Surya Nepal

Orcid: 0000-0002-3289-6599

According to our database1, Surya Nepal authored at least 467 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Comprehensive Survey on Community Detection With Deep Learning.
IEEE Trans. Neural Networks Learn. Syst., April, 2024

Range Specification Bug Detection in Flight Control System Through Fuzzing.
IEEE Trans. Software Eng., March, 2024

Fast and private multi-dimensional range search over encrypted data.
Inf. Sci., January, 2024

Design and Generation of a Set of Declarative APIs for Security Orchestration.
IEEE Trans. Serv. Comput., 2024

Anti-Compression Contrastive Facial Forgery Detection.
IEEE Trans. Multim., 2024

Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization.
IEEE Trans. Multim., 2024

A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects.
IEEE Trans. Inf. Forensics Secur., 2024

SoK: Can Trajectory Generation Combine Privacy and Utility?
CoRR, 2024

A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection.
CoRR, 2024

A2C: A Modular Multi-stage Collaborative Decision Framework for Human-AI Teams.
CoRR, 2024

Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Blockchain-based Zero Trust Cybersecurity in the Internet of Things.
ACM Trans. Internet Techn., August, 2023

An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

ShieldDB: An Encrypted Document Database With Padding Countermeasures.
IEEE Trans. Knowl. Data Eng., April, 2023

Tracking the Evolution of Clusters in Social Media Streams.
IEEE Trans. Big Data, April, 2023

Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT.
IEEE Trans. Sustain. Comput., 2023

Towards Proactive Risk-Aware Cloud Cost Optimization Leveraging Transient Resources.
IEEE Trans. Serv. Comput., 2023

SAM: Multi-turn Response Selection Based on Semantic Awareness Matching.
ACM Trans. Internet Techn., 2023

Optimizing Secure Decision Tree Inference Outsourcing.
IEEE Trans. Dependable Secur. Comput., 2023

Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses.
IEEE Trans. Dependable Secur. Comput., 2023

Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions.
IEEE Trans. Dependable Secur. Comput., 2023

Cyber Code Intelligence for Android Malware Detection.
IEEE Trans. Cybern., 2023

Evaluation of Federated Learning in Phishing Email Detection.
Sensors, 2023

AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity.
CoRR, 2023

Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks.
CoRR, 2023

DeepTheft: Stealing DNN Model Architectures through Power Side Channel.
CoRR, 2023

A Multi-Client Searchable Encryption Scheme for IoT Environment.
CoRR, 2023

Two-in-one Knowledge Distillation for Efficient Facial Forgery Detection.
CoRR, 2023

Dynalogue: A Transformer-Based Dialogue System with Dynamic Attention.
Proceedings of the ACM Web Conference 2023, 2023

AgrEvader: Poisoning Membership Inference against Byzantine-robust Federated Learning.
Proceedings of the ACM Web Conference 2023, 2023

Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps.
Proceedings of the ACM Web Conference 2023, 2023

RAI4IoE: Responsible AI for Enabling the Internet of Energy.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Message from the General Chairs and PC Chairs TPS-ISA 2023.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Digital Twins and the Future of Their Use Enabling Shift Left and Shift Right Cybersecurity Operations.
Proceedings of the 5th IEEE International Conference on Trust, 2023

TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

PublicCheck: Public Integrity Verification for Services of Run-time Deep Models.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Icicle: A Re-designed Emulator for Grey-Box Firmware Fuzzing.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Acumen: Analysing the Impact of Organisational Change on Users' Access Entitlements.
Proceedings of the Computer Security - ESORICS 2023, 2023

Private Image Generation with Dual-Purpose Auxiliary Classifier.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns.
Proceedings of the 18th Asian Internet Engineering Conference, 2023

DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Explainable machine learning in cybersecurity: A survey.
Int. J. Intell. Syst., December, 2022

NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions.
Dataset, June, 2022

eRiskCom: an e-commerce risky community detection platform.
VLDB J., 2022

Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs.
IEEE Trans. Serv. Comput., 2022

Defending Adversarial Attacks via Semantic Feature Manipulation.
IEEE Trans. Serv. Comput., 2022

Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models.
IEEE Trans. Serv. Comput., 2022

Guest Editorial: Special Issue on Services Computing for COVID-19 and Future Pandemics.
IEEE Trans. Serv. Comput., 2022

OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning.
IEEE Trans. Parallel Distributed Syst., 2022

Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity.
ACM Trans. Internet Techn., 2022

On the Neural Backdoor of Federated Generative Models in Edge Computing.
ACM Trans. Internet Techn., 2022

Deep Multi-Attributed-View Graph Representation Learning.
IEEE Trans. Netw. Sci. Eng., 2022

Adversarial Detection by Latent Style Transformations.
IEEE Trans. Inf. Forensics Secur., 2022

Securely and Efficiently Outsourcing Decision Tree Inference.
IEEE Trans. Dependable Secur. Comput., 2022

Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training.
IEEE Trans. Dependable Secur. Comput., 2022

Orchestration or Automation: Authentication Flaw Detection in Android Apps.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-Preserving Collaborative Analytics on Medical Time Series Data.
IEEE Trans. Dependable Secur. Comput., 2022

Geometric Range Search on Encrypted Data With Forward/Backward Security.
IEEE Trans. Dependable Secur. Comput., 2022

Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2022

TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs.
IEEE Trans. Dependable Secur. Comput., 2022

Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples.
IEEE Trans. Cybern., 2022

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things.
IEEE Trans. Computers, 2022

Range search on encrypted spatial data with dynamic updates.
J. Comput. Secur., 2022

Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks.
IEEE Internet Things J., 2022

Blockchain-Based Secure and Lightweight Authentication for Internet of Things.
IEEE Internet Things J., 2022

Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs.
IEEE Internet Things J., 2022

ANS-based compression and encryption with 128-bit security.
Int. J. Inf. Sec., 2022

Editorial: Human-Centric Security and Privacy.
Frontiers Big Data, 2022

Tracking Dataset IP Use in Deep Neural Networks.
CoRR, 2022

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
CoRR, 2022

Profiler: Profile-Based Model to Detect Phishing Emails.
CoRR, 2022

Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms.
CoRR, 2022

Towards Web Phishing Detection Limitations and Mitigation.
CoRR, 2022

Integrity Fingerprinting of DNN with Double Black-box Design and Verification.
CoRR, 2022

Local Differential Privacy for Federated Learning in Industrial Settings.
CoRR, 2022

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World.
CoRR, 2022

A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM.
CoRR, 2022

Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation.
Comput. Secur., 2022

Forward-Secure Edge Authentication for Graphs.
Comput. J., 2022

SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

A Universal Deduplication Architecture for Secure and Efficient Cloud Storage.
Proceedings of the 4th IEEE International Conference on Trust, 2022

Vulnerability Detection Using Deep Learning Based Function Classification.
Proceedings of the Network and System Security - 16th International Conference, 2022

RAIDER: Reinforcement-Aided Spear Phishing Detector.
Proceedings of the Network and System Security - 16th International Conference, 2022

OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control.
Proceedings of the Information Security - 25th International Conference, 2022

VulDeBERT: A Vulnerability Detection System Using BERT.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy.
Proceedings of the International Joint Conference on Neural Networks, 2022

Profiler: Distributed Model to Detect Phishing.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Modelling direct messaging networks with multiple recipients for cyber deception.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Efficient Hash-Based Redactable Signature for Smart Grid Applications.
Proceedings of the Computer Security - ESORICS 2022, 2022

Local Differential Privacy for Federated Learning.
Proceedings of the Computer Security - ESORICS 2022, 2022

DeepFake Disrupter: The Detector of DeepFake Is My Friend.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Demo - MaLFraDA: A Machine Learning Framework with Data Airlock.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Transformer-Based Language Models for Software Vulnerability Detection.
Proceedings of the Annual Computer Security Applications Conference, 2022

Reconstruction Attack on Differential Private Trajectory Protection Mechanisms.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Scheduling Real-Time Security Aware Tasks in Fog Networks.
IEEE Trans. Serv. Comput., 2021

Exploiting Heterogeneity for Opportunistic Resource Scaling in Cloud-Hosted Applications.
IEEE Trans. Serv. Comput., 2021

Privacy Preserving Location-Aware Personalized Web Service Recommendations.
IEEE Trans. Serv. Comput., 2021

Privacy-Aware Autonomous Valet Parking: Towards Experience Driven Approach.
IEEE Trans. Intell. Transp. Syst., 2021

BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability.
IEEE Trans. Inf. Forensics Secur., 2021

Detecting Hardware-Assisted Virtualization With Inconspicuous Features.
IEEE Trans. Inf. Forensics Secur., 2021

Compcrypt-Lightweight ANS-Based Compression and Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems.
IEEE Trans. Emerg. Top. Comput., 2021

Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models.
IEEE Trans. Dependable Secur. Comput., 2021

Multi-Client Cloud-Based Symmetric Searchable Encryption.
IEEE Trans. Dependable Secur. Comput., 2021

CATTmew: Defeating Software-Only Physical Kernel Isolation.
IEEE Trans. Dependable Secur. Comput., 2021

Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things.
IEEE Trans. Comput. Soc. Syst., 2021

The importance of social identity on password formulations.
Pers. Ubiquitous Comput., 2021

Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT.
IEEE Internet Things J., 2021

SDN-Enabled Secure IoT Architecture.
IEEE Internet Things J., 2021

P2DPI: Practical and Privacy-Preserving Deep Packet Inspection.
IACR Cryptol. ePrint Arch., 2021

User, Usage and Usability: Redefining Human Centric Cyber Security.
Frontiers Big Data, 2021

A Survey of Android Malware Detection with Deep Neural Models.
ACM Comput. Surv., 2021

Characterizing Malicious URL Campaigns.
CoRR, 2021

RAIDER: Reinforcement-aided Spear Phishing Detector.
CoRR, 2021

Robust Training Using Natural Transformation.
CoRR, 2021

OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning.
CoRR, 2021

Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning.
CoRR, 2021

Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?
CoRR, 2021

Token-Modification Adversarial Attacks for Natural Language Processing: A Survey.
CoRR, 2021

DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN.
CoRR, 2021

Modeling social worm propagation for advanced persistent threats.
Comput. Secur., 2021

Two-Factor Decryption: A Better Way to Protect Data Security and Privacy.
Comput. J., 2021

An internet of things service roadmap.
Commun. ACM, 2021

Intelligent Anomaly Detection for Large Network Traffic With Optimized Deep Clustering (ODC) Algorithm.
IEEE Access, 2021

Can pre-trained Transformers be used in detecting complex sensitive sentences? - A Monsanto case study.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Deception for Cyber Defence: Challenges and Opportunities.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

Scheduling Real Tim Security Aware Tasks in Fog Networks.
Proceedings of the IEEE World Congress on Services, 2021

Digital Twins and Cyber Security - solution or challenge?
Proceedings of the 6th South-East Europe Design Automation, 2021

DeepiSign: invisible fragile watermark to protect the integrity and authenticity of CNN.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

OblivSketch: Oblivious Network Measurement as a Cloud Service.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Diverse Multimedia Layout Generation with Multi Choice Learning.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

HoneyCode: Automating Deceptive Software Repositories with Deep Generative Models.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021

Peeler: Profiling Kernel-Level Events to Detect Ransomware.
Proceedings of the Computer Security - ESORICS 2021, 2021

Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Are Android Apps Being Protected Well Against Attacks?
IEEE Wirel. Commun., 2020

What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text.
IEEE Trans. Serv. Comput., 2020

Privacy-Preserving User Profile Matching in Social Networks.
IEEE Trans. Knowl. Data Eng., 2020

Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.
IEEE Trans. Inf. Forensics Secur., 2020

Robust digital signature revisited.
Theor. Comput. Sci., 2020

A survey of recent methods on deriving topics from Twitter: algorithm to evaluation.
Knowl. Inf. Syst., 2020

Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions.
IACR Cryptol. ePrint Arch., 2020

Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities.
Future Gener. Comput. Syst., 2020

HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios.
CoRR, 2020

Towards Self-Improving Hybrid Elasticity Control of Cloud-based Software Systems.
CoRR, 2020

Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks.
CoRR, 2020

FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning.
CoRR, 2020

Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review.
CoRR, 2020

Adversarial Defense by Latent Style Transformations.
CoRR, 2020

Can the Multi-Incoming Smart Meter Compressed Streams be Re-Compressed?
CoRR, 2020

Defending Adversarial Attacks via Semantic Feature Manipulation.
CoRR, 2020

GhostKnight: Breaching Data Integrity via Speculative Execution.
CoRR, 2020

Generating Semantic Adversarial Examples via Feature Manipulation.
CoRR, 2020

Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies.
IEEE Commun. Surv. Tutorials, 2020

Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

SMARTSHIELD: Automatic Smart Contract Protection Made Easy.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

Towards IoT Security Automation and Orchestration.
Proceedings of the Second IEEE International Conference on Trust, 2020

A Needle in a Haystack: Finding a Suitable Lightweight IoT Authentication Protocol and Improving Its Usability.
Proceedings of the Second IEEE International Conference on Trust, 2020

Security and Privacy for a Sustainable Internet of Things.
Proceedings of the Second IEEE International Conference on Trust, 2020

End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

A Behavioural Network Traffic Novelty Detection for the Internet of Things Infrastructures.
Proceedings of the Parallel Architectures, Algorithms and Programming, 2020

Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT).
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses.
Proceedings of the 53rd Annual IEEE/ACM International Symposium on Microarchitecture, 2020

OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Deep Learning for Community Detection: Progress, Challenges and Opportunities.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

AuraEN: Autonomous Resource Allocation for Cloud-Hosted Data Processing Pipelines.
Proceedings of the Service-Oriented Computing - ICSOC 2020 Workshops, 2020

A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks.
Proceedings of the Information Systems Security - 16th International Conference, 2020

Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

PART-GAN: Privacy-Preserving Time-Series Sharing.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020

An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation.
Proceedings of the Computer Security - ESORICS 2020, 2020

Architecture-Centric Support for Integrating Security Tools in a Security Orchestration Platform.
Proceedings of the Software Architecture - 14th European Conference, 2020

DAN: Dual-View Representation Learning for Adapting Stance Classifiers to New Domains.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

Assessing Social License to Operate from the Public Discourse on Social Media.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Vulnerability Database as a Service for IoT.
Proceedings of the Applications and Techniques in Information Security, 2020

Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
A lightweight authentication scheme for vehicular ad hoc networks based on MSR.
Veh. Commun., 2019

Introduction to the Special Section on Advances in Internet-based Collaborative Technologies.
ACM Trans. Internet Techn., 2019

Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
ACM Trans. Cyber Phys. Syst., 2019

SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams.
IEEE Trans. Big Data, 2019

A Note on Quality of Service Issues in Smart Cities.
J. Parallel Distributed Comput., 2019

Exploiting the Remote Server Access Support of CoAP Protocol.
IEEE Internet Things J., 2019

A Multi-Vocal Review of Security Orchestration.
ACM Comput. Surv., 2019

TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique.
CoRR, 2019

Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing.
CoRR, 2019

Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples.
CoRR, 2019

A new privacy-preserving authentication protocol for anonymous web browsing.
Concurr. Comput. Pract. Exp., 2019

Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks.
Concurr. Comput. Pract. Exp., 2019

Proof-of-QoS: QoS based blockchain consensus protocol.
Comput. Secur., 2019

A3CM: Automatic Capability Annotation for Android Malware.
IEEE Access, 2019

Learning Influence Probabilities and Modelling Influence Diffusion in Twitter.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

A Logic for Secure Stratified Systems and its Application to Containerized Systems.
Proceedings of the 18th IEEE International Conference On Trust, 2019

IoT Device Identification via Network-Flow Based Fingerprinting and Learning.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks.
Proceedings of the Provable Security, 2019

Building Secure SRAM PUF Key Generators on Resource Constrained Devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Data-Driven Android Malware Intelligence: A Survey.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

An ontology-driven approach to automating the process of integrating security software systems.
Proceedings of the International Conference on Software and System Processes, 2019

P-STM: Privacy-Protected Social Tie Mining of Individual Trajectories.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019

Context-Aware Trust Management System for IoT Applications with Multiple Domains.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Self-Improving Autonomic Systems for Antifragile Cyber Defence: Challenges and Opportunities.
Proceedings of the 2019 IEEE International Conference on Autonomic Computing, 2019

Finding Flaws from Password Authentication Code in Android Apps.
Proceedings of the Computer Security - ESORICS 2019, 2019

Generic Multi-keyword Ranked Search on Encrypted Cloud Data.
Proceedings of the Computer Security - ESORICS 2019, 2019

Proactive Antifragility: A New Paradigm for Next-Generation Cyber Defence at the Edge.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Benchmarking for End-to-End QoS Sustainability in Cloud-Hosted Data Processing Pipelines.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Security is the Weakest Link: Prevalent Culture of Victim Blaming in Cyberattacks.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Bootstrapping Trust in a "Trusted" Virtualized Platform.
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019

Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Automated Interpretation and Integration of Security Tools Using Semantic Knowledge.
Proceedings of the Advanced Information Systems Engineering, 2019

An empirical study of SMS one-time password authentication in Android apps.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

STRIP: a defence against trojan attacks on deep neural networks.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

Recognising Agreement and Disagreement between Stances with Reason Comparing Networks.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Towards Risk-Aware Cost-Optimal Resource Allocation for Cloud Applications.
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019

2018
Editorial.
IEEE Trans. Serv. Comput., 2018

A Government-Run Online Community to Support Recipients of Welfare Payments.
Int. J. Cooperative Inf. Syst., 2018

Platform-independent Secure Blockchain-Based Voting System.
IACR Cryptol. ePrint Arch., 2018

Privacy-protected statistics publication over social media user trajectory streams.
Future Gener. Comput. Syst., 2018

Security and Performance Considerations in ROS 2: A Balancing Act.
CoRR, 2018

TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs.
CoRR, 2018

Crowdsensing and privacy in smart city applications.
CoRR, 2018

Internet of Things (IoT) and Cloud Computing Enabled Disaster Management.
CoRR, 2018

Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
CoRR, 2018

Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones.
CoRR, 2018

Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks.
CoRR, 2018

A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS.
CoRR, 2018

Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation.
CoRR, 2018

An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.
Comput. Networks, 2018

IoTChain: Establishing Trust in the Internet of Things Ecosystem Using Blockchain.
IEEE Cloud Comput., 2018

The Next Grand Challenges: Integrating the Internet of Things and Data Science.
IEEE Cloud Comput., 2018

A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption.
IEEE Access, 2018

Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks.
IEEE Access, 2018

Privacy Preserving User Based Web Service Recommendations.
IEEE Access, 2018

An Improved Lightweight RFID Authentication Protocol for Internet of Things.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Decentralized Voting: A Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

P-GENT: Privacy-Preserving Geocoding of Non-Geotagged Tweets.
Proceedings of the 17th IEEE International Conference On Trust, 2018

PAIRS: Privacy-Aware Identification and Recommendation of Spatio-Friends.
Proceedings of the 17th IEEE International Conference On Trust, 2018

KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

A Privacy-Preserving Semantic Annotation Framework Using Online Social Media.
Proceedings of the Web Services - ICWS 2018, 2018

AWaRE - Towards Distributed Self-Management for Resilient Cyber Systems.
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018

MEDUSA: Malware Detection Using Statistical Analysis of System's Behavior.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Towards Resource and Contract Heterogeneity Aware Rescaling for Cloud-Hosted Applications.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018

ADSL: An Embedded Domain-Specific Language for Constraint-Based Distributed Self-Management.
Proceedings of the 25th Australasian Software Engineering Conference, 2018

Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

Cross-Target Stance Classification with Self-Attention Networks.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018

Towards End-to-End QoS and Cost-Aware Resource Scaling in Cloud-Based IoT Data Processing Pipelines.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018

2017
Using time-sensitive interactions to improve topic derivation in twitter.
World Wide Web, 2017

Lightweight Mutual Authentication for IoT and Its Applications.
IEEE Trans. Sustain. Comput., 2017

Privacy-Aware Scheduling SaaS in High Performance Computing Environments.
IEEE Trans. Parallel Distributed Syst., 2017

DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream.
ACM Trans. Embed. Comput. Syst., 2017

TruXy: Trusted Storage Cloud for Scientific Workflows.
IEEE Trans. Cloud Comput., 2017

An Infrastructure Service Recommendation System for Cloud Applications with Real-time QoS Requirement Constraints.
IEEE Syst. J., 2017

A dynamic prime number based efficient security mechanism for big sensing data streams.
J. Comput. Syst. Sci., 2017

IoT Middleware: A Survey on Issues and Enabling Technologies.
IEEE Internet Things J., 2017

Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication.
IACR Cryptol. ePrint Arch., 2017

A service computing manifesto: the next 10 years.
Commun. ACM, 2017

Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability.
IEEE Access, 2017

Twitter Content Eliciting User Engagement: A Case Study on Australian Organisations.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Exploiting Users' Rating Behaviour to Enhance the Robustness of Social Recommendation.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

A Verifiable Ranked Choice Internet Voting System.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Privacy Preserving Location Recommendations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

<i>RT-SANE</i>: Real Time Security Aware Scheduling on the Network Edge.
Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Practical Authentication Protocol for Anonymous Web Browsing.
Proceedings of the Information Security Practice and Experience, 2017

IoT and Big Data: An Architecture with Data Flow and Security Issues.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

ARA-Assessor: Application-Aware Runtime Risk Assessment for Cloud-Based Business Continuity.
Proceedings of the Service-Oriented Computing - 15th International Conference, 2017

Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

The Joint Effects of Tweet Content Similarity and Tweet Interactions for Topic Derivation.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Fuzzy Extractors for Biometric Identification.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

ConTaaS: An Approach to Internet-Scale Contextualisation for Developing Efficient Internet of Things Applications.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Incentivising Resource Sharing in Edge Computing Applications.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2017

Towards Quality-Assured Data Delivery in Cloud-Based IoT Platforms for Smart Cities.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Sensitive gazetteer discovery and protection for mobile social media users.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Privacy-protected place of activity mining on big location data.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Internet of Things (IoT): Smart and Secure Service Delivery.
ACM Trans. Internet Techn., 2016

SafeProtect: Controlled Data Sharing With User-Defined Policies in Cloud-Based Collaborative Environment.
IEEE Trans. Emerg. Top. Comput., 2016

Developing Dependable and Secure Cloud Applications.
IEEE Internet Comput., 2016

A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage.
Data Sci. Eng., 2016

WebRTC-based video conferencing service for telehealth.
Computing, 2016

Threats to Networking Cloud and Edge Datacenters in the Internet of Things.
IEEE Cloud Comput., 2016

Guest Editorial: Cloud Computing and Scientific Applications (CCSA) - Big Data Analysis in the Cloud.
Comput. J., 2016

An Innovative Approach to Derive Trust from Social Networks and to Improve the Matching in Dental Care Recommendation Systems.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

Impact of Subjective Aspects in the Matching of Dentists and Patients in Dental Care Recommendation Systems.
Proceedings of the International Conference on Information Systems, 2016

PBCP: A Process-based Bussiness Collaboration Platform.
Proceedings of the ICEIS 2016, 2016

A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Privacy-protected social media user trajectories calibration.
Proceedings of the 12th IEEE International Conference on e-Science, 2016

Can a Government Use Social Media to Support Disadvantaged Citizens?
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Why Is It Difficult for Welfare Recipients to Return to Work? A Case Study through a Collaborative Online Community.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

TweetRipple: Understanding Your Twitter Audience and the Impact of Your Tweets.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Protecting the location privacy of mobile social media users.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

LogProv: Logging events as provenance of big data analytics pipelines with trustworthiness.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
Trusting the Social Web: issues and challenges.
World Wide Web, 2015

ReputationNet: Reputation-Based Service Recommendation for e-Science.
IEEE Trans. Serv. Comput., 2015

A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud.
IEEE Trans. Parallel Distributed Syst., 2015

Interaction-Based Recommendations for Online Communities.
ACM Trans. Internet Techn., 2015

Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud.
IEEE Trans. Computers, 2015

Domain-aware reputable service recommendation in heterogeneous manufacturing service ecosystem.
Int. J. Comput. Integr. Manuf., 2015

A Cloud Infrastructure Service Recommendation System for Optimizing Real-time QoS Provisioning Constraints.
CoRR, 2015

A note on resource orchestration for cloud computing.
Concurr. Comput. Pract. Exp., 2015

Guest editorial: Special issue on data intensive cloud computing.
Computing, 2015

Trustworthy Processing of Healthcare Big Data in Hybrid Clouds.
IEEE Cloud Comput., 2015

Building Sensor-Based Big Data Cyberinfrastructures.
IEEE Cloud Comput., 2015

Behavior-Based Propagation of Trust in Social Networks with Restricted and Anonymous Participation.
Comput. Intell., 2015

A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

Time-Sensitive Topic Derivation in Twitter.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

DPBSV - An Efficient and Secure Scheme for Big Sensing Data Stream.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Incorporating Tweet Relationships into Topic Derivation.
Proceedings of the Computational Linguistics, 2015

Analysing and Using Subjective Criteria to Improve Dental Care Recommendation Systems.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

Self Protecting Data Sharing Using Generic Policies.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

Efficient Algorithms for Social Network Coverage and Reach.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

Matrix Inter-joint Factorization - A New Approach for Topic Derivation in Twitter.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

Deriving Topics in Twitter by Exploiting Tweet Interactions.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

Cloud Docs: Secure Scalable Document Sharing on Public Clouds.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

Next Step: An Online Community for Delivering Human Services.
Proceedings of the Social Media for Government Services, 2015

Social Media for Government Services: An Introduction.
Proceedings of the Social Media for Government Services, 2015

Gamification on the Social Web.
Proceedings of the Social Media for Government Services, 2015

2014
Guest Editorial: Special Issue on Clouds for Social Computing.
IEEE Trans. Serv. Comput., 2014

A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud.
J. Comput. Syst. Sci., 2014

A survey of emerging threats in cybersecurity.
J. Comput. Syst. Sci., 2014

Gamification for Online Communities: A Case Study for Delivering Government Services.
Int. J. Cooperative Inf. Syst., 2014

A platform for secure monitoring and sharing of generic health data in the Cloud.
Future Gener. Comput. Syst., 2014

Guest Editorial: Selected Papers from IEEE IEEE/EAI CollaborateCom 2013.
EAI Endorsed Trans. Collab. Comput., 2014

Improving the Matching Process of Dental Care Recommendation Systems by using Subjective criteria for both patients and Dentists.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

A Novel Equitable Trustworthy Mechanism for Service Recommendation in the Evolving Service Ecosystem.
Proceedings of the Service-Oriented Computing - 12th International Conference, 2014

Improving dental care recommendation systems using trust and social networks.
Proceedings of the IEEE International Conference on Communications, 2014

Online Multiple Workflow Scheduling under Privacy and Deadline in Hybrid Cloud Environment.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Protecting and Analysing Health Care Data on Cloud.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014

Multifaceted Visualisation of Annotated Social Media Data.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

Service Trust Management for E-Government Applications.
Proceedings of the Advanced Web Services, 2014

2013
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud.
IEEE Trans. Parallel Distributed Syst., 2013

An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud.
J. Comput. Syst. Sci., 2013

A trust model-based analysis of social networks.
Int. J. Trust. Manag. Comput. Commun., 2013

Model-driven provisioning of application services in hybrid computing environments.
Future Gener. Comput. Syst., 2013

Cloud Computing and Scientific Applications - Big Data, Scalable Analytics, and Beyond.
Future Gener. Comput. Syst., 2013

A survey of trust in social networks.
ACM Comput. Surv., 2013

Ethical considerations in an online community: the balancing act.
CoRR, 2013

SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud.
Concurr. Comput. Pract. Exp., 2013

Interaction Based Content Recommendation in Online Communities.
Proceedings of the User Modeling, Adaptation, and Personalization, 2013

Know Your Members' Trust.
Proceedings of the Late-Breaking Results, 2013

The Human Touch of Government Services.
Proceedings of the Late-Breaking Results, 2013

Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud.
Proceedings of the 12th IEEE International Conference on Trust, 2013

MPHC: Preserving Privacy for Workflow Execution in Hybrid Clouds.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

Supporting tele-assistance and tele-monitoring in safety-critical environments.
Proceedings of the Augmentation, Application, Innovation, Collaboration, OzCHI '13, Adelaide, Australia - November 25, 2013

A Performance Evaluation of Public Cloud Using TPC-C.
Proceedings of the Service-Oriented Computing - ICSOC 2012 Workshops, 2013

Introduction to the 3rd International Workshop on Cloud Computing and Scientific Applications (CCSA'13).
Proceedings of the Service-Oriented Computing - ICSOC 2013 Workshops, 2013

Mirror, Mirror, on the Web, Which Is the Most Reputable Service of Them All? - A Domain-Aware and Reputation-Aware Method for Service Recommendation.
Proceedings of the Service-Oriented Computing - 11th International Conference, 2013

Galaxy + Hadoop: Toward a Collaborative and Scalable Image Processing Toolbox in Cloud.
Proceedings of the Service-Oriented Computing - ICSOC 2013 Workshops, 2013

TrustVis: A Trust Visualisation Service for Online Communities.
Proceedings of the Service-Oriented Computing - ICSOC 2012 Workshops, 2013

Querying Streaming XML Big Data with Multiple Filters on Cloud.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Secure and Controlled Sharing of Data in Distributed Computing.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Designing for reflection and collaboration to support a transition from welfare to work.
Proceedings of the Computer Supported Cooperative Work, 2013

Next step: an online community to support parents in their transition to work.
Proceedings of the Computer Supported Cooperative Work, 2013

A social trust based friend recommender for online communities "invited paper".
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Data architecture for telehealth services research: A case study of home tele-monitoring.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Security analysis of mobile applications: A case study of a collaboration tool in healthcare.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

Social Networking and Dental Care: State of the Art and Analysis of the Impact on Dentists, Dental Practices and their Patients.
Proceedings of the 26th Bled eConference: eTrust: eInnovation: Challenges and Impacts for Individuals, 2013

Data Abstraction and Visualisation in Next Step: Experiences from a Government Services Delivery Trial.
Proceedings of the IEEE International Congress on Big Data, 2013

2012
Context-sensitive user interfaces for semantic services.
ACM Trans. Internet Techn., 2012

Issues and Challenges in Web Service Management Systems.
Int. J. Next Gener. Comput., 2012

Editorial.
Int. J. Cloud Comput., 2012

A New Cloud Architecture of Virtual Trusted Platform Modules.
IEICE Trans. Inf. Syst., 2012

A Declarative Recommender System for Cloud Infrastructure Services Selection
CoRR, 2012

Big Data and Cloud.
Proceedings of the Web Information Systems Engineering - WISE 2011 and 2012 Workshops, 2012

SRec: a social behaviour based recommender for online communities.
Proceedings of the Workshop and Poster Proceedings of the 20th Conference on User Modeling, 2012

An association based approach to propagate social trust in social networks.
Proceedings of the Workshop and Poster Proceedings of the 20th Conference on User Modeling, 2012

Engagement and Cooperation in Social Networks: Do Benefits and Rewards Help?
Proceedings of the 11th IEEE International Conference on Trust, 2012

The design of an online community for welfare recipients.
Proceedings of the 24th Australian Computer-Human Interaction Conference, OzCHI '12, Melbourne, VIC, Australia - November 26, 2012

Modeling Availability in Clouds for Mobile Computing.
Proceedings of the 2012 IEEE First International Conference on Mobile Services, 2012

PASOAC-Net: A Petri-Net Model to Manage Authorization in Service-Based Business Process.
Proceedings of the Service-Oriented Computing - 10th International Conference, 2012

A Declarative Recommender System for Cloud Infrastructure Services Selection.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2012

An ontology-based system for Cloud infrastructure services' discovery.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Portable key management service for cloud storage.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Using gamification in an online community.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Privacy-Preserving Layer over MapReduce on Cloud.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Business Process Engine Simulator.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

ReputationNet: A Reputation Engine to Enhance ServiceMap by Recommending Trusted Services.
Proceedings of the 2012 IEEE Ninth International Conference on Services Computing, 2012

SOAC-Net: A Model to Manage Service-Based Business Process Authorization.
Proceedings of the 2012 IEEE Ninth International Conference on Services Computing, 2012

2011
Reputation Management for Composite Services in Service-Oriented Systems.
Int. J. Web Serv. Res., 2011

Dynamic Business Collaborations Through Contract Services.
Int. J. Syst. Serv. Oriented Eng., 2011

A Service-Oriented User Interface for the Next Generation Web.
Int. J. Syst. Serv. Oriented Eng., 2011

A mobile and portable trusted computing platform.
EURASIP J. Wirel. Commun. Netw., 2011

Building Trust Communities Using Social Trust.
Proceedings of the Advances in User Modeling, 2011

A Secure Storage Service in the Hybrid Cloud.
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011

A Trust Prediction Model for Service Web.
Proceedings of the IEEE 10th International Conference on Trust, 2011

STrust: A Trust Model for Social Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Biometric Enabled Portable Trusted Computing Platform.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Secure Connectivity for Intra-cloud and Inter-cloud Communication.
Proceedings of the 2011 International Conference on Parallel Processing Workshops, 2011

A test-bed for the evaluation of business process prediction techniques.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

DIaaS: Data Integrity as a Service in the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
End-to-End Service Support for Mashups.
IEEE Trans. Serv. Comput., 2010

A snapshot of trusted personal devices applicable to transaction processing.
Pers. Ubiquitous Comput., 2010

A Smart User Interface for Service-Oriented Web.
Proceedings of the Web Information Systems Engineering - WISE 2010 Workshops, 2010

A behaviour-based trust model for service web.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010

User Authentication for Online Applications Using a USB-Based Trust Device.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

A Fuzzy Trust Management Framework for Service Web.
Proceedings of the IEEE International Conference on Web Services, 2010

Managing Web Services: An Application in Bioinformatics.
Proceedings of the Service-Oriented Computing - 8th International Conference, 2010

Trusted Computing Platform in Your Pocket.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

A Cloud Architecture of Virtual Trusted Platform Modules.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

TrustStore: Making Amazon S3 Trustworthy with Services Composition.
Proceedings of the 10th IEEE/ACM International Conference on Cluster, 2010

A Trust Ontology for Semantic Services.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010

2009
An Approach to Checking Compatibility of Service Contracts in Service-Oriented Applications.
Int. J. Web Serv. Res., 2009

A Service-Oriented Architecture to enable virtual storage services: a dynamic collaboration context.
Int. J. Ad Hoc Ubiquitous Comput., 2009

Reputation Propagation in Composite Services.
Proceedings of the IEEE International Conference on Web Services, 2009

2008
Cooperative Data Management Services Based on Accountable Contract.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

WS-CCDL: A Framework for Web Service Collaborative Context Definition Language for Dynamic Collaborations.
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008

Facilitating Dynamic Collaborations with eContract Services.
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008

A Contract Language for Service-Oriented Dynamic Collaborations.
Proceedings of the Collaborative Computing: Networking, 2008

Secure and Conditional Resource Coordination for Successful Collaborations.
Proceedings of the Collaborative Computing: Networking, 2008

Yet Another Performance Testing Framework.
Proceedings of the 19th Australian Software Engineering Conference (ASWEC 2008), 2008

WSLA+: Web Service Level Agreement Language for Collaborations.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

A Conflict Neighbouring Negotiation Algorithm for Resource Services in Dynamic Collaborations.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

Trusted Email protocol: Dealing with privacy concerns from malicious email intermediaries.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
A Trusted System for Sharing Patient Electronic Medical Records in Autonomous Distributed Health Care Systems.
Int. J. Heal. Inf. Syst. Informatics, 2007

Virtual Storage Services for Dynamic Collaborations.
Proceedings of the 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2007), 2007

User-Controlled Collaborations in the Context of Trust Extended Environments.
Proceedings of the 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2007), 2007

A Distributed Approach for Negotiating Resource Contributions in Dynamic Collaboration.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

Anitya: An Ephemeral Data Management Service and Secure Data Access Protocols for Dynamic Collaborations.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

A Policy Based Approach to Managing Shared Data in Dynamic Collaborations.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Trust Extension Device: Providing Mobility and Portability of Trust in Cooperative Information Systems.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Isolation Support for Service-based Applications: A Position Paper.
Proceedings of the Third Biennial Conference on Innovative Data Systems Research, 2007

An Infrastructure Virtualisation SOA for VNO-based Business Models.
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007

2006
Establishing a Trust Relationship in Cooperative Information Systems.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006

Expressing and Reasoning about Service Contracts in Service-Oriented Computing.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

An Event-Driven Workflow Engine for Service-based Business Systems.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

A Tag-Based Data Model for Privacy-Preserving Medical Applications.
Proceedings of the Current Trends in Database Technology - EDBT 2006, 2006

Secure Sharing of Electronic Patient Records.
Proceedings of the European Conference on eHealth 2006, 2006

Checking Conformance between Business Processes and Web Service Contract in Service Oriented Applications.
Proceedings of the 17th Australian Software Engineering Conference (ASWEC 2006), 2006

Compatibility of Service Contracts in Service-Oriented Ap.
Proceedings of the 2006 IEEE International Conference on Services Computing (SCC 2006), 2006

2005
A Survey of MPEG-1 Audio, Video and Semantic Analysis Techniques.
Multim. Tools Appl., 2005

Consistency for Web Services Applications.
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005

A Service-Oriented Workflow Language for Robust Interacting Applications.
Proceedings of the On the Move to Meaningful Internet Systems 2005: CoopIS, 2005

2003
Making sense of video content.
Proceedings of the Eleventh ACM International Conference on Multimedia, 2003

DAVE: a system for quality driven adaptive video delivery.
Proceedings of the 5th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2003

Adaptive video highlights for wired and wireless platforms.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

Edge-based semantic classification of sports video sequences.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

2002
Role of Edge Detection in Video Semantics.
Proceedings of the Visualisation 2002, 2002

Spatio-temporal Modelling and Querying Video Databases Using High-level Concepts.
Proceedings of the Visual and Multimedia Information Management, 2002

A Heuristic Algorithm for Combining Fuzzy Results in Multimedia Databases.
Proceedings of the Database Technologies 2002, 2002

2001
Automatic detection of 'Goal' segments in basketball videos.
Proceedings of the 9th ACM International Conference on Multimedia 2001, Ottawa, Ontario, Canada, September 30, 2001

Semantic Based Retrieval Model for Digital Audio and Video.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001

2000
An evaluation measure for query processing in CBIR systems.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000

1999
Query Processing Issues in Image (Multimedia) Databases.
Proceedings of the 15th International Conference on Data Engineering, 1999

A Fuzzy Object Query Language (FOQL) for Image Databases.
Proceedings of the Database Systems for Advanced Applications, 1999

1998
A Research Prototype Image Retrieval System.
Proceedings of the SIGIR '98: Proceedings of the 21st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 1998

Four Layer Schema for Image Modeling.
Proceedings of the Database Systems 98, 1998


  Loading...