


default search action
18th TrustCom / 13th BigDataSE 2019: Rotorua, New Zealand
- 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 13th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019. IEEE 2019, ISBN 978-1-7281-2777-4

TrustCom 2019: The 18th IEEE International Conferenceon Trust, Security, and Privacy in Computing and Communications
TrustCom Trust Track
- Yunlong Guo, Aimin Yu, Xiaoli Gong, Lixin Zhao, Lijun Cai, Dan Meng:

Building Trust in Container Environment. 1-9 - Kevin Theuermann:

Trustworthy Privacy-Preserving Service Compositions. 10-17 - Gul Jabeen, Ping Luo:

A Unified Measurable Software Trustworthy Model Based on Vulnerability Loss Speed Index. 18-25 - Dongxu Ji, Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan:

MicroTEE: Designing TEE OS Based on the Microkernel Architecture. 26-33 - Nisha Malik, Priyadarsi Nanda, Xiangjian He

, Ren Ping Liu:
Trust and Reputation in Vehicular Networks: A Smart Contract-Based Approach. 34-41 - Yun-Ping Tien, Wei-Chen Lin, Jan-Ming Ho, Wing-Kai Hon:

Optimal File Dissemination Scheduling Under a General Binary Tree of Trust Relationship. 42-49 - Felix Hörandner

, Christof Rabensteiner:
Horcruxes for Everyone - A Framework for Key-Loss Recovery by Splitting Trust. 50-57 - Kunli Lin, Wenqing Liu, Kun Zhang, Bibo Tu:

HyperMI: A Privilege-level VM Protection Approach against Compromised Hypervisor. 58-65
TrustCom Security Track
- Tristan Ninet, Axel Legay, Romaric Maillard, Louis-Marie Traonouez, Olivier Zendra:

The Deviation Attack: A Novel Denial-of-Service Attack Against IKEv2. 66-74 - Yang Zhang, Haichang Gao, Ge Pei, Sainan Luo, Guoqin Chang, Nuo Cheng:

A Survey of Research on CAPTCHA Designing and Breaking Techniques. 75-84 - Omaru Maruatona, Ahmad Azab

, Paul A. Watters
:
AVOCAD: Adaptive Terrorist Comms Surveillance and Interception using Machine Learning. 85-94 - Ke He

, Dong Seong Kim
:
Malware Detection with Malware Images using Deep Learning Techniques. 95-102 - Salma Abdalla Hamad, Wei Emma Zhang

, Quan Z. Sheng
, Surya Nepal
:
IoT Device Identification via Network-Flow Based Fingerprinting and Learning. 103-111 - Yongjie Huang, Qiping Yang, Jinghui Qin, Wushao Wen:

Phishing URL Detection via CNN and Attention-Based Hierarchical RNN. 112-119 - Yepeng Yao, Liya Su, Zhigang Lu, Baoxu Liu:

STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection. 120-127 - Karl Ott, Rabi N. Mahapatra:

Continuous Authentication of Embedded Software. 128-135 - Zhicheng Liu, Xiaochun Yun, Yongzheng Zhang, Yipeng Wang:

CCGA: Clustering and Capturing Group Activities for DGA-Based Botnets Detection. 136-143 - Chansu Han

, Jumpei Shimamura, Takeshi Takahashi, Daisuke Inoue, Masanori Kawakita, Jun'ichi Takeuchi, Koji Nakao:
Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso. 144-151 - Shaofeng Zhu, Hua Chen, Wei Xi, Meihui Chen, Limin Fan, Dengguo Feng:

A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs. 152-159 - Zecheng He, Aswin Raghavan, Guangyuan Hu, Sek M. Chai, Ruby B. Lee:

Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning. 160-167 - Lukas Zobernig, Steven D. Galbraith

, Giovanni Russello:
When are Opaque Predicates Useful? 168-175 - Wenjing Cui, Yang Li, Yan Zhang, Chang Liu, Mengqi Zhan

:
An Ant Colony Algorithm Based Content Poisoning Mitigation in Named Data Networking. 176-183 - Dingyu Yan, Feng Liu:

A Heuristic Method for Network Modification Against Cyber Epidemic Attacks. 184-191 - Zhangtan Li, Liang Cheng, Yang Zhang:

Tracking Sensitive Information and Operations in Integrated Clinical Environment. 192-199 - Ning Xi, Cong Sun, Jianfeng Ma, Jing Lv:

Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds. 200-207 - Shin-Ying Huang, Tao Ban:

A Topic-Based Unsupervised Learning Approach for Online Underground Market Exploration. 208-215 - Bingyu Li, Dawei Chu, Jingqiang Lin, Quanwei Cai, Congli Wang, Lingjia Meng:

The Weakest Link of Certificate Transparency: Exploring the TLS/HTTPS Configurations of Third-Party Monitors. 216-223 - Denys A. Flores, Arshad Jhumka:

Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing. 224-231 - Zhenyu Cheng

, Xunxun Chen
, Yongzheng Zhang, Shuhao Li, Jian Xu:
MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network. 232-239 - Raphael Labaca Castro, Corinna Schmitt, Gabi Dreo:

AIMED: Evolving Malware with Genetic Programming to Evade Detection. 240-247 - Lipeng Zhu, Xiaotong Fu, Yao Yao, Yuqing Zhang, He Wang:

FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware. 248-255 - Ying Pang, Zhenxiang Chen, Lizhi Peng, Kun Ma

, Chuan Zhao, Ke Ji:
A Signature-Based Assistant Random Oversampling Method for Malware Detection. 256-263 - Mohammed A. Rashid

, Houshyar Honar Pajooh
:
A Security Framework for IoT Authentication and Authorization Based on Blockchain Technology. 264-271 - Mahbub E. Khoda

, Tasadduq Imam
, Joarder Kamruzzaman
, Iqbal Gondal
, Ashfaqur Rahman:
Selective Adversarial Learning for Mobile Malware. 272-279 - Utkarsh Porwal, Smruthi Mukund:

Credit Card Fraud Detection in E-Commerce. 280-287 - Cole Dishington, Dilli P. Sharma

, Dong Seong Kim
, Jin-Hee Cho, Terrence J. Moore
, Frederica F. Nelson:
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks. 288-295 - Na Huang, Ming Xu, Ning Zheng, Tong Qiao, Kim-Kwang Raymond Choo

:
Deep Android Malware Classification with API-Based Feature Graph. 296-303 - Hidehito Gomi, Shuji Yamaguchi, Wataru Ogami, Teruhiko Teraoka, Tatsuru Higurashi:

Context-Aware Authentication Using Co-Located Devices. 304-311 - Liya Su, Yepeng Yao, Zhigang Lu, Baoxu Liu:

Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection. 312-318 - Shuai Chen, Wenjie Xiong

, Yehan Xu, Bing Li, Jakub Szefer:
Thermal Covert Channels Leveraging Package-on-Package DRAM. 319-326 - Mohammad Jabed Morshed Chowdhury, Alan Colman

, Muhammad Ashad Kabir
, Jun Han, Paul Sarda:
Continuous Authorization in Subject-Driven Data Sharing Using Wearable Devices. 327-333 - Amartya Sen

, Kenneth K. Fletcher, Sanjay Madria:
A Secure User-Centric Framework for Dynamic Service Provisioning in IoT Environments. 334-341 - Shawn Rasheed, Jens Dietrich

, Amjed Tahir:
Laughter in the Wild: A Study Into DoS Vulnerabilities in YAML Libraries. 342-349
TrustCom Privacy Track
- Mohammad Reza Nosouhi

, Shui Yu
, Keshav Sood
, Marthie Grobler
:
HSDC-Net: Secure Anonymous Messaging in Online Social Networks. 350-357 - Fadi Hassan, David Sánchez

, Jordi Soria-Comas
, Josep Domingo-Ferrer
:
Automatic Anonymization of Textual Documents: Detecting Sensitive Information via Word Embeddings. 358-365 - Victor Morel, Mathieu Cunche, Daniel Le Métayer:

A Generic Information and Consent Framework for the IoT. 366-373 - Jiale Zhang, Junjun Chen, Di Wu

, Bing Chen, Shui Yu
:
Poisoning Attack in Federated Learning using Generative Adversarial Nets. 374-380 - Riad Ladjel, Nicolas Anciaux, Philippe Pucheral, Guillaume Scerri:

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments. 381-388 - Yonghong Zhang, Peijia Zheng, Weiqi Luo

:
Privacy-Preserving Outsourcing Computation of QR Decomposition in the Encrypted Domain. 389-396 - Wenhao Chen, Bohang Zeng, Peijia Zheng:

A Robust Watermarking Scheme for Encrypted JPEG Bitstreams with Format-Compliant Encryption. 397-403
TrustCom Forensics and Analytics Track
- Paul Black

, Iqbal Gondal
, Peter Vamplew, Arun Lakhotia:
Evolved Similarity Techniques in Malware Analysis. 404-410 - Heyan Chai, Shuqiang Yang, Zoe Lin Jiang, Xuan Wang:

A Robust and Reversible Watermarking Technique for Relational Dataset Based on Clustering. 411-418 - Alastair Nisbet, Rijo Jacob

:
TRIM, Wear Levelling and Garbage Collection on Solid State Drives: A Prediction Model for Forensic Investigators. 419-426 - Benjamin Taubmann, Alexander Böhm, Hans P. Reiser

:
TwinPorter - An Architecture For Enabling the Live Migration of VMI-Based Monitored Virtual Machines. 427-434 - Vijay Naidu, Manoranjan Mohanty:

Defeating Fake Food Labels Using Watermarking and Biosequence Analysis. 435-441 - Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar

, Nhien-An Le-Khac
:
Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection. 442-449 - Xavier Francis, Hamid R. Sharifzadeh, Angus Newton, Nilufar Baghaei

, Soheil Varastehpour:
Learning Wear Patterns on Footwear Outsoles Using Convolutional Neural Networks. 450-457 - Guanbo Jia, Paul Miller, Xin Hong, Harsha K. Kalutarage

, Tao Ban:
Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder. 458-465 - Tobias Latzo, Felix C. Freiling:

Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files. 466-475 - Ranul Deelaka Thantilage, Nhien-An Le-Khac

:
Framework for the Retrieval of Social Media and Instant Messaging Evidence from Volatile Memory. 476-482
TrustCom Emerging Technologies Track
- Rui Azevedo, Ibéria Medeiros

, Alysson Bessani
:
PURE: Generating Quality Threat Intelligence by Clustering and Correlating OSINT. 483-490 - Dawei Li, Jianwei Liu

, Zongxun Tang, Qianhong Wu, Zhenyu Guan:
AgentChain: A Decentralized Cross-Chain Exchange System. 491-498 - Hong Zhao, Yuexin Zhang, Xinyi Huang, Yang Xiang

:
An Adaptive Physical Layer Key Extraction Scheme for Smart Homes. 499-506 - Liangrong Zhao, Jiangshan Yu

:
Evaluating DAG-Based Blockchains for IoT. 507-513 - Qingyi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Zhimei Sui, Shifeng Sun, Shuyang Tang, Dawu Gu:

Making Monero Hard-to-Trace and More Efficient. 514-521 - Vinay Sachidananda, Suhas Bhairav, Nirnay Ghosh, Yuval Elovici:

PIT: A Probe Into Internet of Things by Comprehensive Security Analysis. 522-529 - Jianxing Hu, Dongdong Huo, Meilin Wang, Yazhe Wang, Yan Zhang, Yu Li:

A Probability Prediction Based Mutable Control-Flow Attestation Scheme on Embedded Platforms. 530-537 - Hongyang Liu, Feng Shen, Zhiqiang Liu, Yu Long, Zhen Liu, Shifeng Sun, Shuyang Tang, Dawu Gu:

A Secure and Practical Blockchain Scheme for IoT. 538-545 - Xin Chen, Xinyi Huang, Yi Mu, Ding Wang

:
A Typo-Tolerant Password Authentication Scheme with Targeted Error Correction. 546-553 - Alexander Marsalek, Thomas Zefferer

:
A Correctable Public Blockchain. 554-561 - Hagen Lauer, Amin Sakzad

, Carsten Rudolph
, Surya Nepal
:
A Logic for Secure Stratified Systems and its Application to Containerized Systems. 562-569 - Jiazhuo Lyu, Zoe Lin Jiang, Xuan Wang, Zhenhao Nong

, Man Ho Au, Junbin Fang
:
A Secure Decentralized Trustless E-Voting System Based on Smart Contract. 570-577 - Xingye Lu, Man Ho Au, Zhenfei Zhang:

(Linkable) Ring Signature from Hash-Then-One-Way Signature. 578-585 - Borui Gong, Man Ho Au, Haiyang Xue

:
Constructing Strong Designated Verifier Signatures from Key Encapsulation Mechanisms. 586-593 - Jack Huang, Yuan Wei Qi, Muhammad Rizwan Asghar, Andrew Meads, Yu-Cheng Tu

:
MedBloc: A Blockchain-Based Secure EHR System for Sharing and Accessing Medical Data. 594-601 - SeongMo An, Taehoon Eom, Jong Sou Park, Jin Bum Hong

, Armstrong Nhlabatsi, Noora Fetais
, Khaled M. Khan
, Dong Seong Kim
:
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing. 602-609 - Taehoon Eom, Jin Bum Hong

, SeongMo An, Jong Sou Park, Dong Seong Kim
:
Security and Performance Modeling and Optimization for Software Defined Networking. 610-617 - Ahmad Salehi Shahraki, Carsten Rudolph

, Marthie Grobler
:
A Dynamic Access Control Policy Model for Sharing of Healthcare Data in Multiple Domains. 618-625 - Alexander Marsalek, Thomas Zefferer

, Edona Fasllija, Dominik Ziegler
:
Tackling Data Inefficiency: Compressing the Bitcoin Blockchain. 626-633
BigDataSE 2019: The 13th IEEE International Conferenceon Big Data Science and Engineering
- Yibing Yang, M. Omair Shafiq:

Identifying High Value Users in Twitter Based on Text Mining Approaches. 634-641 - Yuntao Wang

, Zhou Su, Kuan Zhang
:
A Secure Private Charging Pile Sharing Scheme with Electric Vehicles in Energy Blockchain. 648-654 - Yuan Qiu, Xinhong Hei, Tadashi Ohmori, Hideyuki Fujita:

An Object-Pair Driven Approach for Top-k mCK Query Problem by Using Hilbert R-Tree. 655-661 - Xinhong Hei, Binbin Bai, Yichuan Wang, Li Zhang, Lei Zhu, Wenjiang Ji:

Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis. 662-669 - Yujun Huang, Yunpeng Weng

, Shuai Yu, Xu Chen:
Diffusion Convolutional Recurrent Neural Network with Rank Influence Learning for Traffic Forecasting. 678-685 - Kunyuan Deng, Xiaoyong Zhang, Yijun Cheng, Zhiyong Zheng, Fu Jiang, Weirong Liu, Jun Peng:

A Remaining Useful Life Prediction Method with Automatic Feature Extraction for Aircraft Engines. 686-692 - Ran Mo, Jianfeng Liu, Wentao Yu, Fu Jiang, Xin Gu, Xiaoshuai Zhao, Weirong Liu, Jun Peng:

A Differential Privacy-Based Protecting Data Preprocessing Method for Big Data Mining. 693-699 - Bo Yin, Yu Cheng

, Lin X. Cai
, Xianghui Cao:
A Cooperative Edge Computing Scheme for Reducing the Cost of Transferring Big Data in 5G Networks. 700-706 - Laha Ale

, Xiaojie Fang, Dajiang Chen, Ye Wang, Ning Zhang:
Lightweight Deep Learning Model For Facial Expression Recognition. 707-712 - Takayuki Sasaki, Yusuke Morita, Astha Jada:

Access Control Architecture for Smart City IoT Platform. 717-722
SECSOC-2019: The 3rd International Workshop on SecureSmart Society In Next Generation Networking Paradigm
- Shixuan Li, Dongmei Zhao:

A LSTM-Based Method for Comprehension and Evaluation of Network Security Situation. 723-728 - Hao Cao, Xiaolong Xu, Qingxiang Liu

, Yuan Xue, Lianyong Qi:
Uncertainty-Aware Resource Provisioning for Workflow Scheduling in Edge Computing Environment. 734-739 - Xiaoxiao Chi, Chao Yan, Huaizhen Kou

, Lianyong Qi:
Accuracy-Aware Service Recommendation with Privacy. 740-745 - Liangfu Lu, Xiaohan Ren, Chenming Cui, Yun Luo, Yongheng Jia, Yinong Xu:

Mutual Information on Tensors for Measuring the Nonlinear Correlations in Network Security. 746-750 - Iqbal Gondal

, Joarder Kamruzzaman
, Leo Zhang:
One-Shot Malware Outbreak Detection using Spatio-Temporal Isomorphic Dynamic Features. 751-756 - Yanchen Qiao, Qingshan Jiang, Zhenchao Jiang, Liang Gu:

A Multi-channel Visualization Method for Malware Classification Based on Deep Learning. 757-762 - Miroslaw Kutylowski, Przemyslaw Kubiak

:
Privacy and Security Analysis of PACE GM Protocol. 763-768 - Mohammed Al-Shaboti, Aaron Chen, Ian Welch:

Automatic Device Selection and Access Policy Generation Based on User Preference for IoT Activity Workflow. 769-774 - Mohammad Manzurul Islam

, Gour C. Karmakar, Joarder Kamruzzaman, M. Manzur Murshed:
Measuring Trustworthiness of IoT Image Sensor Data Using Other Sensors' Complementary Multimodal Data. 775-780
SST-ITS 2019: The 2019 International Workshop on Safety, Security, and Trust in Intelligent Transportation System
- Soheila Ghane Ezabadi, Alireza Jolfaei

, Lars Kulik, Ramamohanarao Kotagiri:
Differentially Private Streaming to Untrusted Edge Servers in Intelligent Transportation System. 781-786 - Abdullahi Chowdhury

, Gour C. Karmakar, Joarder Kamruzzaman
:
Trusted Autonomous Vehicle: Measuring Trust using On-Board Unit Data. 787-792 - Alireza Jolfaei

, Krishna Kant, Hassan Shafei:
Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System. 793-798 - Hussein Alnabulsi, Md. Rafiqul Islam

:
Protecting Code Injection Attacks in Intelligent Transportation System. 799-806 - Feras M. Awaysheh, José Carlos Cabaleiro, Tomás Fernández Pena

, Mamoun Alazab
:
Big Data Security Frameworks Meet the Intelligent Transportation Systems Trust Challenges. 807-813 - Mohammad Aladwan, Feras M. Awaysheh, José Carlos Cabaleiro, Tomás F. Pena

, Hamzeh Alabool
, Mamoun Alazab
:
Common Security Criteria for Vehicular Clouds and Internet of Vehicles Evaluation and Selection. 814-820
DSPFT 2019: 2019 Workshop on Data Security, Privacy, Forensics and Trust
- Di Wu, Dali Zhu, Yinlong Liu, Luping Ma:

Joint RSS and CSI Based Access Point Authentication Scheme in WiFi Networks via XGBoost. 821-826 - Peter Robinson, John Brainard:

Anonymous State Pinning for Private Blockchains. 827-834 - Edward Knight, Sam Lord, Budi Arief

:
Lock Picking in the Era of Internet of Things. 835-842 - Zhijun Wu, Enzhong Xu, Liang Liu, Meng Yue:

CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN. 843-848 - Girish Revadigar, Chitra Javali, Yang Li, Sreejaya Viswanathan:

On the Effectiveness of Electric Network Frequency (ENF) as a Source of Randomness. 849-854

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














