Raj Gaire

Orcid: 0000-0003-2499-2553

Affiliations:
  • CSIRO, Data61, Australia


According to our database1, Raj Gaire authored at least 31 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns.
Proceedings of the 18th Asian Internet Engineering Conference, 2023

2022
Machine Learning for Detecting Data Exfiltration: A Review.
ACM Comput. Surv., 2022

Profiler: Profile-Based Model to Detect Phishing Emails.
CoRR, 2022

Towards Web Phishing Detection Limitations and Mitigation.
CoRR, 2022

PRESSGenDB: PRivacy-prEserving Substring Search on Encrypted Genomic DataBase.
Proceedings of the IEEE INFOCOM 2022, 2022

Profiler: Distributed Model to Detect Phishing.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Demo - MaLFraDA: A Machine Learning Framework with Data Airlock.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Energy-Aware Resource Scheduling for Serverless Edge Computing.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022

2021
AutoScaleSim: A simulation toolkit for auto-scaling Web applications in clouds.
Simul. Model. Pract. Theory, 2021

User, Usage and Usability: Redefining Human Centric Cyber Security.
Frontiers Big Data, 2021

Characterizing Malicious URL Campaigns.
CoRR, 2021

PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database.
CoRR, 2021

ReinforceBug: A Framework to Generate Adversarial Textual Examples.
CoRR, 2021

A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data.
Proceedings of the Information Security - 24th International Conference, 2021

WattEdge: A Holistic Approach for Empirical Energy Measurements in Edge Computing.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021

Collaborative analysis of genomic data: vision and challenges.
Proceedings of the 7th IEEE International Conference on Collaboration and Internet Computing, 2021

Serverless Edge Computing: Vision and Challenges.
Proceedings of the ACSW '21: 2021 Australasian Computer Science Week Multiconference, 2021

2020
Secrecy capacity against adaptive eavesdroppers in a random wireless network using friendly jammers and protected zone.
J. Netw. Comput. Appl., 2020

Machine Learning for Detecting Data Exfiltration.
CoRR, 2020

An Evasion Attack against ML-based Phishing URL Detectors.
CoRR, 2020

Auto-scaling of Web Applications in Clouds: A Tail Latency Evaluation.
Proceedings of the 13th IEEE/ACM International Conference on Utility and Cloud Computing, 2020

Friendly Jammer against an Adaptive Eavesdropper in a Relay-aided Network.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

2019
Statistically managing cloud operations for latency-tail-tolerance in IoT-enabled smart cities.
J. Parallel Distributed Comput., 2019

2018
Crowdsensing and privacy in smart city applications.
CoRR, 2018

Internet of Things (IoT) and Cloud Computing Enabled Disaster Management.
CoRR, 2018

2017
Distribution Based Workload Modelling of Continuous Queries in Clouds.
IEEE Trans. Emerg. Top. Comput., 2017

2015
Text and Data Mining Techniques in Adverse Drug Reaction Detection.
ACM Comput. Surv., 2015

Resource Usage Estimation of Data Stream Processing Workloads in Datacenter Clouds.
CoRR, 2015

2013
Farming the Web of Things.
IEEE Intell. Syst., 2013

Demonstration: Semantic Web Enabled Smart Farm with GSN.
Proceedings of the ISWC 2013 Posters & Demonstrations Track, 2013


  Loading...