year = {2018},
booktitle = {HICSS},
author = {{Charles Zhechao Liu} and {Mohsen M. Jozani} and {Kim-Kwang Raymond Choo}},
publisher = {ScholarSpace / AIS Electronic Library (AISeL)},
booktitle = {51st Hawaii International Conference on System Sciences, HICSS 2018, Hilton Waikoloa Village, Hawaii, USA, January 3-6, 2018}
}
@inproceedings{conf/icccn/BanerjeeLCC18,
title = {Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design.},
year = {2018},
booktitle = {ICCCN},
author = {{Mandrita Banerjee} and {Junghee Lee} and {Qian Chen 019} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {27th International Conference on Computer Communication and Networks, ICCCN 2018, Hangzhou, China, July 30 - August 2, 2018}
}
@inproceedings{conf/icccn/CuiRTWC18,
title = {Evolution of Resource Sharing Cooperation Based on Reciprocity in Social Networks.},
year = {2018},
booktitle = {ICCCN},
author = {{Guanghai Cui} and {Yizhi Ren} and {Shengwen Tian} and {Ting Wu 001} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {27th International Conference on Computer Communication and Networks, ICCCN 2018, Hangzhou, China, July 30 - August 2, 2018}
}
@inproceedings{conf/icccn/XuWCRDC18,
title = {An Extended Exploration to the Epidemic Containment Game.},
year = {2018},
booktitle = {ICCCN},
author = {{Jia-Hao Xu} and {Zhen Wang 013} and {Guanghai Cui} and {Yizhi Ren} and {Hong Ding} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {27th International Conference on Computer Communication and Networks, ICCCN 2018, Hangzhou, China, July 30 - August 2, 2018}
}
@inproceedings{conf/icdf2c/ShenCZ18,
title = {Multi-item Passphrases: A Self-adaptive Approach Against Offline Guessing Attacks.},
year = {2018},
booktitle = {ICDF2C},
author = {{Jaryn Shen} and {Kim-Kwang Raymond Choo} and {Qingkai Zeng 002}},
publisher = {Springer},
booktitle = {Digital Forensics and Cyber Crime - 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings}
}
@inproceedings{conf/icii/MoustafaTC18,
title = {Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks.},
year = {2018},
booktitle = {ICII},
author = {{Nour Moustafa} and {Benjamin P. Turnbull} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Industrial Internet, ICII 2018, Seattle, WA, USA, October 21-23, 2018}
}
@inproceedings{conf/milcom/JiangCCLLYM18,
title = {Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails.},
year = {2018},
booktitle = {MILCOM},
author = {{Jianguo Jiang} and {Jiuming Chen} and {Kim-Kwang Raymond Choo} and {Kunying Liu} and {Chao Liu 020} and {Min Yu 001} and {Prasant Mohapatra}},
publisher = {IEEE},
booktitle = {2018 IEEE Military Communications Conference, MILCOM 2018, Los Angeles, CA, USA, October 29-31, 2018}
}
@inproceedings{conf/nss/CastiglioneCMM18,
title = {Walking on the Cloud: Gait Recognition, a Wearable Solution.},
year = {2018},
booktitle = {NSS},
author = {{Aniello Castiglione} and {Kim-Kwang Raymond Choo} and {Maria De Marsico} and {Alessio Mecca}},
publisher = {Springer},
booktitle = {Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings}
}
@inproceedings{conf/nss/UmairNHC18,
title = {User Relationship Classification of Facebook Messenger Mobile Data using WEKA.},
year = {2018},
booktitle = {NSS},
author = {{Amber Umair} and {Priyadarsi Nanda} and {Xiangjian He} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings}
}
@inproceedings{conf/nss/YangJHZXC18,
title = {A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity.},
year = {2018},
booktitle = {NSS},
author = {{Xiaoyan Yang} and {Han Jiang 001} and {Mengbo Hou} and {Zhihua Zheng} and {Qiuliang Xu} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings}
}
@inproceedings{conf/securecomm/CahyaniMCA18,
title = {An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations.},
year = {2018},
booktitle = {SecureComm (2)},
author = {{Niken Dwi Wahyu Cahyani} and {Ben Martini} and {Kim-Kwang Raymond Choo} and {Helen Ashman}},
publisher = {Springer},
booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part II}
}
@inproceedings{conf/securecomm/CahyaniMCA18a,
title = {Event Reconstruction of Indonesian E-Banking Services on Windows Phone Devices.},
year = {2018},
booktitle = {SecureComm (2)},
author = {{Niken Dwi Wahyu Cahyani} and {Ben Martini} and {Kim-Kwang Raymond Choo} and {Helen Ashman}},
publisher = {Springer},
booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part II}
}
@inproceedings{conf/trustcom/CarmanKLCA18,
title = {Manipulating Visibility of Political and Apolitical Threads on Reddit via Score Boosting.},
year = {2018},
booktitle = {TrustCom/BigDataSE},
author = {{Mark J. Carman} and {Mark Koerber} and {Jiuyong Li} and {Kim-Kwang Raymond Choo} and {Helen Ashman}},
publisher = {IEEE},
booktitle = {17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}
}
@inproceedings{conf/trustcom/CloydOEGC18,
title = {Browser Analysis of Residual Facebook Data.},
year = {2018},
booktitle = {TrustCom/BigDataSE},
author = {{Taylor Cloyd} and {Trey Osborn} and {Brian Ellingboe} and {William Bradley Glisson} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}
}
@inproceedings{conf/trustcom/GoudbeekCL18,
title = {A Forensic Investigation Framework for Smart Home Environment.},
year = {2018},
booktitle = {TrustCom/BigDataSE},
author = {{Arnoud Goudbeek} and {Kim-Kwang Raymond Choo} and {Nhien-An Le-Khac}},
publisher = {IEEE},
booktitle = {17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}
}
@inproceedings{conf/trustcom/LedbetterGMAGC18,
title = {Digital Blues: An Investigation Into the Use of Bluetooth Protocols.},
year = {2018},
booktitle = {TrustCom/BigDataSE},
author = {{William Ledbetter} and {William Bradley Glisson} and {Todd McDonald} and {Todd R. Andel} and {George Grispos} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}
}
@inproceedings{conf/trustcom/LiuCD0Z18,
title = {PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains.},
year = {2018},
booktitle = {TrustCom/BigDataSE},
author = {{Ximeng Liu} and {Kim-Kwang Raymond Choo} and {Robert H. Deng} and {Yang Yang 026} and {Yinghui Zhang 002}},
publisher = {IEEE},
booktitle = {17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}
}
@inproceedings{conf/trustcom/MataBC18,
title = {Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis.},
year = {2018},
booktitle = {TrustCom/BigDataSE},
author = {{Nicholas Mata} and {Nicole Beebe} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}
}
@inproceedings{conf/trustcom/PariziDC18,
title = {Towards Better Ocular Recognition for Secure Real-World Applications.},
year = {2018},
booktitle = {TrustCom/BigDataSE},
author = {{Reza M. Parizi} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}
}
@inproceedings{conf/trustcom/Qian0SC18,
title = {A Lightweight Path Authentication Protocol for RFID-Based Supply Chains.},
year = {2018},
booktitle = {TrustCom/BigDataSE},
author = {{Yuyin Qian} and {Peng Zeng 002} and {Zuming Shen} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}
}
@inproceedings{conf/trustcom/RenJYWWLC18,
title = {Node Immunization in Networks with Uncertainty.},
year = {2018},
booktitle = {TrustCom/BigDataSE},
author = {{Yizhi Ren} and {Mengjin Jiang} and {Ye Yao} and {Ting Wu 001} and {Zhen Wang 013} and {Mengkun Li} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}
}
@inproceedings{conf/trustcom/YanXQWYZC18,
title = {Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic.},
year = {2018},
booktitle = {TrustCom/BigDataSE},
author = {{Feipeng Yan} and {Ming Xu 001} and {Tong Qiao} and {Ting Wu 001} and {Xue Yang} and {Ning Zheng 001} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}
}
@article{journals/access/HeCKC18,
title = {IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies.},
year = {2018},
journal = {IEEE Access},
author = {{Debiao He} and {Kim-Kwang Raymond Choo} and {Neeraj Kumar 001} and {Aniello Castiglione}}
}
@article{journals/access/LiRZC18,
title = {Lico: A Lightweight Access Control Model for Inter-Networking Linkages.},
year = {2018},
journal = {IEEE Access},
author = {{Simin Li} and {Wei Ren 002} and {Tianqing Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/access/LinHHKC18,
title = {A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems.},
year = {2018},
journal = {IEEE Access},
author = {{Chao Lin} and {Debiao He} and {Xinyi Huang 001} and {Muhammad Khurram Khan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/access/QuickC18,
title = {IoT Device Forensics and Data Reduction.},
year = {2018},
journal = {IEEE Access},
author = {{Darren Quick} and {Kim-Kwang Raymond Choo}}
}
@article{journals/access/ShenZQC18,
title = {A Secure and Practical RFID Ownership Transfer Protocol Based on Chebyshev Polynomials.},
year = {2018},
journal = {IEEE Access},
author = {{Zuming Shen} and {Peng Zeng 002} and {Yuyin Qian} and {Kim-Kwang Raymond Choo}}
}
@article{journals/access/WangLDCHPF18,
title = {Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems.},
year = {2018},
journal = {IEEE Access},
author = {{Guofeng Wang} and {Chuanyi Liu} and {Yingfei Dong} and {Kim-Kwang Raymond Choo} and {Peiyi Han} and {Hezhong Pan} and {Binxing Fang}}
}
@article{journals/access/WangWZC18,
title = {A Novel Index for Assessing the Robustness of Integrated Electrical Network and a Natural Gas Network.},
year = {2018},
journal = {IEEE Access},
author = {{Bo Wang 047} and {Shaohua Wan 001} and {Xiujun Zhang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/access/XuZWDCZG18,
title = {Side-Channel Attack on a Protected RFID Card.},
year = {2018},
journal = {IEEE Access},
author = {{Rixin Xu} and {Liehuang Zhu} and {An Wang 001} and {Xiaojiang Du} and {Kim-Kwang Raymond Choo} and {Guoshuang Zhang} and {Keke Gai}}
}
@article{journals/access/ZengC18,
title = {A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage.},
year = {2018},
journal = {IEEE Access},
author = {{Peng Zeng 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/access/ZhongRZRC18,
title = {Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.},
year = {2018},
journal = {IEEE Access},
author = {{Sheng Zhong} and {Wei Ren 002} and {Tianqing Zhu} and {Yi Ren 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/adhoc/JiaHLC18,
title = {An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment.},
year = {2018},
journal = {Ad Hoc Networks},
author = {{Xiaoying Jia 002} and {Debiao He} and {Qin Liu 003} and {Kim-Kwang Raymond Choo}}
}
@article{journals/amc/RenCWSCWC18,
title = {Neighbor-considered migration facilitates cooperation in prisoner's dilemma games.},
year = {2018},
journal = {Appl. Math. Comput.},
author = {{Yizhi Ren} and {Xiangyu Chen} and {Zhen Wang 013} and {Benyun Shi} and {Guanghai Cui} and {Ting Wu 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/asc/ZhangCSC18,
title = {Crowd computing for social media ecosystems.},
year = {2018},
journal = {Appl. Soft Comput.},
author = {{Zhiyong Zhang 002} and {Kim-Kwang Raymond Choo} and {Arun Kumar Sangaiah} and {Liang Chen}}
}
@article{journals/cee/LeuKYCH18,
title = {A smartphone-based wearable sensors for monitoring real-time physiological data.},
year = {2018},
journal = {Comput. Electr. Eng.},
author = {{Fang-Yie Leu} and {Chia-Yin Ko} and {Ilsun You} and {Kim-Kwang Raymond Choo} and {Chi-Lun Ho}}
}
@article{journals/cem/LinZAYC18,
title = {Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices.},
year = {2018},
journal = {IEEE Consumer Electron. Mag.},
author = {{Fuhong Lin} and {Yutong Zhou} and {Xingshuo An} and {Ilsun You} and {Kim-Kwang Raymond Choo}}
}
@article{journals/chb/HeraviMC18,
title = {Information privacy in online social networks: Uses and gratification perspective.},
year = {2018},
journal = {Comput. Hum. Behav.},
author = {{Alireza Heravi} and {Sameera Mubarak} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cj/ChenZCD18,
title = {Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.},
year = {2018},
journal = {Comput. J.},
author = {{Siyuan Chen} and {Peng Zeng 002} and {Kim-Kwang Raymond Choo} and {Xiaolei Dong}}
}
@article{journals/cloudcomp/BarraCMNC18,
title = {Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond.},
year = {2018},
journal = {IEEE Cloud Comput.},
author = {{Silvio Barra} and {Aniello Castiglione} and {Maria De Marsico} and {Michele Nappi} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/BarraCNCNR18,
title = {Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications.},
year = {2018},
journal = {IEEE Cloud Comput.},
author = {{Silvio Barra} and {Kim-Kwang Raymond Choo} and {Michele Nappi} and {Arcangelo Castiglione} and {Fabio Narducci} and {Rajiv Ranjan 001}}
}
@article{journals/cloudcomp/CinqueRECFK18,
title = {Cloud Reliability: Possible Sources of Security and Legal Issues?},
year = {2018},
journal = {IEEE Cloud Comput.},
author = {{Marcello Cinque} and {Stefano Russo 001} and {Christian Esposito 001} and {Kim-Kwang Raymond Choo} and {Frederica Free-Nelson} and {Charles A. Kamhoua}}
}
@article{journals/cloudcomp/EspositoPC18,
title = {Cloud Message Queueing and Notification: Challenges and Opportunities.},
year = {2018},
journal = {IEEE Cloud Comput.},
author = {{Christian Esposito 001} and {Francesco Palmieri 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/EspositoSTCC18,
title = {Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?},
year = {2018},
journal = {IEEE Cloud Comput.},
author = {{Christian Esposito 001} and {Alfredo De Santis} and {Genny Tortora} and {Henry Chang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cloudcomp/GaiCZ18,
title = {Blockchain-Enabled Reengineering of Cloud Datacenters.},
year = {2018},
journal = {IEEE Cloud Comput.},
author = {{Keke Gai} and {Kim-Kwang Raymond Choo} and {Liehuang Zhu}}
}
@article{journals/cloudcomp/MalufSC18,
title = {Trust Erosion: Dealing with Unknown-Unknowns in Cloud Security.},
year = {2018},
journal = {IEEE Cloud Comput.},
author = {{David A. Maluf} and {Raghuram S. Sudhaakar} and {Kim-Kwang Raymond Choo}}
}
@article{journals/clsr/BrownGAC18,
title = {Cloud forecasting: Legal visibility issues in saturated environments.},
year = {2018},
journal = {Comput. Law Secur. Rev.},
author = {{Adam J. Brown} and {William Bradley Glisson} and {Todd R. Andel} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cluster/ShenTCK18,
title = {Performance prediction of parallel computing models to analyze cloud-based big data applications.},
year = {2018},
journal = {Clust. Comput.},
author = {{Chao Shen 007} and {Weiqin Tong} and {Kim-Kwang Raymond Choo} and {Samina Kausar}}
}
@article{journals/cm/KumarRGCLVZ18,
title = {Achieving Energy Efficiency and Sustainability in Edge/Fog Deployment.},
year = {2018},
journal = {IEEE Commun. Mag.},
author = {{Neeraj Kumar 001} and {Joel J. P. C. Rodrigues} and {Mohsen Guizani} and {Kim-Kwang Raymond Choo} and {Rongxing Lu} and {Christos V. Verikoukis} and {Zhimeng Zhong}}
}
@article{journals/cm/LinHKCVH18,
title = {Security and Privacy for the Internet of Drones: Challenges and Solutions.},
year = {2018},
journal = {IEEE Commun. Mag.},
author = {{Chao Lin} and {Debiao He} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo} and {Alexey V. Vinel} and {Xinyi Huang 001}}
}
@article{journals/cm/LiuCG18,
title = {Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography.},
year = {2018},
journal = {IEEE Commun. Mag.},
author = {{Zhe Liu 001} and {Kim-Kwang Raymond Choo} and {Johann Großschädl}}
}
@article{journals/cn/DoMC18,
title = {Cyber-physical systems information gathering: A smart home case study.},
year = {2018},
journal = {Comput. Networks},
author = {{Quang Do} and {Ben Martini} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/AnjumMCKHKKAR18,
title = {An efficient privacy mechanism for electronic health records.},
year = {2018},
journal = {Comput. Secur.},
author = {{Adeel Anjum} and {Saif Ur Rehman Malik} and {Kim-Kwang Raymond Choo} and {Abid Khan} and {Asma Haroon} and {Sangeen Khan} and {Samee U. Khan} and {Naveed Ahmad 001} and {Basit Raza}}
}
@article{journals/compsec/ChooBGN18,
title = {Internet- and cloud-of-things cybersecurity research challenges and advances.},
year = {2018},
journal = {Comput. Secur.},
author = {{Kim-Kwang Raymond Choo} and {Matt Bishop} and {William Bradley Glisson} and {Kara L. Nance}}
}
@article{journals/compsec/MillerGYC18,
title = {Identifying 3D printer residual data via open-source documentation.},
year = {2018},
journal = {Comput. Secur.},
author = {{Daniel Bradford Miller} and {William Bradley Glisson} and {Mark Yampolskiy} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/ToorWNC18,
title = {Visual Question Authentication Protocol (VQAP).},
year = {2018},
journal = {Comput. Secur.},
author = {{Andeep S. Toor} and {Harry Wechsler} and {Michele Nappi} and {Kim-Kwang Raymond Choo}}
}
@article{journals/concurrency/TeingDC18,
title = {CloudMe forensics: A case of big data forensic investigation.},
year = {2018},
journal = {Concurr. Comput. Pract. Exp.},
author = {{Yee-Yang Teing} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/abs-1804-08649,
title = {Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study.},
year = {2018},
journal = {CoRR},
author = {{Alan Roder} and {Kim-Kwang Raymond Choo} and {Nhien-An Le-Khac}}
}
@article{journals/corr/abs-1806-02008,
title = {IoTChain: A Three-Tier Blockchain-based IoT Security Architecture.},
year = {2018},
journal = {CoRR},
author = {{Zijian Bao} and {Wenbo Shi} and {Debiao He} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/abs-1807-10218,
title = {CloudMe Forensics: A Case of Big-Data Investigation.},
year = {2018},
journal = {CoRR},
author = {{Yee-Yang Teing} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/abs-1807-10443,
title = {Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing.},
year = {2018},
journal = {CoRR},
author = {{Opeyemi A. Osanaiye} and {Kim-Kwang Raymond Choo} and {Ali Dehghantanha} and {Zheng Xu 001} and {Mqhele E. Dlodlo}}
}
@article{journals/corr/abs-1807-10445,
title = {Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study.},
year = {2018},
journal = {CoRR},
author = {{Yee-Yang Teing} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/abs-1807-10448,
title = {Ubuntu One Investigation: Detecting Evidences on Client Machines.},
year = {2018},
journal = {CoRR},
author = {{Mohammad Shariati} and {Ali Dehghantanha} and {Ben Martini} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/abs-1808-01202,
title = {Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.},
year = {2018},
journal = {CoRR},
author = {{Gregory Epiphaniou} and {Petros Karadimas} and {Dhouha Kbaier Ben Ismail} and {Haider M. Al-Khateeb} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/dcan/BanerjeeLC18,
title = {A blockchain future for internet of things security: a position paper.},
year = {2018},
journal = {Digit. Commun. Networks},
author = {{Mandrita Banerjee} and {Junghee Lee} and {Kim-Kwang Raymond Choo}}
}
@article{journals/di/KouwenSCL18,
title = {Digital forensic investigation of two-way radio communication equipment and services.},
year = {2018},
journal = {Digit. Investig.},
author = {{Arie Kouwen} and {Mark Scanlon} and {Kim-Kwang Raymond Choo} and {Nhien-An Le-Khac}}
}
@article{journals/ecr/RoutCDBJW18,
title = {A model for sentiment and emotion analysis of unstructured social media text.},
year = {2018},
journal = {Electron. Commer. Res.},
author = {{Jitendra Kumar Rout} and {Kim-Kwang Raymond Choo} and {Amiya Kumar Dash} and {Sambit Bakshi} and {Sanjay Kumar Jena} and {Karen L. Williams}}
}
@article{journals/ejwcn/PeiKZCZS18,
title = {Secure and privacy-preserving 3D vehicle positioning schemes for vehicular ad hoc network.},
year = {2018},
journal = {EURASIP J. Wirel. Commun. Netw.},
author = {{Qianwen Pei} and {Burong Kang} and {Lei Zhang 009} and {Kim-Kwang Raymond Choo} and {Yuanfei Zhang} and {Yinxia Sun}}
}
@article{journals/eswa/HuWRC18,
title = {User influence analysis for Github developer social networks.},
year = {2018},
journal = {Expert Syst. Appl.},
author = {{Yan Hu} and {Shanshan Wang} and {Yizhi Ren} and {Kim-Kwang Raymond Choo}}
}
@article{journals/ett/LiZKCH18,
title = {Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps.},
year = {2018},
journal = {Trans. Emerg. Telecommun. Technol.},
author = {{JiLiang Li} and {WeiGuo Zhang 001} and {Saru Kumari} and {Kim-Kwang Raymond Choo} and {Dieter Hogrefe}}
}
@article{journals/fgcs/AlamEKKJCB18,
title = {Secure policy execution using reusable garbled circuit in the cloud.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Masoom Alam} and {Naina Emmanuel} and {Tanveer Khan} and {Abid Khan} and {Nadeem Javaid} and {Kim-Kwang Raymond Choo} and {Rajkumar Buyya}}
}
@article{journals/fgcs/Chen00C18,
title = {LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Zitao Chen} and {Wei Ren 002} and {Yi Ren 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/ChooLCY18,
title = {A foggy research future: Advances and future opportunities in fog computing research.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Kim-Kwang Raymond Choo} and {Rongxing Lu} and {Liqun Chen 002} and {Xun Yi}}
}
@article{journals/fgcs/ChooSC18,
title = {Measurements and security of complex networks and systems: Research advances and challenges.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Kim-Kwang Raymond Choo} and {Yongtang Shi} and {Zengqiang Chen 001}}
}
@article{journals/fgcs/DOrazioC18,
title = {Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Christian Javier D'Orazio} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/JiangLC18,
title = {Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Rong Jiang 001} and {Rongxing Lu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/LiNKWC18,
title = {A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Xiong Li 002} and {Jianwei Niu 002} and {Saru Kumari} and {Fan Wu 003} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/PajouhDKC18,
title = {A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Hamed Haddad Pajouh} and {Ali Dehghantanha} and {Raouf Khayami} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/QuickC18,
title = {Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mix.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Darren Quick} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/SongGSQLC18,
title = {QRFence: A flexible and scalable QR link security detection framework for Android devices.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Jun Song 003} and {Kun Gao} and {Xinyang Shen} and {Xiaotian Qi} and {Rui Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/WangHSKC18,
title = {PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Huaqun Wang} and {Debiao He} and {Yanfei Sun} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/YanMWCJ18,
title = {A cloud-based remote sensing data production system.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Jining Yan} and {Yan Ma 001} and {Lizhe Wang 001} and {Kim-Kwang Raymond Choo} and {Wei Jie}}
}
@article{journals/fgcs/YangWCC18,
title = {HEPart: A balanced hypergraph partitioning algorithm for big data applications.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Wenyin Yang} and {Guojun Wang 001} and {Kim-Kwang Raymond Choo} and {Shuhong Chen}}
}
@article{journals/fgcs/ZhangCLW18,
title = {Enhancing privacy through uniform grid and caching in location-based services.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Shaobo Zhang 001} and {Kim-Kwang Raymond Choo} and {Qin Liu 001} and {Guojun Wang 001}}
}
@article{journals/fgcs/ZhouSSZC18,
title = {Stag hunt and trust emergence in social networks.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Lu Zhou 002} and {Chunhua Su} and {Xin Sun 001} and {Xishun Zhao} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/ZhouZC18,
title = {Efficiently and securely harnessing cloud to solve linear regression and other matrix operations.},
year = {2018},
journal = {Future Gener. Comput. Syst.},
author = {{Lu Zhou 002} and {Youwen Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iacr/DoMC18,
title = {The Role of the Adversary Model in Applied Security Research.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Quang Do} and {Ben Martini} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iacr/ZhangHHWC18,
title = {White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yudi Zhang 001} and {Debiao He} and {Xinyi Huang 001} and {Ding Wang 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/ijcomsys/JiaKCH18,
title = {Efficient revocable ID-based encryption with cloud revocation server.},
year = {2018},
journal = {Int. J. Commun. Syst.},
author = {{Xiaoying Jia 002} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/ijon/XuMCLHLL18,
title = {Mobile crowd sensing of human-like intelligence using social sensors: A survey.},
year = {2018},
journal = {Neurocomputing},
author = {{Zheng Xu 001} and {Lin Mei 001} and {Kim-Kwang Raymond Choo} and {Zhihan Lv} and {Chuanping Hu} and {Xiangfeng Luo} and {Yunhuai Liu}}
}
@article{journals/iotj/EpiphaniouKIADC18,
title = {Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.},
year = {2018},
journal = {IEEE Internet Things J.},
author = {{Gregory Epiphaniou} and {Petros Karadimas} and {Dhouha Kbaier Ben Ismail} and {Haider M. Al-Khateeb} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/GaiCQZ18,
title = {Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things.},
year = {2018},
journal = {IEEE Internet Things J.},
author = {{Keke Gai} and {Kim-Kwang Raymond Choo} and {Meikang Qiu} and {Liehuang Zhu}}
}
@article{journals/iotj/LiPNWLC18,
title = {A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things.},
year = {2018},
journal = {IEEE Internet Things J.},
author = {{Xiong Li 002} and {Jieyao Peng} and {Jianwei Niu 002} and {Fan Wu 003} and {Junguo Liao} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/MiraftabzadehRC18,
title = {A Privacy-Aware Architecture at the Edge for Autonomous Real-Time Identity Reidentification in Crowds.},
year = {2018},
journal = {IEEE Internet Things J.},
author = {{Seyed Ali Miraftabzadeh} and {Paul Rad} and {Kim-Kwang Raymond Choo} and {Mo M. Jamshidi}}
}
@article{journals/iotj/ZhangHZWC18,
title = {Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks.},
year = {2018},
journal = {IEEE Internet Things J.},
author = {{Yudi Zhang 001} and {Debiao He} and {Sherali Zeadally} and {Ding Wang 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotm/PereraBDBVC18,
title = {Designing the Sensing as a Service Ecosystem for the Internet of Things.},
year = {2018},
journal = {IEEE Internet Things Mag.},
author = {{Charith Perera} and {Mahmoud Barhamgi} and {Suparna De} and {Tim Baarslag} and {Massimo Vecchio} and {Kim-Kwang Raymond Choo}}
}
@article{journals/isci/IslamLYC18,
title = {Task aware hybrid DVFS for multi-core real-time systems using machine learning.},
year = {2018},
journal = {Inf. Sci.},
author = {{Fakhruddin Muhammad Mahbub Ul Islam} and {Man Lin} and {Laurence T. Yang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/isci/MiaoWLCLL18,
title = {Enabling verifiable multiple keywords search over encrypted cloud data.},
year = {2018},
journal = {Inf. Sci.},
author = {{Yinbin Miao} and {Jian Weng 001} and {Ximeng Liu} and {Kim-Kwang Raymond Choo} and {Zhiquan Liu} and {Hongwei Li 001}}
}
@article{journals/isci/ZhangLC18,
title = {Jo-DPMF: Differentially private matrix factorization learning through joint optimization.},
year = {2018},
journal = {Inf. Sci.},
author = {{Feng Zhang 012} and {Victor E. Lee} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jaihc/AzmoodehDCC18,
title = {Detecting crypto-ransomware in IoT networks based on energy consumption footprint.},
year = {2018},
journal = {J. Ambient Intell. Humaniz. Comput.},
author = {{Amin Azmoodeh} and {Ali Dehghantanha} and {Mauro Conti} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jnca/AminIKC18,
title = {An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks.},
year = {2018},
journal = {J. Netw. Comput. Appl.},
author = {{Ruhul Amin 001} and {SK Hafizul Islam} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jnca/KumariTTKMC18,
title = {Multimedia big data computing and Internet of Things applications: A taxonomy and process model.},
year = {2018},
journal = {J. Netw. Comput. Appl.},
author = {{Aparna Kumari} and {Sudeep Tanwar} and {Sudhanshu Tyagi} and {Neeraj Kumar 001} and {Michele Maasberg} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jnca/LiNKWSC18,
title = {A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments.},
year = {2018},
journal = {J. Netw. Comput. Appl.},
author = {{Xiong Li 002} and {Jianwei Niu 002} and {Saru Kumari} and {Fan Wu 003} and {Arun Kumar Sangaiah} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jnca/LinHHCV18,
title = {BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0.},
year = {2018},
journal = {J. Netw. Comput. Appl.},
author = {{Chao Lin} and {Debiao He} and {Xinyi Huang 001} and {Kim-Kwang Raymond Choo} and {Athanasios V. Vasilakos}}
}
@article{journals/jocs/KiwiaDCS18,
title = {A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence.},
year = {2018},
journal = {J. Comput. Sci.},
author = {{Dennis Kiwia} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo} and {Jim Slaughter}}
}
@article{journals/jocs/ZhangCG18,
title = {The convergence of new computing paradigms and big data analytics methodologies for online social networks.},
year = {2018},
journal = {J. Comput. Sci.},
author = {{Zhiyong Zhang 002} and {Kim-Kwang Raymond Choo} and {Brij B. Gupta}}
}
@article{journals/jocs/ZhangLDXC18,
title = {Micro-blog topic recommendation based on knowledge flow and user selection.},
year = {2018},
journal = {J. Comput. Sci.},
author = {{Shunxiang Zhang} and {Wenjuan Liu} and {XiaoLu Deng} and {Zheng Xu 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jpdc/JieTCSLG18,
title = {Online task scheduling for edge computing based on repeated stackelberg game.},
year = {2018},
journal = {J. Parallel Distributed Comput.},
author = {{Yingmo Jie} and {Xinyu Tang} and {Kim-Kwang Raymond Choo} and {Shenghao Su} and {Mingchu Li} and {Cheng Guo 001}}
}
@article{journals/jpdc/WuCCH18,
title = {Efficient and secure searchable encryption protocol for cloud-based Internet of Things.},
year = {2018},
journal = {J. Parallel Distributed Comput.},
author = {{Libing Wu} and {Biwen Chen} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/jpdc/ZhouLCZ18,
title = {DADTA: A novel adaptive strategy for energy and performance efficient virtual machine consolidation.},
year = {2018},
journal = {J. Parallel Distributed Comput.},
author = {{Hang Zhou 006} and {Qing Li 011} and {Kim-Kwang Raymond Choo} and {Hai Zhu 001}}
}
@article{journals/mta/JiaHLC18,
title = {Signature-based three-factor authenticated key exchange for internet of things applications.},
year = {2018},
journal = {Multim. Tools Appl.},
author = {{Xiaoying Jia 002} and {Debiao He} and {Li Li 073} and {Kim-Kwang Raymond Choo}}
}
@article{journals/mta/LvLC18,
title = {E-government multimedia big data platform for disaster management.},
year = {2018},
journal = {Multim. Tools Appl.},
author = {{Zhihan Lv} and {Xiaoming Li} and {Kim-Kwang Raymond Choo}}
}
@article{journals/mta/TianGSCH18,
title = {Feature extraction and classification of VHR images with attribute profiles and convolutional neural networks.},
year = {2018},
journal = {Multim. Tools Appl.},
author = {{Tian Tian} and {Lang Gao} and {Weijing Song} and {Kim-Kwang Raymond Choo} and {Jijun He}}
}
@article{journals/ppna/GeZLC18,
title = {FGDA: Fine-grained data analysis in privacy-preserving smart grid communications.},
year = {2018},
journal = {Peer-to-Peer Netw. Appl.},
author = {{Shanshan Ge} and {Peng Zeng 002} and {Rongxing Lu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/scn/LiZCLH18,
title = {An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System.},
year = {2018},
journal = {Secur. Commun. Networks},
author = {{Li Li 073} and {Siqin Zhou} and {Kim-Kwang Raymond Choo} and {Xiaohong Li 003} and {Debiao He}}
}
@article{journals/scn/QianCCZ18,
title = {Multimedia Security: Novel Steganography and Privacy Preserving.},
year = {2018},
journal = {Secur. Commun. Networks},
author = {{Zhenxing Qian} and {Kim-Kwang Raymond Choo} and {Rémi Cogranne} and {Xinpeng Zhang 001}}
}
@article{journals/scn/YanZCX18,
title = {Security Measurements of Cyber Networks.},
year = {2018},
journal = {Secur. Commun. Networks},
author = {{Zheng Yan 002} and {Yuqing Zhang 001} and {Kim-Kwang Raymond Choo} and {Yang Xiang 001}}
}
@article{journals/scn/ZhangLCH18,
title = {A General Architecture for Multiserver Authentication Key Agreement with Provable Security.},
year = {2018},
journal = {Secur. Commun. Networks},
author = {{Yunru Zhang} and {Min Luo 002} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/soco/DingZRSC18,
title = {Heterogeneous investment in spatial public goods game with mixed strategy.},
year = {2018},
journal = {Soft Comput.},
author = {{Hong Ding} and {Yao Zhang} and {Yizhi Ren} and {Benyun Shi} and {Kim-Kwang Raymond Choo}}
}
@article{journals/soco/JabbarpourZKSC18,
title = {Applications of computational intelligence in vehicle traffic congestion problem: a survey.},
year = {2018},
journal = {Soft Comput.},
author = {{Mohammad Reza Jabbarpour} and {Houman Zarrabi} and {Rashid Hafeez Khokhar} and {Shahaboddin Shamshirband} and {Kim-Kwang Raymond Choo}}
}
@article{journals/soco/RadhakrishnaAKC18,
title = {A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns.},
year = {2018},
journal = {Soft Comput.},
author = {{Vangipuram Radhakrishna} and {Shadi A. Aljawarneh} and {Puligadda Veereswara Kumar} and {Kim-Kwang Raymond Choo}}
}
@article{journals/soco/WangLSC18,
title = {DUK-SVD: dynamic dictionary updating for sparse representation of a long-time remote sensing image sequence.},
year = {2018},
journal = {Soft Comput.},
author = {{Lizhe Wang 001} and {Peng Liu 024} and {Weijing Song} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tbd/XuLLCSYMH18,
title = {From Latency, Through Outbreak, to Decline: Detecting Different States of Emergency Events Using Web Resources.},
year = {2018},
journal = {IEEE Trans. Big Data},
author = {{Zheng Xu 001} and {Xiangfeng Luo} and {Yunhuai Liu} and {Kim-Kwang Raymond Choo} and {Vijayan Sugumaran} and {Neil Y. Yen} and {Lin Mei 001} and {Chuanping Hu}}
}
@article{journals/tcad/KermaniJAXC18,
title = {Reliable Inversion in GF(28) With Redundant Arithmetic for Secure Error Detection of Cryptographic Architectures.},
year = {2018},
journal = {IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.},
author = {{Mehran Mozaffari Kermani} and {Amir Jalali} and {Reza Azarderakhsh} and {Jiafeng Xie} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tdsc/HeKWWCV18,
title = {A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.},
year = {2018},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Debiao He} and {Neeraj Kumar 001} and {Huaqun Wang} and {Lina Wang} and {Kim-Kwang Raymond Choo} and {Alexey V. Vinel}}
}
@article{journals/tdsc/LiuCDLW18,
title = {Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers.},
year = {2018},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Ximeng Liu} and {Kim-Kwang Raymond Choo} and {Robert H. Deng} and {Rongxing Lu} and {Jian Weng 001}}
}
@article{journals/tii/ChooGP18,
title = {Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities.},
year = {2018},
journal = {IEEE Trans. Ind. Informatics},
author = {{Kim-Kwang Raymond Choo} and {Stefanos Gritzalis} and {Jong Hyuk Park}}
}
@article{journals/tii/MaHKCC18,
title = {Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.},
year = {2018},
journal = {IEEE Trans. Ind. Informatics},
author = {{Mimi Ma} and {Debiao He} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo} and {Jianhua Chen 002}}
}
@article{journals/titb/DasWKKCP18,
title = {Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.},
year = {2018},
journal = {IEEE J. Biomed. Health Informatics},
author = {{Ashok Kumar Das} and {Mohammad Wazid} and {Neeraj Kumar 001} and {Muhammad Khurram Khan} and {Kim-Kwang Raymond Choo} and {YoungHo Park 005}}
}
@article{journals/tnsm/MengCFVP18,
title = {Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks.},
year = {2018},
journal = {IEEE Trans. Netw. Serv. Manag.},
author = {{Weizhi Meng 001} and {Kim-Kwang Raymond Choo} and {Steven Furnell} and {Athanasios V. Vasilakos} and {Christian W. Probst}}
}
@article{journals/tsusc/WuZCH18,
title = {Efficient Identity-Based Encryption Scheme with Equality Test in Smart City.},
year = {2018},
journal = {IEEE Trans. Sustain. Comput.},
author = {{Libing Wu} and {Yubo Zhang 003} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/tvt/FangXZWC18,
title = {Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication.},
year = {2018},
journal = {IEEE Trans. Veh. Technol.},
author = {{He Fang} and {Li Xu 002} and {Yulong Zou} and {Xianbin Wang 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/vcomm/LiCZKRKH18,
title = {EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks.},
year = {2018},
journal = {Veh. Commun.},
author = {{JiLiang Li} and {Kim-Kwang Raymond Choo} and {WeiGuo Zhang 001} and {Saru Kumari} and {Joel J. P. C. Rodrigues} and {Muhammad Khurram Khan} and {Dieter Hogrefe}}
}
@article{journals/virology/PajouhDKC18,
title = {Intelligent OS X malware threat detection with code inspection.},
year = {2018},
journal = {J. Comput. Virol. Hacking Tech.},
author = {{Hamed Haddad Pajouh} and {Ali Dehghantanha} and {Raouf Khayami} and {Kim-Kwang Raymond Choo}}
}
@article{journals/wicomm/LiuYCW18,
title = {Security and Privacy Challenges for Internet-of-Things and Fog Computing.},
year = {2018},
journal = {Wirel. Commun. Mob. Comput.},
author = {{Ximeng Liu} and {Yang Yang 026} and {Kim-Kwang Raymond Choo} and {Huaqun Wang}}
}
@article{journals/wicomm/WangSLC18,
title = {Rethinking Authentication on Smart Mobile Devices.},
year = {2018},
journal = {Wirel. Commun. Mob. Comput.},
author = {{Ding Wang 002} and {Jian Shen 001} and {Joseph K. Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/wicomm/ZhangHC18,
title = {BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT.},
year = {2018},
journal = {Wirel. Commun. Mob. Comput.},
author = {{Yunru Zhang} and {Debiao He} and {Kim-Kwang Raymond Choo}}
}
@incollection{books/iet/19/BahramiDDPCJ0CX019,
title = {A layered security architecture based on cyber kill chain against advanced persistent threats.},
year = {2019},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications},
author = {{Pooneh Nikkhah Bahrami} and {Ali Dehghantanha} and {Tooska Dargahi} and {Reza M. Parizi} and {Kim-Kwang Raymond Choo} and {Hamid H. S. Javadi} and {Lizhe Wang 001} and {Fatos Xhafa} and {Wei Ren 002}},
publisher = {Institution of Engineering and Technology},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications}
}
@incollection{books/iet/19/Gao00CX19,
title = {Chaos-based communication systems.},
year = {2019},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications},
author = {{Xiaojing Gao} and {Wei Ren 002} and {Lizhe Wang 001} and {Kim-Kwang Raymond Choo} and {Fatos Xhafa}},
publisher = {Institution of Engineering and Technology},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications}
}
@incollection{books/iet/19/MaG0R0CX19,
title = {A watermark-based in situ access-control model for image big data.},
year = {2019},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications},
author = {{Liangli Ma} and {Jinyi Guo} and {Wei Ren 002} and {Yi Ren 001} and {Lizhe Wang 001} and {Kim-Kwang Raymond Choo} and {Fatos Xhafa}},
publisher = {Institution of Engineering and Technology},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications}
}
@incollection{books/iet/19/Mu000CX19,
title = {Security of marine-information system.},
year = {2019},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications},
author = {{Lin Mu} and {Jun Song 003} and {Wei Ren 002} and {Lizhe Wang 001} and {Kim-Kwang Raymond Choo} and {Fatos Xhafa}},
publisher = {Institution of Engineering and Technology},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications}
}
@incollection{books/iet/19/NadeemFZ00CX19,
title = {Privacy verification of PhotoDNA based on machine learning.},
year = {2019},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications},
author = {{Muhammad Shahroz Nadeem} and {Virginia N. L. Franqueira} and {Xiaojun Zhai} and {Wei Ren 002} and {Lizhe Wang 001} and {Kim-Kwang Raymond Choo} and {Fatos Xhafa}},
publisher = {Institution of Engineering and Technology},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications}
}
@incollection{books/iet/19/NietoR000CX19,
title = {Privacy-aware digital forensics.},
year = {2019},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications},
author = {{Ana Nieto} and {Ruben Rios} and {Javier López 001} and {Wei Ren 002} and {Lizhe Wang 001} and {Kim-Kwang Raymond Choo} and {Fatos Xhafa}},
publisher = {Institution of Engineering and Technology},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications}
}
@incollection{books/iet/19/Xhafa00C19,
title = {A survey of trust, trustworthiness and trustworthy computing: concepts, models and challenges.},
year = {2019},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications},
author = {{Fatos Xhafa} and {Wei Ren 002} and {Lizhe Wang 001} and {Kim-Kwang Raymond Choo}},
publisher = {Institution of Engineering and Technology},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications}
}
@incollection{books/iet/19/ZhengJH00CX19,
title = {Blockchain-based security and access control for BIM big data.},
year = {2019},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications},
author = {{Rongyue Zheng} and {Jianlin Jiang} and {Xiaohan Hao} and {Wei Ren 002} and {Lizhe Wang 001} and {Kim-Kwang Raymond Choo} and {Fatos Xhafa}},
publisher = {Institution of Engineering and Technology},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications}
}
@incollection{books/iet/19/ZhuW00CX19,
title = {Dynamic public opinion evolvement modeling and supervision in social networks.},
year = {2019},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications},
author = {{Shuaishuai Zhu} and {Xu An Wang 001} and {Wei Ren 002} and {Lizhe Wang 001} and {Kim-Kwang Raymond Choo} and {Fatos Xhafa}},
publisher = {Institution of Engineering and Technology},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications}
}
@incollection{books/sp/19/AzmoodehDC19,
title = {Big Data and Internet of Things Security and Forensics: Challenges and Opportunities.},
year = {2019},
booktitle = {Handbook of Big Data and IoT Security},
author = {{Amin Azmoodeh} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Handbook of Big Data and IoT Security}
}
@incollection{books/sp/19/PariziDCHE19,
title = {Security in Online Games: Current Implementations and Challenges.},
year = {2019},
booktitle = {Handbook of Big Data and IoT Security},
author = {{Reza M. Parizi} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo} and {Mohammad Hammoudeh} and {Gregory Epiphaniou}},
publisher = {Springer},
booktitle = {Handbook of Big Data and IoT Security}
}
@incollection{books/sp/19/TaylorMDACHP19,
title = {Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study.},
year = {2019},
booktitle = {Handbook of Big Data and IoT Security},
author = {{Paul J. Taylor} and {Henry Mwiki} and {Ali Dehghantanha} and {Alex Akinbi} and {Kim-Kwang Raymond Choo} and {Mohammad Hammoudeh} and {Reza M. Parizi}},
publisher = {Springer},
booktitle = {Handbook of Big Data and IoT Security}
}
@incollection{books/sp/19/TeingHDCPHE19,
title = {Private Cloud Storage Forensics: Seafile as a Case Study.},
year = {2019},
booktitle = {Handbook of Big Data and IoT Security},
author = {{Yee-Yang Teing} and {Sajad Homayoun} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo} and {Reza M. Parizi} and {Mohammad Hammoudeh} and {Gregory Epiphaniou}},
publisher = {Springer},
booktitle = {Handbook of Big Data and IoT Security}
}
@inproceedings{conf/acisp/ShenYCZ19,
title = {AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords.},
year = {2019},
booktitle = {ACISP},
author = {{Jaryn Shen} and {Timothy T. Yuen} and {Kim-Kwang Raymond Choo} and {Qingkai Zeng 002}},
publisher = {Springer},
booktitle = {Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}
}
@inproceedings{conf/amcis/XiongLCR19,
title = {Complex contagions of information diffusion across social networking platforms.},
year = {2019},
booktitle = {AMCIS},
author = {{Rachael Ruizhu Xiong} and {Charles Zhechao Liu} and {Kim-Kwang Raymond Choo} and {Anthony Rios}},
publisher = {Association for Information Systems},
booktitle = {25th Americas Conference on Information Systems, AMCIS 2019, Cancún, Mexico, August 15-17, 2019}
}
@inproceedings{conf/blockchain2/NyaleteyPZC19,
title = {BlockIPFS - Blockchain-Enabled Interplanetary File System for Forensic and Trusted Data Traceability.},
year = {2019},
booktitle = {Blockchain},
author = {{Emmanuel Nyaletey} and {Reza M. Parizi} and {Qi Zhang 009} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}
}
@inproceedings{conf/ccece/HomayounDPC19,
title = {A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores.},
year = {2019},
booktitle = {CCECE},
author = {{Sajad Homayoun} and {Ali Dehghantanha} and {Reza M. Parizi} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {2019 IEEE Canadian Conference of Electrical and Computer Engineering, CCECE 2019, Edmonton, AB, Canada, May 5-8, 2019}
}
@inproceedings{conf/ccece/PariziHYDC19,
title = {Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains.},
year = {2019},
booktitle = {CCECE},
author = {{Reza M. Parizi} and {Sajad Homayoun} and {Abbas Yazdinejad} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {2019 IEEE Canadian Conference of Electrical and Computer Engineering, CCECE 2019, Edmonton, AB, Canada, May 5-8, 2019}
}
@inproceedings{conf/cisc/JiangMSC19,
title = {CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones.},
year = {2019},
booktitle = {Inscrypt},
author = {{Hao Jiang} and {Weizhi Meng 001} and {Chunhua Su} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers}
}
@inproceedings{conf/css/HuXHZC19,
title = {Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps.},
year = {2019},
booktitle = {CSS (1)},
author = {{Jiaxi Hu} and {Zhiqiang Xu} and {Debiao He} and {Sherali Zeadally} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part I}
}
@inproceedings{conf/esorics/MengLJCS19,
title = {Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks.},
year = {2019},
booktitle = {ESORICS (1)},
author = {{Weizhi Meng 001} and {Wenjuan Li 001} and {Lijun Jiang} and {Kim-Kwang Raymond Choo} and {Chunhua Su}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I}
}
@inproceedings{conf/globecom/YazdinejadPSDC19,
title = {Energy Efficient Decentralized Authentication in Internet of Underwater Things Using Blockchain.},
year = {2019},
booktitle = {GLOBECOM Workshops},
author = {{Abbas Yazdinejad} and {Reza M. Parizi} and {Gautam Srivastava 001} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019}
}
@inproceedings{conf/hicss/ChooD19,
title = {Introduction to the Minitrack on Cyber Threat Intelligence and Analytics.},
year = {2019},
booktitle = {HICSS},
author = {{Kim-Kwang Raymond Choo} and {Ali Dehghantanha}},
publisher = {ScholarSpace},
booktitle = {52nd Hawaii International Conference on System Sciences, HICSS 2019, Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019}
}
@inproceedings{conf/hicss/VempralaXLC19,
title = {Where Does My Product Stand? A Social Network Perspective on Online Product Reviews.},
year = {2019},
booktitle = {HICSS},
author = {{Naga Vemprala} and {Rachael Ruizhu Xiong} and {Charles Zhechao Liu} and {Kim-Kwang Raymond Choo}},
publisher = {ScholarSpace},
booktitle = {52nd Hawaii International Conference on System Sciences, HICSS 2019, Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019}
}
@inproceedings{conf/icii/AledhariPDC19,
title = {A Hybrid RSA Algorithm in Support of IoT Greenhouse Applications.},
year = {2019},
booktitle = {ICII},
author = {{Mohammed Aledhari} and {Reza M. Parizi} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Industrial Internet, ICII 2019, Orlando, FL, USA, November 11-12, 2019}
}
@inproceedings{conf/isci/SrivastavaPDC19,
title = {Data Sharing and Privacy for Patient IoT Devices Using Blockchain.},
year = {2019},
booktitle = {iSCI},
author = {{Gautam Srivastava 001} and {Reza M. Parizi} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Smart City and Informatization - 7th International Conference, iSCI 2019, Guangzhou, China, November 12-15, 2019, Proceedings}
}
@inproceedings{conf/milcom/JiangCGCLYHM19,
title = {Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation.},
year = {2019},
booktitle = {MILCOM},
author = {{Jianguo Jiang} and {Jiuming Chen} and {Tianbo Gu} and {Kim-Kwang Raymond Choo} and {Chao Liu 020} and {Min Yu 001} and {Weiqing Huang} and {Prasant Mohapatra}},
publisher = {IEEE},
booktitle = {2019 IEEE Military Communications Conference, MILCOM 2019, Norfolk, VA, USA, November 12-14, 2019}
}
@inproceedings{conf/milcom/JiangCGCLYHM19a,
title = {Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection.},
year = {2019},
booktitle = {MILCOM},
author = {{Jianguo Jiang} and {Jiuming Chen} and {Tianbo Gu} and {Kim-Kwang Raymond Choo} and {Chao Liu 020} and {Min Yu 001} and {Weiqing Huang} and {Prasant Mohapatra}},
publisher = {IEEE},
booktitle = {2019 IEEE Military Communications Conference, MILCOM 2019, Norfolk, VA, USA, November 12-14, 2019}
}
@inproceedings{conf/ncs/RoderC19,
title = {Unmanned Aerial Vehicles (UAVs) Threat Analysis and a Routine Activity Theory Based Mitigation Approach.},
year = {2019},
booktitle = {NCS},
author = {{Alan Roder} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {National Cyber Summit, NCS 2019, Research Track, Huntsville, AL, USA, 4-6 June, 2019}
}
@inproceedings{conf/nss/DiederichsenCL19,
title = {A Graph Database-Based Approach to Analyze Network Log Files.},
year = {2019},
booktitle = {NSS},
author = {{Lars Diederichsen} and {Kim-Kwang Raymond Choo} and {Nhien-An Le-Khac}},
publisher = {Springer},
booktitle = {Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings}
}
@inproceedings{conf/trustcom/HuangX0QC19,
title = {Deep Android Malware Classification with API-Based Feature Graph.},
year = {2019},
booktitle = {TrustCom/BigDataSE},
author = {{Na Huang} and {Ming Xu 001} and {Ning Zheng 001} and {Tong Qiao} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 13th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}
}
@article{journals/access/Al-KadiMTC19,
title = {Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers.},
year = {2019},
journal = {IEEE Access},
author = {{Osama Al-Kadi} and {Nour Moustafa} and {Benjamin P. Turnbull} and {Kim-Kwang Raymond Choo}}
}
@article{journals/access/AlladiCPC19,
title = {Blockchain Applications for Industry 4.0 and Industrial IoT: A Review.},
year = {2019},
journal = {IEEE Access},
author = {{Tejasvi Alladi} and {Vinay Chamola} and {Reza M. Parizi} and {Kim-Kwang Raymond Choo}}
}
@article{journals/access/ChiaraviglioDCC19,
title = {Joint Optimization of Area Throughput and Grid-Connected Microgeneration in UAV-Based Mobile Networks.},
year = {2019},
journal = {IEEE Access},
author = {{Luca Chiaraviglio} and {Fabio D'Andreagiovanni} and {Kim-Kwang Raymond Choo} and {Francesca Cuomo} and {Stefania Colonnese}}
}
@article{journals/access/KarimipourDPCL19,
title = {A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids.},
year = {2019},
journal = {IEEE Access},
author = {{Hadis Karimipour} and {Ali Dehghantanha} and {Reza M. Parizi} and {Kim-Kwang Raymond Choo} and {Henry Leung}}
}
@article{journals/access/RadwanMKCG19,
title = {Hierarchical Adversarial Network for Human Pose Estimation.},
year = {2019},
journal = {IEEE Access},
author = {{Ibrahim Radwan} and {Nour Moustafa} and {Byron W. Keating} and {Kim-Kwang Raymond Choo} and {Roland Goecke}}
}
@article{journals/access/ShiZC19,
title = {Detecting Malicious Social Bots Based on Clickstream Sequences.},
year = {2019},
journal = {IEEE Access},
author = {{Peining Shi} and {Zhiyong Zhang 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/access/UsmanJACUSIA19,
title = {A Novel Internet of Things-Centric Framework to Mine Malicious Frequent Patterns.},
year = {2019},
journal = {IEEE Access},
author = {{Nighat Usman} and {Qaisar Javaid} and {Adnan Akhunzada} and {Kim-Kwang Raymond Choo} and {Saeeda Usman} and {Asma Sher} and {Manzoor Ilahi} and {Masoom Alam}}
}
@article{journals/access/WuYCY19,
title = {IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management.},
year = {2019},
journal = {IEEE Access},
author = {{Yulei Wu} and {Zheng Yan 002} and {Kim-Kwang Raymond Choo} and {Laurence T. Yang}}
}
@article{journals/access/ZhangSCFWZZ19,
title = {A Novel Social Situation Analytics-Based Recommendation Algorithm for Multimedia Social Networks.},
year = {2019},
journal = {IEEE Access},
author = {{Zhiyong Zhang 002} and {Ranran Sun} and {Kim-Kwang Raymond Choo} and {Kefeng Fan} and {Wei Wu} and {Manhua Zhang} and {Changwei Zhao}}
}
@article{journals/access/ZollnerCL19,
title = {An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems.},
year = {2019},
journal = {IEEE Access},
author = {{Stephan Zollner} and {Kim-Kwang Raymond Choo} and {Nhien-An Le-Khac}}
}
@article{journals/cee/McKinnelDDC19,
title = {A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment.},
year = {2019},
journal = {Comput. Electr. Eng.},
author = {{Dean Richard McKinnel} and {Tooska Dargahi} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cee/MengJCWJ19,
title = {Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones.},
year = {2019},
journal = {Comput. Electr. Eng.},
author = {{Weizhi Meng 001} and {Lijun Jiang} and {Kim-Kwang Raymond Choo} and {Yu Wang 017} and {Chong Jiang}}
}
@article{journals/cee/MiHWHC19,
title = {A post-quantum light weight 1-out-n oblivious transfer protocol.},
year = {2019},
journal = {Comput. Electr. Eng.},
author = {{Bo Mi} and {Darong Huang} and {Shaohua Wan 001} and {Yu Hu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cem/HuHZC19,
title = {Parking Management: A Blockchain-Based Privacy-Preserving System.},
year = {2019},
journal = {IEEE Consumer Electron. Mag.},
author = {{Jiaxi Hu} and {Debiao He} and {Qinglan Zhao} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/ChaudharyJAAKC19,
title = {BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system.},
year = {2019},
journal = {Comput. Secur.},
author = {{Rajat Chaudhary} and {Anish Jindal} and {Gagangeet Singh Aujla} and {Shubhani Aggarwal} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/concurrency/BahramiJDDC19,
title = {A hierarchical key pre-distribution scheme for fog networks.},
year = {2019},
journal = {Concurr. Comput. Pract. Exp.},
author = {{Pooneh Nikkhah Bahrami} and {Hamid H. S. Javadi} and {Tooska Dargahi} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/concurrency/BewongLLLC19,
title = {A relative privacy model for effective privacy preservation in transactional data.},
year = {2019},
journal = {Concurr. Comput. Pract. Exp.},
author = {{Michael Bewong} and {Jixue Liu} and {Lin Liu 003} and {Jiuyong Li} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/abs-1904-05023,
title = {Designing Sensing as a Service (S2aaS) Ecosystem for Internet of Things.},
year = {2019},
journal = {CoRR},
author = {{Charith Perera} and {Mahmoud Barhamgi} and {Suparna De} and {Tim Baarslag} and {Massimo Vecchio} and {Kim-Kwang Raymond Choo}}
}
@article{journals/di/PourBVNPC19,
title = {Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns.},
year = {2019},
journal = {Digit. Investig.},
author = {{Morteza Safaei Pour} and {Elias Bou-Harb} and {Kavita Varma} and {Nataliia Neshenko} and {Dimitris A. Pados} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/ChenLCCZ19,
title = {Blockchain based searchable encryption for electronic health record sharing.},
year = {2019},
journal = {Future Gener. Comput. Syst.},
author = {{Lanxiang Chen} and {Wai-Kong Lee} and {Chin-Chen Chang 001} and {Kim-Kwang Raymond Choo} and {Nan Zhang}}
}
@article{journals/fgcs/DasRCNLM19,
title = {Distributed machine learning cloud teleophthalmology IoT for predicting AMD disease progression.},
year = {2019},
journal = {Future Gener. Comput. Syst.},
author = {{Arun Das 001} and {Paul Rad} and {Kim-Kwang Raymond Choo} and {Babak Nouhi} and {Jonathan Lish} and {James Martel}}
}
@article{journals/fgcs/HomayounDAHKCN19,
title = {DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer.},
year = {2019},
journal = {Future Gener. Comput. Syst.},
author = {{Sajad Homayoun} and {Ali Dehghantanha} and {Marzieh Ahmadzadeh} and {Sattar Hashemi} and {Raouf Khayami} and {Kim-Kwang Raymond Choo} and {David Ellis Newton}}
}
@article{journals/fgcs/JieCLCG19,
title = {Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model.},
year = {2019},
journal = {Future Gener. Comput. Syst.},
author = {{Yingmo Jie} and {Kim-Kwang Raymond Choo} and {Mingchu Li} and {Ling Chen} and {Cheng Guo 001}}
}
@article{journals/fgcs/NoorAAC19,
title = {A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise.},
year = {2019},
journal = {Future Gener. Comput. Syst.},
author = {{Umara Noor} and {Zahid Anwar} and {Tehmina Amjad} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/VoletySMLC19,
title = {Cracking Bitcoin wallets: I want what you have in the wallets.},
year = {2019},
journal = {Future Gener. Comput. Syst.},
author = {{Tejaswi Volety} and {Shalabh Saini} and {Thomas McGhin} and {Charles Zhechao Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/WanZWGAC19,
title = {Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things.},
year = {2019},
journal = {Future Gener. Comput. Syst.},
author = {{Shaohua Wan 001} and {Yu Zhao 009} and {Tian Wang 001} and {Zonghua Gu 001} and {Qammer H. Abbasi} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/ZhuWGC19,
title = {Controllable and trustworthy blockchain-based cloud data management.},
year = {2019},
journal = {Future Gener. Comput. Syst.},
author = {{Liehuang Zhu} and {Yulu Wu} and {Keke Gai} and {Kim-Kwang Raymond Choo}}
}
@article{journals/hcis/ZengCC19,
title = {An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case.},
year = {2019},
journal = {Hum. centric Comput. Inf. Sci.},
author = {{Peng Zeng 002} and {Siyuan Chen} and {Kim-Kwang Raymond Choo}}
}
@article{journals/ijfcs/WuZCH19,
title = {Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks.},
year = {2019},
journal = {Int. J. Found. Comput. Sci.},
author = {{Libing Wu} and {Yubo Zhang 003} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/iotj/BanerjeeODSKCC19,
title = {A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Soumya Banerjee 001} and {Vanga Odelu} and {Ashok Kumar Das} and {Jangirala Srinivas} and {Neeraj Kumar 001} and {Samiran Chattopadhyay} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/ChengZWC19,
title = {Deep Belief Network for Meteorological Time Series Prediction in the Internet of Things.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Yong Cheng} and {Xiangyu Zhou} and {Shaohua Wan 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/EspositoCFCYC19,
title = {On Data Sovereignty in Cloud-Based Computation Offloading for Smart Cities Applications.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Christian Esposito 001} and {Aniello Castiglione} and {Flavio Frattini} and {Marcello Cinque} and {Yanjiang Yang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/GaoXZWC19,
title = {Adaptive Fusion and Category-Level Dictionary Learning Model for Multiview Human Action Recognition.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Zan Gao} and {Hai-Zhen Xuan} and {Hua Zhang 003} and {Shaohua Wan 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/GuoZJCT19,
title = {Secure Range Search Over Encrypted Uncertain IoT Outsourced Data.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Cheng Guo 001} and {Ruhan Zhuang} and {Yingmo Jie} and {Kim-Kwang Raymond Choo} and {Xinyu Tang}}
}
@article{journals/iotj/GuoZSLC19,
title = {Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Cheng Guo 001} and {Ruhan Zhuang} and {Chunhua Su} and {Charles Zhechao Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/LiCSBC19,
title = {IoT Forensics: Amazon Echo as a Use Case.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Shancang Li} and {Kim-Kwang Raymond Choo} and {Qindong Sun} and {William J. Buchanan} and {Jiuxin Cao}}
}
@article{journals/iotj/LiJCH19,
title = {CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Jiliang Li} and {Yusheng Ji} and {Kim-Kwang Raymond Choo} and {Dieter Hogrefe}}
}
@article{journals/iotj/MaHWKC19,
title = {An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Mimi Ma} and {Debiao He} and {Huaqun Wang} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/MiaoLCDWL19,
title = {Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Yinbin Miao} and {Ximeng Liu} and {Kim-Kwang Raymond Choo} and {Robert H. Deng} and {Hongjun Wu 001} and {Hongwei Li 001}}
}
@article{journals/iotj/MiaoTCLDL19,
title = {Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Yinbin Miao} and {Qiuyun Tong} and {Kim-Kwang Raymond Choo} and {Ximeng Liu} and {Robert H. Deng} and {Hongwei Li 001}}
}
@article{journals/iotj/MoustafaTC19,
title = {An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Nour Moustafa} and {Benjamin P. Turnbull} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/QinHZCZQC19,
title = {Learning-Aided User Identification Using Smartphone Sensors for Smart Homes.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Zhen Qin 002} and {Lingzhou Hu} and {Ning Zhang 007} and {Dajiang Chen} and {Kuan Zhang 001} and {Zhiguang Qin} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/ZhangCB19,
title = {How Do I Share My IoT Forensic Experience With the Broader Community? An Automated Knowledge Sharing IoT Forensic Platform.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Xiaolu Zhang} and {Kim-Kwang Raymond Choo} and {Nicole Lang Beebe}}
}
@article{journals/isci/DingYCWJ19,
title = {Privacy preserving similarity joins using MapReduce.},
year = {2019},
journal = {Inf. Sci.},
author = {{Xiaofeng Ding 001} and {Wanlu Yang} and {Kim-Kwang Raymond Choo} and {Xiaoli Wang} and {Hai Jin 001}}
}
@article{journals/isci/DouTLYC19,
title = {A heuristic line piloting method to disclose malicious taxicab driver's privacy over GPS big data.},
year = {2019},
journal = {Inf. Sci.},
author = {{Wanchun Dou} and {Wenda Tang} and {Shu Li} and {Shui Yu 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/isci/KanwalSAMCKAAK19,
title = {Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes.},
year = {2019},
journal = {Inf. Sci.},
author = {{Tehsin Kanwal} and {Sayed Ali Asjad Shaukat} and {Adeel Anjum} and {Saif Ur Rehman Malik} and {Kim-Kwang Raymond Choo} and {Abid Khan} and {Naveed Ahmad 001} and {Mansoor Ahmad} and {Samee U. Khan}}
}
@article{journals/isci/PunithavathiGKI19,
title = {A lightweight machine learning-based authentication framework for smart IoT devices.},
year = {2019},
journal = {Inf. Sci.},
author = {{P. Punithavathi} and {S. Geetha 001} and {Marimuthu Karuppiah} and {SK Hafizul Islam} and {Mohammad Mehedi Hassan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/isci/SelvakumarKRIHF19,
title = {Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs.},
year = {2019},
journal = {Inf. Sci.},
author = {{K. Selvakumar 001} and {Marimuthu Karuppiah} and {L. Sai Ramesh} and {SK Hafizul Islam} and {Mohammad Mehedi Hassan} and {Giancarlo Fortino} and {Kim-Kwang Raymond Choo}}
}
@article{journals/isci/ZhengLLSYC19,
title = {Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data.},
year = {2019},
journal = {Inf. Sci.},
author = {{Yandong Zheng} and {Rongxing Lu} and {Beibei Li 002} and {Jun Shao 001} and {Haomiao Yang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/isci/ZhouSSLC19,
title = {Game theoretic security of quantum bit commitment.},
year = {2019},
journal = {Inf. Sci.},
author = {{Lu Zhou 002} and {Xin Sun 001} and {Chunhua Su} and {Zhe Liu 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/itiis/WuWGSTC19,
title = {Convolutional Neural Network with Expert Knowledge for Hyperspectral Remote Sensing Imagery Classification.},
year = {2019},
journal = {KSII Trans. Internet Inf. Syst.},
author = {{Chunming Wu 002} and {Meng Wang} and {Lang Gao} and {Weijing Song} and {Tian Tian} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jcss/ChooAI19,
title = {Special issue on cybersecurity in the critical infrastructure: Advances and future directions.},
year = {2019},
journal = {J. Comput. Syst. Sci.},
author = {{Kim-Kwang Raymond Choo} and {Jemal H. Abawajy} and {Md. Rafiqul Islam 001}}
}
@article{journals/jips/BahramiDDPCJ19,
title = {Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures.},
year = {2019},
journal = {J. Inf. Process. Syst.},
author = {{Pooneh Nikkhah Bahrami} and {Ali Dehghantanha} and {Tooska Dargahi} and {Reza M. Parizi} and {Kim-Kwang Raymond Choo} and {Hamid H. S. Javadi}}
}
@article{journals/jnca/AggarwalCAKCZ19,
title = {Blockchain for smart communities: Applications, challenges and opportunities.},
year = {2019},
journal = {J. Netw. Comput. Appl.},
author = {{Shubhani Aggarwal} and {Rajat Chaudhary} and {Gagangeet Singh Aujla} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo} and {Albert Y. Zomaya}}
}
@article{journals/jnca/GuriPCRKE19,
title = {Using malware for the greater good: Mitigating data leakage.},
year = {2019},
journal = {J. Netw. Comput. Appl.},
author = {{Mordechai Guri} and {Rami Puzis} and {Kim-Kwang Raymond Choo} and {Sergey Rubinshtein} and {Gabi Kedma} and {Yuval Elovici}}
}
@article{journals/jnca/KumariTTKPC19,
title = {Fog data analytics: A taxonomy and process model.},
year = {2019},
journal = {J. Netw. Comput. Appl.},
author = {{Aparna Kumari} and {Sudeep Tanwar} and {Sudhanshu Tyagi} and {Neeraj Kumar 001} and {Reza M. Parizi} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jnca/LiZDCKH19,
title = {AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities.},
year = {2019},
journal = {J. Netw. Comput. Appl.},
author = {{JiLiang Li} and {WeiGuo Zhang 001} and {Vivek Dabra} and {Kim-Kwang Raymond Choo} and {Saru Kumari} and {Dieter Hogrefe}}
}
@article{journals/jnca/McGhinCLH19,
title = {Blockchain in healthcare applications: Research challenges and opportunities.},
year = {2019},
journal = {J. Netw. Comput. Appl.},
author = {{Thomas McGhin} and {Kim-Kwang Raymond Choo} and {Charles Zhechao Liu} and {Debiao He}}
}
@article{journals/jnca/ParraRC19,
title = {Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities.},
year = {2019},
journal = {J. Netw. Comput. Appl.},
author = {{Gonzalo De La Torre Parra} and {Paul Rad} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jpdc/LiWKXSC19,
title = {A provably secure and anonymous message authentication scheme for smart grids.},
year = {2019},
journal = {J. Parallel Distributed Comput.},
author = {{Xiong Li 002} and {Fan Wu 003} and {Saru Kumari} and {Lili Xu} and {Arun Kumar Sangaiah} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jpdc/SilvaRBCU19,
title = {Cooperative unmanned aerial vehicles with privacy preserving deep vision for real-time object identification and tracking.},
year = {2019},
journal = {J. Parallel Distributed Comput.},
author = {{Samuel Henrique Silva} and {Paul Rad} and {Nicole Beebe} and {Kim-Kwang Raymond Choo} and {Mahesh Umapathy}}
}
@article{journals/jpdc/ZhangLJGCMDC19,
title = {Privacy-aware smart city: A case study in collaborative filtering recommender systems.},
year = {2019},
journal = {J. Parallel Distributed Comput.},
author = {{Feng Zhang 012} and {Victor E. Lee} and {Ruoming Jin} and {Saurabh Garg 001} and {Kim-Kwang Raymond Choo} and {Michele Maasberg} and {Lijun Dong} and {Chi Cheng}}
}
@article{journals/monet/FuentesGLPC19,
title = {Editorial: Security and Privacy in Internet of Things.},
year = {2019},
journal = {Mob. Networks Appl.},
author = {{José María de Fuentes} and {Lorena González-Manzano} and {Javier López 001} and {Pedro Peris-Lopez} and {Kim-Kwang Raymond Choo}}
}
@article{journals/monet/HuYZZC19,
title = {A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method.},
year = {2019},
journal = {Mob. Networks Appl.},
author = {{Weitong Hu} and {Ye Yao} and {Di Zhou} and {Qiuhua Zheng} and {Kim-Kwang Raymond Choo}}
}
@article{journals/mta/SongWLC19,
title = {Improved t-SNE based manifold dimensional reduction for remote sensing data processing.},
year = {2019},
journal = {Multim. Tools Appl.},
author = {{Weijing Song} and {Lizhe Wang 001} and {Peng Liu 024} and {Kim-Kwang Raymond Choo}}
}
@article{journals/scn/LiHCH19,
title = {A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks.},
year = {2019},
journal = {Secur. Commun. Networks},
author = {{Quanrun Li} and {Ching-Fang Hsu 001} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/soco/PauCMC19,
title = {A fuzzy-PSO system for indoor localization based on visible light communications.},
year = {2019},
journal = {Soft Comput.},
author = {{Giovanni Pau 002} and {Mario Collotta} and {Vincenzo Maniscalco} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tbd/ChooCD19,
title = {Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1.},
year = {2019},
journal = {IEEE Trans. Big Data},
author = {{Kim-Kwang Raymond Choo} and {Mauro Conti} and {Ali Dehghantanha}}
}
@article{journals/tbd/ChooCD19a,
title = {Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2.},
year = {2019},
journal = {IEEE Trans. Big Data},
author = {{Kim-Kwang Raymond Choo} and {Mauro Conti} and {Ali Dehghantanha}}
}
@article{journals/tcps/LiLCWL19,
title = {On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach.},
year = {2019},
journal = {ACM Trans. Cyber Phys. Syst.},
author = {{Beibei Li 002} and {Rongxing Lu} and {Kim-Kwang Raymond Choo} and {Wei Wang 100} and {Sheng Luo 001}}
}
@article{journals/tcps/YangFSLC19,
title = {A Crowdsensing-based Cyber-physical System for Drone Surveillance Using Random Finite Set Theory.},
year = {2019},
journal = {ACM Trans. Cyber Phys. Syst.},
author = {{Chaoqun Yang} and {Li Feng 001} and {Zhiguo Shi 001} and {Rongxing Lu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tdsc/LiYMSNC19,
title = {Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems.},
year = {2019},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Yannan Li} and {Yong Yu 002} and {Geyong Min} and {Willy Susilo} and {Jianbing Ni} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tdsc/LiuSCCK19,
title = {Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things.},
year = {2019},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Zhe Liu 001} and {Hwajeong Seo} and {Aniello Castiglione} and {Kim-Kwang Raymond Choo} and {Howon Kim 001}}
}
@article{journals/tetc/PajouhJKDC19,
title = {A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks.},
year = {2019},
journal = {IEEE Trans. Emerg. Top. Comput.},
author = {{Hamed Haddad Pajouh} and {Reza Javidan} and {Raouf Khayami} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/CasinoCP19,
title = {HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets.},
year = {2019},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Fran Casino} and {Kim-Kwang Raymond Choo} and {Constantinos Patsakis}}
}
@article{journals/tifs/MoustafaCRC19,
title = {Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog.},
year = {2019},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Nour Moustafa} and {Kim-Kwang Raymond Choo} and {Ibrahim Radwan} and {Seyit Camtepe}}
}
@article{journals/tifs/WuWCH19,
title = {Secure Key Agreement and Key Protection for Mobile Device User Authentication.},
year = {2019},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Libing Wu} and {Jing Wang 036} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/tii/SharmaYJGC19,
title = {Neural-Blockchain-Based Ultrareliable Caching for Edge-Enabled UAV Networks.},
year = {2019},
journal = {IEEE Trans. Ind. Informatics},
author = {{Vishal Sharma 001} and {Ilsun You} and {Dushantha Nalin K. Jayakody} and {Daniel Gutiérrez-Reina} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tii/SinghGKBKC19,
title = {Fuzzy-Folded Bloom Filter-as-a-Service for Big Data Storage in the Cloud.},
year = {2019},
journal = {IEEE Trans. Ind. Informatics},
author = {{Amritpal Singh} and {Sahil Garg} and {Kuljeet Kaur} and {Shalini Batra} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/titb/AminIGCT19,
title = {Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System.},
year = {2019},
journal = {IEEE J. Biomed. Health Informatics},
author = {{Ruhul Amin 001} and {SK Hafizul Islam} and {Prosanta Gope} and {Kim-Kwang Raymond Choo} and {Nachiket Tapas}}
}
@article{journals/tjs/PanwarRCR19,
title = {Are you emotional or depressed? Learning about your emotional state from your music using machine learning.},
year = {2019},
journal = {J. Supercomput.},
author = {{Sharaj Panwar} and {Paul Rad} and {Kim-Kwang Raymond Choo} and {Mehdi Roopaei}}
}
@article{journals/tsusc/AzmoodehDC19,
title = {Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning.},
year = {2019},
journal = {IEEE Trans. Sustain. Comput.},
author = {{Amin Azmoodeh} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tsusc/TeingDCMA19,
title = {Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study.},
year = {2019},
journal = {IEEE Trans. Sustain. Comput.},
author = {{Yee-Yang Teing} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo} and {Zaiton Muda} and {Mohd Taufik Abdullah}}
}
@article{journals/vcomm/ZhangLLACCT19,
title = {Blockchain based secure data sharing system for Internet of vehicles: A position paper.},
year = {2019},
journal = {Veh. Commun.},
author = {{Lei Zhang 009} and {Mingxing Luo} and {Jiangtao Li 003} and {Man Ho Au} and {Kim-Kwang Raymond Choo} and {Tong Chen} and {Shengwei Tian}}
}
@article{journals/winet/JiaHKC19,
title = {Authenticated key agreement scheme for fog-driven IoT healthcare system.},
year = {2019},
journal = {Wirel. Networks},
author = {{Xiaoying Jia 002} and {Debiao He} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo}}
}
@incollection{books/sp/20/BoytonLCJ20,
title = {Forensic Investigation of Ransomware Activities - Part 2.},
year = {2020},
booktitle = {Cyber and Digital Forensic Investigations},
author = {{Christopher Boyton} and {Nhien-An Le-Khac} and {Kim-Kwang Raymond Choo} and {Anca Jurcut}},
publisher = {Springer},
booktitle = {Cyber and Digital Forensic Investigations, A Law Enforcement Practitioner's Perspective.}
}
@incollection{books/sp/20/GommBCLH20,
title = {CCTV Forensics in the Big Data Era: Challenges and Approaches.},
year = {2020},
booktitle = {Cyber and Digital Forensic Investigations},
author = {{Richard Gomm} and {Ryan Brooks} and {Kim-Kwang Raymond Choo} and {Nhien-An Le-Khac} and {Kien Wooi Hew}},
publisher = {Springer},
booktitle = {Cyber and Digital Forensic Investigations, A Law Enforcement Practitioner's Perspective.}
}
@incollection{books/sp/20/HilgenbergDLC20,
title = {Digital Forensic Investigation of Internet of Thing Devices: A Proposed Model and Case Studies.},
year = {2020},
booktitle = {Cyber and Digital Forensic Investigations},
author = {{Alexander Hilgenberg} and {Trung Q. Duong} and {Nhien-An Le-Khac} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Cyber and Digital Forensic Investigations, A Law Enforcement Practitioner's Perspective.}
}
@incollection{books/sp/20/KinderCL20,
title = {Towards an Automated Process to Categorise Tor's Hidden Services.},
year = {2020},
booktitle = {Cyber and Digital Forensic Investigations},
author = {{Andrew Kinder} and {Kim-Kwang Raymond Choo} and {Nhien-An Le-Khac}},
publisher = {Springer},
booktitle = {Cyber and Digital Forensic Investigations, A Law Enforcement Practitioner's Perspective.}
}
@incollection{books/sp/20/Le-KhacC20,
title = {The Increasing Importance of Digital Forensics and Investigations in Law Enforcement, Government and Commercial Sectors.},
year = {2020},
booktitle = {Cyber and Digital Forensic Investigations},
author = {{Nhien-An Le-Khac} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Cyber and Digital Forensic Investigations, A Law Enforcement Practitioner's Perspective.}
}
@incollection{books/sp/20/Le-KhacC20a,
title = {So, What's Next?},
year = {2020},
booktitle = {Cyber and Digital Forensic Investigations},
author = {{Nhien-An Le-Khac} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Cyber and Digital Forensic Investigations, A Law Enforcement Practitioner's Perspective.}
}
@incollection{books/sp/20/OSullivanCL20,
title = {Defending IoT Devices from Malware.},
year = {2020},
booktitle = {Cyber and Digital Forensic Investigations},
author = {{William O'Sullivan} and {Kim-Kwang Raymond Choo} and {Nhien-An Le-Khac}},
publisher = {Springer},
booktitle = {Cyber and Digital Forensic Investigations, A Law Enforcement Practitioner's Perspective.}
}
@incollection{books/sp/20/RedmondTCL20,
title = {Long Term Evolution Network Security and Real-Time Data Extraction.},
year = {2020},
booktitle = {Cyber and Digital Forensic Investigations},
author = {{Neil Redmond} and {Le-Nam Tran} and {Kim-Kwang Raymond Choo} and {Nhien-An Le-Khac}},
publisher = {Springer},
booktitle = {Cyber and Digital Forensic Investigations, A Law Enforcement Practitioner's Perspective.}
}
@incollection{books/sp/20/SchlepphorstCL20,
title = {Digital Forensic Approaches for Cloud Service Models: A Survey.},
year = {2020},
booktitle = {Cyber and Digital Forensic Investigations},
author = {{Sebastian Schlepphorst} and {Kim-Kwang Raymond Choo} and {Nhien-An Le-Khac}},
publisher = {Springer},
booktitle = {Cyber and Digital Forensic Investigations, A Law Enforcement Practitioner's Perspective.}
}
@incollection{books/sp/20/StandareHLC20,
title = {Forensic Investigation of PayPal Accounts.},
year = {2020},
booktitle = {Cyber and Digital Forensic Investigations},
author = {{Lars Standare} and {Darren R. Hayes} and {Nhien-An Le-Khac} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Cyber and Digital Forensic Investigations, A Law Enforcement Practitioner's Perspective.}
}
@incollection{books/sp/20/VeldhuizenLCL20,
title = {The Bitcoin-Network Protocol from a Forensic Perspective.},
year = {2020},
booktitle = {Cyber and Digital Forensic Investigations},
author = {{Cornelis Leendert van Veldhuizen} and {Madhusanka Liyanage} and {Kim-Kwang Raymond Choo} and {Nhien-An Le-Khac}},
publisher = {Springer},
booktitle = {Cyber and Digital Forensic Investigations, A Law Enforcement Practitioner's Perspective.}
}
@incollection{books/sp/20/YoungMLC20,
title = {Forensic Investigation of Ransomware Activities - Part 1.},
year = {2020},
booktitle = {Cyber and Digital Forensic Investigations},
author = {{Cian Young} and {Robert McArdle} and {Nhien-An Le-Khac} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Cyber and Digital Forensic Investigations, A Law Enforcement Practitioner's Perspective.}
}
@incollection{books/sp/20/ZhangC20,
title = {The Way Forward.},
year = {2020},
booktitle = {Digital Forensic Education},
author = {{Xiaolu Zhang} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Digital Forensic Education, An Experiential Learning Approach.}
}
@incollection{books/sp/20/ZhangYC20,
title = {Experiential Learning in Digital Forensics.},
year = {2020},
booktitle = {Digital Forensic Education},
author = {{Xiaolu Zhang} and {Timothy T. Yuen} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Digital Forensic Education, An Experiential Learning Approach.}
}
@inproceedings{conf/cisis-spain/AlabdulsalamDCL20,
title = {Evidence Identification and Acquisition Based on Network Link in an Internet of Things Environment.},
year = {2020},
booktitle = {CISIS},
author = {{Saad Khalid Alabdulsalam} and {Trung Q. Duong} and {Kim-Kwang Raymond Choo} and {Nhien-An Le-Khac}},
publisher = {Springer},
booktitle = {13th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2020, Burgos, Spain, September 2020.}
}
@inproceedings{conf/csonet/HakakKBRC20,
title = {Propagation of Fake News on Social Media: Challenges and Opportunities.},
year = {2020},
booktitle = {CSoNet},
author = {{Saqib Hakak} and {Wazir Zada Khan} and {Sweta Bhattacharya} and {G. Thippa Reddy} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Computational Data and Social Networks - 9th International Conference, CSoNet 2020, Dallas, TX, USA, December 11-13, 2020, Proceedings}
}
@inproceedings{conf/ecis/VempralaLC20,
title = {How Helpful are Comparative Reviews for Predicting Product demand?},
year = {2020},
booktitle = {ECIS},
author = {{Naga Vemprala} and {Charles Zhechao Liu} and {Kim-Kwang Raymond Choo}},
booktitle = {28th European Conference on Information Systems - Liberty, Equality, and Fraternity in a Digitizing World, ECIS 2020, Marrakech, Morocco, June 15-17, 2020}
}
@inproceedings{conf/globecom/NayakAMC20,
title = {Blockchain-Based Programmable Fog Architecture for Future Internet of Things Applications.},
year = {2020},
booktitle = {GLOBECOM},
author = {{Sharmistha Nayak} and {Nurzaman Ahmed} and {Sudip Misra} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {IEEE Global Communications Conference, GLOBECOM 2020, Virtual Event, Taiwan, December 7-11, 2020}
}
@inproceedings{conf/hicss/ChooD20,
title = {Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics.},
year = {2020},
booktitle = {HICSS},
author = {{Kim-Kwang Raymond Choo} and {Ali Dehghantanha}},
publisher = {ScholarSpace},
booktitle = {53rd Hawaii International Conference on System Sciences, HICSS 2020, Maui, Hawaii, USA, January 7-10, 2020}
}
@inproceedings{conf/hicss/GlissonGC20,
title = {Introduction to the Minitrack on Cybersecurity Investigations and Digital Forensics.},
year = {2020},
booktitle = {HICSS},
author = {{William Bradley Glisson} and {George Grispos} and {Kim-Kwang Raymond Choo}},
publisher = {ScholarSpace},
booktitle = {53rd Hawaii International Conference on System Sciences, HICSS 2020, Maui, Hawaii, USA, January 7-10, 2020}
}
@inproceedings{conf/icess/ZhangXWGCD020,
title = {Efficient and Intelligent Attack Detection in Software Defined IoT Networks.},
year = {2020},
booktitle = {ICESS},
author = {{Yuntong Zhang 001} and {Jingye Xu} and {Zhiwei Wang} and {Rong Geng} and {Kim-Kwang Raymond Choo} and {Jesús Arturo Pérez Díaz} and {Dakai Zhu 001}},
publisher = {IEEE},
booktitle = {2020 IEEE International Conference on Embedded Software and Systems, ICESS 2020, Shanghai, China, December 10-11, 2020}
}
@inproceedings{conf/icphys/AlthubaityGCNA020,
title = {Specification-based Distributed Detection of Rank-related Attacks in RPL-based Resource-Constrained Real-Time Wireless Networks.},
year = {2020},
booktitle = {ICPS},
author = {{Areej Althubaity} and {Tao Gong} and {Kim-Kwang Raymond Choo} and {Mark Nixon} and {Reda Ammar} and {Song Han 002}},
publisher = {IEEE},
booktitle = {IEEE Conference on Industrial Cyberphysical Systems, ICPS 2020, Tampere, Finland, June 10-12, 2020}
}
@inproceedings{conf/socialsec/ZhangLC0H20,
title = {Efficient and Secure Two-Party Distributed Signing Protocol for the GOST Signature Algorithm.},
year = {2020},
booktitle = {SocialSec},
author = {{Yunru Zhang} and {Min Luo 002} and {Kim-Kwang Raymond Choo} and {Li Li 073} and {Debiao He}},
publisher = {Springer},
booktitle = {Security and Privacy in Social Networks and Big Data - 6th International Symposium, SocialSec 2020, Tianjin, China, September 26-27, 2020, Proceedings}
}
@inproceedings{conf/trustcom/FengHLLC20,
title = {Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency.},
year = {2020},
booktitle = {TrustCom},
author = {{Qi Feng} and {Debiao He} and {Min Luo 002} and {Zengxiang Li} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}
}
@article{journals/access/Al-DhaqmRDCSIAK20,
title = {Categorization and Organization of Database Forensic Investigation Processes.},
year = {2020},
journal = {IEEE Access},
author = {{Arafat Mohammed Rashad Al-Dhaqm} and {Shukor Abd Razak} and {David A. Dampier} and {Kim-Kwang Raymond Choo} and {Kamran Siddique} and {Adeyemi Richard Ikuesan} and {Abdulhadi Alqarni} and {Victor R. Kebande}}
}
@article{journals/access/ChenWLCH20,
title = {A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing.},
year = {2020},
journal = {IEEE Access},
author = {{Biwen Chen} and {Libing Wu} and {Li Li 073} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/access/DiazVCZ20,
title = {A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning.},
year = {2020},
journal = {IEEE Access},
author = {{Jesús Arturo Pérez Díaz} and {Ismael Amezcua Valdovinos} and {Kim-Kwang Raymond Choo} and {Dakai Zhu 001}}
}
@article{journals/access/HaiderAMPFCI20,
title = {A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks.},
year = {2020},
journal = {IEEE Access},
author = {{Shahzeb Haider} and {Adnan Akhunzada} and {Iqra Mustafa} and {Tanil Bharat Patel} and {Amanda S. Fernandez} and {Kim-Kwang Raymond Choo} and {Javed Iqbal}}
}
@article{journals/access/HakakKICS20,
title = {Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies.},
year = {2020},
journal = {IEEE Access},
author = {{Saqib Hakak} and {Wazir Zada Khan} and {Muhammad Imran 001} and {Kim-Kwang Raymond Choo} and {Muhammad Shoaib 005}}
}
@article{journals/access/LiCTHHQ20,
title = {IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities.},
year = {2020},
journal = {IEEE Access},
author = {{Shancang Li} and {Kim-Kwang Raymond Choo} and {Zhiyuan Tan 001} and {Xiangjian He} and {Jiankun Hu} and {Tao Qin 002}}
}
@article{journals/access/Loyola-Gonzalez20a,
title = {A Contrast Pattern-Based Scientometric Study of the QS World University Ranking.},
year = {2020},
journal = {IEEE Access},
author = {{Octavio Loyola-González} and {Miguel Angel Medina-Pérez} and {Raymundo Adrián Coronilla Valdez} and {Kim-Kwang Raymond Choo}}
}
@article{journals/access/WangXCZWL20,
title = {Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage.},
year = {2020},
journal = {IEEE Access},
author = {{Feng Wang 020} and {Li Xu 002} and {Kim-Kwang Raymond Choo} and {Yuexin Zhang} and {Huaqun Wang} and {Jiguo Li 001}}
}
@article{journals/amc/JieLLCCG20,
title = {Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving.},
year = {2020},
journal = {Appl. Math. Comput.},
author = {{Yingmo Jie} and {Charles Zhechao Liu} and {Mingchu Li} and {Kim-Kwang Raymond Choo} and {Ling Chen} and {Cheng Guo 001}}
}
@article{journals/cee/WanUC20,
title = {Introduction to the special section on blockchain technologies for industrial Internet of Things (SI-bciot).},
year = {2020},
journal = {Comput. Electr. Eng.},
author = {{Shaohua Wan 001} and {Tariq Umer} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cem/AlladiCSC20,
title = {Consumer IoT: Security Vulnerability Case Studies and Solutions.},
year = {2020},
journal = {IEEE Consumer Electron. Mag.},
author = {{Tejasvi Alladi} and {Vinay Chamola} and {Biplab Sikdar 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/chb/JozaniAKC20,
title = {Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective.},
year = {2020},
journal = {Comput. Hum. Behav.},
author = {{Mohsen M. Jozani} and {Emmanuel Ayaburi} and {Myung Ko 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/chinaf/LinHZKC20,
title = {SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system.},
year = {2020},
journal = {Sci. China Inf. Sci.},
author = {{Chao Lin} and {Debiao He} and {Sherali Zeadally} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/chinaf/RenJWYCW20,
title = {An eigenvalue-based immunization scheme for node attacks in networks with uncertainty.},
year = {2020},
journal = {Sci. China Inf. Sci.},
author = {{Yizhi Ren} and {Mengjin Jiang} and {Ting Wu 001} and {Ye Yao} and {Kim-Kwang Raymond Choo} and {Zhen Wang 013}}
}
@article{journals/clsr/GravesGC20,
title = {LinkedLegal: Investigating social media as evidence in courtrooms.},
year = {2020},
journal = {Comput. Law Secur. Rev.},
author = {{Lynne Graves} and {William Bradley Glisson} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/GuoJCJ20,
title = {Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical images.},
year = {2020},
journal = {Comput. Secur.},
author = {{Cheng Guo 001} and {Jing Jia} and {Kim-Kwang Raymond Choo} and {Yingmo Jie}}
}
@article{journals/compsec/HaiderMKFCW20,
title = {FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems.},
year = {2020},
journal = {Comput. Secur.},
author = {{Waqas Haider} and {Nour Moustafa} and {Marwa Keshk} and {Amanda S. Fernandez} and {Kim-Kwang Raymond Choo} and {Abdul Wahab}}
}
@article{journals/compsec/JahromiHDCKNP20,
title = {An improved two-hidden-layer extreme learning machine for malware hunting.},
year = {2020},
journal = {Comput. Secur.},
author = {{Amir Namavar Jahromi} and {Sattar Hashemi} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo} and {Hadis Karimipour} and {David Ellis Newton} and {Reza M. Parizi}}
}
@article{journals/compsec/KnoxMPPC20,
title = {What's really 'Happning'? A forensic analysis of Android and iOS Happn dating apps.},
year = {2020},
journal = {Comput. Secur.},
author = {{Shawn Knox} and {Steven Moghadam} and {Kenny Patrick} and {Anh Phan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/LuZSKC20,
title = {A secure and scalable data integrity auditing scheme based on hyperledger fabric.},
year = {2020},
journal = {Comput. Secur.},
author = {{Ning Lu 005} and {Yongxin Zhang} and {Wenbo Shi} and {Saru Kumari} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/RenZWWWC20,
title = {Query-efficient label-only attacks against black-box machine learning models.},
year = {2020},
journal = {Comput. Secur.},
author = {{Yizhi Ren} and {Qi Zhou} and {Zhen Wang 013} and {Ting Wu 001} and {Guohua Wu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/ShiHLKKC20,
title = {Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey.},
year = {2020},
journal = {Comput. Secur.},
author = {{Shuyun Shi} and {Debiao He} and {Li Li 073} and {Neeraj Kumar 001} and {Muhammad Khurram Khan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/SinghPZCD20,
title = {Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities.},
year = {2020},
journal = {Comput. Secur.},
author = {{Amritraj Singh} and {Reza M. Parizi} and {Qi Zhang 009} and {Kim-Kwang Raymond Choo} and {Ali Dehghantanha}}
}
@article{journals/compsec/YazdinejadPDC20,
title = {P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking.},
year = {2020},
journal = {Comput. Secur.},
author = {{Abbas Yazdinejad} and {Reza M. Parizi} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/computing/ChenZSCYC20,
title = {Secure search for encrypted personal health records from big data NoSQL databases in cloud.},
year = {2020},
journal = {Computing},
author = {{Lanxiang Chen} and {Nan Zhang} and {Hung-Min Sun} and {Chin-Chen Chang 001} and {Shui Yu 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/concurrency/DarabianDHHC20,
title = {An opcode-based technique for polymorphic Internet of Things malware detection.},
year = {2020},
journal = {Concurr. Comput. Pract. Exp.},
author = {{Hamid Darabian} and {Ali Dehghantanha} and {Sattar Hashemi} and {Sajad Homayoun} and {Kim-Kwang Raymond Choo}}
}
@article{journals/concurrency/LuWZZRC20,
title = {Cyberbullying detection in social media text based on character-level convolutional neural network with shortcuts.},
year = {2020},
journal = {Concurr. Comput. Pract. Exp.},
author = {{Nijia Lu} and {Guohua Wu} and {Zhen Zhang} and {Yitao Zheng} and {Yizhi Ren} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/abs-2009-05107,
title = {Efficiently Constructing Adversarial Examples by Feature Watermarking.},
year = {2020},
journal = {CoRR},
author = {{Yuexin Xiang} and {Wei Ren 002} and {Tiantian Li} and {Xianghan Zheng} and {Tianqing Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/csur/ManralSCCG20,
title = {A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions.},
year = {2020},
journal = {ACM Comput. Surv.},
author = {{Bharat Manral} and {Gaurav Somani 001} and {Kim-Kwang Raymond Choo} and {Mauro Conti} and {Manoj Singh Gaur}}
}
@article{journals/dcan/TaylorDDPC20,
title = {A systematic literature review of blockchain cyber security.},
year = {2020},
journal = {Digit. Commun. Networks},
author = {{Paul J. Taylor} and {Tooska Dargahi} and {Ali Dehghantanha} and {Reza M. Parizi} and {Kim-Kwang Raymond Choo}}
}
@article{journals/di/ZhangUBC20,
title = {IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers.},
year = {2020},
journal = {Digit. Investig.},
author = {{Xiaolu Zhang} and {Oren Upton} and {Nicole Lang Beebe} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fcsc/ZhangHZC20,
title = {A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm.},
year = {2020},
journal = {Frontiers Comput. Sci.},
author = {{Yudi Zhang 001} and {Debiao He} and {Mingwu Zhang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/GuoJCTZ20,
title = {Lightweight privacy preserving data aggregation with batch verification for smart grid.},
year = {2020},
journal = {Future Gener. Comput. Syst.},
author = {{Cheng Guo 001} and {Xueru Jiang} and {Kim-Kwang Raymond Choo} and {Xinyu Tang} and {Jing Zhang}}
}
@article{journals/fgcs/KumarVCY20,
title = {Energy Management for Cyber-Physical Cloud Systems.},
year = {2020},
journal = {Future Gener. Comput. Syst.},
author = {{Neeraj Kumar 001} and {Athanasios V. Vasilakos} and {Kim-Kwang Raymond Choo} and {Laurence T. Yang}}
}
@article{journals/fgcs/Le-KhacJNBC20,
title = {Smart vehicle forensics: Challenges and case study.},
year = {2020},
journal = {Future Gener. Comput. Syst.},
author = {{Nhien-An Le-Khac} and {Daniel Jacobs} and {John Nijhoff} and {Karsten Bertens} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/MaMMCLWY20,
title = {PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting.},
year = {2020},
journal = {Future Gener. Comput. Syst.},
author = {{Zhuoran Ma} and {Jianfeng Ma 001} and {Yinbin Miao} and {Kim-Kwang Raymond Choo} and {Ximeng Liu} and {Xiangyu Wang 010} and {Tengfei Yang}}
}
@article{journals/fgcs/MateosCZ20,
title = {Sharpening the edge: Towards improved edge computing environment for mobile and IoT applications.},
year = {2020},
journal = {Future Gener. Comput. Syst.},
author = {{Cristian Mateos} and {Kim-Kwang Raymond Choo} and {Alejandro Zunino}}
}
@article{journals/fgcs/ParraRC20,
title = {Driverless vehicle security: Challenges and future research opportunities.},
year = {2020},
journal = {Future Gener. Comput. Syst.},
author = {{Gonzalo De La Torre Parra} and {Paul Rad} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/YangJLC20,
title = {A task scheduling algorithm considering game theory designed for energy management in cloud computing.},
year = {2020},
journal = {Future Gener. Comput. Syst.},
author = {{Jiachen Yang} and {Bin Jiang 003} and {Zhihan Lv} and {Kim-Kwang Raymond Choo}}
}
@article{journals/grid/DarabianHDHKPC20,
title = {Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis.},
year = {2020},
journal = {J. Grid Comput.},
author = {{Hamid Darabian} and {Sajad Homayoun} and {Ali Dehghantanha} and {Sattar Hashemi} and {Hadis Karimipour} and {Reza M. Parizi} and {Kim-Kwang Raymond Choo}}
}
@article{journals/grid/Loyola-Gonzalez20,
title = {A Review of Supervised Classification based on Contrast Patterns: Applications, Trends, and Challenges.},
year = {2020},
journal = {J. Grid Comput.},
author = {{Octavio Loyola-González} and {Miguel Angel Medina-Pérez} and {Kim-Kwang Raymond Choo}}
}
@article{journals/hcis/ZhangJWCG20,
title = {A crowdsourcing method for online social networks security assessment based on human-centric computing.},
year = {2020},
journal = {Hum. centric Comput. Inf. Sci.},
author = {{Zhiyong Zhang 002} and {Junchang Jing} and {Xiaoxue Wang} and {Kim-Kwang Raymond Choo} and {Brij B. Gupta}}
}
@article{journals/ieicet/ZhangHHWCW20,
title = {White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.},
year = {2020},
journal = {IEICE Trans. Inf. Syst.},
author = {{Yudi Zhang 001} and {Debiao He} and {Xinyi Huang 001} and {Ding Wang 002} and {Kim-Kwang Raymond Choo} and {Jing Wang 036}}
}
@article{journals/iet-ifs/FengHLWC20,
title = {Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme.},
year = {2020},
journal = {IET Inf. Secur.},
author = {{Qi Feng} and {Debiao He} and {Zhe Liu 001} and {Ding Wang 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/ijon/YuQZDQC20,
title = {A framework for hierarchical division of retinal vascular networks.},
year = {2020},
journal = {Neurocomputing},
author = {{Linfang Yu} and {Zhen Qin 002} and {Tianming Zhuang} and {Yi Ding 003} and {Zhiguang Qin} and {Kim-Kwang Raymond Choo}}
}
@article{journals/inffus/QinZMQC20,
title = {Imaging and fusing time series for wearable sensor-based human activity recognition.},
year = {2020},
journal = {Inf. Fusion},
author = {{Zhen Qin 002} and {Yibo Zhang} and {Shuyu Meng} and {Zhiguang Qin} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/ChenZCVDC20,
title = {Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks.},
year = {2020},
journal = {IEEE Internet Things J.},
author = {{Jialu Chen} and {Jun Zhou 018} and {Zhenfu Cao} and {Athanasios V. Vasilakos} and {Xiaolei Dong} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/GargGPCR20,
title = {Guest Editorial Special Issue on Edge-Cloud Interplay Based on SDN and NFV for Next-Generation IoT Applications.},
year = {2020},
journal = {IEEE Internet Things J.},
author = {{Sahil Garg} and {Song Guo 001} and {Vincenzo Piuri} and {Kim-Kwang Raymond Choo} and {Balasubramanian Raman}}
}
@article{journals/iotj/GargKKC20,
title = {Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0.},
year = {2020},
journal = {IEEE Internet Things J.},
author = {{Sahil Garg} and {Kuljeet Kaur} and {Georges Kaddoum} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/GuoJJLC20,
title = {Enabling Secure Cross-Modal Retrieval Over Encrypted Heterogeneous IoT Databases With Collective Matrix Factorization.},
year = {2020},
journal = {IEEE Internet Things J.},
author = {{Cheng Guo 001} and {Jing Jia} and {Yingmo Jie} and {Charles Zhechao Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/HeRZC20,
title = {BoSMoS: A Blockchain-Based Status Monitoring System for Defending Against Unauthorized Software Updating in Industrial Internet of Things.},
year = {2020},
journal = {IEEE Internet Things J.},
author = {{Sen He 003} and {Wei Ren 002} and {Tianqing Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/HuangZMC20,
title = {Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home.},
year = {2020},
journal = {IEEE Internet Things J.},
author = {{Zhigang Huang} and {Lei Zhang 009} and {Xinyu Meng} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/JieGCLL20,
title = {Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment.},
year = {2020},
journal = {IEEE Internet Things J.},
author = {{Yingmo Jie} and {Cheng Guo 001} and {Kim-Kwang Raymond Choo} and {Charles Zhechao Liu} and {Mingchu Li}}
}
@article{journals/iotj/LinHKHVC20,
title = {HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes.},
year = {2020},
journal = {IEEE Internet Things J.},
author = {{Chao Lin} and {Debiao He} and {Neeraj Kumar 001} and {Xinyi Huang 001} and {Pandi Vijayakumar} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/MandalBSDCP20,
title = {Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment.},
year = {2020},
journal = {IEEE Internet Things J.},
author = {{Shobhan Mandal} and {Basudeb Bera} and {Anil Kumar Sutrala} and {Ashok Kumar Das} and {Kim-Kwang Raymond Choo} and {Youngho Park 005}}
}
@article{journals/iotj/SaharkhizanADCP20,
title = {An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic.},
year = {2020},
journal = {IEEE Internet Things J.},
author = {{Mahdis Saharkhizan} and {Amin Azmoodeh} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo} and {Reza M. Parizi}}
}
@article{journals/iotj/ShenZCDC20,
title = {Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks.},
year = {2020},
journal = {IEEE Internet Things J.},
author = {{Huajie Shen} and {Jun Zhou 018} and {Zhenfu Cao} and {Xiaolei Dong} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/XuRYZC20,
title = {A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things.},
year = {2020},
journal = {IEEE Internet Things J.},
author = {{Cheng Xu} and {Wei Ren 002} and {Linchen Yu} and {Tianqing Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/Zhang0PC20,
title = {Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage.},
year = {2020},
journal = {IEEE Internet Things J.},
author = {{Zhiting Zhang} and {Peng Zeng 002} and {Bofeng Pan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/isci/0002HZ0C20,
title = {A flexible method to defend against computationally resourceful miners in blockchain proof of work.},
year = {2020},
journal = {Inf. Sci.},
author = {{Wei Ren 002} and {Jingjing Hu} and {Tianqing Zhu} and {Yi Ren 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/isci/DingZSBCJ20,
title = {Differentially private publication of streaming trajectory data.},
year = {2020},
journal = {Inf. Sci.},
author = {{Xiaofeng Ding 001} and {Wenxiang Zhou} and {Shujun Sheng} and {Zhifeng Bao} and {Kim-Kwang Raymond Choo} and {Hai Jin 001}}
}
@article{journals/isci/LinHHXC20,
title = {Blockchain-based system for secure outsourcing of bilinear pairings.},
year = {2020},
journal = {Inf. Sci.},
author = {{Chao Lin} and {Debiao He} and {Xinyi Huang 001} and {Xiang Xie} and {Kim-Kwang Raymond Choo}}
}
@article{journals/isci/ShahidKMC20,
title = {WOTS-S: A Quantum Secure Compact Signature Scheme for Distributed Ledger.},
year = {2020},
journal = {Inf. Sci.},
author = {{Furqan Shahid} and {Abid Khan} and {Saif Ur Rehman Malik} and {Kim-Kwang Raymond Choo}}
}
@article{journals/isci/ZhangMCPW20,
title = {A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services.},
year = {2020},
journal = {Inf. Sci.},
author = {{Shaobo Zhang 001} and {Xinjun Mao} and {Kim-Kwang Raymond Choo} and {Tao Peng 011} and {Guojun Wang 001}}
}
@article{journals/isf/ChinELC20,
title = {Understanding Factors Influencing Employees' Consumptive and Contributive Use of Enterprise Social Networks.},
year = {2020},
journal = {Inf. Syst. Frontiers},
author = {{Christie Pei-Yee Chin} and {Nina Evans} and {Charles Zhechao Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/isf/DuJCSC20,
title = {An Ontology and Multi-Agent Based Decision Support Framework for Prefabricated Component Supply Chain.},
year = {2020},
journal = {Inf. Syst. Frontiers},
author = {{Juan Du 004} and {Hengqing Jing} and {Kim-Kwang Raymond Choo} and {Vijayan Sugumaran} and {Daniel Castro-Lacouture}}
}
@article{journals/istr/PengCZCH20,
title = {CsiIBS: A post-quantum identity-based signature scheme based on isogenies.},
year = {2020},
journal = {J. Inf. Secur. Appl.},
author = {{Cong Peng 005} and {Jianhua Chen 002} and {Lu Zhou 002} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/istr/XuHWVC20,
title = {A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems.},
year = {2020},
journal = {J. Inf. Secur. Appl.},
author = {{Zhiyan Xu} and {Debiao He} and {Huaqun Wang} and {Pandi Vijayakumar} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jcsc/HuangZC20,
title = {An Efficient Privacy-Preserving Protocol for Computing kth Minimum Value in P2P Networks.},
year = {2020},
journal = {J. Circuits Syst. Comput.},
author = {{Yue Huang} and {Peng Zeng 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jms/XuHVCL20,
title = {Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems.},
year = {2020},
journal = {J. Medical Syst.},
author = {{Zhiyan Xu} and {Debiao He} and {Pandi Vijayakumar} and {Kim-Kwang Raymond Choo} and {Li Li 073}}
}
@article{journals/jnca/AlauthmanAAKAC20,
title = {An efficient reinforcement learning-based Botnet detection approach.},
year = {2020},
journal = {J. Netw. Comput. Appl.},
author = {{Mohammad Alauthman} and {Nauman Aslam} and {Mouhammd Al-Kasassbeh 001} and {Suleman Khan 001} and {Ahmad Al-Qerem} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jnca/GuoJCJ20,
title = {R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity.},
year = {2020},
journal = {J. Netw. Comput. Appl.},
author = {{Cheng Guo 001} and {Xueru Jiang} and {Kim-Kwang Raymond Choo} and {Yingmo Jie}}
}
@article{journals/jnca/LiuHOKKC20,
title = {Blockchain-based identity management systems: A review.},
year = {2020},
journal = {J. Netw. Comput. Appl.},
author = {{Yang Liu} and {Debiao He} and {Mohammad S. Obaidat} and {Neeraj Kumar 001} and {Muhammad Khurram Khan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jnca/ParraRCB20,
title = {Detecting Internet of Things attacks using distributed deep learning.},
year = {2020},
journal = {J. Netw. Comput. Appl.},
author = {{Gonzalo De La Torre Parra} and {Paul Rad} and {Kim-Kwang Raymond Choo} and {Nicole Beebe}}
}
@article{journals/jnca/SinghCPZDC20,
title = {Sidechain technologies in blockchain networks: An examination and state-of-the-art review.},
year = {2020},
journal = {J. Netw. Comput. Appl.},
author = {{Amritraj Singh} and {Kelly Click} and {Reza M. Parizi} and {Qi Zhang 009} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jnca/WangDCJZ20,
title = {FSFC: An input filter-based secure framework for smart contract.},
year = {2020},
journal = {J. Netw. Comput. Appl.},
author = {{Zeli Wang} and {Weiqi Dai} and {Kim-Kwang Raymond Choo} and {Hai Jin 001} and {Deqing Zou}}
}
@article{journals/jnca/YazdinejadPBDC20,
title = {A high-performance framework for a network programmable packet processor using P4 and FPGA.},
year = {2020},
journal = {J. Netw. Comput. Appl.},
author = {{Abbas Yazdinejad} and {Reza M. Parizi} and {Ali Bohlooli} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jsa/ZengPCL20,
title = {MMDA: Multidimensional and multidirectional data aggregation for edge computing-enhanced IoT.},
year = {2020},
journal = {J. Syst. Archit.},
author = {{Peng Zeng 002} and {Bofeng Pan} and {Kim-Kwang Raymond Choo} and {Hong Liu}}
}
@article{journals/nca/HaddadPajouhKDC20,
title = {AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things.},
year = {2020},
journal = {Neural Comput. Appl.},
author = {{Hamed HaddadPajouh} and {Raouf Khayami} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo} and {Reza M. Parizi}}
}
@article{journals/network/HanLYCG20,
title = {Blockchain-Based Self-Tallying Voting System with Software Updates in Decentralized IoT.},
year = {2020},
journal = {IEEE Netw.},
author = {{Gang Han} and {Yannan Li} and {Yong Yu 002} and {Kim-Kwang Raymond Choo} and {Nadra Guizani}}
}
@article{journals/network/LuGDCLWX20,
title = {Machine Learning Empowered Content Delivery: Status, Challenges, and Opportunities.},
year = {2020},
journal = {IEEE Netw.},
author = {{Zhihui Lu 002} and {Keke Gai} and {Qiang Duan} and {Kim-Kwang Raymond Choo} and {Junnan Li 003} and {Jie Wu 003} and {Yajing Xu}}
}
@article{journals/scn/XuHKC20,
title = {Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs.},
year = {2020},
journal = {Secur. Commun. Networks},
author = {{Zhiyan Xu} and {Debiao He} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/sj/FengHWKC20,
title = {White-Box Implementation of Shamir's Identity-Based Signature Scheme.},
year = {2020},
journal = {IEEE Syst. J.},
author = {{Qi Feng} and {Debiao He} and {Huaqun Wang} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/sj/JiaHKC20,
title = {A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing.},
year = {2020},
journal = {IEEE Syst. J.},
author = {{Xiaoying Jia 002} and {Debiao He} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/sj/KaurGKACO20,
title = {An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers.},
year = {2020},
journal = {IEEE Syst. J.},
author = {{Kuljeet Kaur} and {Sahil Garg} and {Neeraj Kumar 001} and {Gagangeet Singh Aujla} and {Kim-Kwang Raymond Choo} and {Mohammad S. Obaidat}}
}
@article{journals/sj/ZhangHLZC20,
title = {Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks.},
year = {2020},
journal = {IEEE Syst. J.},
author = {{Yudi Zhang 001} and {Debiao He} and {Yumei Li 003} and {Mingwu Zhang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tbd/LwowskiRC20,
title = {Geospatial Event Detection by Grouping Emotion Contagion in Social Media.},
year = {2020},
journal = {IEEE Trans. Big Data},
author = {{Brandon Lwowski} and {Paul Rad} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcc/LiuDCY20,
title = {Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery.},
year = {2020},
journal = {IEEE Trans. Cloud Comput.},
author = {{Ximeng Liu} and {Robert H. Deng} and {Kim-Kwang Raymond Choo} and {Yang Yang 026}}
}
@article{journals/tccn/RatheeJGCC20,
title = {A Secure Spectrum Handoff Mechanism in Cognitive Radio Networks.},
year = {2020},
journal = {IEEE Trans. Cogn. Commun. Netw.},
author = {{Geetanjali Rathee} and {Naveen Jaglan} and {Sahil Garg} and {Bong Jun Choi 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tce/AyubSMIPC20,
title = {A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices.},
year = {2020},
journal = {IEEE Trans. Consumer Electron.},
author = {{Muhammad Faizan Ayub} and {Salman Shamshad} and {Khalid Mahmood 002} and {SK Hafizul Islam} and {Reza M. Parizi} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcps/SaxenaCBLCC20,
title = {Introduction to the Special Issue on User-Centric Security and Safety for CPS.},
year = {2020},
journal = {ACM Trans. Cyber Phys. Syst.},
author = {{Neetesh Saxena} and {Alvaro A. Cárdenas} and {Raheem Beyah} and {Rongxing Lu} and {Kim-Kwang Raymond Choo} and {Yiran Chen 001}}
}
@article{journals/tcss/ErolMBRCJ20,
title = {Toward Artificial Emotional Intelligence for Cooperative Social Human-Machine Interaction.},
year = {2020},
journal = {IEEE Trans. Comput. Soc. Syst.},
author = {{Berat A. Erol} and {Abhijit Majumdar} and {Patrick Benavidez} and {Paul Rad} and {Kim-Kwang Raymond Choo} and {Mo M. Jamshidi}}
}
@article{journals/tdsc/FengYZC20,
title = {Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment.},
year = {2020},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Jun Feng 007} and {Laurence T. Yang} and {Qing Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tdsc/HeZWC20,
title = {Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.},
year = {2020},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Debiao He} and {Yudi Zhang 001} and {Ding Wang 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tdsc/LiuDCYP20,
title = {Privacy-Preserving Outsourced Calculation Toolkit in the Cloud.},
year = {2020},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Ximeng Liu} and {Robert H. Deng} and {Kim-Kwang Raymond Choo} and {Yang Yang 026} and {HweeHwa Pang}}
}
@article{journals/tdsc/SaxenaSKCC20,
title = {BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users.},
year = {2020},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Neetesh Saxena} and {Hong Shen 001} and {Nikos Komninos} and {Kim-Kwang Raymond Choo} and {Narendra S. Chaudhari}}
}
@article{journals/tdsc/ZhangMCZD20,
title = {Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud.},
year = {2020},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Lei Zhang 009} and {Xinyu Meng} and {Kim-Kwang Raymond Choo} and {Yuanfei Zhang} and {Feifei Dai}}
}
@article{journals/tem/ChooODP20,
title = {Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges.},
year = {2020},
journal = {IEEE Trans. Engineering Management},
author = {{Kim-Kwang Raymond Choo} and {Sercan Ozcan} and {Ali Dehghantanha} and {Reza M. Parizi}}
}
@article{journals/tetc/LiuCLK20,
title = {Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance.},
year = {2020},
journal = {IEEE Trans. Emerg. Top. Comput.},
author = {{Zhe Liu 001} and {Kim-Kwang Raymond Choo} and {Weiqiang Liu 001} and {Muhammad Khurram Khan}}
}
@article{journals/tetci/JahromiHDPC20,
title = {An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems.},
year = {2020},
journal = {IEEE Trans. Emerg. Top. Comput. Intell.},
author = {{Amir Namavar Jahromi} and {Sattar Hashemi} and {Ali Dehghantanha} and {Reza M. Parizi} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/Al-KadiMTC20,
title = {An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems.},
year = {2020},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Osama Al-Kadi} and {Nour Moustafa} and {Benjamin P. Turnbull} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/DaiDCCZ020,
title = {SDTE: A Secure Blockchain-Based Data Trading Ecosystem.},
year = {2020},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Weiqi Dai} and {Chunkai Dai} and {Kim-Kwang Raymond Choo} and {Changze Cui} and {Deqing Zou} and {Hai Jin 001}}
}
@article{journals/tifs/FengHLWC20,
title = {SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing.},
year = {2020},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Qi Feng} and {Debiao He} and {Zhe Liu 001} and {Huaqun Wang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/LinHHKC20,
title = {DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain.},
year = {2020},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Chao Lin} and {Debiao He} and {Xinyi Huang 001} and {Muhammad Khurram Khan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/SaxenaCCC20,
title = {BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices.},
year = {2020},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Neetesh Saxena} and {Mauro Conti} and {Kim-Kwang Raymond Choo} and {Narendra S. Chaudhari}}
}
@article{journals/tifs/WangCWM20,
title = {Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources".},
year = {2020},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Xu An Wang 001} and {Kim-Kwang Raymond Choo} and {Jian Weng 001} and {Jianfeng Ma 001}}
}
@article{journals/tifs/WuYZC20,
title = {A Two-Dimensional Vectorized Secure Transmission Scheme for Wireless Communications.},
year = {2020},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Renyong Wu} and {Chao Yuan} and {Ning Zhang 007} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tii/ChooYM20,
title = {Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities.},
year = {2020},
journal = {IEEE Trans. Ind. Informatics},
author = {{Kim-Kwang Raymond Choo} and {Zheng Yan 002} and {Weizhi Meng 001}}
}
@article{journals/tii/KaurGKBC20,
title = {A Big Data-Enabled Consolidated Framework for Energy Efficient Software Defined Data Centers in IoT Setups.},
year = {2020},
journal = {IEEE Trans. Ind. Informatics},
author = {{Kuljeet Kaur} and {Sahil Garg} and {Georges Kaddoum} and {Elias Bou-Harb} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tii/KeshkTMVC20,
title = {A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks.},
year = {2020},
journal = {IEEE Trans. Ind. Informatics},
author = {{Marwa Keshk} and {Benjamin P. Turnbull} and {Nour Moustafa} and {Dinusha Vatsalan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tii/SongAZYCZ20,
title = {Smart Collaborative Automation for Receive Buffer Control in Multipath Industrial Networks.},
year = {2020},
journal = {IEEE Trans. Ind. Informatics},
author = {{Fei Song 001} and {Zheng-Yang Ai} and {Yutong Zhou} and {Ilsun You} and {Kim-Kwang Raymond Choo} and {Hongke Zhang}}
}
@article{journals/tii/WangWCH20,
title = {Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure.},
year = {2020},
journal = {IEEE Trans. Ind. Informatics},
author = {{Jing Wang 036} and {Libing Wu} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/titb/YazdinejadSPDCA20,
title = {Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain.},
year = {2020},
journal = {IEEE J. Biomed. Health Informatics},
author = {{Abbas Yazdinejad} and {Gautam Srivastava 001} and {Reza M. Parizi} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo} and {Mohammed Aledhari}}
}
@article{journals/tsc/YazdinejadPDZC20,
title = {An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security.},
year = {2020},
journal = {IEEE Trans. Serv. Comput.},
author = {{Abbas Yazdinejad} and {Reza M. Parizi} and {Ali Dehghantanha} and {Qi Zhang 009} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tvt/AujlaSSSKC20,
title = {BloCkEd: Blockchain-Based Secure Data Processing Framework in Edge Envisioned V2X Environment.},
year = {2020},
journal = {IEEE Trans. Veh. Technol.},
author = {{Gagangeet Singh Aujla} and {Amritpal Singh} and {Maninderpal Singh} and {Sumit Sharma 006} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tvt/JiangZNMMC20,
title = {Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles.},
year = {2020},
journal = {IEEE Trans. Veh. Technol.},
author = {{Qi Jiang 001} and {Ning Zhang 007} and {Jianbing Ni} and {Jianfeng Ma 001} and {Xindi Ma} and {Kim-Kwang Raymond Choo}}
}
@article{journals/www/DarabianDHTAHCP20,
title = {A multiview learning method for malware threat hunting: windows, IoT and android as case studies.},
year = {2020},
journal = {World Wide Web},
author = {{Hamid Darabian} and {Ali Dehghantanha} and {Sattar Hashemi} and {Mohammad Taheri} and {Amin Azmoodeh} and {Sajad Homayoun} and {Kim-Kwang Raymond Choo} and {Reza M. Parizi}}
}
@incollection{series/ais/PariziDAC20,
title = {Blockchain in Cybersecurity Realm: An Overview.},
year = {2020},
booktitle = {Blockchain Cybersecurity, Trust and Privacy},
author = {{Reza M. Parizi} and {Ali Dehghantanha} and {Amin Azmoodeh} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Blockchain Cybersecurity, Trust and Privacy}
}
@incollection{series/ais/SinghPHDKC20,
title = {Public Blockchains Scalability: An Examination of Sharding and Segregated Witness.},
year = {2020},
booktitle = {Blockchain Cybersecurity, Trust and Privacy},
author = {{Amritraj Singh} and {Reza M. Parizi} and {Meng Han} and {Ali Dehghantanha} and {Hadis Karimipour} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Blockchain Cybersecurity, Trust and Privacy}
}
@incollection{series/ais/TibaPZDKC20,
title = {Secure Blockchain-Based Traffic Load Balancing Using Edge Computing and Reinforcement Learning.},
year = {2020},
booktitle = {Blockchain Cybersecurity, Trust and Privacy},
author = {{Kevin Tiba} and {Reza M. Parizi} and {Qi Zhang 009} and {Ali Dehghantanha} and {Hadis Karimipour} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Blockchain Cybersecurity, Trust and Privacy}
}
@inproceedings{conf/amcis/MandaokarBC21,
title = {Investigating formation of Collective Identity driving the Black Lives Matter movement during COVID-19.},
year = {2021},
booktitle = {AMCIS},
author = {{Pranali Mandaokar} and {Paras Bhatt} and {Kim-Kwang Raymond Choo}},
publisher = {Association for Information Systems},
booktitle = {27th Americas Conference on Information Systems, AMCIS 2021, Virtual Conference, August 9-13, 2021}
}
@inproceedings{conf/ccs/Choo21,
title = {Internet of Things (IoT) Security and Forensics: Challenges and Opportunities.},
year = {2021},
booktitle = {CPSIOTSEC@CCS},
author = {{Kim-Kwang Raymond Choo}},
publisher = {ACM},
booktitle = {CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, Virtual Event, Republic of Korea, 15 November 2021}
}
@inproceedings{conf/cikm/ZhangPY0CY21,
title = {International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI2021).},
year = {2021},
booktitle = {CIKM},
author = {{Xuyun Zhang} and {Deepak Puthal} and {Chi Yang} and {Guanfeng Liu 001} and {Kim-Kwang Raymond Choo} and {Hongzhi Yin}},
publisher = {ACM},
booktitle = {CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1 - 5, 2021}
}
@inproceedings{conf/desec/00010PC21,
title = {Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation.},
year = {2021},
booktitle = {DSC},
author = {{Wenjuan Li 001} and {Weizhi Meng 001} and {Javier Parra-Arnau} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {IEEE Conference on Dependable and Secure Computing, DSC 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}
}
@inproceedings{conf/fabulous/GrisposFGC21,
title = {Investigating Protected Health Information Leakage from Android Medical Applications.},
year = {2021},
booktitle = {FABULOUS},
author = {{George Grispos} and {Talon Flynn} and {William Bradley Glisson} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Future Access Enablers for Ubiquitous and Intelligent Infrastructures - 5th EAI International Conference, FABULOUS 2021, Virtual Event, May 6-7, 2021, Proceedings}
}
@inproceedings{conf/fabulous/JochimsBC21,
title = {Effectiveness of Mobile Wiping Applications.},
year = {2021},
booktitle = {FABULOUS},
author = {{Kevin Jochims} and {Andres Bello} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Future Access Enablers for Ubiquitous and Intelligent Infrastructures - 5th EAI International Conference, FABULOUS 2021, Virtual Event, May 6-7, 2021, Proceedings}
}
@inproceedings{conf/hicss/ChooGG21,
title = {Introduction to the Minitrack on Cyber Operations, Defence, and Forensics.},
year = {2021},
booktitle = {HICSS},
author = {{Kim-Kwang Raymond Choo} and {George Grispos} and {William Bradley Glisson}},
publisher = {ScholarSpace},
booktitle = {54th Hawaii International Conference on System Sciences, HICSS 2021, Kauai, Hawaii, USA, January 5, 2021}
}
@inproceedings{conf/hicss/DehghantanhaDC21,
title = {Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics.},
year = {2021},
booktitle = {HICSS},
author = {{Ali Dehghantanha} and {Glenn Dietrich} and {Kim-Kwang Raymond Choo}},
publisher = {ScholarSpace},
booktitle = {54th Hawaii International Conference on System Sciences, HICSS 2021, Kauai, Hawaii, USA, January 5, 2021}
}
@inproceedings{conf/isci/OzcanAGC21,
title = {DIEF: An Autopsy Module for Distributed Identification of E-mail Files from Disk Images.},
year = {2021},
booktitle = {iSCI},
author = {{Selim Ozcan} and {Merve Astekin} and {William Bradley Glisson} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {9th IEEE International Conference on Smart City and Informatization, iSCI 2021, Shenyang, China, October 20-22, 2021}
}
@inproceedings{conf/ispec/LiuAYZWSLLC21,
title = {Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.},
year = {2021},
booktitle = {ISPEC},
author = {{Joseph K. Liu} and {Man Ho Au} and {Tsz Hon Yuen} and {Cong Zuo} and {Jiawei Wang 003} and {Amin Sakzad} and {Xiapu Luo} and {Li Li 029} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings}
}
@inproceedings{conf/kbse/NguyenC21,
title = {Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation.},
year = {2021},
booktitle = {ASE},
author = {{Tien N. Nguyen} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {36th IEEE/ACM International Conference on Automated Software Engineering, ASE 2021, Melbourne, Australia, November 15-19, 2021}
}
@inproceedings{conf/mobicom/LiuYFC21,
title = {Cross-domain authentication for 5G-enabled UAVs: a blockchain approach.},
year = {2021},
booktitle = {DroneCom@MobiCom},
author = {{Bin Liu} and {Keping Yu} and {Chaosheng Feng} and {Kim-Kwang Raymond Choo}},
publisher = {ACM},
booktitle = {DroneCom '21: Proceedings of the 4th ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, Virtual Event, 29 October 2021}
}
@inproceedings{conf/ncs/StigallC21,
title = {Digital Forensics Education: Challenges and Future Opportunities.},
year = {2021},
booktitle = {NCS},
author = {{Megan Stigall} and {Kim-Kwang Raymond Choo}},
publisher = {Springer},
booktitle = {National Cyber Summit (NCS) Research Track 2021, Huntsville, AL, USA, September 28-30, 2021}
}
@inproceedings{conf/trustcom/AlrabaeeCQK21,
title = {BinDeep: Binary to Source Code Matching Using Deep Learning.},
year = {2021},
booktitle = {TrustCom},
author = {{Saed Alrabaee} and {Kim-Kwang Raymond Choo} and {Mohammad Qbea'h} and {Mahmoud Khasawneh}},
publisher = {IEEE},
booktitle = {20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}
}
@inproceedings{conf/trustcom/GrisposTCMG21,
title = {A Digital Forensics Investigation of a Smart Scale IoT Ecosystem.},
year = {2021},
booktitle = {TrustCom},
author = {{George Grispos} and {Frank Tursi} and {Kim-Kwang Raymond Choo} and {William Mahoney} and {William Bradley Glisson}},
publisher = {IEEE},
booktitle = {20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}
}
@article{journals/access/Al-DhaqmIKRGCAA21,
title = {Digital Forensics Subdomains: The State of the Art and Future Directions.},
year = {2021},
journal = {IEEE Access},
author = {{Arafat Al-Dhaqm} and {Richard Adeyemi Ikuesan} and {Victor R. Kebande} and {Shukor Abd Razak} and {George Grispos} and {Kim-Kwang Raymond Choo} and {Bander Ali Saleh Al-Rimy} and {Abdul Rahman A. Alsewari}}
}
@article{journals/access/PuAAC21,
title = {A Stochastic Packet Forwarding Algorithm in Flying Ad Hoc Networks: Design, Analysis, and Evaluation.},
year = {2021},
journal = {IEEE Access},
author = {{Cong Pu} and {Imtiaz Ahmed 001} and {Evan J. Allen} and {Kim-Kwang Raymond Choo}}
}
@article{journals/access/ZafarNBKKBCKS21,
title = {A Systematic Review of Bio-Cyber Interface Technologies and Security Issues for Internet of Bio-Nano Things.},
year = {2021},
journal = {IEEE Access},
author = {{Sidra Zafar} and {Mohsin Nazir} and {Taimur Bakhshi} and {Hasan Ali Khattak} and {Sarmadullah Khan} and {Muhammad Bilal 003} and {Kim-Kwang Raymond Choo} and {Kyung-Sup Kwak} and {Aneeqa Sabah}}
}
@article{journals/access/ZhangZNCK21,
title = {Secure, Robust and Flexible Cooperative Downloading Scheme for Highway VANETs.},
year = {2021},
journal = {IEEE Access},
author = {{Yan Zhang 103} and {Lei Zhang 009} and {Dingkai Ni} and {Kim-Kwang Raymond Choo} and {Burong Kang}}
}
@article{journals/access/ZhaoZC21,
title = {An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health.},
year = {2021},
journal = {IEEE Access},
author = {{Jing Zhao} and {Peng Zeng 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cee/ChooDK21,
title = {Introduction to the special section on application of artificial intelligence in security of cyber physical systems (VSI-aicps).},
year = {2021},
journal = {Comput. Electr. Eng.},
author = {{Kim-Kwang Raymond Choo} and {Ali Dehghantanha} and {Hadis Karimipour}}
}
@article{journals/cee/XuLXLC21,
title = {A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles.},
year = {2021},
journal = {Comput. Electr. Eng.},
author = {{Zisang Xu} and {Xiong Li 002} and {Jianbo Xu} and {Wei Liang 005} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cn/Tang0C0L21,
title = {A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain.},
year = {2021},
journal = {Comput. Networks},
author = {{Xinyu Tang} and {Cheng Guo 001} and {Kim-Kwang Raymond Choo} and {Yining Liu 002} and {Long Li 005}}
}
@article{journals/compsec/AloufiHLCC21,
title = {Universal location referencing and homomorphic evaluation of geospatial query.},
year = {2021},
journal = {Comput. Secur.},
author = {{Asma Aloufi} and {Peizhao Hu} and {Hang Liu 001} and {Sherman S. M. Chow} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/ChooGCY21,
title = {A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management.},
year = {2021},
journal = {Comput. Secur.},
author = {{Kim-Kwang Raymond Choo} and {Keke Gai} and {Luca Chiaraviglio} and {Qing Yang 001}}
}
@article{journals/compsec/DabbaghCBTS21,
title = {A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities.},
year = {2021},
journal = {Comput. Secur.},
author = {{Mohammad Dabbagh} and {Kim-Kwang Raymond Choo} and {Amin Beheshti} and {Mohammad Tahir} and {Nader Sohrabi Safa}}
}
@article{journals/compsec/NowrooziDPC21,
title = {A survey of machine learning techniques in adversarial image forensics.},
year = {2021},
journal = {Comput. Secur.},
author = {{Ehsan Nowroozi} and {Ali Dehghantanha} and {Reza M. Parizi} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/SunZCHW21,
title = {NLP-based digital forensic investigation platform for online communications.},
year = {2021},
journal = {Comput. Secur.},
author = {{Dongming Sun} and {Xiaolu Zhang} and {Kim-Kwang Raymond Choo} and {Liang Hu 001} and {Feng Wang 014}}
}
@article{journals/compsec/ZhangLCA21,
title = {A design science approach to developing an integrated mobile app forensic framework.},
year = {2021},
journal = {Comput. Secur.},
author = {{Xiaolu Zhang} and {Charles Zhechao Liu} and {Kim-Kwang Raymond Choo} and {Jesus A. Alvarado}}
}
@article{journals/corr/abs-2105-08876,
title = {A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block Mixing for Image Classification in Deep Learning.},
year = {2021},
journal = {CoRR},
author = {{Yuexin Xiang} and {Tiantian Li} and {Wei Ren 002} and {Tianqing Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/dcan/Liu00QOCZ21,
title = {Capability-based IoT access control using blockchain.},
year = {2021},
journal = {Digit. Commun. Networks},
author = {{Yue Liu} and {Qinghua Lu 001} and {Shiping Chen 001} and {Qiang Qu} and {Hugo O'Connor} and {Kim-Kwang Raymond Choo} and {He Zhang}}
}
@article{journals/di/LanaganC21,
title = {On the need for AI to triage encrypted data containers in U.S. law enforcement applications.},
year = {2021},
journal = {Digit. Investig.},
author = {{Sean Lanagan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/ett/AujlaKSC21,
title = {Security and privacy solutions in edge envisioned connected things environment.},
year = {2021},
journal = {Trans. Emerg. Telecommun. Technol.},
author = {{Gagangeet Singh Aujla} and {Neeraj Kumar 001} and {Biplab Sikdar 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fcsc/WangJDCZ21,
title = {Ethereum smart contract security research: survey and future research opportunities.},
year = {2021},
journal = {Frontiers Comput. Sci.},
author = {{Zeli Wang} and {Hai Jin 001} and {Weiqi Dai} and {Kim-Kwang Raymond Choo} and {Deqing Zou}}
}
@article{journals/fgcs/AguilarLMCC21,
title = {PBC4occ: A novel contrast pattern-based classifier for one-class classification.},
year = {2021},
journal = {Future Gener. Comput. Syst.},
author = {{Diana Laura Aguilar} and {Octavio Loyola-González} and {Miguel Angel Medina-Pérez} and {Leonardo Cañete-Sifuentes} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/ApostolopoulosK21,
title = {Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks.},
year = {2021},
journal = {Future Gener. Comput. Syst.},
author = {{Theodoros Apostolopoulos} and {Vasilios Katos} and {Kim-Kwang Raymond Choo} and {Constantinos Patsakis}}
}
@article{journals/fgcs/ChowCH21,
title = {Editorial for accountability and privacy issues in blockchain and cryptocurrency.},
year = {2021},
journal = {Future Gener. Comput. Syst.},
author = {{Sherman S. M. Chow} and {Kim-Kwang Raymond Choo} and {Jinguang Han}}
}
@article{journals/fgcs/HaoRXZC21,
title = {Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things.},
year = {2021},
journal = {Future Gener. Comput. Syst.},
author = {{Xiaohan Hao} and {Wei Ren 002} and {Ruoting Xiong} and {Tianqing Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fgcs/ImtiazMIJCR21,
title = {Discovering communities from disjoint complex networks using Multi-Layer Ant Colony Optimization.},
year = {2021},
journal = {Future Gener. Comput. Syst.},
author = {{Zar Bakht Imtiaz} and {Awais Manzoor} and {Saif ul Islam} and {Malik Ali Judge} and {Kim-Kwang Raymond Choo} and {Joel J. P. C. Rodrigues}}
}
@article{journals/fgcs/MoustafaKCLCW21,
title = {DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks.},
year = {2021},
journal = {Future Gener. Comput. Syst.},
author = {{Nour Moustafa} and {Marwa Keshk} and {Kim-Kwang Raymond Choo} and {Timothy M. Lynar} and {Seyit Camtepe} and {Monica T. Whitty}}
}
@article{journals/icl/XuLKCH21,
title = {Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios.},
year = {2021},
journal = {IEEE Commun. Lett.},
author = {{Zhiyan Xu} and {Min Luo 002} and {Muhammad Khurram Khan} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/ieeejas/FerragSC21,
title = {Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspectives.},
year = {2021},
journal = {IEEE CAA J. Autom. Sinica},
author = {{Mohamed Amine Ferrag} and {Lei Shu 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/ieeejas/HassanFYJCZW21,
title = {Guest Editorial for Special Issue on Blockchain for Internet-of-Things and Cyber-Physical Systems.},
year = {2021},
journal = {IEEE CAA J. Autom. Sinica},
author = {{Mohammad Mehedi Hassan} and {Giancarlo Fortino} and {Laurence T. Yang} and {Hai Jiang} and {Kim-Kwang Raymond Choo} and {Jun Jason Zhang} and {Fei-Yue Wang 001}}
}
@article{journals/iotj/Al-KadiMTC21,
title = {A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks.},
year = {2021},
journal = {IEEE Internet Things J.},
author = {{Osama Al-Kadi} and {Nour Moustafa} and {Benjamin P. Turnbull} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/ChenZCCDC21,
title = {PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks.},
year = {2021},
journal = {IEEE Internet Things J.},
author = {{Linghui Chen} and {Jun Zhou 018} and {Ying Chen} and {Zhenfu Cao} and {Xiaolei Dong} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/ChenZCZM21,
title = {Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems.},
year = {2021},
journal = {IEEE Internet Things J.},
author = {{Tong Chen} and {Lei Zhang 009} and {Kim-Kwang Raymond Choo} and {Rui Zhang} and {Xinyu Meng}}
}
@article{journals/iotj/FanZLLLCZ21,
title = {SBBS: A Secure Blockchain-Based Scheme for IoT Data Credibility in Fog Environment.},
year = {2021},
journal = {IEEE Internet Things J.},
author = {{Yongkai Fan} and {Guanqun Zhao} and {Xia Lei} and {Wei Liang 005} and {Kuan-Ching Li} and {Kim-Kwang Raymond Choo} and {Chunsheng Zhu}}
}
@article{journals/iotj/GroverACSC21,
title = {Edge Computing and Deep Learning Enabled Secure Multitier Network for Internet of Vehicles.},
year = {2021},
journal = {IEEE Internet Things J.},
author = {{Harsh Grover} and {Tejasvi Alladi} and {Vinay Chamola} and {Dheerendra Singh} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/HaddadPajouhMDK21,
title = {A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer.},
year = {2021},
journal = {IEEE Internet Things J.},
author = {{Hamed HaddadPajouh} and {Alireza Mohtadi} and {Ali Dehghantanha} and {Hadis Karimipour} and {Xiaodong Lin 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/JahromiKDC21,
title = {Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems.},
year = {2021},
journal = {IEEE Internet Things J.},
author = {{Amir Namavar Jahromi} and {Hadis Karimipour} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/LiSGCJ21,
title = {PSL-MAAKA: Provably Secure and Lightweight Mutual Authentication and Key Agreement Protocol for Fully Public Channels in Internet of Medical Things.},
year = {2021},
journal = {IEEE Internet Things J.},
author = {{Jiliang Li} and {Zhou Su} and {Deke Guo} and {Kim-Kwang Raymond Choo} and {Yusheng Ji}}
}
@article{journals/iotj/PengL0CH21,
title = {Efficient Certificateless Online/Offline Signature Scheme for Wireless Body Area Networks.},
year = {2021},
journal = {IEEE Internet Things J.},
author = {{Cong Peng 005} and {Min Luo 002} and {Li Li 073} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/iotj/PengLHWWC21,
title = {Security Challenges and Opportunities for Smart Contracts in Internet of Things: A Survey.},
year = {2021},
journal = {IEEE Internet Things J.},
author = {{Kai Peng 001} and {Meijun Li} and {Haojun Huang} and {Chen Wang 011} and {Shaohua Wan 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/SeshadriRSCACL21,
title = {IoTCop: A Blockchain-Based Monitoring Framework for Detection and Isolation of Malicious Devices in Internet-of-Things Systems.},
year = {2021},
journal = {IEEE Internet Things J.},
author = {{Sreenivas Sudarshan Seshadri} and {David Rodriguez} and {Mukunda Subedi} and {Kim-Kwang Raymond Choo} and {Sara Ahmed} and {Qian Chen 019} and {Junghee Lee}}
}
@article{journals/iotj/WangWWCH21,
title = {An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things.},
year = {2021},
journal = {IEEE Internet Things J.},
author = {{Jing Wang 036} and {Libing Wu} and {Huaqun Wang} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/iotj/ZengZLC21,
title = {Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things.},
year = {2021},
journal = {IEEE Internet Things J.},
author = {{Peng Zeng 002} and {Zhiting Zhang} and {Rongxing Lu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/ZhangZRWCX21,
title = {An Energy-Efficient Authentication Scheme Based on Chebyshev Chaotic Map for Smart Grid Environments.},
year = {2021},
journal = {IEEE Internet Things J.},
author = {{Liping Zhang 003} and {Yue Zhu 006} and {Wei Ren 002} and {Yinghan Wang} and {Kim-Kwang Raymond Choo} and {Neal N. Xiong}}
}
@article{journals/isci/LiMMLC21,
title = {Forward and backward secure keyword search with flexible keyword shielding.},
year = {2021},
journal = {Inf. Sci.},
author = {{Zhijun Li} and {Jianfeng Ma 001} and {Yinbin Miao} and {Ximeng Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/isci/LiRXZZCS21,
title = {FAPS: A fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, Ether cheque and smart contracts.},
year = {2021},
journal = {Inf. Sci.},
author = {{Tiantian Li} and {Wei Ren 002} and {Yuexin Xiang} and {Xianghan Zheng} and {Tianqing Zhu} and {Kim-Kwang Raymond Choo} and {Gautam Srivastava 001}}
}
@article{journals/isci/WangHCC21,
title = {Blockchain-based multi-party proof of assets with privacy preservation.},
year = {2021},
journal = {Inf. Sci.},
author = {{Huaqun Wang} and {Debiao He} and {Kim-Kwang Raymond Choo} and {Xi Chen}}
}
@article{journals/itiis/WangKYWMC21,
title = {On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks.},
year = {2021},
journal = {KSII Trans. Internet Inf. Syst.},
author = {{Qiuhua Wang} and {Mingyang Kang} and {Lifeng Yuan} and {Yunlu Wang} and {Gongxun Miao} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jips/JiangCK21,
title = {A Special Section on Deep & Advanced Machine Learning Approaches for Human Behavior Analysis.},
year = {2021},
journal = {J. Inf. Process. Syst.},
author = {{Yizhang Jiang} and {Kim-Kwang Raymond Choo} and {Hoon Ko}}
}
@article{journals/jis/FardousDHCH21,
title = {Group trip planning and information seeking behaviours by mobile social media users: A study of tourists in Australia, Bangladesh and China.},
year = {2021},
journal = {J. Inf. Sci.},
author = {{Jannatul Fardous} and {Jia Tina Du} and {Preben Hansen} and {Kim-Kwang Raymond Choo} and {Songshan (Sam) Huang}}
}
@article{journals/jnca/BegAAHAKC21,
title = {A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS).},
year = {2021},
journal = {J. Netw. Comput. Appl.},
author = {{Saira Beg} and {Adeel Anjum} and {Mansoor Ahmad} and {Shahid Hussain 001} and {Ghufran Ahmad} and {Suleman Khan 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jnca/ValdovinosDCB21,
title = {Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions.},
year = {2021},
journal = {J. Netw. Comput. Appl.},
author = {{Ismael Amezcua Valdovinos} and {Jesús Arturo Pérez Díaz} and {Kim-Kwang Raymond Choo} and {Juan Felipe Botero}}
}
@article{journals/jnca/XiangRLZZC21,
title = {A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks.},
year = {2021},
journal = {J. Netw. Comput. Appl.},
author = {{Yuexin Xiang} and {Wei Ren 002} and {Tiantian Li} and {Xianghan Zheng} and {Tianqing Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jpdc/ChooGC21,
title = {Blockchain-enabled secure communications in smart cities.},
year = {2021},
journal = {J. Parallel Distributed Comput.},
author = {{Kim-Kwang Raymond Choo} and {Keke Gai} and {Luca Chiaraviglio}}
}
@article{journals/jvcir/BaffourQWQC21,
title = {Spatial self-attention network with self-attention distillation for fine-grained image recognition.},
year = {2021},
journal = {J. Vis. Commun. Image Represent.},
author = {{Adu Asare Baffour} and {Zhen Qin 002} and {Yong Wang} and {Zhiguang Qin} and {Kim-Kwang Raymond Choo}}
}
@article{journals/kbs/Villa-PerezCLMV21,
title = {Semi-supervised anomaly detection algorithms: A comparative summary and future research directions.},
year = {2021},
journal = {Knowl. Based Syst.},
author = {{Miryam Elizabeth Villa-Pérez} and {Miguel Ángel Álvarez-Carmona} and {Octavio Loyola-González} and {Miguel Angel Medina-Pérez} and {Juan Carlos Velazco-Rossell} and {Kim-Kwang Raymond Choo}}
}
@article{journals/network/BaoLWCH21,
title = {Blockchain-Based Secure Communication for Space Information Networks.},
year = {2021},
journal = {IEEE Netw.},
author = {{Zijian Bao} and {Min Luo 002} and {Huaqun Wang} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/network/WuDWC21,
title = {Blockchain-Based Privacy Preservation for 5G-Enabled Drone Communications.},
year = {2021},
journal = {IEEE Netw.},
author = {{Yulei Wu} and {Hong-Ning Dai} and {Hao Wang 003} and {Kim-Kwang Raymond Choo}}
}
@article{journals/network/ZhangWKJLCR21,
title = {Artificial Intelligence Technologies for COVID-19-Like Epidemics: Methods and Challenges.},
year = {2021},
journal = {IEEE Netw.},
author = {{Peiying Zhang} and {Chao Wang 093} and {Neeraj Kumar 001} and {Chunxiao Jiang} and {Qinghua Lu 001} and {Kim-Kwang Raymond Choo} and {Joel J. P. C. Rodrigues}}
}
@article{journals/sap/KebandeKCA21,
title = {Digital forensic readiness intelligence crime repository.},
year = {2021},
journal = {Secur. Priv.},
author = {{Victor R. Kebande} and {Nickson M. Karie} and {Kim-Kwang Raymond Choo} and {Sadi Alawadi}}
}
@article{journals/scn/WangLWWCH21,
title = {The Applications of Blockchain in Artificial Intelligence.},
year = {2021},
journal = {Secur. Commun. Networks},
author = {{Ruonan Wang} and {Min Luo 002} and {Yihong Wen} and {Lianhai Wang} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/sj/BaoHLC21,
title = {A Survey of Blockchain Applications in the Energy Sector.},
year = {2021},
journal = {IEEE Syst. J.},
author = {{Jiabin Bao} and {Debiao He} and {Min Luo 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/sj/LinHHXC21,
title = {PPChain: A Privacy-Preserving Permissioned Blockchain Architecture for Cryptocurrency and Other Regulated Applications.},
year = {2021},
journal = {IEEE Syst. J.},
author = {{Chao Lin} and {Debiao He} and {Xinyi Huang 001} and {Xiang Xie} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcc/AkbarMCK0A21,
title = {A Game-based Thermal-Aware Resource Allocation Strategy for Data Centers.},
year = {2021},
journal = {IEEE Trans. Cloud Comput.},
author = {{Saeed Akbar} and {Saif Ur Rehman Malik} and {Kim-Kwang Raymond Choo} and {Samee U. Khan} and {Naveed Ahmad 001} and {Adeel Anjum}}
}
@article{journals/tcc/KaratiAIC21,
title = {Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment.},
year = {2021},
journal = {IEEE Trans. Cloud Comput.},
author = {{Arijit Karati} and {Ruhul Amin 001} and {SK Hafizul Islam} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcc/MarahattaPZPCL21,
title = {Classification-Based and Energy-Efficient Dynamic Task Scheduling Scheme for Virtualized Cloud Data Center.},
year = {2021},
journal = {IEEE Trans. Cloud Comput.},
author = {{Avinab Marahatta} and {Sandeep Pirbhulal} and {Fa Zhang 001} and {Reza M. Parizi} and {Kim-Kwang Raymond Choo} and {Zhiyong Liu 002}}
}
@article{journals/tdsc/LiangJWJCSC21,
title = {DeepFuzzer: Accelerated Deep Greybox Fuzzing.},
year = {2021},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Jie Liang} and {Yu Jiang 001} and {Mingzhe Wang} and {Xun Jiao} and {Yuanliang Chen} and {Houbing Song} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tdsc/MiaoDCLNL21,
title = {Optimized Verifiable Fine-Grained Keyword Search in Dynamic Multi-Owner Settings.},
year = {2021},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Yinbin Miao} and {Robert H. Deng} and {Kim-Kwang Raymond Choo} and {Ximeng Liu} and {Jianting Ning} and {Hongwei Li 001}}
}
@article{journals/tdsc/MiaoDLCWL21,
title = {Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data.},
year = {2021},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Yinbin Miao} and {Robert H. Deng} and {Ximeng Liu} and {Kim-Kwang Raymond Choo} and {Hongjun Wu 001} and {Hongwei Li 001}}
}
@article{journals/tdsc/MiaoLCDLLM21,
title = {Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting.},
year = {2021},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Yinbin Miao} and {Ximeng Liu} and {Kim-Kwang Raymond Choo} and {Robert H. Deng} and {Jiguo Li 001} and {Hongwei Li 001} and {Jian-Feng Ma 001}}
}
@article{journals/tdsc/XiaoRZC21,
title = {A Mixing Scheme Using a Decentralized Signature Protocol for Privacy Protection in Bitcoin Blockchain.},
year = {2021},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Ruiyang Xiao} and {Wei Ren 002} and {Tianqing Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tdsc/ZhouCCD21,
title = {PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting.},
year = {2021},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Jun Zhou 018} and {Kim-Kwang Raymond Choo} and {Zhenfu Cao} and {Xiaolei Dong}}
}
@article{journals/tetc/ChenWKCH21,
title = {Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data.},
year = {2021},
journal = {IEEE Trans. Emerg. Top. Comput.},
author = {{Biwen Chen} and {Libing Wu} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/tetc/LiuDCY21,
title = {Privacy-Preserving Reinforcement Learning Design for Patient-Centric Dynamic Treatment Regimes.},
year = {2021},
journal = {IEEE Trans. Emerg. Top. Comput.},
author = {{Ximeng Liu} and {Robert H. Deng} and {Kim-Kwang Raymond Choo} and {Yang Yang 026}}
}
@article{journals/tfs/QinHXQC21,
title = {A Fuzzy Authentication System Based on Neural Network Learning and Extreme Value Statistics.},
year = {2021},
journal = {IEEE Trans. Fuzzy Syst.},
author = {{Zhen Qin 002} and {Gu Huang} and {Hu Xiong} and {Zhiguang Qin} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/DaiLCLZJ21,
title = {CRSA: A Cryptocurrency Recovery Scheme Based on Hidden Assistance Relationships.},
year = {2021},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Weiqi Dai} and {Yan Lv} and {Kim-Kwang Raymond Choo} and {Zhongze Liu} and {Deqing Zou} and {Hai Jin 001}}
}
@article{journals/tifs/DingWZCJ21,
title = {Efficient and Privacy-Preserving Multi-Party Skyline Queries Over Encrypted Data.},
year = {2021},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Xiaofeng Ding 001} and {Zuan Wang} and {Pan Zhou} and {Kim-Kwang Raymond Choo} and {Hai Jin 001}}
}
@article{journals/tifs/LinHHC21,
title = {OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing.},
year = {2021},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Chao Lin} and {Debiao He} and {Xinyi Huang 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tii/GaoYJSCS21,
title = {Semantic Learning Based Cross-Platform Binary Vulnerability Search For IoT Devices.},
year = {2021},
journal = {IEEE Trans. Ind. Informatics},
author = {{Jian Gao 008} and {Xin Yang} and {Yu Jiang 001} and {Houbing Song} and {Kim-Kwang Raymond Choo} and {Jiaguang Sun 001}}
}
@article{journals/tii/GuoSCT21,
title = {A Fast Nearest Neighbor Search Scheme Over Outsourced Encrypted Medical Images.},
year = {2021},
journal = {IEEE Trans. Ind. Informatics},
author = {{Cheng Guo 001} and {Shenghao Su} and {Kim-Kwang Raymond Choo} and {Xinyu Tang}}
}
@article{journals/tii/GuoTC21,
title = {Enabling Privacy-Assured Fog-Based Data Aggregation in E-Healthcare Systems.},
year = {2021},
journal = {IEEE Trans. Ind. Informatics},
author = {{Cheng Guo 001} and {Pengxu Tian} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tii/LiMMLLC21,
title = {Secure and Verifiable Multikey Image Search in Cloud-Assisted Edge Computing.},
year = {2021},
journal = {IEEE Trans. Ind. Informatics},
author = {{Yingying Li} and {Jianfeng Ma 001} and {Yinbin Miao} and {Liming Liu} and {Ximeng Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tii/Wang0C21,
title = {Fault-Tolerant Multisubset Aggregation Scheme for Smart Grid.},
year = {2021},
journal = {IEEE Trans. Ind. Informatics},
author = {{Xiaodi Wang} and {Yining Liu 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tits/GaiWZCX21,
title = {Blockchain-Enabled Trustworthy Group Communications in UAV Networks.},
year = {2021},
journal = {IEEE Trans. Intell. Transp. Syst.},
author = {{Keke Gai} and {Yulu Wu} and {Liehuang Zhu} and {Kim-Kwang Raymond Choo} and {Bin Xiao 001}}
}
@article{journals/tits/LinHHKC21,
title = {BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks.},
year = {2021},
journal = {IEEE Trans. Intell. Transp. Syst.},
author = {{Chao Lin} and {Debiao He} and {Xinyi Huang 001} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tkde/DingWCJ21,
title = {A Novel Privacy Preserving Framework for Large Scale Graph Data Publishing.},
year = {2021},
journal = {IEEE Trans. Knowl. Data Eng.},
author = {{Xiaofeng Ding 001} and {Cui Wang} and {Kim-Kwang Raymond Choo} and {Hai Jin 001}}
}
@article{journals/tmc/ChiaraviglioDLG21,
title = {Multi-Area Throughput and Energy Optimization of UAV-Aided Cellular Networks Powered by Solar Panels and Grid.},
year = {2021},
journal = {IEEE Trans. Mob. Comput.},
author = {{Luca Chiaraviglio} and {Fabio D'Andreagiovanni} and {William Liu} and {Jairo A. Gutiérrez} and {Nicola Blefari-Melazzi} and {Kim-Kwang Raymond Choo} and {Mohamed-Slim Alouini}}
}
@article{journals/tnse/ChenHKWC21,
title = {A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems.},
year = {2021},
journal = {IEEE Trans. Netw. Sci. Eng.},
author = {{Biwen Chen} and {Debiao He} and {Neeraj Kumar 001} and {Huaqun Wang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tnse/YazdinejadPDC21,
title = {Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks.},
year = {2021},
journal = {IEEE Trans. Netw. Sci. Eng.},
author = {{Abbas Yazdinejad} and {Reza M. Parizi} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tnse/ZhangWRZCX21,
title = {SIP: An Efficient and Secure Information Propagation Scheme in E-Health Networks.},
year = {2021},
journal = {IEEE Trans. Netw. Sci. Eng.},
author = {{Liping Zhang 003} and {Zhen Wei} and {Wei Ren 002} and {Xianghan Zheng} and {Kim-Kwang Raymond Choo} and {Neal N. Xiong}}
}
@article{journals/toit/ChenYGLC21,
title = {Time-Efficient Ensemble Learning with Sample Exchange for Edge Computing.},
year = {2021},
journal = {ACM Trans. Internet Techn.},
author = {{Wu Chen} and {Yong Yu} and {Keke Gai} and {Jiamou Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/toit/ChooGTPD21,
title = {Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems.},
year = {2021},
journal = {ACM Trans. Internet Techn.},
author = {{Kim-Kwang Raymond Choo} and {Uttam Ghosh} and {Deepak K. Tosh} and {Reza M. Parizi} and {Ali Dehghantanha}}
}
@article{journals/toit/MarquesEAMHCDC21,
title = {A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks.},
year = {2021},
journal = {ACM Trans. Internet Techn.},
author = {{Rafael Salema Marques} and {Gregory Epiphaniou} and {Haider M. Al-Khateeb} and {Carsten Maple} and {Mohammad Hammoudeh} and {Paulo André Lima de Castro} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/trets/ZhouHLLC21,
title = {A Software/Hardware Co-Design of Crystals-Dilithium Signature Scheme.},
year = {2021},
journal = {ACM Trans. Reconfigurable Technol. Syst.},
author = {{Zhen Zhou} and {Debiao He} and {Zhe Liu 001} and {Min Luo 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tsc/LiuDCY21,
title = {Privacy-Preserving Outsourced Clinical Decision Support System in the Cloud.},
year = {2021},
journal = {IEEE Trans. Serv. Comput.},
author = {{Ximeng Liu} and {Robert H. Deng} and {Kim-Kwang Raymond Choo} and {Yang Yang 026}}
}
@article{journals/tsc/NingCDLWC21,
title = {CryptCloud\$^+\$+: Secure and Expressive Data Access Control for Cloud Storage.},
year = {2021},
journal = {IEEE Trans. Serv. Comput.},
author = {{Jianting Ning} and {Zhenfu Cao} and {Xiaolei Dong} and {Kaitai Liang} and {Lifei Wei} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tsg/AhmedSGMKPC21,
title = {Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment.},
year = {2021},
journal = {IEEE Trans. Smart Grid},
author = {{Shafiq Ahmed} and {Salman Shamshad} and {Zahid Ghaffar} and {Khalid Mahmood 002} and {Neeraj Kumar 001} and {Reza M. Parizi} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tsusc/AhsanWIKBC21,
title = {CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics.},
year = {2021},
journal = {IEEE Trans. Sustain. Comput.},
author = {{M. A. Manazir Ahsan} and {Ainuddin Wahid Bin Abdul Wahab} and {Mohd Yamani Idna Bin Idris} and {Suleman Khan 001} and {Eric Bachura} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tsusc/ShettyGC21,
title = {Are You Dating Danger? An Interdisciplinary Approach to Evaluating the (In)Security of Android Dating Apps.},
year = {2021},
journal = {IEEE Trans. Sustain. Comput.},
author = {{Rushank Shetty} and {George Grispos} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tvt/BaggaDWRCP21,
title = {On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System.},
year = {2021},
journal = {IEEE Trans. Veh. Technol.},
author = {{Palak Bagga} and {Ashok Kumar Das} and {Mohammad Wazid} and {Joel J. P. C. Rodrigues} and {Kim-Kwang Raymond Choo} and {YoungHo Park 005}}
}
@article{journals/tvt/LiMMYLC21,
title = {Secure Semantic-Aware Search Over Dynamic Spatial Data in VANETs.},
year = {2021},
journal = {IEEE Trans. Veh. Technol.},
author = {{Jiayi Li} and {Jianfeng Ma 001} and {Yinbin Miao} and {Fan Yang} and {Ximeng Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tvt/LiSGCJP21,
title = {Secure Data Deduplication Protocol for Edge-Assisted Mobile CrowdSensing Services.},
year = {2021},
journal = {IEEE Trans. Veh. Technol.},
author = {{Jiliang Li} and {Zhou Su} and {Deke Guo} and {Kim-Kwang Raymond Choo} and {Yusheng Ji} and {Huayan Pu}}
}
@article{journals/wpc/Toral-CruzHMCK21,
title = {Reliable and Secure e-Health Networks.},
year = {2021},
journal = {Wirel. Pers. Commun.},
author = {{Homero Toral-Cruz} and {Debiao He} and {Albena Dimitrova Mihovska} and {Kim-Kwang Raymond Choo} and {Muhammad Khurram Khan}}
}
@inproceedings{conf/asiaccs/GaiC22,
title = {BSCI 2022: The 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure.},
year = {2022},
booktitle = {AsiaCCS},
author = {{Keke Gai} and {Kim-Kwang Raymond Choo}},
publisher = {ACM},
booktitle = {ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}
}
@inproceedings{conf/hpcc/YinLCLL22,
title = {Forward and Backward Private Searchable Symmetric Encryption with Efficient Updates.},
year = {2022},
booktitle = {HPCC/DSS/SmartCity/DependSys},
author = {{Zhiming Yin} and {Xiong Li 002} and {Kim-Kwang Raymond Choo} and {Yuzhen Liu} and {Wei Liang 005}},
publisher = {IEEE},
booktitle = {24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application, HPCC/DSS/SmartCity/DependSys 2022, Hainan, China, December 18-20, 2022}
}
@inproceedings{conf/icdcs/YangMCD22,
title = {Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud Data.},
year = {2022},
booktitle = {ICDCS},
author = {{Yutao Yang} and {Yinbin Miao} and {Kim-Kwang Raymond Choo} and {Robert H. Deng}},
publisher = {IEEE},
booktitle = {42nd IEEE International Conference on Distributed Computing Systems, ICDCS 2022, Bologna, Italy, July 10-13, 2022}
}
@inproceedings{conf/mdm/PuWAC22,
title = {SecureIoD: A Secure Data Collection and Storage Mechanism for Internet of Drones.},
year = {2022},
booktitle = {MDM},
author = {{Cong Pu} and {Andrew Wall} and {Imtiaz Ahmed 001} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {23rd IEEE International Conference on Mobile Data Management, MDM 2022, Paphos, Cyprus, June 6-9, 2022}
}
@inproceedings{conf/secrypt/MalinaRDJHC22,
title = {On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms.},
year = {2022},
booktitle = {SECRYPT},
author = {{Lukas Malina} and {Sara Ricci} and {Patrik Dobias} and {Petr Jedlicka} and {Jan Hajny} and {Kim-Kwang Raymond Choo}},
publisher = {SCITEPRESS},
booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022.}
}
@article{journals/access/AsikuzzamanMMCP22,
title = {Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD Domain.},
year = {2022},
journal = {IEEE Access},
author = {{Md. Asikuzzaman} and {Hannes Mareen} and {Nour Moustafa} and {Kim-Kwang Raymond Choo} and {Mark R. Pickering}}
}
@article{journals/adhoc/DwivediADLCV22,
title = {Blockchain-based vehicular ad-hoc networks: A comprehensive survey.},
year = {2022},
journal = {Ad Hoc Networks},
author = {{Sanjeev Kumar Dwivedi} and {Ruhul Amin 001} and {Ashok Kumar Das} and {Mark T. Leung} and {Kim-Kwang Raymond Choo} and {Satyanarayana Vollala}}
}
@article{journals/air/ZhangNSFXXZC22,
title = {Artificial intelligence in cyber security: research advances, challenges, and opportunities.},
year = {2022},
journal = {Artif. Intell. Rev.},
author = {{Zhimin Zhang 005} and {Huansheng Ning} and {Feifei Shi} and {Fadi Farha} and {Yang Xu} and {Jiabo Xu} and {Fan Zhang 042} and {Kim-Kwang Raymond Choo}}
}
@article{journals/cj/ChenZC22,
title = {A New Code-Based Blind Signature Scheme.},
year = {2022},
journal = {Comput. J.},
author = {{Siyuan Chen} and {Peng Zeng 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/AldaajehSABBC22,
title = {The role of national cybersecurity strategies on the improvement of cybersecurity education.},
year = {2022},
journal = {Comput. Secur.},
author = {{Saleh H. Aldaajeh} and {Heba Saleous} and {Saed Alrabaee} and {Ezedin Barka} and {Frank Breitinger} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/DaveCSYC22,
title = {Cyber security challenges in aviation communication, navigation, and surveillance.},
year = {2022},
journal = {Comput. Secur.},
author = {{Gaurav Dave} and {Gaurav Choudhary} and {Vikas Sihag} and {Ilsun You} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/GuZLZRC22,
title = {Privacy, accuracy, and model fairness trade-offs in federated learning.},
year = {2022},
journal = {Comput. Secur.},
author = {{Xiuting Gu} and {Tianqing Zhu} and {Jie Li} and {Tao Zhang 055} and {Wei Ren 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/HassaninMTC22,
title = {Rethinking maximum-margin softmax for adversarial robustness.},
year = {2022},
journal = {Comput. Secur.},
author = {{Mohammed Hassanin} and {Nour Moustafa} and {Murat Tahtali} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/PuC22,
title = {Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function.},
year = {2022},
journal = {Comput. Secur.},
author = {{Cong Pu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/WangYWCZMR22,
title = {Black-box adversarial attacks on XSS attack detection model.},
year = {2022},
journal = {Comput. Secur.},
author = {{Qiuhua Wang} and {Hui Yang} and {Guohua Wu 001} and {Kim-Kwang Raymond Choo} and {Zheng Zhang} and {Gongxun Miao} and {Yizhi Ren}}
}
@article{journals/compsec/WangZXRC22,
title = {A privacy preservation method for multiple-source unstructured data in online social networks.},
year = {2022},
journal = {Comput. Secur.},
author = {{Chenguang Wang 008} and {Tianqing Zhu} and {Ping Xiong 001} and {Wei Ren 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/concurrency/ZhuWCBCQLW22,
title = {On authenticated skyline query processing over road networks.},
year = {2022},
journal = {Concurr. Comput. Pract. Exp.},
author = {{Xiaoyu Zhu} and {Jie Wu 001} and {Wei Chang} and {Md. Zakirul Alam Bhuiyan} and {Kim-Kwang Raymond Choo} and {Fang Qi} and {Qin Liu 001} and {Guojun Wang 001}}
}
@article{journals/corr/abs-2204-05746,
title = {BABD: A Bitcoin Address Behavior Dataset for Address Behavior Pattern Analysis.},
year = {2022},
journal = {CoRR},
author = {{Yuexin Xiang} and {Yuchen Lei} and {Ding Bao} and {Wei Ren 002} and {Tiantian Li} and {Qingqing Yang} and {Wenmao Liu} and {Tianqing Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/abs-2205-14611,
title = {Forensic Artefact Discovery and Attribution from Android Cryptocurrency Wallet Applications.},
year = {2022},
journal = {CoRR},
author = {{Eugene Chang} and {Paul D'Arcy} and {Kim-Kwang Raymond Choo} and {Nhien-An Le-Khac}}
}
@article{journals/corr/abs-2205-14665,
title = {Multi-Domain Virtual Network Embedding Algorithm based on Horizontal Federated Learning.},
year = {2022},
journal = {CoRR},
author = {{Peiying Zhang} and {Ning Chen} and {Shibao Li} and {Kim-Kwang Raymond Choo} and {Chunxiao Jiang}}
}
@article{journals/csur/HuangHOVLC21,
title = {The Application of the Blockchain Technology in Voting Systems: A Review.},
year = {2022},
journal = {ACM Comput. Surv.},
author = {{Jun Huang 002} and {Debiao He} and {Mohammad S. Obaidat} and {Pandi Vijayakumar} and {Min Luo 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/csur/ZouHZKWC22,
title = {Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges.},
year = {2022},
journal = {ACM Comput. Surv.},
author = {{Jinglin Zou} and {Debiao He} and {Sherali Zeadally} and {Neeraj Kumar 001} and {Huaqun Wang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/distribledger/ChooH22,
title = {Editorial: The Inaugural Issue of ACM Distributed Ledger Technologies: Research and Practice.},
year = {2022},
journal = {Distributed Ledger Technol. Res. Pract.},
author = {{Kim-Kwang Raymond Choo} and {Mohammad Hammoudeh}}
}
@article{journals/igpl/AlabdulsalamDCL22,
title = {An efficient IoT forensic approach for the evidence acquisition and analysis based on network link.},
year = {2022},
journal = {Log. J. IGPL},
author = {{Saad Khalid Alabdulsalam} and {Trung Q. Duong} and {Kim-Kwang Raymond Choo} and {Nhien-An Le-Khac}}
}
@article{journals/iotj/AhvanooeyZLMCGC22,
title = {Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Milad Taleby Ahvanooey} and {Mark Xuefang Zhu} and {Qianmu Li} and {Wojciech Mazurczyk} and {Kim-Kwang Raymond Choo} and {Brij Bhooshan Gupta} and {Mauro Conti}}
}
@article{journals/iotj/ChenWZNDZC22,
title = {Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Dajiang Chen} and {Hao Wang 003} and {Ning Zhang 007} and {Xuyun Nie} and {Hong-Ning Dai} and {Kuan Zhang 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/CviticPGC22,
title = {Boosting-Based DDoS Detection in Internet of Things Systems.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Ivan Cvitic} and {Dragan Perakovic} and {Brij B. Gupta} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/DaiTYCZ022,
title = {HAPPS: A Hidden Attribute and Privilege-Protection Data-Sharing Scheme With Verifiability.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Weiqi Dai} and {Shuyue Tuo} and {Liangliang Yu} and {Kim-Kwang Raymond Choo} and {Deqing Zou} and {Hai Jin 001}}
}
@article{journals/iotj/FengLGYQC22,
title = {Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Chaosheng Feng} and {Bin Liu} and {Zhen Guo} and {Keping Yu} and {Zhiguang Qin} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/FengMLMLC22,
title = {Transparent Ciphertext Retrieval System Supporting Integration of Encrypted Heterogeneous Database in Cloud-Assisted IoT.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Xiaoqin Feng} and {Jianfeng Ma 001} and {Shaobin Liu} and {Yinbin Miao} and {Ximeng Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/GaiDWZCZW22,
title = {Attacking the Edge-of-Things: A Physical Attack Perspective.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Keke Gai} and {Yaoling Ding} and {An Wang 001} and {Liehuang Zhu} and {Kim-Kwang Raymond Choo} and {Qi Zhang 010} and {Zhuping Wang}}
}
@article{journals/iotj/GaiFWZJC22,
title = {Edge Computing and Lightning Network Empowered Secure Food Supply Management.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Keke Gai} and {Zhengkang Fang} and {Ruili Wang} and {Liehuang Zhu} and {Peng Jiang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/GuoSCTT22,
title = {A Provably Secure and Efficient Range Query Scheme for Outsourced Encrypted Uncertain Data From Cloud-Based Internet of Things Systems.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Cheng Guo 001} and {Shenghao Su} and {Kim-Kwang Raymond Choo} and {Pengxu Tian} and {Xinyu Tang}}
}
@article{journals/iotj/JiaLCLH22,
title = {A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Xiaoying Jia 002} and {Min Luo 002} and {Kim-Kwang Raymond Choo} and {Li Li 073} and {Debiao He}}
}
@article{journals/iotj/LiZMMMLC22,
title = {CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Xinghua Li 001} and {Hengyou Zhang} and {Yinbin Miao} and {Siqi Ma} and {Jianfeng Ma 001} and {Ximeng Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/LiuMCLLMD22,
title = {Time-Controlled Hierarchical Multikeyword Search Over Encrypted Data in Cloud-Assisted IoT.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Tong Liu} and {Yinbin Miao} and {Kim-Kwang Raymond Choo} and {Hongwei Li 001} and {Ximeng Liu} and {Xiangdong Meng} and {Robert H. Deng}}
}
@article{journals/iotj/LuoLLRZGC22,
title = {RESAT: A Utility-Aware Incentive Mechanism-Based Distributed Spatial Cloaking.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Bin Luo 006} and {Xinghua Li 001} and {Ximeng Liu} and {Yanbing Ren} and {Man Zhang} and {Jingjing Guo} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/MallADLC22,
title = {PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Priyanka Mall} and {Ruhul Amin 001} and {Ashok Kumar Das} and {Mark T. Leung} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/PuWCAL22,
title = {A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Cong Pu} and {Andrew Wall} and {Kim-Kwang Raymond Choo} and {Imtiaz Ahmed 001} and {Sunho Lim}}
}
@article{journals/iotj/PuZWLCA22,
title = {A Lightweight and Anonymous Authentication and Key Agreement Protocol for Wireless Body Area Networks.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Cong Pu} and {Haleigh Zerkle} and {Andrew Wall} and {Sunho Lim} and {Kim-Kwang Raymond Choo} and {Imtiaz Ahmed 001}}
}
@article{journals/iotj/SahooTLNCB22,
title = {Demand-Supply-Based Economic Model for Resource Provisioning in Industrial IoT Traffic.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Kshira Sagar Sahoo} and {Mayank Tiwari 003} and {Ashish Kr. Luhach} and {Anand Nayyar} and {Kim-Kwang Raymond Choo} and {Muhammad Bilal 003}}
}
@article{journals/iotj/Shen0C22,
title = {Multicopy and Multiserver Provable Data Possession for Cloud-Based IoT.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Jiayan Shen} and {Peng Zeng 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/SongMWCLD22,
title = {Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Lin Song} and {Yinbin Miao} and {Jian Weng 001} and {Kim-Kwang Raymond Choo} and {Ximeng Liu} and {Robert H. Deng}}
}
@article{journals/iotj/WangWWCWH22,
title = {A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Jing Wang 036} and {Libing Wu} and {Huaqun Wang} and {Kim-Kwang Raymond Choo} and {Lianhai Wang} and {Debiao He}}
}
@article{journals/iotj/WazidDCP22,
title = {SCS-WoT: Secure Communication Scheme for Web of Things Deployment.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Mohammad Wazid} and {Ashok Kumar Das} and {Kim-Kwang Raymond Choo} and {Youngho Park 005}}
}
@article{journals/iotj/WeiZLNSCY22,
title = {A Redactable Blockchain Framework for Secure Federated Learning in Industrial Internet of Things.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Jiannan Wei} and {Qinchuan Zhu} and {Qianmu Li} and {Laisen Nie} and {Zhangyi Shen} and {Kim-Kwang Raymond Choo} and {Keping Yu}}
}
@article{journals/iotj/XenofontosZKJKC22,
title = {Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Christos Xenofontos} and {Ioannis Zografopoulos} and {Charalambos Konstantinou} and {Alireza Jolfaei} and {Muhammad Khurram Khan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/XuYBWDC22,
title = {Service Migration Across Edge Devices in 6G-Enabled Internet of Vehicles Networks.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Xiaolong Xu 001} and {Liang Yao} and {Muhammad Bilal 003} and {Shaohua Wan 001} and {Fei Dai 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/YangMYNMC22,
title = {Privacy-Preserving Threshold Spatial Keyword Search in Cloud-Assisted IIoT.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Yutao Yang} and {Yinbin Miao} and {Zuobin Ying} and {Jianting Ning} and {Xiangdong Meng} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/YuTYCBRS22,
title = {A Blockchain-Based Shamir's Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Keping Yu} and {Liang Tan 001} and {Caixia Yang} and {Kim-Kwang Raymond Choo} and {Ali Kashif Bashir} and {Joel J. P. C. Rodrigues} and {Takuro Sato}}
}
@article{journals/ipm/QinCDZQC22,
title = {Segmentation mask and feature similarity loss guided GAN for object-oriented image-to-image translation.},
year = {2022},
journal = {Inf. Process. Manag.},
author = {{Zhen Qin 002} and {Qingya Chen} and {Yi Ding 003} and {Tianming Zhuang} and {Zhiguang Qin} and {Kim-Kwang Raymond Choo}}
}
@article{journals/isf/ChooPLW22,
title = {Introducing the Special Topic on "Mitigating Cyber Threats and Defense in Data Intensive Smart Cities".},
year = {2022},
journal = {Inf. Syst. Frontiers},
author = {{Kim-Kwang Raymond Choo} and {Deepak Puthal} and {Charles Zhechao Liu} and {Chonggang Wang}}
}
@article{journals/istr/AhvanooeyZMLKCC22,
title = {CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks.},
year = {2022},
journal = {J. Inf. Secur. Appl.},
author = {{Milad Taleby Ahvanooey} and {Mark Xuefang Zhu} and {Wojciech Mazurczyk} and {Qianmu Li} and {Max Kilger} and {Kim-Kwang Raymond Choo} and {Mauro Conti}}
}
@article{journals/itpro/AhvanooeyZMCCZ22,
title = {Misinformation Detection on Social Media: Challenges and the Road Ahead.},
year = {2022},
journal = {IT Prof.},
author = {{Milad Taleby Ahvanooey} and {Mark Xuefang Zhu} and {Wojciech Mazurczyk} and {Kim-Kwang Raymond Choo} and {Mauro Conti} and {Jing Zhang 015}}
}
@article{journals/jpdc/FrihaFSMCN22,
title = {FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things.},
year = {2022},
journal = {J. Parallel Distributed Comput.},
author = {{Othmane Friha} and {Mohamed Amine Ferrag} and {Lei Shu 001} and {Leandros A. Maglaras} and {Kim-Kwang Raymond Choo} and {Mehdi Nafaa}}
}
@article{journals/jpdc/TangDLGWHC22,
title = {Coordinate-based efficient indexing mechanism for intelligent IoT systems in heterogeneous edge computing.},
year = {2022},
journal = {J. Parallel Distributed Comput.},
author = {{Songtao Tang} and {Xin Du} and {Zhihui Lu 002} and {Keke Gai} and {Jie Wu 003} and {Patrick C. K. Hung} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jsac/ZhangGXZC22,
title = {Blockchain-Empowered Efficient Data Sharing in Internet of Things Settings.},
year = {2022},
journal = {IEEE J. Sel. Areas Commun.},
author = {{Yue Zhang} and {Keke Gai} and {Jiang Xiao} and {Liehuang Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/sap/KebandeC22,
title = {Finite state machine for cloud forensic readiness as a service (CFRaaS) events.},
year = {2022},
journal = {Secur. Priv.},
author = {{Victor R. Kebande} and {Kim-Kwang Raymond Choo}}
}
@article{journals/sj/LinLHCH22,
title = {An Efficient Privacy-Preserving Credit Score System Based on Noninteractive Zero-Knowledge Proof.},
year = {2022},
journal = {IEEE Syst. J.},
author = {{Chao Lin} and {Min Luo 002} and {Xinyi Huang 001} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/sj/LiuLLHWC22,
title = {The Security of Blockchain-Based Medical Systems: Research Challenges and Opportunities.},
year = {2022},
journal = {IEEE Syst. J.},
author = {{Qin Liu 003} and {Yunlian Liu} and {Min Luo 002} and {Debiao He} and {Huaqun Wang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/sj/MothukuriPPDC22,
title = {FabricFL: Blockchain-in-the-Loop Federated Learning for Trusted Decentralized Systems.},
year = {2022},
journal = {IEEE Syst. J.},
author = {{Viraaji Mothukuri} and {Reza M. Parizi} and {Seyedamin Pouriyeh} and {Ali Dehghantanha} and {Kim-Kwang Raymond Choo}}
}
@article{journals/sj/TangGRWC22,
title = {A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems.},
year = {2022},
journal = {IEEE Syst. J.},
author = {{Xinyu Tang} and {Cheng Guo 001} and {Yizhi Ren} and {Cong Wang 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/sj/TianGCLLY22,
title = {EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search.},
year = {2022},
journal = {IEEE Syst. J.},
author = {{Pengxu Tian} and {Cheng Guo 001} and {Kim-Kwang Raymond Choo} and {Yining Liu 002} and {Long Li 005} and {Lin Yao 001}}
}
@article{journals/sj/ZhangYLHC22,
title = {DssP: Efficient Dual-Server Secret Sharing Protocol Based on Password Authentication for Cloud Storage Services.},
year = {2022},
journal = {IEEE Syst. J.},
author = {{Songsong Zhang} and {Xie Yong} and {Min Luo 002} and {Debiao He} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tbd/EbadiJCR22,
title = {A Memory Network Information Retrieval Model for Identification of News Misinformation.},
year = {2022},
journal = {IEEE Trans. Big Data},
author = {{Nima Ebadi} and {Mohsen M. Jozani} and {Kim-Kwang Raymond Choo} and {Paul Rad}}
}
@article{journals/tbd/XiongCV22,
title = {Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing.},
year = {2022},
journal = {IEEE Trans. Big Data},
author = {{Hu Xiong} and {Kim-Kwang Raymond Choo} and {Athanasios V. Vasilakos}}
}
@article{journals/tbd/YangLCYT22,
title = {Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud.},
year = {2022},
journal = {IEEE Trans. Big Data},
author = {{Xue Yang 003} and {Rongxing Lu} and {Kim-Kwang Raymond Choo} and {Fan Yin} and {Xiaohu Tang}}
}
@article{journals/tc/Li0MLYWLC22,
title = {DVREI: Dynamic Verifiable Retrieval Over Encrypted Images.},
year = {2022},
journal = {IEEE Trans. Computers},
author = {{Yingying Li} and {Jianfeng Ma 001} and {Yinbin Miao} and {Huizhong Li} and {Qiang Yan 001} and {Yue Wang 063} and {Ximeng Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcc/AliSMCRC22,
title = {An Automated Task Scheduling Model Using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems.},
year = {2022},
journal = {IEEE Trans. Cloud Comput.},
author = {{Ismail M. Ali} and {Karam M. Sallam} and {Nour Moustafa} and {Ripon K. Chakrabortty} and {Michael J. Ryan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcc/GaiZQXC22,
title = {Multi-Access Filtering for Privacy-Preserving Fog Computing.},
year = {2022},
journal = {IEEE Trans. Cloud Comput.},
author = {{Keke Gai} and {Liehuang Zhu} and {Meikang Qiu} and {Kai Xu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcc/LiMMWLC22,
title = {Similarity Search for Encrypted Images in Secure Cloud Computing.},
year = {2022},
journal = {IEEE Trans. Cloud Comput.},
author = {{Yingying Li} and {Jianfeng Ma 001} and {Yinbin Miao} and {Yue Wang 063} and {Ximeng Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcc/LiMMWYLC22,
title = {Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings.},
year = {2022},
journal = {IEEE Trans. Cloud Comput.},
author = {{Yingying Li} and {Jianfeng Ma 001} and {Yinbin Miao} and {Yue Wang 063} and {Tengfei Yang} and {Ximeng Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcc/LiMMYLC22,
title = {Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data.},
year = {2022},
journal = {IEEE Trans. Cloud Comput.},
author = {{Jiayi Li} and {Jianfeng Ma 001} and {Yinbin Miao} and {Ruikang Yang} and {Ximeng Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcc/MiaoDCLL22,
title = {Threshold Multi-Keyword Search for Cloud-Based Group Data Sharing.},
year = {2022},
journal = {IEEE Trans. Cloud Comput.},
author = {{Yinbin Miao} and {Robert H. Deng} and {Kim-Kwang Raymond Choo} and {Ximeng Liu} and {Hongwei Li 001}}
}
@article{journals/tcc/MiaoTDCLL22,
title = {Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage.},
year = {2022},
journal = {IEEE Trans. Cloud Comput.},
author = {{Yinbin Miao} and {Qiuyun Tong} and {Robert H. Deng} and {Kim-Kwang Raymond Choo} and {Ximeng Liu} and {Hongwei Li 001}}
}
@article{journals/tcc/PanchalSDKC22,
title = {Designing Secure and Efficient Biometric-Based Access Mechanism for Cloud Services.},
year = {2022},
journal = {IEEE Trans. Cloud Comput.},
author = {{Gaurang Panchal} and {Debasis Samanta} and {Ashok Kumar Das} and {Neeraj Kumar 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcc/TongMLCDL22,
title = {VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things.},
year = {2022},
journal = {IEEE Trans. Cloud Comput.},
author = {{Qiuyun Tong} and {Yinbin Miao} and {Ximeng Liu} and {Kim-Kwang Raymond Choo} and {Robert H. Deng} and {Hongwei Li 001}}
}
@article{journals/tcc/WangXLC22,
title = {Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage.},
year = {2022},
journal = {IEEE Trans. Cloud Comput.},
author = {{Feng Wang 020} and {Li Xu 002} and {Jiguo Li 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcc/ZhouCDC22,
title = {Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain.},
year = {2022},
journal = {IEEE Trans. Cloud Comput.},
author = {{Jun Zhou 018} and {Zhenfu Cao} and {Xiaolei Dong} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tdsc/00080CHSKZ22,
title = {DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain.},
year = {2022},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Yi Chen 008} and {Hongxia Wang 001} and {Kim-Kwang Raymond Choo} and {Peisong He} and {Zoran Salcic} and {Dali Kaafar} and {Xuyun Zhang}}
}
@article{journals/tdsc/BanerjeeBCLN22,
title = {A Hardware-Assisted Heartbeat Mechanism for Fault Identification in Large-Scale IoT Systems.},
year = {2022},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Mandrita Banerjee} and {Carlo Borges} and {Kim-Kwang Raymond Choo} and {Junghee Lee} and {Chrysostomos Nicopoulos}}
}
@article{journals/tdsc/FengMMLC22,
title = {Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks.},
year = {2022},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Xiaoqin Feng} and {Jianfeng Ma 001} and {Yinbin Miao} and {Ximeng Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tdsc/LuCSC22,
title = {CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions.},
year = {2022},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Ning Lu 005} and {Yuan Chang} and {Wenbo Shi} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tem/ChooODP22,
title = {Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges: Part II.},
year = {2022},
journal = {IEEE Trans. Engineering Management},
author = {{Kim-Kwang Raymond Choo} and {Sercan Ozcan} and {Ali Dehghantanha} and {Reza M. Parizi}}
}
@article{journals/tifs/ChenJZLC22,
title = {On Message Authentication Channel Capacity Over a Wiretap Channel.},
year = {2022},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Dajiang Chen} and {Shaoquan Jiang} and {Ning Zhang 007} and {Lei Liu 031} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/MiaoLLCD22,
title = {Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems.},
year = {2022},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Yinbin Miao} and {Ziteng Liu} and {Hongwei Li 001} and {Kim-Kwang Raymond Choo} and {Robert H. Deng}}
}
@article{journals/tifs/RenLMLWCD22,
title = {Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach.},
year = {2022},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Yanbing Ren} and {Xinghua Li 001} and {Yinbin Miao} and {Bin Luo 006} and {Jian Weng 001} and {Kim-Kwang Raymond Choo} and {Robert H. Deng}}
}
@article{journals/tifs/WangXWRMC22,
title = {SDoS: Selfish Mining-Based Denial-of-Service Attack.},
year = {2022},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Qiuhua Wang} and {Tianyu Xia} and {Dong Wang 019} and {Yizhi Ren} and {Gongxun Miao} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/YangZZCZ22,
title = {Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET.},
year = {2022},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Yafang Yang} and {Lei Zhang 009} and {Yunlei Zhao} and {Kim-Kwang Raymond Choo} and {Yan Zhang 103}}
}
@article{journals/tii/0003GC0CX22,
title = {A Privacy-Preserving Proximity Testing Using Private Set Intersection for Vehicular Ad-Hoc Networks.},
year = {2022},
journal = {IEEE Trans. Ind. Informatics},
author = {{Liping Zhang 003} and {Wenhao Gao 002} and {Shukai Chen} and {Wei Ren 002} and {Kim-Kwang Raymond Choo} and {Neal N. Xiong}}
}
@article{journals/tii/HaoRCX22,
title = {A Self-Trading and Authenticated Roaming Scheme Based on Blockchain for Smart Grids.},
year = {2022},
journal = {IEEE Trans. Ind. Informatics},
author = {{Xiaohan Hao} and {Wei Ren 002} and {Kim-Kwang Raymond Choo} and {Neal N. Xiong}}
}
@article{journals/tii/MaMMLCGD22,
title = {Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things.},
year = {2022},
journal = {IEEE Trans. Ind. Informatics},
author = {{Zhuoran Ma} and {Jianfeng Ma 001} and {Yinbin Miao} and {Ximeng Liu} and {Kim-Kwang Raymond Choo} and {Yu Gao} and {Robert H. Deng}}
}
@article{journals/tii/MoustafaCA22,
title = {Guest Editorial: AI-Enabled Threat Intelligence and Hunting Microservices for Distributed Industrial IoT System.},
year = {2022},
journal = {IEEE Trans. Ind. Informatics},
author = {{Nour Moustafa} and {Kim-Kwang Raymond Choo} and {Adnan M. Abu-Mahfouz}}
}
@article{journals/titb/DingZGQCQH22,
title = {MVFusFra: A Multi-View Dynamic Fusion Framework for Multimodal Brain Tumor Segmentation.},
year = {2022},
journal = {IEEE J. Biomed. Health Informatics},
author = {{Yi Ding 003} and {Wei Zheng} and {Ji Geng 001} and {Zhen Qin 002} and {Kim-Kwang Raymond Choo} and {Zhiguang Qin} and {Xiaolin Hou}}
}
@article{journals/tits/ChenZZCDC22,
title = {SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks.},
year = {2022},
journal = {IEEE Trans. Intell. Transp. Syst.},
author = {{Ying Chen} and {Tianhui Zhou} and {Jun Zhou 018} and {Zhenfu Cao} and {Xiaolei Dong} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tkde/DingFZCJ22,
title = {Privacy-Preserving Feature Extraction via Adversarial Training.},
year = {2022},
journal = {IEEE Trans. Knowl. Data Eng.},
author = {{Xiaofeng Ding 001} and {Hongbiao Fang} and {Zhilin Zhang 001} and {Kim-Kwang Raymond Choo} and {Hai Jin 001}}
}
@article{journals/tkde/GaoLXCLD22,
title = {MAS-Encryption and its Applications in Privacy-Preserving Classifiers.},
year = {2022},
journal = {IEEE Trans. Knowl. Data Eng.},
author = {{Chong-zhi Gao} and {Jin Li 002} and {Shi-bing Xia} and {Kim-Kwang Raymond Choo} and {Wenjing Lou} and {Changyu Dong}}
}
@article{journals/tmc/FarhaNYXZC22,
title = {Timestamp Scheme to Mitigate Replay Attacks in Secure ZigBee Networks.},
year = {2022},
journal = {IEEE Trans. Mob. Comput.},
author = {{Fadi Farha} and {Huansheng Ning} and {Shunkun Yang} and {Jiabo Xu} and {Weishan Zhang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tmis/MaHCWCX22,
title = {Social Media Event Prediction using DNN with Feedback Mechanism.},
year = {2022},
journal = {ACM Trans. Manag. Inf. Syst.},
author = {{Wanlun Ma} and {Xiangyu Hu 006} and {Chao Chen 015} and {Sheng Wen} and {Kim-Kwang Raymond Choo} and {Yang Xiang 001}}
}
@article{journals/tnn/DingTQCCQ22,
title = {DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption.},
year = {2022},
journal = {IEEE Trans. Neural Networks Learn. Syst.},
author = {{Yi Ding 003} and {Fuyuan Tan} and {Zhen Qin 002} and {Mingsheng Cao} and {Kim-Kwang Raymond Choo} and {Zhiguang Qin}}
}
@article{journals/tnn/ZuoXCC22,
title = {A Privacy-Preserving Semisupervised Algorithm Under Maximum Correntropy Criterion.},
year = {2022},
journal = {IEEE Trans. Neural Networks Learn. Syst.},
author = {{Ling Zuo} and {Yinghan Xu} and {Chi Cheng} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tnse/JiangWWLC22,
title = {AI-Assisted Energy-Efficient and Intelligent Routing for Reconfigurable Wireless Networks.},
year = {2022},
journal = {IEEE Trans. Netw. Sci. Eng.},
author = {{Dingde Jiang} and {Zhihao Wang} and {Wenjuan Wang} and {Zhihan Lv} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tnsm/LiMDCY22,
title = {Federated Anomaly Detection on System Logs for the Internet of Things: A Customizable and Communication-Efficient Approach.},
year = {2022},
journal = {IEEE Trans. Netw. Serv. Manag.},
author = {{Beibei Li 002} and {Shang Ma} and {Ruilong Deng} and {Kim-Kwang Raymond Choo} and {Jin Yang}}
}
@article{journals/tnsm/TelikaniGCS22,
title = {A Cost-Sensitive Deep Learning-Based Approach for Network Traffic Classification.},
year = {2022},
journal = {IEEE Trans. Netw. Serv. Manag.},
author = {{Akbar Telikani} and {Amir H. Gandomi} and {Kim-Kwang Raymond Choo} and {Jun Shen 001}}
}
@article{journals/ton/WuMTLC22,
title = {A Generic Secure Transmission Scheme Based on Random Linear Network Coding.},
year = {2022},
journal = {IEEE/ACM Trans. Netw.},
author = {{Renyong Wu} and {Jieming Ma} and {Zhixiang Tang} and {Xiehua Li} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tsc/LiMMCWLC22,
title = {Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing.},
year = {2022},
journal = {IEEE Trans. Serv. Comput.},
author = {{Jiayi Li} and {Jianfeng Ma 001} and {Yinbin Miao} and {Lei Chen} and {Yunbo Wang} and {Ximeng Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tsc/MaMMLCD22,
title = {Pocket Diagnosis: Secure Federated Learning Against Poisoning Attack in the Cloud.},
year = {2022},
journal = {IEEE Trans. Serv. Comput.},
author = {{Zhuoran Ma} and {Jianfeng Ma 001} and {Yinbin Miao} and {Ximeng Liu} and {Kim-Kwang Raymond Choo} and {Robert H. Deng}}
}
@article{journals/tsc/MaMMLCYW22,
title = {Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing.},
year = {2022},
journal = {IEEE Trans. Serv. Comput.},
author = {{Zhuoran Ma} and {Jianfeng Ma 001} and {Yinbin Miao} and {Ximeng Liu} and {Kim-Kwang Raymond Choo} and {Ruikang Yang} and {Xiangyu Wang 010}}
}
@article{journals/tsc/TongMCWLCD22,
title = {VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings.},
year = {2022},
journal = {IEEE Trans. Serv. Comput.},
author = {{Qiuyun Tong} and {Yinbin Miao} and {Lei Chen} and {Jian Weng 001} and {Ximeng Liu} and {Kim-Kwang Raymond Choo} and {Robert H. Deng}}
}
@article{journals/tsc/ZhangXHLCL22,
title = {Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities.},
year = {2022},
journal = {IEEE Trans. Serv. Comput.},
author = {{Lei Zhang 009} and {Hu Xiong} and {Qiong Huang 001} and {Jiguo Li 001} and {Kim-Kwang Raymond Choo} and {Jiangtao Li 003}}
}
@article{journals/tvt/LiHYXC22,
title = {Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network.},
year = {2022},
journal = {IEEE Trans. Veh. Technol.},
author = {{Quanrun Li} and {Debiao He} and {Zhichao Yang 002} and {Qi Xie} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tvt/WangSLZZCL22,
title = {Blockchain-Based Secure and Cooperative Private Charging Pile Sharing Services for Vehicular Networks.},
year = {2022},
journal = {IEEE Trans. Veh. Technol.},
author = {{Yuntao Wang 004} and {Zhou Su} and {Jiliang Li} and {Ning Zhang 007} and {Kuan Zhang 001} and {Kim-Kwang Raymond Choo} and {Yiliang Liu}}
}
@article{journals/wc/GuoYLCSR22,
title = {Deep Federated Learning Enhanced Secure POI Microservices for Cyber-Physical Systems.},
year = {2022},
journal = {IEEE Wirel. Commun.},
author = {{Zhiwei Guo} and {Keping Yu} and {Zhihan Lv} and {Kim-Kwang Raymond Choo} and {Peng Shi 001} and {Joel J. P. C. Rodrigues}}
}
@article{journals/jcis/LiuYJC22,
title = {Blockchain for Cybersecurity: Systematic Literature Review and Classification.},
year = {2022},
month = {November},
journal = {J. Comput. Inf. Syst.},
author = {{Marina Liu} and {William Yeoh 002} and {Frank Jiang 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jksucis/KoracDSC22,
title = {A hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurity.},
year = {2022},
month = {November},
journal = {J. King Saud Univ. Comput. Inf. Sci.},
author = {{Dragan Korac} and {Boris Damjanovic} and {Dejan Simic} and {Kim-Kwang Raymond Choo}}
}
@inproceedings{conf/IEEEares/MalinaDHC23,
title = {On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures.},
year = {2023},
booktitle = {ARES},
author = {{Lukas Malina} and {Patrik Dobias} and {Jan Hajny} and {Kim-Kwang Raymond Choo}},
publisher = {ACM},
booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, 29 August 2023- 1 September 2023}
}
@inproceedings{conf/blockchain2/LeiGYWZC23,
title = {Efficiency-enhanced Blockchain-based Client Selection in Heterogeneous Federated Learning.},
year = {2023},
booktitle = {Blockchain},
author = {{Zhiqi Lei} and {Keke Gai} and {Jing Yu 007} and {Shuo Wang} and {Liehuang Zhu} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Blockchain, Blockchain 2023, Danzhou, China, December 17-21, 2023}
}
@inproceedings{conf/cikm/ZhuCJWZXLSC23,
title = {FVW: Finding Valuable Weight on Deep Neural Network for Model Pruning.},
year = {2023},
booktitle = {CIKM},
author = {{Zhiyu Zhu} and {Huaming Chen} and {Zhibo Jin} and {Xinyi Wang} and {Jiayu Zhang} and {Minhui Xue} and {Qinghua Lu 001} and {Jun Shen 001} and {Kim-Kwang Raymond Choo}},
publisher = {ACM},
booktitle = {Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, CIKM 2023, Birmingham, United Kingdom, October 21-25, 2023}
}
@inproceedings{conf/cikm/ZhuCZWJ00C23,
title = {Improving Adversarial Transferability via Frequency-based Stationary Point Search.},
year = {2023},
booktitle = {CIKM},
author = {{Zhiyu Zhu} and {Huaming Chen} and {Jiayu Zhang} and {Xinyi Wang} and {Zhibo Jin} and {Qinghua Lu 001} and {Jun Shen 001} and {Kim-Kwang Raymond Choo}},
publisher = {ACM},
booktitle = {Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, CIKM 2023, Birmingham, United Kingdom, October 21-25, 2023}
}
@inproceedings{conf/ecis/WangGC23,
title = {Enabling Privacy-Preserving Prediction for Length of Stay in ICU - A Multimodal Federated-Learning-based Approach.},
year = {2023},
booktitle = {ECIS},
author = {{Tongnian Wang} and {Yuanxiong Guo} and {Kim-Kwang Raymond Choo}},
booktitle = {31st European Conference on Information Systems - Co-creating Sustainable Digital Futures, ECIS 2023, Kristiansan, Norway, June 11-16, 2023}
}
@inproceedings{conf/hicss/WuLCT23,
title = {Voters' Impacts on Creators' Popularity Disparity and Network Size in Two-sided Decentralized User-Generated Content Market.},
year = {2023},
booktitle = {HICSS},
author = {{Bingyi Wu} and {Charles Zhechao Liu} and {Kim-Kwang Raymond Choo} and {Takeshi Tsuyuguchi}},
publisher = {ScholarSpace},
booktitle = {56th Hawaii International Conference on System Sciences, HICSS 2023, Maui, Hawaii, USA, January 3-6, 2023}
}
@inproceedings{conf/icc/FerragKCDC23,
title = {Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-Enabled IoTs: An Anticipatory Study.},
year = {2023},
booktitle = {ICC Workshops},
author = {{Mohamed Amine Ferrag} and {Burak Kantarci} and {Lucas C. Cordeiro} and {Mérouane Debbah} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Communications, ICC 2023 - Workshops, Rome, Italy, May 28 - June 1, 2023}
}
@inproceedings{conf/ichi/WangZCGCG23,
title = {Analyzing the Impact of Personalization on Fairness in Federated Learning for Healthcare.},
year = {2023},
booktitle = {ICHI},
author = {{Tongnian Wang} and {Kai Zhang} and {Jiannan Cai} and {Yanmin Gong 001} and {Kim-Kwang Raymond Choo} and {Yuanxiong Guo}},
publisher = {IEEE},
booktitle = {11th IEEE International Conference on Healthcare Informatics, ICHI 2023, Houston, TX, USA, June 26-29, 2023}
}
@inproceedings{conf/iscc/WuLZLRC23,
title = {Attack Analysis on Two-party Signature and Threshold Signature Based on Dilithium.},
year = {2023},
booktitle = {ISCC},
author = {{Xiang Wu} and {Bohao Li} and {Boyang Zhang} and {Xiaofan Liu} and {Wei Ren 002} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {IEEE Symposium on Computers and Communications, ISCC 2023, Gammarth, Tunisia, July 9-12, 2023}
}
@inproceedings{conf/pkdd/ZhuZJWXSCC23,
title = {Towards Minimising Perturbation Rate for Adversarial Machine Learning with Pruning.},
year = {2023},
booktitle = {ECML/PKDD (1)},
author = {{Zhiyu Zhu} and {Jiayu Zhang} and {Zhibo Jin} and {Xinyi Wang} and {Minhui Xue} and {Jun Shen 001} and {Kim-Kwang Raymond Choo} and {Huaming Chen}},
publisher = {Springer},
booktitle = {Machine Learning and Knowledge Discovery in Databases: Research Track - European Conference, ECML PKDD 2023, Turin, Italy, September 18-22, 2023, Proceedings, Part I}
}
@article{journals/compsec/AhvanooeyZOMMCL23,
title = {AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms.},
year = {2023},
journal = {Comput. Secur.},
author = {{Milad Taleby Ahvanooey} and {Mark Xuefang Zhu} and {Shiyan Ou} and {Hassan Dana Mazraeh} and {Wojciech Mazurczyk} and {Kim-Kwang Raymond Choo} and {Chuan Li}}
}
@article{journals/compsec/ZhangZRXC23,
title = {Preserving data privacy in federated learning through large gradient pruning.},
year = {2023},
journal = {Comput. Secur.},
author = {{Zhiqiu Zhang} and {Tianqing Zhu} and {Wei Ren 002} and {Ping Xiong 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/comsur/FerragFKTCDHAC23,
title = {Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses.},
year = {2023},
journal = {IEEE Commun. Surv. Tutorials},
author = {{Mohamed Amine Ferrag} and {Othmane Friha} and {Burak Kantarci} and {Norbert Tihanyi} and {Lucas C. Cordeiro} and {Mérouane Debbah} and {Djallel Hamouda} and {Muna Al-Hawawreh 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/abs-2303-12898,
title = {Towards Understanding the Generalization of Medical Text-to-SQL Models and Datasets.},
year = {2023},
journal = {CoRR},
author = {{Richard Tarbell} and {Kim-Kwang Raymond Choo} and {Glenn Dietrich} and {Anthony Rios}}
}
@article{journals/corr/abs-2308-02678,
title = {Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment.},
year = {2023},
journal = {CoRR},
author = {{Jianyi Zhang} and {Xu Ji} and {Zhangchi Zhao} and {Xiali Hei 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/corr/abs-2310-00222,
title = {Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning.},
year = {2023},
journal = {CoRR},
author = {{Hongsheng Hu} and {Xuyun Zhang} and {Zoran Salcic} and {Lichao Sun 001} and {Kim-Kwang Raymond Choo} and {Gillian Dobbie}}
}
@article{journals/corr/abs-2312-16726,
title = {FairCompass: Operationalising Fairness in Machine Learning.},
year = {2023},
journal = {CoRR},
author = {{Jessica Liu} and {Huaming Chen} and {Jun Shen 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/csur/SimKJJLLC23,
title = {Technical Requirements and Approaches in Personal Data Control.},
year = {2023},
journal = {ACM Comput. Surv.},
author = {{Junsik Sim} and {Beomjoong Kim} and {Kiseok Jeon} and {Moonho Joo} and {Jihun Lim} and {Junghee Lee} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/XieGZGC23,
title = {Cross-Chain-Based Trustworthy Node Identity Governance in Internet of Things.},
year = {2023},
journal = {IEEE Internet Things J.},
author = {{Tianxiu Xie} and {Keke Gai} and {Liehuang Zhu} and {Yunwei Guo} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/XiongRHHC23,
title = {BDIM: A Blockchain-Based Decentralized Identity Management Scheme for Large Scale Internet of Things.},
year = {2023},
journal = {IEEE Internet Things J.},
author = {{Ruoting Xiong} and {Wei Ren 002} and {Xiaohan Hao} and {Jie He} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/XuLGDLWC23,
title = {BESIFL: Blockchain-Empowered Secure and Incentive Federated Learning Paradigm in IoT.},
year = {2023},
journal = {IEEE Internet Things J.},
author = {{Yajing Xu} and {Zhihui Lu 002} and {Keke Gai} and {Qiang Duan} and {Junxiong Lin} and {Jie Wu 003} and {Kim-Kwang Raymond Choo}}
}
@article{journals/ojcomps/BaoHPLC23,
title = {An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System.},
year = {2023},
journal = {IEEE Open J. Comput. Soc.},
author = {{Zijian Bao} and {Debiao He} and {Cong Peng 005} and {Min Luo 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcc/LiMMJLC23,
title = {Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap.},
year = {2023},
journal = {IEEE Trans. Cloud Comput.},
author = {{Feng Li 041} and {Jianfeng Ma 001} and {Yinbin Miao} and {Qi Jiang 001} and {Ximeng Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcc/LiMMLCLD23,
title = {Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data.},
year = {2023},
journal = {IEEE Trans. Cloud Comput.},
author = {{Feng Li 041} and {Jianfeng Ma 001} and {Yinbin Miao} and {Zhiquan Liu} and {Kim-Kwang Raymond Choo} and {Ximeng Liu} and {Robert H. Deng}}
}
@article{journals/tcc/LyuLDWRZLLC23,
title = {A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services.},
year = {2023},
journal = {IEEE Trans. Cloud Comput.},
author = {{Qiuyun Lyu} and {Hao Li} and {Zhining Deng} and {Jingyu Wang} and {Yizhi Ren} and {Ning Zheng 001} and {Junliang Liu} and {Huaping Liu 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tdsc/AguilarMLCB23,
title = {Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Diana Laura Aguilar} and {Miguel Angel Medina-Pérez} and {Octavio Loyola-González} and {Kim-Kwang Raymond Choo} and {Edoardo Bucheli-Susarrey}}
}
@article{journals/tdsc/ChenSWCZ23,
title = {NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Yi Chen 008} and {Zoran Salcic} and {Hongxia Wang 001} and {Kim-Kwang Raymond Choo} and {Xuyun Zhang}}
}
@article{journals/tdsc/DingTGQCCQ23,
title = {Interpreting Universal Adversarial Example Attacks on Image Classification Models.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Yi Ding 003} and {Fuyuan Tan} and {Ji Geng 001} and {Zhen Qin 002} and {Mingsheng Cao} and {Kim-Kwang Raymond Choo} and {Zhiguang Qin}}
}
@article{journals/tdsc/JingZCFSZ23,
title = {Inference of User Desires to Spread Disinformation Based on Social Situation Analytics and Group Effect.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Junchang Jing} and {Zhiyong Zhang 002} and {Kim-Kwang Raymond Choo} and {Kefeng Fan} and {Bin Song 007} and {Lili Zhang}}
}
@article{journals/tdsc/LiHGLCPC23,
title = {LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Xuru Li} and {Daojing He} and {Yun Gao} and {Ximeng Liu} and {Sammy Chan} and {Manghan Pan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tdsc/MaMMLZCD23,
title = {VerifyTL: Secure and Verifiable Collaborative Transfer Learning.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Zhuoran Ma} and {Jianfeng Ma 001} and {Yinbin Miao} and {Ximeng Liu} and {Wei Zheng} and {Kim-Kwang Raymond Choo} and {Robert H. Deng}}
}
@article{journals/tdsc/ZhangZCC23,
title = {Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Rui Zhang} and {Lei Zhang 009} and {Kim-Kwang Raymond Choo} and {Tong Chen}}
}
@article{journals/tdsc/ZhouGCCD23,
title = {Lightweight Privacy-Preserving Distributed Recommender System Using Tag-Based Multikey Fully Homomorphic Data Encapsulation.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Jun Zhou 018} and {Guobin Gao} and {Zhenfu Cao} and {Kim-Kwang Raymond Choo} and {Xiaolei Dong}}
}
@article{journals/tdsc/ZhouWWGCDC23,
title = {A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing.},
year = {2023},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Jun Zhou 018} and {Nan Wu} and {Yisong Wang} and {Shouzhen Gu} and {Zhenfu Cao} and {Xiaolei Dong} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tem/AlzahraniDC23,
title = {Assessment of the Blockchain Technology Adoption for the Management of the Electronic Health Record Systems.},
year = {2023},
journal = {IEEE Trans. Engineering Management},
author = {{Saeed Alzahrani} and {Tugrul U. Daim} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tem/SoltanisehatKHC23,
title = {Technical, Temporal, and Spatial Research Challenges and Opportunities in Blockchain-Based Healthcare: A Systematic Literature Review.},
year = {2023},
journal = {IEEE Trans. Engineering Management},
author = {{Leili Soltanisehat} and {Reza Alizadeh Kordabad} and {Haijing Hao} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/ChenXH0C23,
title = {BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records.},
year = {2023},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Biwen Chen} and {Tao Xiang 001} and {Debiao He} and {Hongwei Li 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/ChenYDWCJ23,
title = {Differentially Private Deep Learning With Dynamic Privacy Budget Allocation and Adaptive Optimization.},
year = {2023},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Lin Chen} and {Danyang Yue} and {Xiaofeng Ding 001} and {Zuan Wang} and {Kim-Kwang Raymond Choo} and {Hai Jin 001}}
}
@article{journals/tifs/LinZCDC23,
title = {Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality.},
year = {2023},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Zhongyun Lin} and {Jun Zhou 018} and {Zhenfu Cao} and {Xiaolei Dong} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/LiuHF0C23,
title = {PERCE: A Permissioned Redactable Credentials Scheme for a Period of Membership.},
year = {2023},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Yang Liu} and {Debiao He} and {Qi Feng} and {Min Luo 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/MiaoYLLLCD23,
title = {Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data.},
year = {2023},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Yinbin Miao} and {Yutao Yang} and {Xinghua Li 001} and {Zhiquan Liu} and {Hongwei Li 001} and {Kim-Kwang Raymond Choo} and {Robert H. Deng}}
}
@article{journals/tifs/MiaoZLLCD23,
title = {Secure Model-Contrastive Federated Learning With Improved Compressive Sensing.},
year = {2023},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Yinbin Miao} and {Wei Zheng} and {Xinghua Li 001} and {Hongwei Li 001} and {Kim-Kwang Raymond Choo} and {Robert H. Deng}}
}
@article{journals/tifs/ShenZCL23,
title = {A Certificateless Provable Data Possession Scheme for Cloud-Based EHRs.},
year = {2023},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Jiayan Shen} and {Peng Zeng 002} and {Kim-Kwang Raymond Choo} and {Chengju Li}}
}
@article{journals/tifs/WangZDCJ23,
title = {A Dynamic-Efficient Structure for Secure and Verifiable Location-Based Skyline Queries.},
year = {2023},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Zuan Wang} and {Liang Zhang} and {Xiaofeng Ding 001} and {Kim-Kwang Raymond Choo} and {Hai Jin 001}}
}
@article{journals/tifs/ZhangCLCJW23,
title = {Multi-Domain Virtual Network Embedding Algorithm Based on Horizontal Federated Learning.},
year = {2023},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Peiying Zhang} and {Ning Chen} and {Shibao Li} and {Kim-Kwang Raymond Choo} and {Chunxiao Jiang} and {Sheng Wu 001}}
}
@article{journals/tifs/ZhouDMWYYC23,
title = {Generative Steganography via Auto-Generation of Semantic Object Contours.},
year = {2023},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Zhili Zhou} and {Xiaohua Dong} and {Ruohan Meng} and {Meimin Wang} and {Hongyang Yan} and {Keping Yu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tits/TahaAC23,
title = {Efficient Resource Management of Micro-Services in VANETs.},
year = {2023},
journal = {IEEE Trans. Intell. Transp. Syst.},
author = {{Mohammad Bany Taha} and {Saed Alrabaee} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tnse/GargWMGCC23,
title = {Guest Editorial Introduction to the Special Section on AI-Driven Cybersecurity for Healthcare Cyber Physical Systems.},
year = {2023},
journal = {IEEE Trans. Netw. Sci. Eng.},
author = {{Sahil Garg} and {Yulei Wu} and {Shahid Mumtaz} and {Fabrizio Granelli} and {Kim-Kwang Raymond Choo} and {Min Chen 003}}
}
@article{journals/tnse/YeLYCH23,
title = {A Survey on Redactable Blockchain: Challenges and Opportunities.},
year = {2023},
journal = {IEEE Trans. Netw. Sci. Eng.},
author = {{Tao Ye} and {Min Luo 002} and {Yi Yang} and {Kim-Kwang Raymond Choo} and {Debiao He}}
}
@article{journals/tsc/FengMMLC23,
title = {Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks.},
year = {2023},
journal = {IEEE Trans. Serv. Comput.},
author = {{Xiaoqin Feng} and {Jianfeng Ma 001} and {Yinbin Miao} and {Ximeng Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tsc/GaoZWCZ23,
title = {Privacy-Preserving and Reliable Decentralized Federated Learning.},
year = {2023},
journal = {IEEE Trans. Serv. Comput.},
author = {{Yuanyuan Gao} and {Lei Zhang 009} and {Lulu Wang} and {Kim-Kwang Raymond Choo} and {Rui Zhang}}
}
@article{journals/tsc/HaoRFZC23,
title = {A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things.},
year = {2023},
journal = {IEEE Trans. Serv. Comput.},
author = {{Xiaohan Hao} and {Wei Ren 002} and {Yangyang Fei} and {Tianqing Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tsc/LiBMMMLC23,
title = {Privacy-Preserving Top-\$k\$k Spatial Keyword Queries in Fog-Based Cloud Computing.},
year = {2023},
journal = {IEEE Trans. Serv. Comput.},
author = {{Xinghua Li 001} and {Lizhong Bai} and {Yinbin Miao} and {Siqi Ma} and {Jianfeng Ma 001} and {Ximeng Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tsc/LiTZMMWMC23,
title = {VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data.},
year = {2023},
journal = {IEEE Trans. Serv. Comput.},
author = {{Xinghua Li 001} and {Qiuyun Tong} and {Jinwei Zhao} and {Yinbin Miao} and {Siqi Ma} and {Jian Weng 001} and {Jianfeng Ma 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tsc/MiaoYLGLCD23,
title = {Defending Against Membership Inference Attack by Shielding Membership Signals.},
year = {2023},
journal = {IEEE Trans. Serv. Comput.},
author = {{Yinbin Miao} and {Yueming Yu} and {Xinghua Li 001} and {Yu Guo 003} and {Ximeng Liu} and {Kim-Kwang Raymond Choo} and {Robert H. Deng}}
}
@article{journals/tsc/MiaoZJLCD23,
title = {Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method.},
year = {2023},
journal = {IEEE Trans. Serv. Comput.},
author = {{Yinbin Miao} and {Wei Zheng} and {Xiaohua Jia} and {Ximeng Liu} and {Kim-Kwang Raymond Choo} and {Robert H. Deng}}
}
@article{journals/tsc/YangMMWLCX23,
title = {MU-TEIR: Traceable Encrypted Image Retrieval in the Multi-User Setting.},
year = {2023},
journal = {IEEE Trans. Serv. Comput.},
author = {{Tengfei Yang} and {Jianfeng Ma 001} and {Yinbin Miao} and {Yue Wang 063} and {Ximeng Liu} and {Kim-Kwang Raymond Choo} and {Bin Xiao 002}}
}
@article{journals/tsc/ZhangZRZC23,
title = {Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems.},
year = {2023},
journal = {IEEE Trans. Serv. Comput.},
author = {{Liping Zhang 003} and {Yue Zhu 006} and {Wei Ren 002} and {Yixin Zhang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tvt/ZhouHKWC23,
title = {An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs.},
year = {2023},
journal = {IEEE Trans. Veh. Technol.},
author = {{Xiaotong Zhou} and {Debiao He} and {Muhammad Khurram Khan} and {Wei Wu 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/vcomm/ChenWXYHC23,
title = {BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs.},
year = {2023},
journal = {Veh. Commun.},
author = {{Biwen Chen} and {Zhongming Wang} and {Tao Xiang 001} and {Jiyun Yang} and {Debiao He} and {Kim-Kwang Raymond Choo}}
}
@article{journals/dcan/SaleousIAMACA23,
title = {COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities.},
year = {2023},
month = {February},
journal = {Digit. Commun. Networks},
author = {{Heba Saleous} and {Muhusina Ismail} and {Saleh H. Aldaajeh} and {Nisha Madathil} and {Saed Alrabaee} and {Kim-Kwang Raymond Choo} and {Nabeel Al-Qirim}}
}
@article{journals/iotj/BiXTLC23,
title = {Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles.},
year = {2023},
month = {February},
journal = {IEEE Internet Things J.},
author = {{Renwan Bi} and {Jinbo Xiong} and {Youliang Tian} and {Qi Li 011} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tc/LiuHRXZCM23,
title = {A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things.},
year = {2023},
month = {February},
journal = {IEEE Trans. Computers},
author = {{Yizhi Liu} and {Xiaohan Hao} and {Wei Ren 002} and {Ruoting Xiong} and {Tianqing Zhu} and {Kim-Kwang Raymond Choo} and {Geyong Min}}
}
@article{journals/tits/GaiTLXWZC23,
title = {Blockchain-Based Privacy-Preserving Positioning Data Sharing for IoT-Enabled Maritime Transportation Systems.},
year = {2023},
month = {February},
journal = {IEEE Trans. Intell. Transp. Syst.},
author = {{Keke Gai} and {Haokun Tang} and {Guangshun Li} and {Tianxiu Xie} and {Shuo Wang} and {Liehuang Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/di/AagaardDAC23,
title = {Family locating sharing app forensics: Life360 as a case study.},
year = {2023},
month = {March},
journal = {Forensic Sci. Int. Digit. Investig.},
author = {{Posie Aagaard} and {Bijan Dinyarian} and {Omar Abduljabbar} and {Kim-Kwang Raymond Choo}}
}
@article{journals/sj/SangZC23,
title = {Provable Multiple-Copy Integrity Auditing Scheme for Cloud-Based IoT.},
year = {2023},
month = {March},
journal = {IEEE Syst. J.},
author = {{Tongtong Sang} and {Peng Zeng 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tits/WuLMXZLC23,
title = {CITS-MEW: Multi-Party Entangled Watermark in Cooperative Intelligent Transportation System.},
year = {2023},
month = {March},
journal = {IEEE Trans. Intell. Transp. Syst.},
author = {{Tong Wu} and {Xinghua Li 001} and {Yinbin Miao} and {Mengfan Xu} and {Haiyan Zhang} and {Ximeng Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tmc/ZhouCCCD23,
title = {EPNS: Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs.},
year = {2023},
month = {March},
journal = {IEEE Trans. Mob. Comput.},
author = {{Jun Zhou 018} and {Shiying Chen} and {Kim-Kwang Raymond Choo} and {Zhenfu Cao} and {Xiaolei Dong}}
}
@article{journals/tmis/AkelloVBC23,
title = {Blockchain Use Case in Ballistics and Crime Gun Tracing and Intelligence: Toward Overcoming Gun Violence.},
year = {2023},
month = {March},
journal = {ACM Trans. Manag. Inf. Syst.},
author = {{Patricia Akello} and {Naga Vemprala} and {Nicole Lang Beebe} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tvt/TahaTOAC23,
title = {A Multi-Objective Approach Based on Differential Evolution and Deep Learning Algorithms for VANETs.},
year = {2023},
month = {March},
journal = {IEEE Trans. Veh. Technol.},
author = {{Mohammad Bany Taha} and {Chamseddine Talhi} and {Hakima Ould-Slimane} and {Saed Alrabaee} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/FrihaFBBKC23,
title = {2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT.},
year = {2023},
month = {April},
journal = {Comput. Secur.},
author = {{Othmane Friha} and {Mohamed Amine Ferrag} and {Mohamed Benbouzid 001} and {Tarek Berghout} and {Burak Kantarci} and {Kim-Kwang Raymond Choo}}
}
@article{journals/dsj/VempralaLC23,
title = {From puzzles to portraits: Enhancing situation awareness during natural disasters using a design science approach.},
year = {2023},
month = {April},
journal = {Decis. Sci.},
author = {{Naga Vemprala} and {Charles Zhechao Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/SaiCCSR23,
title = {Confluence of Blockchain and Artificial Intelligence Technologies for Secure and Scalable Healthcare Solutions: A Review.},
year = {2023},
month = {April},
journal = {IEEE Internet Things J.},
author = {{Siva Sai} and {Vinay Chamola} and {Kim-Kwang Raymond Choo} and {Biplab Sikdar 001} and {Joel J. P. C. Rodrigues}}
}
@article{journals/tcss/JingLSZC23,
title = {Disinformation Propagation Trend Analysis and Identification Based on Social Situation Analytics and Multilevel Attention Network.},
year = {2023},
month = {April},
journal = {IEEE Trans. Comput. Soc. Syst.},
author = {{Junchang Jing} and {Fei Li} and {Bin Song 007} and {Zhiyong Zhang 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tiv/LiuHBWKC23,
title = {An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks.},
year = {2023},
month = {April},
journal = {IEEE Trans. Intell. Veh.},
author = {{Yulin Liu} and {Debiao He} and {Zijian Bao} and {Huaqun Wang} and {Muhammad Khurram Khan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/LiHGLWCXC23,
title = {AsyFed: Accelerated Federated Learning With Asynchronous Communication Mechanism.},
year = {2023},
month = {May},
journal = {IEEE Internet Things J.},
author = {{Zhixin Li 003} and {Chunpu Huang} and {Keke Gai} and {Zhihui Lu 002} and {Jie Wu 003} and {Lulu Chen} and {Yangchuan Xu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tkde/TongMWLCD23,
title = {Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security.},
year = {2023},
month = {May},
journal = {IEEE Trans. Knowl. Data Eng.},
author = {{Qiuyun Tong} and {Yinbin Miao} and {Jian Weng 001} and {Ximeng Liu} and {Kim-Kwang Raymond Choo} and {Robert H. Deng}}
}
@article{journals/dcan/FurstenauRSLDLCBC23,
title = {Internet of things: Conceptual network structure, main challenges and future directions.},
year = {2023},
month = {June},
journal = {Digit. Commun. Networks},
author = {{Leonardo Bertolin Furstenau} and {Yan Pablo Reckziegel Rodrigues} and {Michele Kremer Sott} and {Pedro Leivas} and {Michael S. Dohan} and {José Ricardo López-Robles} and {Manuel J. Cobo} and {Nicola Luigi Bragazzi} and {Kim-Kwang Raymond Choo}}
}
@article{journals/dss/JozaniLC23,
title = {An empirical study of content-based recommendation systems in mobile app markets.},
year = {2023},
month = {June},
journal = {Decis. Support Syst.},
author = {{Mohsen M. Jozani} and {Charles Zhechao Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jiis/DingZWCJ23,
title = {A learned spatial textual index for efficient keyword queries.},
year = {2023},
month = {June},
journal = {J. Intell. Inf. Syst.},
author = {{Xiaofeng Ding 001} and {Yinting Zheng} and {Zuan Wang} and {Kim-Kwang Raymond Choo} and {Hai Jin 001}}
}
@article{journals/jnca/KumarATDKPKC23,
title = {Blockchain for unmanned underwater drones: Research issues, challenges, trends and future directions.},
year = {2023},
month = {June},
journal = {J. Netw. Comput. Appl.},
author = {{Adarsh Kumar} and {Neelu Jyothi Ahuja} and {Monika Thapliyal} and {Sarthika Dutt} and {Tanesh Kumar} and {Diego Augusto de Jesus Pacheco} and {Charalambos Konstantinou} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tem/ZanellaLC23,
title = {Understanding the Trends in Blockchain Domain Through an Unsupervised Systematic Patent Analysis.},
year = {2023},
month = {June},
journal = {IEEE Trans. Engineering Management},
author = {{Gianluca Zanella} and {Charles Zhechao Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iot/LiuQRXC23,
title = {An in-situ authentication with privacy preservation scheme for accident response in Internet of Vehicles.},
year = {2023},
month = {July},
journal = {Internet Things},
author = {{Xiaofan Liu} and {Weihui Qiu} and {Wei Ren 002} and {Caixu Xu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/isci/WangZLLWRC23,
title = {S-DeepTrust: A deep trust prediction method based on sentiment polarity perception.},
year = {2023},
month = {July},
journal = {Inf. Sci.},
author = {{Qiuhua Wang} and {Rui Zhang} and {Chuangchuang Li} and {Chengyu Li} and {Yeru Wang} and {Yizhi Ren} and {Kim-Kwang Raymond Choo}}
}
@article{journals/dcan/FurstenauLSDLCBC23,
title = {Big data in healthcare: Conceptual network structure, key challenges and opportunities.},
year = {2023},
month = {August},
journal = {Digit. Commun. Networks},
author = {{Leonardo Bertolin Furstenau} and {Pedro Leivas} and {Michele Kremer Sott} and {Michael S. Dohan} and {José Ricardo López-Robles} and {Manuel J. Cobo} and {Nicola Luigi Bragazzi} and {Kim-Kwang Raymond Choo}}
}
@article{journals/eswa/ChaconKHCR23,
title = {Forecasting call center arrivals using temporal memory networks and gradient boosting algorithm.},
year = {2023},
month = {August},
journal = {Expert Syst. Appl.},
author = {{Henry Chacon} and {Vishwa Koppisetti} and {David Hardage} and {Kim-Kwang Raymond Choo} and {Paul Rad}}
}
@article{journals/fgcs/ZhangGLLCW23,
title = {ALPS: Achieving accuracy-aware location privacy service via assisted regions.},
year = {2023},
month = {August},
journal = {Future Gener. Comput. Syst.},
author = {{Shaobo Zhang 001} and {Tao Guo} and {Qin Liu 001} and {Entao Luo} and {Kim-Kwang Raymond Choo} and {Guojun Wang 001}}
}
@article{journals/iotj/YanMLCMD23,
title = {Privacy-Preserving Asynchronous Federated Learning Framework in Distributed IoT.},
year = {2023},
month = {August},
journal = {IEEE Internet Things J.},
author = {{Xinru Yan} and {Yinbin Miao} and {Xinghua Li 001} and {Kim-Kwang Raymond Choo} and {Xiangdong Meng} and {Robert H. Deng}}
}
@article{journals/toit/GaiSZCW23,
title = {A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing.},
year = {2023},
month = {August},
journal = {ACM Trans. Internet Techn.},
author = {{Keke Gai} and {Yufeng She} and {Liehuang Zhu} and {Kim-Kwang Raymond Choo} and {Zhiguo Wan}}
}
@article{journals/compsec/LiZRC23,
title = {Improve individual fairness in federated learning via adversarial training.},
year = {2023},
month = {September},
journal = {Comput. Secur.},
author = {{Jie Li} and {Tianqing Zhu} and {Wei Ren 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/compsec/StudiawanGC23,
title = {Unmanned Aerial Vehicle (UAV) Forensics: The Good, The Bad, and the Unaddressed.},
year = {2023},
month = {September},
journal = {Comput. Secur.},
author = {{Hudan Studiawan} and {George Grispos} and {Kim-Kwang Raymond Choo}}
}
@article{journals/eis/GrecoFCC23,
title = {AI-enabled IoT penetration testing: state-of-the-art and research challenges.},
year = {2023},
month = {September},
journal = {Enterp. Inf. Syst.},
author = {{Claudia Greco} and {Giancarlo Fortino} and {Bruno Crispo} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iet-blc/JahanbinSWKC23,
title = {Towards CRISP-BC: 3TIC specification framework for Blockchain use-cases.},
year = {2023},
month = {September},
journal = {IET Blockchain},
author = {{Pouyan Jahanbin} and {Ravi S. Sharma 001} and {Stephen C. Wingreen} and {Nir Kshetri} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/TianGCTY23,
title = {A Privacy-Preserving Hybrid Range Search Scheme Over Encrypted Electronic Medical Data in IoT Systems.},
year = {2023},
month = {September},
journal = {IEEE Internet Things J.},
author = {{Pengxu Tian} and {Cheng Guo 001} and {Kim-Kwang Raymond Choo} and {Xinyu Tang} and {Lin Yao 001}}
}
@article{journals/iotj/XuYZCG23,
title = {Quantum Learning on Structured Code With Computing Traps for Secure URLLC in Industrial IoT Scenarios.},
year = {2023},
month = {September},
journal = {IEEE Internet Things J.},
author = {{Dongyang Xu} and {Keping Yu} and {Li Zhen} and {Kim-Kwang Raymond Choo} and {Mohsen Guizani}}
}
@article{journals/iotm/PengCYFYCD23,
title = {Guest Editorial: Ubiquitous Intelligence for Internet of Vehicles.},
year = {2023},
month = {September},
journal = {IEEE Internet Things Mag.},
author = {{Haixia Peng} and {Nan Cheng} and {Qiang Ye 002} and {He Fang} and {Shen Yan} and {Kim-Kwang Raymond Choo} and {Trung Q. Duong}}
}
@article{journals/tc/FengHLHC23,
title = {EPRICE: An Efficient and Privacy-Preserving Real-Time Incentive System for Crowdsensing in Industrial Internet of Things.},
year = {2023},
month = {September},
journal = {IEEE Trans. Computers},
author = {{Qi Feng} and {Debiao He} and {Min Luo 002} and {Xinyi Huang 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tkde/WangDLZZCJ23,
title = {Efficient Location-Based Skyline Queries With Secure R-Tree Over Encrypted Data.},
year = {2023},
month = {October},
journal = {IEEE Trans. Knowl. Data Eng.},
author = {{Zuan Wang} and {Xiaofeng Ding 001} and {Junfeng Lu} and {Liang Zhang} and {Pan Zhou} and {Kim-Kwang Raymond Choo} and {Hai Jin 001}}
}
@article{journals/eaai/XiangLRZC23,
title = {A lightweight privacy-preserving scheme using pixel block mixing for facial image classification in deep learning.},
year = {2023},
month = {November},
journal = {Eng. Appl. Artif. Intell.},
author = {{Yuexin Xiang} and {Tiantian Li} and {Wei Ren 002} and {Tianqing Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jsa/ZhangYLSXC23,
title = {MKSS: An Effective Multi-authority Keyword Search Scheme for edge-cloud collaboration.},
year = {2023},
month = {November},
journal = {J. Syst. Archit.},
author = {{Shiwen Zhang} and {Yibin Yang} and {Wei Liang 005} and {Voundi Koe Arthur Sandor} and {Guoqi Xie} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tvt/WangCCYSC23,
title = {Secure Battery Swapping: A Reservation Scheme With Conditional Privacy-Preserving Bidirectional Heterogeneous Aggregate Signcryption and Incentive Mechanism.},
year = {2023},
month = {November},
journal = {IEEE Trans. Veh. Technol.},
author = {{Di Wang 025} and {Yue Cao 002} and {Kim-Kwang Raymond Choo} and {Zhaohui Yang 001} and {Zhili Sun} and {Haitham S. Cruickshank}}
}
@article{journals/fcsc/BaoRXLZRC23,
title = {BTC-Shadow: an analysis and visualization system for exposing implicit behaviors in Bitcoin transaction graphs.},
year = {2023},
month = {December},
journal = {Frontiers Comput. Sci.},
author = {{Ding Bao} and {Wei Ren 002} and {Yuexin Xiang} and {Weimao Liu} and {Tianqing Zhu} and {Yi Ren 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/fcsc/LiuRC23,
title = {BSKCN and BSAML: blind signatures from the module lattice and the asymmetric module lattice.},
year = {2023},
month = {December},
journal = {Frontiers Comput. Sci.},
author = {{Xiaofan Liu} and {Wei Ren 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tits/MiaoYLCMD23,
title = {Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems.},
year = {2023},
month = {December},
journal = {IEEE Trans. Intell. Transp. Syst.},
author = {{Yinbin Miao} and {Yutao Yang} and {Xinghua Li 001} and {Kim-Kwang Raymond Choo} and {Xiangdong Meng} and {Robert H. Deng}}
}
@article{journals/tvt/YueZXCS23,
title = {Adaptive Beamforming for Cascaded Sparse Diversely Polarized Planar Array.},
year = {2023},
month = {December},
journal = {IEEE Trans. Veh. Technol.},
author = {{Yaxing Yue} and {Chengwei Zhou} and {Fangyuan Xing} and {Kim-Kwang Raymond Choo} and {Zhiguo Shi 001}}
}
@inproceedings{conf/aaai/ZhuCZWJXZC24,
title = {MFABA: A More Faithful and Accelerated Boundary-Based Attribution Method for Deep Neural Networks.},
year = {2024},
booktitle = {AAAI},
author = {{Zhiyu Zhu} and {Huaming Chen} and {Jiayu Zhang} and {Xinyi Wang} and {Zhibo Jin} and {Minhui Xue} and {Dongxiao Zhu} and {Kim-Kwang Raymond Choo}},
publisher = {AAAI Press},
booktitle = {Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada}
}
@inproceedings{conf/ccnc/BhattaraiPC24,
title = {A Lightweight Aggregate Authentication Protocol for Internet of Drones.},
year = {2024},
booktitle = {CCNC},
author = {{Image Bhattarai} and {Cong Pu} and {Kim-Kwang Raymond Choo}},
publisher = {IEEE},
booktitle = {21st IEEE Consumer Communications & Networking Conference, CCNC 2024, Las Vegas, NV, USA, January 6-9, 2024}
}
@inproceedings{conf/ccnc/PuCB24,
title = {Chebyshev Polynomial and Private Blockchain Based Cross-Domain Authentication Protocol for IoD Networks.},
year = {2024},
booktitle = {CCNC},
author = {{Cong Pu} and {Kim-Kwang Raymond Choo} and {Image Bhattarai}},
publisher = {IEEE},
booktitle = {21st IEEE Consumer Communications & Networking Conference, CCNC 2024, Las Vegas, NV, USA, January 6-9, 2024}
}
@inproceedings{conf/hicss/WuLCZC24,
title = {Two-sided Long Tails on Blockchain-Based Crowdsourcing Platforms.},
year = {2024},
booktitle = {HICSS},
author = {{Bingyi Wu} and {Charles Zhechao Liu} and {Kim-Kwang Raymond Choo} and {Hongyi Zhu} and {Shen Chang}},
publisher = {ScholarSpace},
booktitle = {57th Hawaii International Conference on System Sciences, HICSS 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024}
}
@article{journals/corr/abs-2401-06031,
title = {GE-AdvGAN: Improving the transferability of adversarial samples by gradient editing-based adversarial generative model.},
year = {2024},
journal = {CoRR},
author = {{Zhiyu Zhu} and {Huaming Chen} and {Xinyi Wang} and {Jiayu Zhang} and {Zhibo Jin} and {Kim-Kwang Raymond Choo} and {Jun Shen} and {Dong Yuan}}
}
@article{journals/tdsc/CaiLLC24,
title = {Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees.},
year = {2024},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Jianping Cai} and {Ximeng Liu} and {Jiayin Li} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tdsc/GuoLTCL24,
title = {Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query.},
year = {2024},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Cheng Guo 001} and {Wenfeng Li} and {Xinyu Tang} and {Kim-Kwang Raymond Choo} and {Yining Liu 002}}
}
@article{journals/tem/JieLC24,
title = {A Game-Theory-Based Contract Mechanism to Facilitate Technology Spillover in Emerging Electric Vehicle Markets.},
year = {2024},
journal = {IEEE Trans. Engineering Management},
author = {{Yingmo Jie} and {Charles Zhechao Liu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/DaiLZCXZJ24,
title = {PRBFPT: A Practical Redactable Blockchain Framework With a Public Trapdoor.},
year = {2024},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Weiqi Dai} and {Jinkai Liu} and {Yang Zhou} and {Kim-Kwang Raymond Choo} and {Xia Xie} and {Deqing Zou} and {Hai Jin 001}}
}
@article{journals/tifs/DingWQZZQC24,
title = {Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network.},
year = {2024},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Yi Ding 003} and {Zi Wang} and {Zhen Qin 002} and {Erqiang Zhou} and {Guobin Zhu} and {Zhiguang Qin} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/DuLHC24,
title = {Toward Secure and Verifiable Hybrid Federated Learning.},
year = {2024},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Runmeng Du} and {Xuru Li} and {Daojing He} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/TangGCL24,
title = {An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing.},
year = {2024},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Xinyu Tang} and {Cheng Guo 001} and {Kim-Kwang Raymond Choo} and {Yi-Ning Liu 002}}
}
@article{journals/tifs/TangZLCH24,
title = {Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography.},
year = {2024},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Weixuan Tang} and {Zhili Zhou} and {Bin Li 011} and {Kim-Kwang Raymond Choo} and {Jiwu Huang}}
}
@article{journals/tifs/WangLXRWZC24,
title = {Optimal Selfish Mining-Based Denial-of-Service Attack.},
year = {2024},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Qiuhua Wang} and {Chengyu Li} and {Tianyu Xia} and {Yizhi Ren} and {Dong Wang 019} and {Guoyan Zhang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tifs/XiangLBLYLRC24,
title = {BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis.},
year = {2024},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Yuexin Xiang} and {Yuchen Lei} and {Ding Bao} and {Tiantian Li} and {Qingqing Yang} and {Wenmao Liu} and {Wei Ren 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tnse/RasheedBBAC24,
title = {Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network.},
year = {2024},
journal = {IEEE Trans. Netw. Sci. Eng.},
author = {{Amar Rasheed} and {Mohamed Baza} and {Mahmoud M. Badr} and {Hani Alshahrani} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/HeLZCC24,
title = {A Method for Detecting Phishing Websites Based on Tiny-Bert Stacking.},
year = {2024},
month = {January},
journal = {IEEE Internet Things J.},
author = {{Daojing He} and {Xin Lv} and {Shanshan Zhu} and {Sammy Chan} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/HuangCZYYC24,
title = {Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing Computation in IoT Environment.},
year = {2024},
month = {January},
journal = {IEEE Internet Things J.},
author = {{Jingwang Huang} and {Qi Cui} and {Zhili Zhou} and {Keping Yu} and {Ching-Nung Yang} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/QinTCRC24,
title = {TriBoDeS: A Tri-Blockchain-Based Detection and Sharing Scheme for Dangerous Road Condition Information in Internet of Vehicles.},
year = {2024},
month = {January},
journal = {IEEE Internet Things J.},
author = {{Haoran Qin} and {Yining Tan} and {Yuxian Chen} and {Wei Ren 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/ZhangLCRC24,
title = {A Secure, Flexible, and PPG-Based Biometric Scheme for Healthy IoT Using Homomorphic Random Forest.},
year = {2024},
month = {January},
journal = {IEEE Internet Things J.},
author = {{Liping Zhang 003} and {Anzi Li} and {Shukai Chen} and {Wei Ren 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tai/FengHSLC24,
title = {PpNNT: Multiparty Privacy-Preserving Neural Network Training System.},
year = {2024},
month = {January},
journal = {IEEE Trans. Artif. Intell.},
author = {{Qi Feng} and {Debiao He} and {Jian Shen 001} and {Min Luo 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tcps/ZhaoZCZZ24,
title = {A Combinatorial Optimization Analysis Method for Detecting Malicious Industrial Internet Attack Behaviors.},
year = {2024},
month = {January},
journal = {ACM Trans. Cyber Phys. Syst.},
author = {{Kejing Zhao} and {Zhiyong Zhang 002} and {Kim-Kwang Raymond Choo} and {Zhongya Zhang} and {Tiantian Zhang}}
}
@article{journals/tii/AbuMahfouzAKGC24,
title = {A Deep Learning Approach to Discover Router Firmware Vulnerabilities.},
year = {2024},
month = {January},
journal = {IEEE Trans. Ind. Informatics},
author = {{Amjad Abu-Mahfouz} and {Saed Alrabaee} and {Mahmoud Khasawneh} and {Marton Gergely} and {Kim-Kwang Raymond Choo}}
}
@article{journals/tomccap/ZhangCLRCM24,
title = {1DIEN: Cross-session Electrocardiogram Authentication Using 1D Integrated EfficientNet.},
year = {2024},
month = {January},
journal = {ACM Trans. Multim. Comput. Commun. Appl.},
author = {{Liping Zhang 003} and {Shukai Chen} and {Fei Lin} and {Wei Ren 002} and {Kim-Kwang Raymond Choo} and {Geyong Min}}
}
@article{journals/air/GuanZZC24,
title = {Graph neural networks: a survey on the links between privacy and security.},
year = {2024},
month = {February},
journal = {Artif. Intell. Rev.},
author = {{Faqian Guan} and {Tianqing Zhu} and {Wanlei Zhou 001} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/LiGZYJC24,
title = {GPU Accelerated Full Homomorphic Encryption Cryptosystem, Library, and Applications for IoT Systems.},
year = {2024},
month = {February},
journal = {IEEE Internet Things J.},
author = {{Xiaodong Li} and {Hehe Gao} and {Jianyi Zhang} and {Shuya Yang} and {Xin Jin 015} and {Kim-Kwang Raymond Choo}}
}
@article{journals/iotj/ZhouZYRC24,
title = {A Concurrent Federated Reinforcement Learning for IoT Resources Allocation With Local Differential Privacy.},
year = {2024},
month = {February},
journal = {IEEE Internet Things J.},
author = {{Wei Zhou} and {Tianqing Zhu} and {Dayong Ye} and {Wei Ren 002} and {Kim-Kwang Raymond Choo}}
}
@article{journals/istr/XiangLRHZC24,
title = {AdvEWM: Generating image adversarial examples by embedding digital watermarks.},
year = {2024},
month = {February},
journal = {J. Inf. Secur. Appl.},
author = {{Yuexin Xiang} and {Tiantian Li} and {Wei Ren 002} and {Jie He} and {Tianqing Zhu} and {Kim-Kwang Raymond Choo}}
}
@article{journals/jaihc/ChoudhurySCB24,
title = {Segmenting foreground objects in a multi-modal background using modified Z-score.},
year = {2024},
month = {February},
journal = {J. Ambient Intell. Humaniz. Comput.},
author = {{Suman Kumar Choudhury} and {Pankaj Kumar Sa} and {Kim-Kwang Raymond Choo} and {Sambit Bakshi}}
}
@article{journals/tii/ZhangMLWLCD24,
title = {Efficient Privacy-Preserving Federated Learning With Improved Compressed Sensing.},
year = {2024},
month = {March},
journal = {IEEE Trans. Ind. Informatics},
author = {{Yifan Zhang} and {Yinbin Miao} and {Xinghua Li 001} and {Linfeng Wei} and {Zhiquan Liu} and {Kim-Kwang Raymond Choo} and {Robert H. Deng}}
}