Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Surya Nepal
@article{DBLP:journals/isci/KermanshahiSYLNL24, author = {Shabnam Kasra Kermanshahi and Ron Steinfeld and Xun Yi and Joseph K. Liu and Surya Nepal and Junwei Lou}, title = {Fast and private multi-dimensional range search over encrypted data}, journal = {Inf. Sci.}, volume = {652}, pages = {119773}, year = {2024}, url = {https://doi.org/10.1016/j.ins.2023.119773}, doi = {10.1016/J.INS.2023.119773}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/KermanshahiSYLNL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanGMLXBNMM24, author = {Ruidong Han and Huihui Gong and Siqi Ma and Juanru Li and Chang Xu and Elisa Bertino and Surya Nepal and Zhuo Ma and Jianfeng Ma}, title = {A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {722--734}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326985}, doi = {10.1109/TIFS.2023.3326985}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HanGMLXBNMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/GongDMCNX24, author = {Huihui Gong and Minjing Dong and Siqi Ma and Seyit Camtepe and Surya Nepal and Chang Xu}, title = {Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization}, journal = {{IEEE} Trans. Multim.}, volume = {26}, pages = {5014--5025}, year = {2024}, url = {https://doi.org/10.1109/TMM.2023.3330089}, doi = {10.1109/TMM.2023.3330089}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/GongDMCNX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/HuangDZMNX24, author = {Jiajun Huang and Chengbin Du and Xinqi Zhu and Siqi Ma and Surya Nepal and Chang Xu}, title = {Anti-Compression Contrastive Facial Forgery Detection}, journal = {{IEEE} Trans. Multim.}, volume = {26}, pages = {6166--6177}, year = {2024}, url = {https://doi.org/10.1109/TMM.2023.3347103}, doi = {10.1109/TMM.2023.3347103}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/HuangDZMNX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/SuXLWYZHPNJSY24, author = {Xing Su and Shan Xue and Fanzhen Liu and Jia Wu and Jian Yang and Chuan Zhou and Wenbin Hu and C{\'{e}}cile Paris and Surya Nepal and Di Jin and Quan Z. Sheng and Philip S. Yu}, title = {A Comprehensive Survey on Community Detection With Deep Learning}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {35}, number = {4}, pages = {4682--4702}, year = {2024}, url = {https://doi.org/10.1109/TNNLS.2021.3137396}, doi = {10.1109/TNNLS.2021.3137396}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnn/SuXLWYZHPNJSY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/IslamBN24, author = {Chadni Islam and Muhammad Ali Babar and Surya Nepal}, title = {Design and Generation of a Set of Declarative APIs for Security Orchestration}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {17}, number = {1}, pages = {127--141}, year = {2024}, url = {https://doi.org/10.1109/TSC.2023.3336666}, doi = {10.1109/TSC.2023.3336666}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/IslamBN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/HanMLNLMM24, author = {Ruidong Han and Siqi Ma and Juanru Li and Surya Nepal and David Lo and Zhuo Ma and Jianfeng Ma}, title = {Range Specification Bug Detection in Flight Control System Through Fuzzing}, journal = {{IEEE} Trans. Software Eng.}, volume = {50}, number = {3}, pages = {461--473}, year = {2024}, url = {https://doi.org/10.1109/TSE.2024.3354739}, doi = {10.1109/TSE.2024.3354739}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/HanMLNLMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/NguyenLKN24, author = {David D. Nguyen and David Liebowitz and Salil S. Kanhere and Surya Nepal}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {14440--14448}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i13.29358}, doi = {10.1609/AAAI.V38I13.29358}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/NguyenLKN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-14432, author = {Shahroz Tariq and Mohan Baruwal Chhetri and Surya Nepal and C{\'{e}}cile Paris}, title = {{A2C:} {A} Modular Multi-stage Collaborative Decision Framework for Human-AI Teams}, journal = {CoRR}, volume = {abs/2401.14432}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.14432}, doi = {10.48550/ARXIV.2401.14432}, eprinttype = {arXiv}, eprint = {2401.14432}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-14432.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-17092, author = {Van Nguyen and Tingmin Wu and Xingliang Yuan and Marthie Grobler and Surya Nepal and Carsten Rudolph}, title = {A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection}, journal = {CoRR}, volume = {abs/2402.17092}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.17092}, doi = {10.48550/ARXIV.2402.17092}, eprinttype = {arXiv}, eprint = {2402.17092}, timestamp = {Mon, 25 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-17092.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-07218, author = {Erik Buchholz and Alsharif Abuadbba and Shuo Wang and Surya Nepal and Salil S. Kanhere}, title = {SoK: Can Trajectory Generation Combine Privacy and Utility?}, journal = {CoRR}, volume = {abs/2403.07218}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.07218}, doi = {10.48550/ARXIV.2403.07218}, eprinttype = {arXiv}, eprint = {2403.07218}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-07218.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ThapaTAGCNAZ23, author = {Chandra Thapa and Jun Wen Tang and Alsharif Abuadbba and Yansong Gao and Seyit Camtepe and Surya Nepal and Mahathir Almashor and Yifeng Zheng}, title = {Evaluation of Federated Learning in Phishing Email Detection}, journal = {Sensors}, volume = {23}, number = {9}, pages = {4346}, year = {2023}, url = {https://doi.org/10.3390/s23094346}, doi = {10.3390/S23094346}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ThapaTAGCNAZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/AnwarNPYWS23, author = {Tarique Anwar and Surya Nepal and C{\'{e}}cile Paris and Jian Yang and Jia Wu and Quan Z. Sheng}, title = {Tracking the Evolution of Clusters in Social Media Streams}, journal = {{IEEE} Trans. Big Data}, volume = {9}, number = {2}, pages = {701--715}, year = {2023}, url = {https://doi.org/10.1109/TBDATA.2022.3204207}, doi = {10.1109/TBDATA.2022.3204207}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbd/AnwarNPYWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/QiuHLPNZX23, author = {Junyang Qiu and Qing{-}Long Han and Wei Luo and Lei Pan and Surya Nepal and Jun Zhang and Yang Xiang}, title = {Cyber Code Intelligence for Android Malware Detection}, journal = {{IEEE} Trans. Cybern.}, volume = {53}, number = {1}, pages = {617--627}, year = {2023}, url = {https://doi.org/10.1109/TCYB.2022.3164625}, doi = {10.1109/TCYB.2022.3164625}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcyb/QiuHLPNZX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengWWDN23, author = {Yifeng Zheng and Cong Wang and Ruochen Wang and Huayi Duan and Surya Nepal}, title = {Optimizing Secure Decision Tree Inference Outsourcing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {3079--3092}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3194048}, doi = {10.1109/TDSC.2022.3194048}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengWWDN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangBLNGCK23, author = {Yanjun Zhang and Guangdong Bai and Xue Li and Surya Nepal and Marthie Grobler and Chen Chen and Ryan K. L. Ko}, title = {Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {3341--3357}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3186672}, doi = {10.1109/TDSC.2022.3186672}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangBLNGCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangHCWGLLNFZ23, author = {Zhi Zhang and Wei He and Yueqiang Cheng and Wenhao Wang and Yansong Gao and Dongxi Liu and Kang Li and Surya Nepal and Anmin Fu and Yi Zou}, title = {Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {5}, pages = {3716--3733}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3214666}, doi = {10.1109/TDSC.2022.3214666}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangHCWGLLNFZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GaoSNR23, author = {Yansong Gao and Yang Su and Surya Nepal and Damith C. Ranasinghe}, title = {NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {6}, pages = {4455--4473}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3221928}, doi = {10.1109/TDSC.2022.3221928}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GaoSNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/VoYSLNW23, author = {Viet Vo and Xingliang Yuan and Shi{-}Feng Sun and Joseph K. Liu and Surya Nepal and Cong Wang}, title = {ShieldDB: An Encrypted Document Database With Padding Countermeasures}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {4}, pages = {4236--4252}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2021.3126607}, doi = {10.1109/TKDE.2021.3126607}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/VoYSLNW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/ZhangWWNP023, author = {Rongjunchen Zhang and Tingmin Wu and Sheng Wen and Surya Nepal and C{\'{e}}cile Paris and Yang Xiang}, title = {{SAM:} Multi-turn Response Selection Based on Semantic Awareness Matching}, journal = {{ACM} Trans. Internet Techn.}, volume = {23}, number = {1}, pages = {3:1--3:18}, year = {2023}, url = {https://doi.org/10.1145/3545570}, doi = {10.1145/3545570}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/ZhangWWNP023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/LiNTL23, author = {Shancang Li and Surya Nepal and Theo Tryfonas and Hongwei Li}, title = {Blockchain-based Zero Trust Cybersecurity in the Internet of Things}, journal = {{ACM} Trans. Internet Techn.}, volume = {23}, number = {3}, pages = {36:1--36:3}, year = {2023}, url = {https://doi.org/10.1145/3594535}, doi = {10.1145/3594535}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/LiNTL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ChhetriFVNK23, author = {Mohan Baruwal Chhetri and Abdur Rahim Mohammad Forkan and Quoc Bao Vo and Surya Nepal and Ryszard Kowalczyk}, title = {Towards Proactive Risk-Aware Cloud Cost Optimization Leveraging Transient Resources}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {4}, pages = {3014--3026}, year = {2023}, url = {https://doi.org/10.1109/TSC.2023.3253473}, doi = {10.1109/TSC.2023.3253473}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ChhetriFVNK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/ZhuYAKNH23, author = {Fei Zhu and Xun Yi and Alsharif Abuadbba and Ibrahim Khalil and Surya Nepal and Xinyi Huang}, title = {Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {8}, number = {1}, pages = {32--42}, year = {2023}, url = {https://doi.org/10.1109/TSUSC.2022.3211298}, doi = {10.1109/TSUSC.2022.3211298}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsusc/ZhuYAKNH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ParkAWMGKN23, author = {Seonhye Park and Alsharif Abuadbba and Shuo Wang and Kristen Moore and Yansong Gao and Hyoungshick Kim and Surya Nepal}, title = {DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {535--549}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627204}, doi = {10.1145/3627106.3627204}, timestamp = {Mon, 18 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ParkAWMGKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aintec/AlmashorAPXA0WC23, author = {Mahathir Almashor and M. Ejaz Ahmed and Benjamin Pick and Jason Xue and Sharif Abuadbba and Raj Gaire and Shuo Wang and Seyit Camtepe and Surya Nepal}, title = {Unraveling Threat Intelligence Through the Lens of Malicious {URL} Campaigns}, booktitle = {Proceedings of the 18th Asian Internet Engineering Conference, {AINTEC} 2023, Hanoi, Vietnam, December 12-14, 2023}, pages = {78--86}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3630590.3630600}, doi = {10.1145/3630590.3630600}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aintec/AlmashorAPXA0WC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/0056LMNX23, author = {Chen Chen and Daochang Liu and Siqi Ma and Surya Nepal and Chang Xu}, title = {Private Image Generation with Dual-Purpose Auxiliary Classifier}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2023, Vancouver, BC, Canada, June 17-24, 2023}, pages = {20361--20370}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CVPR52729.2023.01950}, doi = {10.1109/CVPR52729.2023.01950}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/0056LMNX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KwashieKKJCN23, author = {Selasi Kwashie and Wei Kang and Sandeep Santhosh Kumar and Geoff Jarrad and Seyit Camtepe and Surya Nepal}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Acumen: Analysing the Impact of Organisational Change on Users' Access Entitlements}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14347}, pages = {410--430}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51482-1\_21}, doi = {10.1007/978-3-031-51482-1\_21}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KwashieKKJCN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/ChesserNR23, author = {Michael Chesser and Surya Nepal and Damith C. Ranasinghe}, editor = {Ren{\'{e}} Just and Gordon Fraser}, title = {Icicle: {A} Re-designed Emulator for Grey-Box Firmware Fuzzing}, booktitle = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July 17-21, 2023}, pages = {76--88}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3597926.3598039}, doi = {10.1145/3597926.3598039}, timestamp = {Mon, 17 Jul 2023 11:49:17 +0200}, biburl = {https://dblp.org/rec/conf/issta/ChesserNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangAASXW0NC23, author = {Shuo Wang and Mahathir Almashor and Alsharif Abuadbba and Ruoxi Sun and Minhui Xue and Calvin Wang and Raj Gaire and Surya Nepal and Seyit Camtepe}, title = {{DOITRUST:} Dissecting On-chain Compromised Internet Domains via Graph Learning}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/doitrust-dissecting-on-chain-compromised-internet-domains-via-graph-learning/}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WangAASXW0NC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/SunXTDLWZCN23, author = {Ruoxi Sun and Minhui Xue and Gareth Tyson and Tian Dong and Shaofeng Li and Shuo Wang and Haojin Zhu and Seyit Camtepe and Surya Nepal}, editor = {Satish Chandra and Kelly Blincoe and Paolo Tonella}, title = {Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors}, booktitle = {Proceedings of the 31st {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/FSE} 2023, San Francisco, CA, USA, December 3-9, 2023}, pages = {1573--1585}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3611643.3616309}, doi = {10.1145/3611643.3616309}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/SunXTDLWZCN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WangAAMSXNCK23, author = {Shuo Wang and Sharif Abuadbba and Sidharth Agarwal and Kristen Moore and Ruoxi Sun and Minhui Xue and Surya Nepal and Seyit Camtepe and Salil S. Kanhere}, title = {PublicCheck: Public Integrity Verification for Services of Run-time Deep Models}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1348--1365}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179380}, doi = {10.1109/SP46215.2023.10179380}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/WangAAMSXNCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/MaLGZAFANA23, author = {Hua Ma and Yinshan Li and Yansong Gao and Zhi Zhang and Alsharif Abuadbba and Anmin Fu and Said F. Al{-}Sarawi and Surya Nepal and Derek Abbott}, title = {TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World}, booktitle = {42nd International Symposium on Reliable Distributed Systems, {SRDS} 2023, Marrakesh, Morocco, September 25-29, 2023}, pages = {82--92}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SRDS60354.2023.00018}, doi = {10.1109/SRDS60354.2023.00018}, timestamp = {Mon, 19 Feb 2024 16:30:08 +0100}, biburl = {https://dblp.org/rec/conf/srds/MaLGZAFANA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/XueNLSYRSE23, author = {Minhui Xue and Surya Nepal and Ling Liu and Subbu Sethuvenkatraman and Xingliang Yuan and Carsten Rudolph and Ruoxi Sun and Greg Eisenhauer}, title = {RAI4IoE: Responsible {AI} for Enabling the Internet of Energy}, booktitle = {5th {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta, GA, USA, November 1-4, 2023}, pages = {13--22}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TPS-ISA58951.2023.00012}, doi = {10.1109/TPS-ISA58951.2023.00012}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/XueNLSYRSE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/MohsinJNH23, author = {Ahmad Mohsin and Helge Janicke and Surya Nepal and David Holmes}, title = {Digital Twins and the Future of Their Use Enabling Shift Left and Shift Right Cybersecurity Operations}, booktitle = {5th {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta, GA, USA, November 1-4, 2023}, pages = {277--286}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TPS-ISA58951.2023.00042}, doi = {10.1109/TPS-ISA58951.2023.00042}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/MohsinJNH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/NepalVFP23, author = {Surya Nepal and Jaideep Vaidya and Elena Ferrari and Balaji Palanisamy}, title = {Message from the General Chairs and {PC} Chairs {TPS-ISA} 2023}, booktitle = {5th {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta, GA, USA, November 1-4, 2023}, pages = {xi}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TPS-ISA58951.2023.00005}, doi = {10.1109/TPS-ISA58951.2023.00005}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/NepalVFP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ZhangW0WNP023, author = {Rongjunchen Zhang and Tingmin Wu and Xiao Chen and Sheng Wen and Surya Nepal and C{\'{e}}cile Paris and Yang Xiang}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Dynalogue: {A} Transformer-Based Dialogue System with Dynamic Attention}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {1604--1615}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583330}, doi = {10.1145/3543507.3583330}, timestamp = {Mon, 28 Aug 2023 21:17:10 +0200}, biburl = {https://dblp.org/rec/conf/www/ZhangW0WNP023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/SunXTWCN23, author = {Ruoxi Sun and Minhui Xue and Gareth Tyson and Shuo Wang and Seyit Camtepe and Surya Nepal}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {2166--2177}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583327}, doi = {10.1145/3543507.3583327}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/SunXTWCN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ZhangBCMSWNXWL23, author = {Yanjun Zhang and Guangdong Bai and Mahawaga Arachchige Pathum Chamikara and Mengyao Ma and Liyue Shen and Jingwei Wang and Surya Nepal and Minhui Xue and Long Wang and Joseph K. Liu}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {AgrEvader: Poisoning Membership Inference against Byzantine-robust Federated Learning}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {2371--2382}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583542}, doi = {10.1145/3543507.3583542}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/ZhangBCMSWNXWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiaccs/2023, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856}, doi = {10.1145/3579856}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/SunXTDLWZCN23, author = {Ruoxi Sun and Minhui Xue and Gareth Tyson and Tian Dong and Shaofeng Li and Shuo Wang and Haojin Zhu and Seyit Camtepe and Surya Nepal}, title = {An Explainability-Guided Testing Framework for Robustness of Malware Detectors (Version 1)}, publisher = {Zenodo}, year = {2023}, month = aug, howpublished = {\url{https://doi.org/10.5281/zenodo.8266537}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.5281/zenodo.8266537}, doi = {10.5281/ZENODO.8266537}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/SunXTDLWZCN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/SunXTDLWZCN23a, author = {Ruoxi Sun and Minhui Xue and Gareth Tyson and Tian Dong and Shaofeng Li and Shuo Wang and Haojin Zhu and Seyit Camtepe and Surya Nepal}, title = {An Explainability-Guided Testing Framework for Robustness of Malware Detectors (Version 2)}, publisher = {Zenodo}, year = {2023}, month = aug, howpublished = {\url{https://doi.org/10.5281/zenodo.8266568}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.5281/zenodo.8266568}, doi = {10.5281/ZENODO.8266568}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/SunXTDLWZCN23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-06629, author = {David D. Nguyen and Surya Nepal and Salil S. Kanhere}, title = {Diverse Multimedia Layout Generation with Multi Choice Learning}, journal = {CoRR}, volume = {abs/2301.06629}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.06629}, doi = {10.48550/ARXIV.2301.06629}, eprinttype = {arXiv}, eprint = {2301.06629}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-06629.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-13346, author = {Michael Chesser and Surya Nepal and Damith C. Ranasinghe}, title = {{ICICLE:} {A} Re-Designed Emulator for Grey-Box Firmware Fuzzing}, journal = {CoRR}, volume = {abs/2301.13346}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.13346}, doi = {10.48550/ARXIV.2301.13346}, eprinttype = {arXiv}, eprint = {2301.13346}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-13346.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-06183, author = {Jiajun Huang and Xinqi Zhu and Chengbin Du and Siqi Ma and Surya Nepal and Chang Xu}, title = {Anti-Compression Contrastive Facial Forgery Detection}, journal = {CoRR}, volume = {abs/2302.06183}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.06183}, doi = {10.48550/ARXIV.2302.06183}, eprinttype = {arXiv}, eprint = {2302.06183}, timestamp = {Mon, 20 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-06183.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-10437, author = {Chuyang Zhou and Jiajun Huang and Daochang Liu and Chengbin Du and Siqi Ma and Surya Nepal and Chang Xu}, title = {Two-in-one Knowledge Distillation for Efficient Facial Forgery Detection}, journal = {CoRR}, volume = {abs/2302.10437}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.10437}, doi = {10.48550/ARXIV.2302.10437}, eprinttype = {arXiv}, eprint = {2302.10437}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-10437.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-09008, author = {Ruoxi Sun and Minhui Xue and Gareth Tyson and Shuo Wang and Seyit Camtepe and Surya Nepal}, title = {Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps}, journal = {CoRR}, volume = {abs/2303.09008}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.09008}, doi = {10.48550/ARXIV.2303.09008}, eprinttype = {arXiv}, eprint = {2303.09008}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-09008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-09221, author = {Nazatul Haque Sultan and Shabnam Kasra Kermanshahi and Yen Tran and Shangqi Lai and Vijay Varadharajan and Surya Nepal and Xun Yi}, title = {A Multi-Client Searchable Encryption Scheme for IoT Environment}, journal = {CoRR}, volume = {abs/2305.09221}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.09221}, doi = {10.48550/ARXIV.2305.09221}, eprinttype = {arXiv}, eprint = {2305.09221}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-09221.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-09480, author = {Huihui Gong and Minjing Dong and Siqi Ma and Seyit Camtepe and Surya Nepal and Chang Xu}, title = {Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization}, journal = {CoRR}, volume = {abs/2309.09480}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.09480}, doi = {10.48550/ARXIV.2309.09480}, eprinttype = {arXiv}, eprint = {2309.09480}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-09480.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-11691, author = {Minhui Xue and Surya Nepal and Ling Liu and Subbu Sethuvenkatraman and Xingliang Yuan and Carsten Rudolph and Ruoxi Sun and Greg Eisenhauer}, title = {RAI4IoE: Responsible {AI} for Enabling the Internet of Energy}, journal = {CoRR}, volume = {abs/2309.11691}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.11691}, doi = {10.48550/ARXIV.2309.11691}, eprinttype = {arXiv}, eprint = {2309.11691}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-11691.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-11894, author = {Yansong Gao and Huming Qiu and Zhi Zhang and Binghui Wang and Hua Ma and Alsharif Abuadbba and Minhui Xue and Anmin Fu and Surya Nepal}, title = {DeepTheft: Stealing {DNN} Model Architectures through Power Side Channel}, journal = {CoRR}, volume = {abs/2309.11894}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.11894}, doi = {10.48550/ARXIV.2309.11894}, eprinttype = {arXiv}, eprint = {2309.11894}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-11894.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-13612, author = {Ahmad Mohsin and Helge Janicke and Surya Nepal and David Holmes}, title = {Digital Twins and the Future of their Use Enabling Shift Left and Shift Right Cybersecurity Operations}, journal = {CoRR}, volume = {abs/2309.13612}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.13612}, doi = {10.48550/ARXIV.2309.13612}, eprinttype = {arXiv}, eprint = {2309.13612}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-13612.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-16207, author = {Huihui Gong and Minjing Dong and Siqi Ma and Seyit Camtepe and Surya Nepal and Chang Xu}, title = {Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks}, journal = {CoRR}, volume = {abs/2309.16207}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.16207}, doi = {10.48550/ARXIV.2309.16207}, eprinttype = {arXiv}, eprint = {2309.16207}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-16207.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-12162, author = {Iqbal H. Sarker and Helge Janicke and Nazeeruddin Mohammad and Paul A. Watters and Surya Nepal}, title = {{AI} Potentiality and Awareness: {A} Position Paper from the Perspective of Human-AI Teaming in Cybersecurity}, journal = {CoRR}, volume = {abs/2310.12162}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.12162}, doi = {10.48550/ARXIV.2310.12162}, eprinttype = {arXiv}, eprint = {2310.12162}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-12162.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-11735, author = {David D. Nguyen and David Liebowitz and Surya Nepal and Salil S. Kanhere}, title = {Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions}, journal = {CoRR}, volume = {abs/2312.11735}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.11735}, doi = {10.48550/ARXIV.2312.11735}, eprinttype = {arXiv}, eprint = {2312.11735}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-11735.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhuYAKNH22, author = {Fei Zhu and Xun Yi and Alsharif Abuadbba and Ibrahim Khalil and Surya Nepal and Xinyi Huang}, title = {Forward-Secure Edge Authentication for Graphs}, journal = {Comput. J.}, volume = {65}, number = {7}, pages = {1653--1665}, year = {2022}, url = {https://doi.org/10.1093/comjnl/bxab004}, doi = {10.1093/COMJNL/BXAB004}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhuYAKNH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChengZGCGZMNX22, author = {Yueqiang Cheng and Zhi Zhang and Yansong Gao and Zhaofeng Chen and Shengjian Guo and Qifei Zhang and Rui Mei and Surya Nepal and Yang Xiang}, title = {Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation}, journal = {Comput. Secur.}, volume = {113}, pages = {102556}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102556}, doi = {10.1016/J.COSE.2021.102556}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChengZGCGZMNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fdata/NepalKGC22, author = {Surya Nepal and Ryan K. L. Ko and Marthie Grobler and L. Jean Camp}, title = {Editorial: Human-Centric Security and Privacy}, journal = {Frontiers Big Data}, volume = {5}, pages = {848058}, year = {2022}, url = {https://doi.org/10.3389/fdata.2022.848058}, doi = {10.3389/FDATA.2022.848058}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fdata/NepalKGC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/YanWNPX22, author = {Feixue Yan and Sheng Wen and Surya Nepal and C{\'{e}}cile Paris and Yang Xiang}, title = {Explainable machine learning in cybersecurity: {A} survey}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {12}, pages = {12305--12334}, year = {2022}, url = {https://doi.org/10.1002/int.23088}, doi = {10.1002/INT.23088}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/YanWNPX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CamtepeDMMNPP22, author = {Seyit Camtepe and Jarek Duda and Arash Mahboubi and Pawel Morawiecki and Surya Nepal and Marcin Pawlowski and Josef Pieprzyk}, title = {ANS-based compression and encryption with 128-bit security}, journal = {Int. J. Inf. Sec.}, volume = {21}, number = {5}, pages = {1051--1067}, year = {2022}, url = {https://doi.org/10.1007/s10207-022-00597-4}, doi = {10.1007/S10207-022-00597-4}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/CamtepeDMMNPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YangYYKZHHN22, author = {Xu Yang and Xuechao Yang and Xun Yi and Ibrahim Khalil and Xiaotong Zhou and Debiao He and Xinyi Huang and Surya Nepal}, title = {Blockchain-Based Secure and Lightweight Authentication for Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {5}, pages = {3321--3332}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3098007}, doi = {10.1109/JIOT.2021.3098007}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YangYYKZHHN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhuYAKN0Y22, author = {Fei Zhu and Xun Yi and Alsharif Abuadbba and Ibrahim Khalil and Surya Nepal and Xinyi Huang and Xingfu Yan}, title = {Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {14}, pages = {12209--12218}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3134693}, doi = {10.1109/JIOT.2021.3134693}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhuYAKN0Y22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/0002YKLBN022, author = {Xu Yang and Xun Yi and Ibrahim Khalil and Junwei Luo and Elisa Bertino and Surya Nepal and Xinyi Huang}, title = {Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {14}, pages = {12563--12572}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3138989}, doi = {10.1109/JIOT.2021.3138989}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/0002YKLBN022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KermanshahiDSSL22, author = {Shabnam Kasra Kermanshahi and Rafael Dowsley and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Surya Nepal and Xun Yi and Shangqi Lai}, title = {Range search on encrypted spatial data with dynamic updates}, journal = {J. Comput. Secur.}, volume = {30}, number = {6}, pages = {829--849}, year = {2022}, url = {https://doi.org/10.3233/JCS-210168}, doi = {10.3233/JCS-210168}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KermanshahiDSSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/GaoKTAZCKN22, author = {Yansong Gao and Minki Kim and Chandra Thapa and Alsharif Abuadbba and Zhi Zhang and Seyit Camtepe and Hyoungshick Kim and Surya Nepal}, title = {Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things}, journal = {{IEEE} Trans. Computers}, volume = {71}, number = {10}, pages = {2538--2552}, year = {2022}, url = {https://doi.org/10.1109/TC.2021.3135752}, doi = {10.1109/TC.2021.3135752}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/GaoKTAZCKN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/WangLWHNZX22, author = {Derui Wang and Chaoran Li and Sheng Wen and Qing{-}Long Han and Surya Nepal and Xiangyu Zhang and Yang Xiang}, title = {Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples}, journal = {{IEEE} Trans. Cybern.}, volume = {52}, number = {8}, pages = {7427--7440}, year = {2022}, url = {https://doi.org/10.1109/TCYB.2020.3041481}, doi = {10.1109/TCYB.2020.3041481}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcyb/WangLWHNZX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GaoDXYNR22, author = {Yansong Gao and Marten van Dijk and Lei Xu and Wei Yang and Surya Nepal and Damith C. Ranasinghe}, title = {{TREVERSE:} TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {419--437}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2993802}, doi = {10.1109/TDSC.2020.2993802}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GaoDXYNR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KermanshahiSLSN22, author = {Shabnam Kasra Kermanshahi and Shifeng Sun and Joseph K. Liu and Ron Steinfeld and Surya Nepal and Wang Fat Lau and Man Ho Allen Au}, title = {Geometric Range Search on Encrypted Data With Forward/Backward Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {698--716}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2982389}, doi = {10.1109/TDSC.2020.2982389}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/KermanshahiSLSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangLWNX22, author = {Derui Wang and Chaoran Li and Sheng Wen and Surya Nepal and Yang Xiang}, title = {Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {2}, pages = {953--965}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3014390}, doi = {10.1109/TDSC.2020.3014390}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangLWNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuZYN22, author = {Xiaoning Liu and Yifeng Zheng and Xun Yi and Surya Nepal}, title = {Privacy-Preserving Collaborative Analytics on Medical Time Series Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {3}, pages = {1687--1702}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3035592}, doi = {10.1109/TDSC.2020.3035592}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiuZYN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengDWWN22, author = {Yifeng Zheng and Huayi Duan and Cong Wang and Ruochen Wang and Surya Nepal}, title = {Securely and Efficiently Outsourcing Decision Tree Inference}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {3}, pages = {1841--1855}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3040012}, doi = {10.1109/TDSC.2020.3040012}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengDWWN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaLNO0JDB22, author = {Siqi Ma and Juanru Li and Surya Nepal and Diethelm Ostry and David Lo and Sanjay K. Jha and Robert H. Deng and Elisa Bertino}, title = {Orchestration or Automation: Authentication Flaw Detection in Android Apps}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2165--2178}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3050188}, doi = {10.1109/TDSC.2021.3050188}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaLNO0JDB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GaoKD0ZNRK22, author = {Yansong Gao and Yeonjae Kim and Bao Gia Doan and Zhi Zhang and Gongxuan Zhang and Surya Nepal and Damith C. Ranasinghe and Hyoungshick Kim}, title = {Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2349--2364}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3055844}, doi = {10.1109/TDSC.2021.3055844}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GaoKD0ZNRK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangNARG22, author = {Shuo Wang and Surya Nepal and Alsharif Abuadbba and Carsten Rudolph and Marthie Grobler}, title = {Adversarial Detection by Latent Style Transformations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {1099--1114}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3155975}, doi = {10.1109/TIFS.2022.3155975}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangNARG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/MaXWYPNS22, author = {Xiaoxiao Ma and Shan Xue and Jia Wu and Jian Yang and C{\'{e}}cile Paris and Surya Nepal and Quan Z. Sheng}, title = {Deep Multi-Attributed-View Graph Representation Learning}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {9}, number = {5}, pages = {3762--3774}, year = {2022}, url = {https://doi.org/10.1109/TNSE.2022.3177307}, doi = {10.1109/TNSE.2022.3177307}, timestamp = {Tue, 12 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/MaXWYPNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/WangWJHNX22, author = {Derui Wang and Sheng Wen and Alireza Jolfaei and Mohammad Sayad Haghighi and Surya Nepal and Yang Xiang}, title = {On the Neural Backdoor of Federated Generative Models in Edge Computing}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {2}, pages = {43:1--43:21}, year = {2022}, url = {https://doi.org/10.1145/3425662}, doi = {10.1145/3425662}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/WangWJHNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/WuMWXPNX22, author = {Tingmin Wu and Wanlun Ma and Sheng Wen and Xin Xia and C{\'{e}}cile Paris and Surya Nepal and Yang Xiang}, title = {Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {2}, pages = {52:1--52:27}, year = {2022}, url = {https://doi.org/10.1145/3483332}, doi = {10.1145/3483332}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/WuMWXPNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/WangNMGRA22, author = {Shuo Wang and Surya Nepal and Kristen Moore and Marthie Grobler and Carsten Rudolph and Alsharif Abuadbba}, title = {{OCTOPUS:} Overcoming Performance and Privatization Bottlenecks in Distributed Learning}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {33}, number = {12}, pages = {3460--3477}, year = {2022}, url = {https://doi.org/10.1109/TPDS.2022.3157258}, doi = {10.1109/TPDS.2022.3157258}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/WangNMGRA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ShyuNIJ22, author = {Mei{-}Ling Shyu and Surya Nepal and Val{\'{e}}rie Issarny and James Joshi}, title = {Guest Editorial: Special Issue on Services Computing for {COVID-19} and Future Pandemics}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {3}, pages = {1175--1177}, year = {2022}, url = {https://doi.org/10.1109/TSC.2022.3179065}, doi = {10.1109/TSC.2022.3179065}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ShyuNIJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/WangNRGCC22, author = {Shuo Wang and Surya Nepal and Carsten Rudolph and Marthie Grobler and Shangyu Chen and Tianle Chen}, title = {Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {3}, pages = {1526--1539}, year = {2022}, url = {https://doi.org/10.1109/TSC.2020.3000900}, doi = {10.1109/TSC.2020.3000900}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/WangNRGCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/YangYNKHS22, author = {Xu Yang and Xun Yi and Surya Nepal and Ibrahim Khalil and Xinyi Huang and Jian Shen}, title = {Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {5}, pages = {2728--2741}, year = {2022}, url = {https://doi.org/10.1109/TSC.2021.3059856}, doi = {10.1109/TSC.2021.3059856}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/YangYNKHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/WangNRGCCA22, author = {Shuo Wang and Surya Nepal and Carsten Rudolph and Marthie Grobler and Shangyu Chen and Tianle Chen and Zike An}, title = {Defending Adversarial Attacks via Semantic Feature Manipulation}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {6}, pages = {3184--3197}, year = {2022}, url = {https://doi.org/10.1109/TSC.2021.3090365}, doi = {10.1109/TSC.2021.3090365}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/WangNRGCCA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vldb/LiuLWWYHZWXNS22, author = {Fanzhen Liu and Zhao Li and Baokun Wang and Jia Wu and Jian Yang and Jiaming Huang and Yiqing Zhang and Weiqiang Wang and Shan Xue and Surya Nepal and Quan Z. Sheng}, title = {eRiskCom: an e-commerce risky community detection platform}, journal = {{VLDB} J.}, volume = {31}, number = {5}, pages = {1085--1101}, year = {2022}, url = {https://doi.org/10.1007/s00778-021-00723-z}, doi = {10.1007/S00778-021-00723-Z}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vldb/LiuLWWYHZWXNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BuchholzAWNK22, author = {Erik Buchholz and Alsharif Abuadbba and Shuo Wang and Surya Nepal and Salil Subhash Kanhere}, title = {Reconstruction Attack on Differential Private Trajectory Protection Mechanisms}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {279--292}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564628}, doi = {10.1145/3564625.3564628}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BuchholzAWNK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ThapaJACPN22, author = {Chandra Thapa and Seung Ick Jang and Muhammad Ejaz Ahmed and Seyit Camtepe and Josef Pieprzyk and Surya Nepal}, title = {Transformer-Based Language Models for Software Vulnerability Detection}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {481--496}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567985}, doi = {10.1145/3564625.3567985}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ThapaJACPN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThapaC0NJ22, author = {Chandra Thapa and Seyit Camtepe and Raj Gaire and Surya Nepal and Seung Ick Jang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Demo - MaLFraDA: {A} Machine Learning Framework with Data Airlock}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3523--3525}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3563480}, doi = {10.1145/3548606.3563480}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ThapaC0NJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/WangHMNX22, author = {Xueyu Wang and Jiajun Huang and Siqi Ma and Surya Nepal and Chang Xu}, title = {DeepFake Disrupter: The Detector of DeepFake Is My Friend}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022}, pages = {14900--14909}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPR52688.2022.01450}, doi = {10.1109/CVPR52688.2022.01450}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/WangHMNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChamikaraLCNGBK22, author = {Mahawaga Arachchige Pathum Chamikara and Dongxi Liu and Seyit Camtepe and Surya Nepal and Marthie Grobler and Peter Bert{\'{o}}k and Ibrahim Khalil}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Local Differential Privacy for Federated Learning}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13554}, pages = {195--216}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17140-6\_10}, doi = {10.1007/978-3-031-17140-6\_10}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ChamikaraLCNGBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhuYALNH22, author = {Fei Zhu and Xun Yi and Alsharif Abuadbba and Junwei Luo and Surya Nepal and Xinyi Huang}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Efficient Hash-Based Redactable Signature for Smart Grid Applications}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13556}, pages = {554--573}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17143-7\_27}, doi = {10.1007/978-3-031-17143-7\_27}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ZhuYALNH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/MooreCLNS22, author = {Kristen Moore and Cody James Christopher and David Liebowitz and Surya Nepal and Renee Selvey}, title = {Modelling direct messaging networks with multiple recipients for cyber deception}, booktitle = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022, Genoa, Italy, June 6-10, 2022}, pages = {1--19}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSP53844.2022.00009}, doi = {10.1109/EUROSP53844.2022.00009}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/MooreCLNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/TimmerLNK22, author = {Roelien C. Timmer and David Liebowitz and Surya Nepal and Salil S. Kanhere}, title = {{TSM:} Measuring the Enticement of Honeyfiles with Natural Language Processing}, booktitle = {55th Hawaii International Conference on System Sciences, {HICSS} 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022}, pages = {1--10}, publisher = {ScholarSpace}, year = {2022}, url = {http://hdl.handle.net/10125/79613}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/TimmerLNK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ShmalkoAGWPN22, author = {Mariya Shmalko and Alsharif Abuadbba and Raj Gaire and Tingmin Wu and Hye{-}Young Paik and Surya Nepal}, title = {Profiler: Distributed Model to Detect Phishing}, booktitle = {42nd {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2022, Bologna, Italy, July 10-13, 2022}, pages = {1336--1337}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDCS54860.2022.00152}, doi = {10.1109/ICDCS54860.2022.00152}, timestamp = {Thu, 20 Oct 2022 09:13:03 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/ShmalkoAGWPN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/WangQRNG22, author = {Shuo Wang and Jinyuan Qin and Carsten Rudolph and Surya Nepal and Marthie Grobler}, title = {R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2022, Padua, Italy, July 18-23, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IJCNN55064.2022.9892663}, doi = {10.1109/IJCNN55064.2022.9892663}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/WangQRNG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/KimCANK22, author = {Soolin Kim and Jusop Choi and Muhammad Ejaz Ahmed and Surya Nepal and Hyoungshick Kim}, title = {VulDeBERT: {A} Vulnerability Detection System Using {BERT}}, booktitle = {{IEEE} International Symposium on Software Reliability Engineering Workshops, {ISSRE} 2022 - Workshops, Charlotte, NC, USA, October 31 - Nov. 3, 2022}, pages = {69--74}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISSREW55968.2022.00042}, doi = {10.1109/ISSREW55968.2022.00042}, timestamp = {Tue, 03 Jan 2023 17:09:36 +0100}, biburl = {https://dblp.org/rec/conf/issre/KimCANK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ShenYLYSLN22, author = {Yanjun Shen and Bin Yu and Shangqi Lai and Xingliang Yuan and Shifeng Sun and Joseph K. Liu and Surya Nepal}, editor = {Willy Susilo and Xiaofeng Chen and Fuchun Guo and Yudi Zhang and Rolly Intan}, title = {OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control}, booktitle = {Information Security - 25th International Conference, {ISC} 2022, Bali, Indonesia, December 18-22, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13640}, pages = {269--289}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22390-7\_17}, doi = {10.1007/978-3-031-22390-7\_17}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/ShenYLYSLN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/GongMCNX22, author = {Huihui Gong and Siqi Ma and Seyit Camtepe and Surya Nepal and Chang Xu}, editor = {Xingliang Yuan and Guangdong Bai and Cristina Alcaraz and Suryadipta Majumdar}, title = {Vulnerability Detection Using Deep Learning Based Function Classification}, booktitle = {Network and System Security - 16th International Conference, {NSS} 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13787}, pages = {3--22}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23020-2\_1}, doi = {10.1007/978-3-031-23020-2\_1}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/GongMCNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/EvansAWMAPNJ22, author = {Keelan Evans and Alsharif Abuadbba and Tingmin Wu and Kristen Moore and Mohiuddin Ahmed and Ganna Pogrebna and Surya Nepal and Mike Johnstone}, editor = {Xingliang Yuan and Guangdong Bai and Cristina Alcaraz and Suryadipta Majumdar}, title = {{RAIDER:} Reinforcement-Aided Spear Phishing Detector}, booktitle = {Network and System Security - 16th International Conference, {NSS} 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13787}, pages = {23--50}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23020-2\_2}, doi = {10.1007/978-3-031-23020-2\_2}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/EvansAWMAPNJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/SaricRPJN22, author = {Kevin Saric and Gowri Sankar Ramachandran and Shantanu Pal and Raja Jurdak and Surya Nepal}, title = {A Universal Deduplication Architecture for Secure and Efficient Cloud Storage}, booktitle = {4th {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, {TPS-ISA} 2022, Atlanta, GA, USA, December 14-17, 2022}, pages = {10--19}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TPS-ISA56441.2022.00012}, doi = {10.1109/TPS-ISA56441.2022.00012}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/SaricRPJN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/0001CWHWNGL0022, author = {Zhi Zhang and Yueqiang Cheng and Minghua Wang and Wei He and Wenhao Wang and Surya Nepal and Yansong Gao and Kang Li and Zhe Wang and Chenggang Wu}, editor = {Jiri Schindler and Noa Zilberman}, title = {SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh}, booktitle = {2022 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2022, Carlsbad, CA, USA, July 11-13, 2022}, pages = {399--414}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/atc22/presentation/zhang-zhi}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/usenix/0001CWHWNGL0022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iciss/2022, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7}, doi = {10.1007/978-3-031-23690-7}, isbn = {978-3-031-23689-1}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/SuGNR22, author = {Yang Su and Yansong Gao and Surya Nepal and Damith C. Ranasinghe}, title = {NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions}, publisher = {{IEEE} DataPort}, year = {2022}, month = jun, howpublished = {\url{https://doi.org/10.21227/ktc9-x515}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/ktc9-x515}, doi = {10.21227/KTC9-X515}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/SuGNR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-02986, author = {Zhi Zhang and Jiahao Qi and Yueqiang Cheng and Shijie Jiang and Yiyang Lin and Yansong Gao and Surya Nepal and Yi Zou}, title = {A Retrospective and Futurespective of Rowhammer Attacks and Defenses on {DRAM}}, journal = {CoRR}, volume = {abs/2201.02986}, year = {2022}, url = {https://arxiv.org/abs/2201.02986}, eprinttype = {arXiv}, eprint = {2201.02986}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-02986.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-08619, author = {Hua Ma and Yinshan Li and Yansong Gao and Alsharif Abuadbba and Zhi Zhang and Anmin Fu and Hyoungshick Kim and Said F. Al{-}Sarawi and Surya Nepal and Derek Abbott}, title = {Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World}, journal = {CoRR}, volume = {abs/2201.08619}, year = {2022}, url = {https://arxiv.org/abs/2201.08619}, eprinttype = {arXiv}, eprint = {2201.08619}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-08619.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-06053, author = {M. A. P. Chamikara and Dongxi Liu and Seyit Camtepe and Surya Nepal and Marthie Grobler and Peter Bert{\'{o}}k and Ibrahim Khalil}, title = {Local Differential Privacy for Federated Learning in Industrial Settings}, journal = {CoRR}, volume = {abs/2202.06053}, year = {2022}, url = {https://arxiv.org/abs/2202.06053}, eprinttype = {arXiv}, eprint = {2202.06053}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-06053.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-06793, author = {Roelien C. Timmer and David Liebowitz and Surya Nepal and Salil S. Kanhere}, title = {Can pre-trained Transformers be used in detecting complex sensitive sentences? - {A} Monsanto case study}, journal = {CoRR}, volume = {abs/2203.06793}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.06793}, doi = {10.48550/ARXIV.2203.06793}, eprinttype = {arXiv}, eprint = {2203.06793}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-06793.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-07580, author = {Roelien C. Timmer and David Liebowitz and Surya Nepal and Salil S. Kanhere}, title = {{TSM:} Measuring the Enticement of Honeyfiles with Natural Language Processing}, journal = {CoRR}, volume = {abs/2203.07580}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.07580}, doi = {10.48550/ARXIV.2203.07580}, eprinttype = {arXiv}, eprint = {2203.07580}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-07580.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-10902, author = {Shuo Wang and Sharif Abuadbba and Sidharth Agarwal and Kristen Moore and Surya Nepal and Salil S. Kanhere}, title = {Integrity Fingerprinting of {DNN} with Double Black-box Design and Verification}, journal = {CoRR}, volume = {abs/2203.10902}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.10902}, doi = {10.48550/ARXIV.2203.10902}, eprinttype = {arXiv}, eprint = {2203.10902}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-10902.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-00985, author = {Alsharif Abuadbba and Shuo Wang and Mahathir Almashor and Muhammad Ejaz Ahmed and Raj Gaire and Seyit Camtepe and Surya Nepal}, title = {Towards Web Phishing Detection Limitations and Mitigation}, journal = {CoRR}, volume = {abs/2204.00985}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.00985}, doi = {10.48550/ARXIV.2204.00985}, eprinttype = {arXiv}, eprint = {2204.00985}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-00985.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-03214, author = {Chandra Thapa and Seung Ick Jang and Muhammad Ejaz Ahmed and Seyit Camtepe and Josef Pieprzyk and Surya Nepal}, title = {Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms}, journal = {CoRR}, volume = {abs/2204.03214}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.03214}, doi = {10.48550/ARXIV.2204.03214}, eprinttype = {arXiv}, eprint = {2204.03214}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-03214.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-07127, author = {David Liebowitz and Surya Nepal and Kristen Moore and Cody James Christopher and Salil S. Kanhere and David D. Nguyen and Roelien C. Timmer and Michael Longland and Keerth Rathakumar}, title = {Deception for Cyber Defence: Challenges and Opportunities}, journal = {CoRR}, volume = {abs/2208.07127}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.07127}, doi = {10.48550/ARXIV.2208.07127}, eprinttype = {arXiv}, eprint = {2208.07127}, timestamp = {Wed, 17 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-07127.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-08745, author = {Mariya Shmalko and Alsharif Abuadbba and Raj Gaire and Tingmin Wu and Hye{-}Young Paik and Surya Nepal}, title = {Profiler: Profile-Based Model to Detect Phishing Emails}, journal = {CoRR}, volume = {abs/2208.08745}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.08745}, doi = {10.48550/ARXIV.2208.08745}, eprinttype = {arXiv}, eprint = {2208.08745}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-08745.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-12449, author = {Mahathir Almashor and M. Ejaz Ahmed and Benjamin Pick and Sharif Abuadbba and Jason Xue and Raj Gaire and Shuo Wang and Seyit Camtepe and Surya Nepal}, title = {Unraveling Threat Intelligence Through the Lens of Malicious {URL} Campaigns}, journal = {CoRR}, volume = {abs/2208.12449}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.12449}, doi = {10.48550/ARXIV.2208.12449}, eprinttype = {arXiv}, eprint = {2208.12449}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-12449.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-02339, author = {Hua Ma and Yinshan Li and Yansong Gao and Zhi Zhang and Alsharif Abuadbba and Anmin Fu and Said F. Al{-}Sarawi and Surya Nepal and Derek Abbott}, title = {{MACAB:} Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World}, journal = {CoRR}, volume = {abs/2209.02339}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.02339}, doi = {10.48550/ARXIV.2209.02339}, eprinttype = {arXiv}, eprint = {2209.02339}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-02339.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-09375, author = {Erik Buchholz and Alsharif Abuadbba and Shuo Wang and Surya Nepal and Salil S. Kanhere}, title = {Reconstruction Attack on Differential Private Trajectory Protection Mechanisms}, journal = {CoRR}, volume = {abs/2210.09375}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.09375}, doi = {10.48550/ARXIV.2210.09375}, eprinttype = {arXiv}, eprint = {2210.09375}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-09375.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-13535, author = {Seonhye Park and Alsharif Abuadbba and Shuo Wang and Kristen Moore and Yansong Gao and Hyoungshick Kim and Surya Nepal}, title = {Tracking Dataset {IP} Use in Deep Neural Networks}, journal = {CoRR}, volume = {abs/2211.13535}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.13535}, doi = {10.48550/ARXIV.2211.13535}, eprinttype = {arXiv}, eprint = {2211.13535}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-13535.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RoselinNNH21, author = {Annie Gilda Roselin and Priyadarsi Nanda and Surya Nepal and Xiangjian He}, title = {Intelligent Anomaly Detection for Large Network Traffic With Optimized Deep Clustering {(ODC)} Algorithm}, journal = {{IEEE} Access}, volume = {9}, pages = {47243--47251}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3068172}, doi = {10.1109/ACCESS.2021.3068172}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RoselinNNH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BouguettayaSBNM21, author = {Athman Bouguettaya and Quan Z. Sheng and Boualem Benatallah and Azadeh Ghari Neiat and Sajib Mistry and Aditya Ghose and Surya Nepal and Lina Yao}, title = {An internet of things service roadmap}, journal = {Commun. {ACM}}, volume = {64}, number = {9}, pages = {86--95}, year = {2021}, url = {https://doi.org/10.1145/3464960}, doi = {10.1145/3464960}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/BouguettayaSBNM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/CuiPNYM21, author = {Hui Cui and Russell Paulet and Surya Nepal and Xun Yi and Butrus Mbimbi}, title = {Two-Factor Decryption: {A} Better Way to Protect Data Security and Privacy}, journal = {Comput. J.}, volume = {64}, number = {4}, pages = {550--563}, year = {2021}, url = {https://doi.org/10.1093/comjnl/bxaa080}, doi = {10.1093/COMJNL/BXAA080}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/CuiPNYM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhouGNZ21, author = {Peng Zhou and Xiaojing Gu and Surya Nepal and Jianying Zhou}, title = {Modeling social worm propagation for advanced persistent threats}, journal = {Comput. Secur.}, volume = {108}, pages = {102321}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102321}, doi = {10.1016/J.COSE.2021.102321}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhouGNZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/QiuZLPNX21, author = {Junyang Qiu and Jun Zhang and Wei Luo and Lei Pan and Surya Nepal and Yang Xiang}, title = {A Survey of Android Malware Detection with Deep Neural Models}, journal = {{ACM} Comput. Surv.}, volume = {53}, number = {6}, pages = {126:1--126:36}, year = {2021}, url = {https://doi.org/10.1145/3417978}, doi = {10.1145/3417978}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/QiuZLPNX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fdata/GroblerGN21, author = {Marthie Grobler and Raj Gaire and Surya Nepal}, title = {User, Usage and Usability: Redefining Human Centric Cyber Security}, journal = {Frontiers Big Data}, volume = {4}, pages = {583723}, year = {2021}, url = {https://doi.org/10.3389/fdata.2021.583723}, doi = {10.3389/FDATA.2021.583723}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fdata/GroblerGN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/KarmakarVNT21, author = {Kallol Krishna Karmakar and Vijay Varadharajan and Surya Nepal and Udaya Kiran Tupakula}, title = {SDN-Enabled Secure IoT Architecture}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {8}, pages = {6549--6564}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3043740}, doi = {10.1109/JIOT.2020.3043740}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/KarmakarVNT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhuYAKNH21, author = {Fei Zhu and Xun Yi and Alsharif Abuadbba and Ibrahim Khalil and Surya Nepal and Xinyi Huang}, title = {Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {14}, pages = {11678--11689}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2021.3059570}, doi = {10.1109/JIOT.2021.3059570}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhuYAKNH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/GroblerCAJNP21, author = {Marthie Grobler and M. A. P. Chamikara and Jacob Abbott and Jongkil Jay Jeong and Surya Nepal and C{\'{e}}cile Paris}, title = {The importance of social identity on password formulations}, journal = {Pers. Ubiquitous Comput.}, volume = {25}, number = {5}, pages = {813--827}, year = {2021}, url = {https://doi.org/10.1007/s00779-020-01477-1}, doi = {10.1007/S00779-020-01477-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/GroblerCAJNP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/LinZQLLSN21, author = {Wenmin Lin and Xuyun Zhang and Lianyong Qi and Weimin Li and Shancang Li and Victor S. Sheng and Surya Nepal}, title = {Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {8}, number = {1}, pages = {227--235}, year = {2021}, url = {https://doi.org/10.1109/TCSS.2020.2965234}, doi = {10.1109/TCSS.2020.2965234}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcss/LinZQLLSN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HongINS21, author = {Yuan Hong and Val{\'{e}}rie Issarny and Surya Nepal and Mudhakar Srivatsa}, title = {Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1511--1512}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2021.3076120}, doi = {10.1109/TDSC.2021.3076120}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HongINS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChengZNW21, author = {Yueqiang Cheng and Zhi Zhang and Surya Nepal and Zhi Wang}, title = {CATTmew: Defeating Software-Only Physical Kernel Isolation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1989--2004}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2946816}, doi = {10.1109/TDSC.2019.2946816}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChengZNW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangLWNX21, author = {Derui Wang and Chaoran Li and Sheng Wen and Surya Nepal and Yang Xiang}, title = {Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {5}, pages = {2074--2087}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.3021008}, doi = {10.1109/TDSC.2020.3021008}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangLWNX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KermanshahiLSNL21, author = {Shabnam Kasra Kermanshahi and Joseph K. Liu and Ron Steinfeld and Surya Nepal and Shangqi Lai and Randolph Loh and Cong Zuo}, title = {Multi-Client Cloud-Based Symmetric Searchable Encryption}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {5}, pages = {2419--2437}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2950934}, doi = {10.1109/TDSC.2019.2950934}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KermanshahiLSNL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/HongINS21, author = {Yuan Hong and Val{\'{e}}rie Issarny and Surya Nepal and Mudhakar Srivatsa}, title = {Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {9}, number = {3}, pages = {1328--1329}, year = {2021}, url = {https://doi.org/10.1109/TETC.2021.3076338}, doi = {10.1109/TETC.2021.3076338}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/HongINS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangCGNLZ21, author = {Zhi Zhang and Yueqiang Cheng and Yansong Gao and Surya Nepal and Dongxi Liu and Yi Zou}, title = {Detecting Hardware-Assisted Virtualization With Inconspicuous Features}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {16--27}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3004264}, doi = {10.1109/TIFS.2020.3004264}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangCGNLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CamtepeDMMNPP21, author = {Seyit Camtepe and Jarek Duda and Arash Mahboubi and Pawel Morawiecki and Surya Nepal and Marcin Pawlowski and Josef Pieprzyk}, title = {Compcrypt-Lightweight ANS-Based Compression and Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {3859--3873}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3096026}, doi = {10.1109/TIFS.2021.3096026}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/CamtepeDMMNPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangHCWGWLNX21, author = {Zhi Zhang and Wei He and Yueqiang Cheng and Wenhao Wang and Yansong Gao and Minghua Wang and Kang Li and Surya Nepal and Yang Xiang}, title = {BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {5167--5181}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3124728}, doi = {10.1109/TIFS.2021.3124728}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangHCWGWLNX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/PokhrelQNS21, author = {Shiva Raj Pokhrel and Youyang Qu and Surya Nepal and Surjit Singh}, title = {Privacy-Aware Autonomous Valet Parking: Towards Experience Driven Approach}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {22}, number = {8}, pages = {5352--5363}, year = {2021}, url = {https://doi.org/10.1109/TITS.2020.3006337}, doi = {10.1109/TITS.2020.3006337}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/PokhrelQNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/BadshaYKLNBL21, author = {Shahriar Badsha and Xun Yi and Ibrahim Khalil and Dongxi Liu and Surya Nepal and Elisa Bertino and Kwok{-}Yan Lam}, title = {Privacy Preserving Location-Aware Personalized Web Service Recommendations}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {14}, number = {3}, pages = {791--804}, year = {2021}, url = {https://doi.org/10.1109/TSC.2018.2839587}, doi = {10.1109/TSC.2018.2839587}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/BadshaYKLNBL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ChhetriFVNK21, author = {Mohan Baruwal Chhetri and Abdur Rahim Mohammad Forkan and Quoc Bao Vo and Surya Nepal and Ryszard Kowalczyk}, title = {Exploiting Heterogeneity for Opportunistic Resource Scaling in Cloud-Hosted Applications}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {14}, number = {6}, pages = {1739--1750}, year = {2021}, url = {https://doi.org/10.1109/TSC.2019.2908647}, doi = {10.1109/TSC.2019.2908647}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/ChhetriFVNK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/SinghARJN21, author = {Anil Singh and Nitin Auluck and Omer F. Rana and Andrew C. Jones and Surya Nepal}, title = {Scheduling Real-Time Security Aware Tasks in Fog Networks}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {14}, number = {6}, pages = {1981--1994}, year = {2021}, url = {https://doi.org/10.1109/TSC.2019.2914649}, doi = {10.1109/TSC.2019.2914649}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/SinghARJN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/VoLYNL21, author = {Viet Vo and Shangqi Lai and Xingliang Yuan and Surya Nepal and Joseph K. Liu}, editor = {Kazue Sako and Nils Ole Tippenhauer}, title = {Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves}, booktitle = {Applied Cryptography and Network Security - 19th International Conference, {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12726}, pages = {50--75}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78372-3\_3}, doi = {10.1007/978-3-030-78372-3\_3}, timestamp = {Wed, 09 Jun 2021 10:50:14 +0200}, biburl = {https://dblp.org/rec/conf/acns/VoLYNL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/KimCBSPN21, author = {Jongkil Kim and Seyit Camtepe and Joonsang Baek and Willy Susilo and Josef Pieprzyk and Surya Nepal}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {{P2DPI:} Practical and Privacy-Preserving Deep Packet Inspection}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {135--146}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3437525}, doi = {10.1145/3433210.3437525}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiaccs/KimCBSPN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FengSZXWLN021, author = {Xiaotao Feng and Ruoxi Sun and Xiaogang Zhu and Minhui Xue and Sheng Wen and Dongxi Liu and Surya Nepal and Yang Xiang}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {337--350}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484543}, doi = {10.1145/3460120.3484543}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FengSZXWLN021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/KimAGZANK21, author = {Bedeuro Kim and Alsharif Abuadbba and Yansong Gao and Yifeng Zheng and Muhammad Ejaz Ahmed and Surya Nepal and Hyoungshick Kim}, title = {Decamouflage: {A} Framework to Detect Image-Scaling Attacks on {CNN}}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {63--74}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00023}, doi = {10.1109/DSN48987.2021.00023}, timestamp = {Mon, 09 Aug 2021 14:50:25 +0200}, biburl = {https://dblp.org/rec/conf/dsn/KimAGZANK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KermanshahiDSSL21, author = {Shabnam Kasra Kermanshahi and Rafael Dowsley and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Surya Nepal and Xun Yi}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12973}, pages = {24--43}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88428-4\_2}, doi = {10.1007/978-3-030-88428-4\_2}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KermanshahiDSSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AhmedKCN21, author = {Muhammad Ejaz Ahmed and Hyoungshick Kim and Seyit Camtepe and Surya Nepal}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Peeler: Profiling Kernel-Level Events to Detect Ransomware}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {240--260}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_12}, doi = {10.1007/978-3-030-88418-5\_12}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AhmedKCN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/NguyenLNK21, author = {David D. Nguyen and David Liebowitz and Surya Nepal and Salil S. Kanhere}, title = {HoneyCode: Automating Deceptive Software Repositories with Deep Generative Models}, booktitle = {54th Hawaii International Conference on System Sciences, {HICSS} 2021, Kauai, Hawaii, USA, January 5, 2021}, pages = {1--10}, publisher = {ScholarSpace}, year = {2021}, url = {https://hdl.handle.net/10125/71456}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/NguyenLNK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/MaLKBNO021, author = {Siqi Ma and Juanru Li and Hyoungshick Kim and Elisa Bertino and Surya Nepal and Diethelm Ostry and Cong Sun}, title = {Fine with "1234"? An Analysis of {SMS} One-Time Password Randomness in Android Apps}, booktitle = {43rd {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2021, Madrid, Spain, 22-30 May 2021}, pages = {1671--1682}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICSE43902.2021.00148}, doi = {10.1109/ICSE43902.2021.00148}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/MaLKBNO021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ShenYSLN21, author = {Yanjun Shen and Xingliang Yuan and Shifeng Sun and Joseph K. Liu and Surya Nepal}, editor = {Robert H. Deng and Feng Bao and Guilin Wang and Jian Shen and Mark Ryan and Weizhi Meng and Ding Wang}, title = {OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control}, booktitle = {Information Security Practice and Experience: 16th International Conference, {ISPEC} 2021, Nanjing, China, December 17-19, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13107}, pages = {126--146}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93206-0\_9}, doi = {10.1007/978-3-030-93206-0\_9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ShenYSLN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/NguyenNK21, author = {David D. Nguyen and Surya Nepal and Salil S. Kanhere}, editor = {Heng Tao Shen and Yueting Zhuang and John R. Smith and Yang Yang and Pablo C{\'{e}}sar and Florian Metze and Balakrishnan Prabhakaran}, title = {Diverse Multimedia Layout Generation with Multi Choice Learning}, booktitle = {{MM} '21: {ACM} Multimedia Conference, Virtual Event, China, October 20 - 24, 2021}, pages = {218--226}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474085.3475525}, doi = {10.1145/3474085.3475525}, timestamp = {Mon, 22 Apr 2024 21:24:20 +0200}, biburl = {https://dblp.org/rec/conf/mm/NguyenNK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LaiYLY0LN21, author = {Shangqi Lai and Xingliang Yuan and Joseph K. Liu and Xun Yi and Qi Li and Dongxi Liu and Surya Nepal}, title = {OblivSketch: Oblivious Network Measurement as a Cloud Service}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/oblivsketch-oblivious-network-measurement-as-a-cloud-service/}, timestamp = {Thu, 17 Jun 2021 15:42:26 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LaiYLY0LN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SunSLYSLNG21, author = {Shifeng Sun and Ron Steinfeld and Shangqi Lai and Xingliang Yuan and Amin Sakzad and Joseph K. Liu and Surya Nepal and Dawu Gu}, title = {Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/practical-non-interactive-searchable-encryption-with-forward-and-backward-privacy/}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SunSLYSLNG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qshine/ThapaKCCVN21, author = {Chandra Thapa and Kallol Krishna Karmakar and Alberto Huertas Celdr{\'{a}}n and Seyit Camtepe and Vijay Varadharajan and Surya Nepal}, editor = {Xingliang Yuan and Wei Bao and Xun Yi and Nguyen Hoang Tran}, title = {FedDICE: {A} Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and {SDN} Based Mitigation}, booktitle = {Quality, Reliability, Security and Robustness in Heterogeneous Systems - 17th {EAI} International Conference, QShine 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {402}, pages = {3--24}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91424-0\_1}, doi = {10.1007/978-3-030-91424-0\_1}, timestamp = {Wed, 20 Mar 2024 10:34:02 +0100}, biburl = {https://dblp.org/rec/conf/qshine/ThapaKCCVN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/AbuadbbaKN21, author = {Alsharif Abuadbba and Hyoungshick Kim and Surya Nepal}, editor = {Chih{-}Cheng Hung and Jiman Hong and Alessio Bechini and Eunjee Song}, title = {DeepiSign: invisible fragile watermark to protect the integrity and authenticity of {CNN}}, booktitle = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021}, pages = {952--959}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3412841.3441970}, doi = {10.1145/3412841.3441970}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/AbuadbbaKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seeda/HolmesPMFNJ21, author = {David Holmes and Maria Papathanasaki and Leandros A. Maglaras and Mohamed Amine Ferrag and Surya Nepal and Helge Janicke}, title = {Digital Twins and Cyber Security - solution or challenge?}, booktitle = {6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference, {SEEDA-CECNSM} 2021, Preveza, Greece, September 24-26, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566277}, doi = {10.1109/SEEDA-CECNSM53056.2021.9566277}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/seeda/HolmesPMFNJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/SinghARN21, author = {Anil Singh and Nitin Auluck and Omer F. Rana and Surya Nepal}, editor = {Nimanthi L. Atukorala and Carl K. Chang and Rong N. Chang and Ernesto Damiani and Ian T. Foster and Zhongjie Wang and Jia Zhang}, title = {Scheduling Real Tim Security Aware Tasks in Fog Networks}, booktitle = {{IEEE} World Congress on Services, {SERVICES} 2021, Chicago, IL, USA, September 5-10, 2021}, pages = {6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SERVICES51467.2021.00017}, doi = {10.1109/SERVICES51467.2021.00017}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/services/SinghARN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/YangYNKHS21, author = {Xu Yang and Xun Yi and Surya Nepal and Ibrahim Khalil and Xinyi Huang and Jian Shen}, editor = {Nimanthi L. Atukorala and Carl K. Chang and Rong N. Chang and Ernesto Damiani and Ian T. Foster and Zhongjie Wang and Jia Zhang}, title = {Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs}, booktitle = {{IEEE} World Congress on Services, {SERVICES} 2021, Chicago, IL, USA, September 5-10, 2021}, pages = {11}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SERVICES51467.2021.00022}, doi = {10.1109/SERVICES51467.2021.00022}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/services/YangYNKHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/SultanVKCN21, author = {Nazatul Haque Sultan and Vijay Varadharajan and Chandan Kumar Chaudhary and Seyit Camtepe and Surya Nepal}, title = {A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks}, booktitle = {40th International Symposium on Reliable Distributed Systems, {SRDS} 2021, Chicago, IL, USA, September 20-23, 2021}, pages = {164--175}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SRDS53918.2021.00025}, doi = {10.1109/SRDS53918.2021.00025}, timestamp = {Sun, 20 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/SultanVKCN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/TimmerLNK21, author = {Roelien C. Timmer and David Liebowitz and Surya Nepal and Salil S. Kanhere}, title = {Can pre-trained Transformers be used in detecting complex sensitive sentences? - {A} Monsanto case study}, booktitle = {3rd {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta, GA, USA, December 13-15, 2021}, pages = {90--97}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TPSISA52974.2021.00010}, doi = {10.1109/TPSISA52974.2021.00010}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/TimmerLNK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/LiebowitzNMCKNT21, author = {David Liebowitz and Surya Nepal and Kristen Moore and Cody James Christopher and Salil S. Kanhere and David D. Nguyen and Roelien C. Timmer and Michael Longland and Keerth Rathakumar}, title = {Deception for Cyber Defence: Challenges and Opportunities}, booktitle = {3rd {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta, GA, USA, December 13-15, 2021}, pages = {173--182}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TPSISA52974.2021.00020}, doi = {10.1109/TPSISA52974.2021.00020}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/LiebowitzNMCKNT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-04319, author = {Alsharif Abuadbba and Hyoungshick Kim and Surya Nepal}, title = {DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of {CNN}}, journal = {CoRR}, volume = {abs/2101.04319}, year = {2021}, url = {https://arxiv.org/abs/2101.04319}, eprinttype = {arXiv}, eprint = {2101.04319}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-04319.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-12434, author = {Muhammad Ejaz Ahmed and Hyoungshick Kim and Seyit Camtepe and Surya Nepal}, title = {Peeler: Profiling Kernel-Level Events to Detect Ransomware}, journal = {CoRR}, volume = {abs/2101.12434}, year = {2021}, url = {https://arxiv.org/abs/2101.12434}, eprinttype = {arXiv}, eprint = {2101.12434}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-12434.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-10269, author = {Zhi Zhang and Yueqiang Cheng and Minghua Wang and Wei He and Wenhao Wang and Surya Nepal and Yansong Gao and Kang Li and Zhe Wang and Chenggang Wu}, title = {SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh}, journal = {CoRR}, volume = {abs/2102.10269}, year = {2021}, url = {https://arxiv.org/abs/2102.10269}, eprinttype = {arXiv}, eprint = {2102.10269}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-10269.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-00676, author = {Tom Roth and Yansong Gao and Alsharif Abuadbba and Surya Nepal and Wei Liu}, title = {Token-Modification Adversarial Attacks for Natural Language Processing: {A} Survey}, journal = {CoRR}, volume = {abs/2103.00676}, year = {2021}, url = {https://arxiv.org/abs/2103.00676}, eprinttype = {arXiv}, eprint = {2103.00676}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-00676.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-02762, author = {Yansong Gao and Minki Kim and Chandra Thapa and Sharif Abuadbba and Zhi Zhang and Seyit Ahmet {\c{C}}amtepe and Hyoungshick Kim and Surya Nepal}, title = {Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things}, journal = {CoRR}, volume = {abs/2103.02762}, year = {2021}, url = {https://arxiv.org/abs/2103.02762}, eprinttype = {arXiv}, eprint = {2103.02762}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-02762.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-03043, author = {Athman Bouguettaya and Quan Z. Sheng and Boualem Benatallah and Azadeh Ghari Neiat and Sajib Mistry and Aditya Ghose and Surya Nepal and Lina Yao}, title = {An Internet of Things Service Roadmap}, journal = {CoRR}, volume = {abs/2103.03043}, year = {2021}, url = {https://arxiv.org/abs/2103.03043}, eprinttype = {arXiv}, eprint = {2103.03043}, timestamp = {Tue, 10 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-03043.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-05758, author = {Siqi Ma and Juanru Li and Hyoungshick Kim and Elisa Bertino and Surya Nepal and Diethelm Ostry and Cong Sun}, title = {Fine with "1234"? An Analysis of {SMS} One-Time Password Randomness in Android Apps}, journal = {CoRR}, volume = {abs/2103.05758}, year = {2021}, url = {https://arxiv.org/abs/2103.05758}, eprinttype = {arXiv}, eprint = {2103.05758}, timestamp = {Tue, 16 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-05758.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-03813, author = {Jihyeon Ryu and Yifeng Zheng and Yansong Gao and Sharif Abuadbba and Junyaup Kim and Dongho Won and Surya Nepal and Hyoungshick Kim and Cong Wang}, title = {Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?}, journal = {CoRR}, volume = {abs/2104.03813}, year = {2021}, url = {https://arxiv.org/abs/2104.03813}, eprinttype = {arXiv}, eprint = {2104.03813}, timestamp = {Tue, 18 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-03813.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-13050, author = {Yanjun Zhang and Guangdong Bai and Xue Li and Surya Nepal and Ryan K. L. Ko}, title = {Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning}, journal = {CoRR}, volume = {abs/2104.13050}, year = {2021}, url = {https://arxiv.org/abs/2104.13050}, eprinttype = {arXiv}, eprint = {2104.13050}, timestamp = {Mon, 03 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-13050.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-00602, author = {Shuo Wang and Surya Nepal and Kristen Moore and Marthie Grobler and Carsten Rudolph and Alsharif Abuadbba}, title = {{OCTOPUS:} Overcoming Performance andPrivatization Bottlenecks in Distributed Learning}, journal = {CoRR}, volume = {abs/2105.00602}, year = {2021}, url = {https://arxiv.org/abs/2105.00602}, eprinttype = {arXiv}, eprint = {2105.00602}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-00602.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-04070, author = {Shuo Wang and Lingjuan Lyu and Surya Nepal and Carsten Rudolph and Marthie Grobler and Kristen Moore}, title = {Robust Training Using Natural Transformation}, journal = {CoRR}, volume = {abs/2105.04070}, year = {2021}, url = {https://arxiv.org/abs/2105.04070}, eprinttype = {arXiv}, eprint = {2105.04070}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-04070.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-05445, author = {Xiaotao Feng and Ruoxi Sun and Xiaogang Zhu and Minhui Xue and Sheng Wen and Dongxi Liu and Surya Nepal and Yang Xiang}, title = {Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference}, journal = {CoRR}, volume = {abs/2105.05445}, year = {2021}, url = {https://arxiv.org/abs/2105.05445}, eprinttype = {arXiv}, eprint = {2105.05445}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-05445.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-07582, author = {Keelan Evans and Alsharif Abuadbba and Mohiuddin Ahmed and Tingmin Wu and Mike Johnstone and Surya Nepal}, title = {{RAIDER:} Reinforcement-aided Spear Phishing Detector}, journal = {CoRR}, volume = {abs/2105.07582}, year = {2021}, url = {https://arxiv.org/abs/2105.07582}, eprinttype = {arXiv}, eprint = {2105.07582}, timestamp = {Tue, 18 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-07582.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-12584, author = {Xing Su and Shan Xue and Fanzhen Liu and Jia Wu and Jian Yang and Chuan Zhou and Wenbin Hu and C{\'{e}}cile Paris and Surya Nepal and Di Jin and Quan Z. Sheng and Philip S. Yu}, title = {A Comprehensive Survey on Community Detection with Deep Learning}, journal = {CoRR}, volume = {abs/2105.12584}, year = {2021}, url = {https://arxiv.org/abs/2105.12584}, eprinttype = {arXiv}, eprint = {2105.12584}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-12584.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-05434, author = {Chandra Thapa and Kallol Krishna Karmakar and Alberto Huertas Celdr{\'{a}}n and Seyit Camtepe and Vijay Varadharajan and Surya Nepal}, title = {FedDICE: {A} ransomware spread detection in a distributed integrated clinical environment using federated learning and {SDN} based mitigation}, journal = {CoRR}, volume = {abs/2106.05434}, year = {2021}, url = {https://arxiv.org/abs/2106.05434}, eprinttype = {arXiv}, eprint = {2106.05434}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-05434.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-12726, author = {Mahathir Almashor and M. Ejaz Ahmed and Benjamin Pick and Sharif Abuadbba and Raj Gaire and Seyit Camtepe and Surya Nepal}, title = {Characterizing Malicious {URL} Campaigns}, journal = {CoRR}, volume = {abs/2108.12726}, year = {2021}, url = {https://arxiv.org/abs/2108.12726}, eprinttype = {arXiv}, eprint = {2108.12726}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-12726.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-02942, author = {Yansong Gao and Yang Su and Surya Nepal and Damith C. Ranasinghe}, title = {NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions}, journal = {CoRR}, volume = {abs/2109.02942}, year = {2021}, url = {https://arxiv.org/abs/2109.02942}, eprinttype = {arXiv}, eprint = {2109.02942}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-02942.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-00397, author = {Yifeng Zheng and Cong Wang and Ruochen Wang and Huayi Duan and Surya Nepal}, title = {Optimizing Secure Decision Tree Inference Outsourcing}, journal = {CoRR}, volume = {abs/2111.00397}, year = {2021}, url = {https://arxiv.org/abs/2111.00397}, eprinttype = {arXiv}, eprint = {2111.00397}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-00397.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-11932, author = {Kristen Moore and Cody James Christopher and David Liebowitz and Surya Nepal and Renee Selvey}, title = {Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception}, journal = {CoRR}, volume = {abs/2111.11932}, year = {2021}, url = {https://arxiv.org/abs/2111.11932}, eprinttype = {arXiv}, eprint = {2111.11932}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-11932.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamtepeDMMNPP21, author = {Seyit Camtepe and Jarek Duda and Arash Mahboubi and Pawel Morawiecki and Surya Nepal and Marcin Pawlowski and Josef Pieprzyk}, title = {Compcrypt - Lightweight ANS-based Compression and Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2021}, url = {https://eprint.iacr.org/2021/010}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CamtepeDMMNPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimCBSPN21, author = {Jongkil Kim and Seyit Camtepe and Joonsang Baek and Willy Susilo and Josef Pieprzyk and Surya Nepal}, title = {{P2DPI:} Practical and Privacy-Preserving Deep Packet Inspection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {789}, year = {2021}, url = {https://eprint.iacr.org/2021/789}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimCBSPN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamtepeDMMNPP21a, author = {Seyit Camtepe and Jarek Duda and Arash Mahboubi and Pawel Morawiecki and Surya Nepal and Marcin Pawlowski and Josef Pieprzyk}, title = {ANS-based Compression and Encryption with 128-bit Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {900}, year = {2021}, url = {https://eprint.iacr.org/2021/900}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CamtepeDMMNPP21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/HamadSZN20, author = {Salma Abdalla Hamad and Quan Z. Sheng and Wei Emma Zhang and Surya Nepal}, title = {Realizing an Internet of Secure Things: {A} Survey on Issues and Enabling Technologies}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {22}, number = {2}, pages = {1372--1391}, year = {2020}, url = {https://doi.org/10.1109/COMST.2020.2976075}, doi = {10.1109/COMST.2020.2976075}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/HamadSZN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/YangYNKH20, author = {Xuechao Yang and Xun Yi and Surya Nepal and Andrei Kelarev and Fengling Han}, title = {Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities}, journal = {Future Gener. Comput. Syst.}, volume = {112}, pages = {859--874}, year = {2020}, url = {https://doi.org/10.1016/j.future.2020.06.051}, doi = {10.1016/J.FUTURE.2020.06.051}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/YangYNKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/NugrohoPNYZ20, author = {Robertus Nugroho and C{\'{e}}cile Paris and Surya Nepal and Jian Yang and Weiliang Zhao}, title = {A survey of recent methods on deriving topics from Twitter: algorithm to evaluation}, journal = {Knowl. Inf. Syst.}, volume = {62}, number = {7}, pages = {2485--2519}, year = {2020}, url = {https://doi.org/10.1007/s10115-019-01429-z}, doi = {10.1007/S10115-019-01429-Z}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kais/NugrohoPNYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/CuiQSN20, author = {Hui Cui and Baodong Qin and Willy Susilo and Surya Nepal}, title = {Robust digital signature revisited}, journal = {Theor. Comput. Sci.}, volume = {844}, pages = {87--96}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2020.08.005}, doi = {10.1016/J.TCS.2020.08.005}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/CuiQSN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/0002LWW0N0020, author = {Xiao Chen and Chaoran Li and Derui Wang and Sheng Wen and Jun Zhang and Surya Nepal and Yang Xiang and Kui Ren}, title = {Android {HIV:} {A} Study of Repackaging Malware for Evading Machine-Learning Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {987--1001}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2932228}, doi = {10.1109/TIFS.2019.2932228}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0002LWW0N0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CuiWWNY20, author = {Hui Cui and Zhiguo Wan and Xinlei Wei and Surya Nepal and Xun Yi}, title = {Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3227--3238}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2973864}, doi = {10.1109/TIFS.2020.2973864}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CuiWWNY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/YiBRLNB20, author = {Xun Yi and Elisa Bertino and Fang{-}Yu Rao and Kwok{-}Yan Lam and Surya Nepal and Athman Bouguettaya}, title = {Privacy-Preserving User Profile Matching in Social Networks}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {32}, number = {8}, pages = {1572--1585}, year = {2020}, url = {https://doi.org/10.1109/TKDE.2019.2912748}, doi = {10.1109/TKDE.2019.2912748}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/YiBRLNB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/NugrohoYZPN20, author = {Robertus Nugroho and Jian Yang and Weiliang Zhao and C{\'{e}}cile Paris and Surya Nepal}, title = {What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {13}, number = {3}, pages = {584--596}, year = {2020}, url = {https://doi.org/10.1109/TSC.2017.2696531}, doi = {10.1109/TSC.2017.2696531}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/NugrohoYZPN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/MaLN20, author = {Siqi Ma and Yang Liu and Surya Nepal}, title = {Are Android Apps Being Protected Well Against Attacks?}, journal = {{IEEE} Wirel. Commun.}, volume = {27}, number = {3}, pages = {66--71}, year = {2020}, url = {https://doi.org/10.1109/MWC.001.1900432}, doi = {10.1109/MWC.001.1900432}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/MaLN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/VoLYSNL20, author = {Viet Vo and Shangqi Lai and Xingliang Yuan and Shifeng Sun and Surya Nepal and Joseph K. Liu}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12147}, pages = {83--103}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57878-7\_5}, doi = {10.1007/978-3-030-57878-7\_5}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/VoLYSNL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MaLYLNB20, author = {Siqi Ma and Hehao Li and Wenbo Yang and Juanru Li and Surya Nepal and Elisa Bertino}, title = {Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {320--331}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427263}, doi = {10.1145/3427228.3427263}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MaLYLNB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/NerwichGPN20, author = {Mark Nerwich and Praveen Gauravaram and Hye{-}young Paik and Surya Nepal}, editor = {Lejla Batina and Gang Li}, title = {Vulnerability Database as a Service for IoT}, booktitle = {Applications and Techniques in Information Security - 11th International Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1338}, pages = {95--107}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4706-9\_7}, doi = {10.1007/978-981-33-4706-9\_7}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atis/NerwichGPN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WuZMW0PN020, author = {Tingmin Wu and Rongjunchen Zhang and Wanlun Ma and Sheng Wen and Xin Xia and C{\'{e}}cile Paris and Surya Nepal and Yang Xiang}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {What risk? {I} don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {248--262}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384761}, doi = {10.1145/3320269.3384761}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WuZMW0PN020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AbuadbbaKKTCGKN20, author = {Sharif Abuadbba and Kyuyeon Kim and Minki Kim and Chandra Thapa and Seyit Ahmet {\c{C}}amtepe and Yansong Gao and Hyoungshick Kim and Surya Nepal}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Can We Use Split Learning on 1D {CNN} Models for Privacy Preserving Training?}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {305--318}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384740}, doi = {10.1145/3320269.3384740}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AbuadbbaKKTCGKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coling/XuPSNV20, author = {Chang Xu and C{\'{e}}cile Paris and Ross Sparks and Surya Nepal and Keith Vander Linden}, editor = {Ann Clifton and Courtney Napoles}, title = {Assessing Social License to Operate from the Public Discourse on Social Media}, booktitle = {Proceedings of the 28th International Conference on Computational Linguistics, {COLING} 2020 - Industry Track, Online, December 12, 2020}, pages = {146--159}, publisher = {International Committee on Computational Linguistics}, year = {2020}, url = {https://doi.org/10.18653/v1/2020.coling-industry.14}, doi = {10.18653/V1/2020.COLING-INDUSTRY.14}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coling/XuPSNV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/Wang0CN20, author = {Minghua Wang and Zhi Zhang and Yueqiang Cheng and Surya Nepal}, title = {DRAMDig: {A} Knowledge-assisted Tool to Uncover {DRAM} Address Mapping}, booktitle = {57th {ACM/IEEE} Design Automation Conference, {DAC} 2020, San Francisco, CA, USA, July 20-24, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DAC18072.2020.9218599}, doi = {10.1109/DAC18072.2020.9218599}, timestamp = {Wed, 14 Oct 2020 10:56:17 +0200}, biburl = {https://dblp.org/rec/conf/dac/Wang0CN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/XuPNSLW20, author = {Chang Xu and C{\'{e}}cile Paris and Surya Nepal and Ross Sparks and Chong Long and Yafang Wang}, editor = {Giuseppe De Giacomo and Alejandro Catal{\'{a}} and Bistra Dilkina and Michela Milano and Sen{\'{e}}n Barro and Alberto Bugar{\'{\i}}n and J{\'{e}}r{\^{o}}me Lang}, title = {{DAN:} Dual-View Representation Learning for Adapting Stance Classifiers to New Domains}, booktitle = {{ECAI} 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020 - Including 10th Conference on Prestigious Applications of Artificial Intelligence {(PAIS} 2020)}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {325}, pages = {2260--2267}, publisher = {{IOS} Press}, year = {2020}, url = {https://doi.org/10.3233/FAIA200353}, doi = {10.3233/FAIA200353}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecai/XuPNSLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecsa/IslamBN20, author = {Chadni Islam and Muhammad Ali Babar and Surya Nepal}, editor = {Anton Jansen and Ivano Malavolta and Henry Muccini and Ipek Ozkaya and Olaf Zimmermann}, title = {Architecture-Centric Support for Integrating Security Tools in a Security Orchestration Platform}, booktitle = {Software Architecture - 14th European Conference, {ECSA} 2020, L'Aquila, Italy, September 14-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12292}, pages = {165--181}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58923-3\_11}, doi = {10.1007/978-3-030-58923-3\_11}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecsa/IslamBN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SultanVCN20, author = {Nazatul Haque Sultan and Vijay Varadharajan and Seyit Camtepe and Surya Nepal}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, pages = {569--590}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6\_28}, doi = {10.1007/978-3-030-58951-6\_28}, timestamp = {Fri, 02 Jul 2021 20:12:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SultanVCN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icann/WangRNGC20, author = {Shuo Wang and Carsten Rudolph and Surya Nepal and Marthie Grobler and Shangyu Chen}, editor = {Igor Farkas and Paolo Masulli and Stefan Wermter}, title = {{PART-GAN:} Privacy-Preserving Time-Series Sharing}, booktitle = {Artificial Neural Networks and Machine Learning - {ICANN} 2020 - 29th International Conference on Artificial Neural Networks, Bratislava, Slovakia, September 15-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12396}, pages = {578--593}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61609-0\_46}, doi = {10.1007/978-3-030-61609-0\_46}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icann/WangRNGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/LiuMLMND020, author = {Yang Liu and Zhuo Ma and Ximeng Liu and Siqi Ma and Surya Nepal and Robert H. Deng and Kui Ren}, title = {Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing}, booktitle = {40th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2020, Singapore, November 29 - December 1, 2020}, pages = {1--11}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDCS47774.2020.00017}, doi = {10.1109/ICDCS47774.2020.00017}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/LiuMLMND020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/YaoZ0N20, author = {Jing Yao and Yifeng Zheng and Cong Wang and Surya Nepal}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {295--301}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009801602950301}, doi = {10.5220/0009801602950301}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/YaoZ0N20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/GaoN20, author = {Yansong Gao and Surya Nepal}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {69--80}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_4}, doi = {10.1007/978-3-030-65610-2\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/GaoN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/SamantCVKN20, author = {Sunil Singh Samant and Mohan Baruwal Chhetri and Quoc Bao Vo and Ryszard Kowalczyk and Surya Nepal}, editor = {Hakim Hacid and Fatma Outay and Hye{-}young Paik and Amira Alloum and Marinella Petrocchi and Mohamed Reda Bouadjenek and Amin Beheshti and Xumin Liu and Abderrahmane Maaradji}, title = {AuraEN: Autonomous Resource Allocation for Cloud-Hosted Data Processing Pipelines}, booktitle = {Service-Oriented Computing - {ICSOC} 2020 Workshops - AIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 14-17, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12632}, pages = {77--80}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-76352-7\_12}, doi = {10.1007/978-3-030-76352-7\_12}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/SamantCVKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/LiuX0ZHPNYY20, author = {Fanzhen Liu and Shan Xue and Jia Wu and Chuan Zhou and Wenbin Hu and C{\'{e}}cile Paris and Surya Nepal and Jian Yang and Philip S. Yu}, editor = {Christian Bessiere}, title = {Deep Learning for Community Detection: Progress, Challenges and Opportunities}, booktitle = {Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, {IJCAI} 2020}, pages = {4981--4987}, publisher = {ijcai.org}, year = {2020}, url = {https://doi.org/10.24963/ijcai.2020/693}, doi = {10.24963/IJCAI.2020/693}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/LiuX0ZHPNYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/WangCCNRG20, author = {Shuo Wang and Tianle Chen and Shangyu Chen and Surya Nepal and Carsten Rudolph and Marthie Grobler}, title = {{OIAD:} One-for-all Image Anomaly Detection with Disentanglement Learning}, booktitle = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020, Glasgow, United Kingdom, July 19-24, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IJCNN48605.2020.9207434}, doi = {10.1109/IJCNN48605.2020.9207434}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/WangCCNRG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/0001CLN0Y20, author = {Zhi Zhang and Yueqiang Cheng and Dongxi Liu and Surya Nepal and Zhi Wang and Yuval Yarom}, title = {PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses}, booktitle = {53rd Annual {IEEE/ACM} International Symposium on Microarchitecture, {MICRO} 2020, Athens, Greece, October 17-21, 2020}, pages = {28--41}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/MICRO50266.2020.00016}, doi = {10.1109/MICRO50266.2020.00016}, timestamp = {Tue, 17 Nov 2020 12:25:22 +0100}, biburl = {https://dblp.org/rec/conf/micro/0001CLN0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/KarmakarVTNT20, author = {Kallol Krishna Karmakar and Vijay Varadharajan and Uday Kiran Tupakula and Surya Nepal and Chandra Thapa}, editor = {Filip De Turck and Prosper Chemouil and Tim Wauters and Mohamed Faten Zhani and Walter Cerroni and Rafael Pasquini and Zuqing Zhu}, title = {Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT)}, booktitle = {6th {IEEE} Conference on Network Softwarization, NetSoft 2020, Ghent, Belgium, June 29 - July 3, 2020}, pages = {257--261}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/NetSoft48620.2020.9165387}, doi = {10.1109/NETSOFT48620.2020.9165387}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/KarmakarVTNT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paap/HamadSTZN20, author = {Salma Abdalla Hamad and Quan Z. Sheng and Dai Hoang Tran and Wei Emma Zhang and Surya Nepal}, editor = {Li Ning and Vincent Chau and Francis C. M. Lau}, title = {A Behavioural Network Traffic Novelty Detection for the Internet of Things Infrastructures}, booktitle = {Parallel Architectures, Algorithms and Programming - 11th International Symposium, {PAAP} 2020, Shenzhen, China, December 28-30, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1362}, pages = {174--186}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-0010-4\_16}, doi = {10.1007/978-981-16-0010-4\_16}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paap/HamadSTZN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ZhuYAKYNH20, author = {Fei Zhu and Xun Yi and Sharif Abuadbba and Ibrahim Khalil and Xu Yang and Surya Nepal and Xinyi Huang}, editor = {Khoa Nguyen and Wenling Wu and Kwok{-}Yan Lam and Huaxiong Wang}, title = {Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments}, booktitle = {Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12505}, pages = {145--165}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62576-4\_8}, doi = {10.1007/978-3-030-62576-4\_8}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/ZhuYAKYNH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/GaoKAKTKCKN20, author = {Yansong Gao and Minki Kim and Sharif Abuadbba and Yeonjae Kim and Chandra Thapa and Kyuyeon Kim and Seyit Ahmet {\c{C}}amtepe and Hyoungshick Kim and Surya Nepal}, title = {End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things}, booktitle = {International Symposium on Reliable Distributed Systems, {SRDS} 2020, Shanghai, China, September 21-24, 2020}, pages = {91--100}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SRDS51746.2020.00017}, doi = {10.1109/SRDS51746.2020.00017}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/srds/GaoKAKTKCKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/JanickeAN20, author = {Helge Janicke and Sharif Abuadbba and Surya Nepal}, title = {Security and Privacy for a Sustainable Internet of Things}, booktitle = {Second {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta, GA, USA, October 28-31, 2020}, pages = {12--19}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TPS-ISA50397.2020.00013}, doi = {10.1109/TPS-ISA50397.2020.00013}, timestamp = {Tue, 26 Jan 2021 14:00:08 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/JanickeAN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/LiLNP20, author = {Nan Li and Dongxi Liu and Surya Nepal and Guangyu Pei}, title = {A Needle in a Haystack: Finding a Suitable Lightweight IoT Authentication Protocol and Improving Its Usability}, booktitle = {Second {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta, GA, USA, October 28-31, 2020}, pages = {46--54}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TPS-ISA50397.2020.00017}, doi = {10.1109/TPS-ISA50397.2020.00017}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/LiLNP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/ZhengPAPNJ20, author = {Yifeng Zheng and Arindam Pal and Sharif Abuadbba and Shiva Raj Pokhrel and Surya Nepal and Helge Janicke}, title = {Towards IoT Security Automation and Orchestration}, booktitle = {Second {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta, GA, USA, October 28-31, 2020}, pages = {55--63}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TPS-ISA50397.2020.00018}, doi = {10.1109/TPS-ISA50397.2020.00018}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/ZhengPAPNJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/ZhangMLLNG20, author = {Yuyao Zhang and Siqi Ma and Juanru Li and Kailai Li and Surya Nepal and Dawu Gu}, editor = {Kostas Kontogiannis and Foutse Khomh and Alexander Chatzigeorgiou and Marios{-}Eleftherios Fokaefs and Minghui Zhou}, title = {{SMARTSHIELD:} Automatic Smart Contract Protection Made Easy}, booktitle = {27th {IEEE} International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2020, London, ON, Canada, February 18-21, 2020}, pages = {23--34}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SANER48275.2020.9054825}, doi = {10.1109/SANER48275.2020.9054825}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcre/ZhangMLLNG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/WangLCCNRG20, author = {Shuo Wang and Lingjuan Lyu and Tianle Chen and Shangyu Chen and Surya Nepal and Carsten Rudolph and Marthie Grobler}, editor = {Zhisheng Huang and Wouter Beek and Hua Wang and Rui Zhou and Yanchun Zhang}, title = {Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer}, booktitle = {Web Information Systems Engineering - {WISE} 2020 - 21st International Conference, Amsterdam, The Netherlands, October 20-24, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12343}, pages = {185--200}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62008-0\_13}, doi = {10.1007/978-3-030-62008-0\_13}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wise/WangLCCNRG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bigdata2/2020, editor = {Surya Nepal and Wenqi Cao and Aziz Nasridinov and Md. Zakirul Alam Bhuiyan and Xuan Guo and Liang{-}Jie Zhang}, title = {Big Data - BigData 2020 - 9th International Conference, Held as Part of the Services Conference Federation, {SCF} 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12402}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59612-5}, doi = {10.1007/978-3-030-59612-5}, isbn = {978-3-030-59611-8}, timestamp = {Fri, 21 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdata2/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-02297, author = {Shuo Wang and Shangyu Chen and Tianle Chen and Surya Nepal and Carsten Rudolph and Marthie Grobler}, title = {Generating Semantic Adversarial Examples via Feature Manipulation}, journal = {CoRR}, volume = {abs/2001.02297}, year = {2020}, url = {http://arxiv.org/abs/2001.02297}, eprinttype = {arXiv}, eprint = {2001.02297}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-02297.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-03274, author = {Shuo Wang and Surya Nepal and Carsten Rudolph and Marthie Grobler and Shangyu Chen and Tianle Chen}, title = {Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models}, journal = {CoRR}, volume = {abs/2001.03274}, year = {2020}, url = {https://arxiv.org/abs/2001.03274}, eprinttype = {arXiv}, eprint = {2001.03274}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-03274.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-03743, author = {Viet Vo and Shangqi Lai and Xingliang Yuan and Shifeng Sun and Surya Nepal and Joseph K. Liu}, title = {Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution}, journal = {CoRR}, volume = {abs/2001.03743}, year = {2020}, url = {https://arxiv.org/abs/2001.03743}, eprinttype = {arXiv}, eprint = {2001.03743}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-03743.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-06640, author = {Shuo Wang and Tianle Chen and Shangyu Chen and Carsten Rudolph and Surya Nepal and Marthie Grobler}, title = {{OIAD:} One-for-all Image Anomaly Detection with Disentanglement Learning}, journal = {CoRR}, volume = {abs/2001.06640}, year = {2020}, url = {https://arxiv.org/abs/2001.06640}, eprinttype = {arXiv}, eprint = {2001.06640}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-06640.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-00524, author = {Zhi Zhang and Yueqiang Cheng and Yinqian Zhang and Surya Nepal}, title = {GhostKnight: Breaching Data Integrity via Speculative Execution}, journal = {CoRR}, volume = {abs/2002.00524}, year = {2020}, url = {https://arxiv.org/abs/2002.00524}, eprinttype = {arXiv}, eprint = {2002.00524}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-00524.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-02007, author = {Shuo Wang and Tianle Chen and Surya Nepal and Carsten Rudolph and Marthie Grobler and Shangyu Chen}, title = {Defending Adversarial Attacks via Semantic Feature Manipulation}, journal = {CoRR}, volume = {abs/2002.02007}, year = {2020}, url = {https://arxiv.org/abs/2002.02007}, eprinttype = {arXiv}, eprint = {2002.02007}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-02007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-09190, author = {Chadni Islam and Muhammad Ali Babar and Surya Nepal}, title = {A Multi-Vocal Review of Security Orchestration}, journal = {CoRR}, volume = {abs/2002.09190}, year = {2020}, url = {https://arxiv.org/abs/2002.09190}, eprinttype = {arXiv}, eprint = {2002.09190}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-09190.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-06103, author = {Viet Vo and Xingliang Yuan and Shifeng Sun and Joseph K. Liu and Surya Nepal and Cong Wang}, title = {ShieldDB: An Encrypted Document Database with Padding Countermeasures}, journal = {CoRR}, volume = {abs/2003.06103}, year = {2020}, url = {https://arxiv.org/abs/2003.06103}, eprinttype = {arXiv}, eprint = {2003.06103}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-06103.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-06514, author = {Chang Xu and C{\'{e}}cile Paris and Surya Nepal and Ross Sparks and Chong Long and Yafang Wang}, title = {{DAN:} Dual-View Representation Learning for Adapting Stance Classifiers to New Domains}, journal = {CoRR}, volume = {abs/2003.06514}, year = {2020}, url = {https://arxiv.org/abs/2003.06514}, eprinttype = {arXiv}, eprint = {2003.06514}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-06514.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-12365, author = {Sharif Abuadbba and Kyuyeon Kim and Minki Kim and Chandra Thapa and Seyit Ahmet {\c{C}}amtepe and Yansong Gao and Hyoungshick Kim and Surya Nepal}, title = {Can We Use Split Learning on 1D {CNN} Models for Privacy Preserving Training?}, journal = {CoRR}, volume = {abs/2003.12365}, year = {2020}, url = {https://arxiv.org/abs/2003.12365}, eprinttype = {arXiv}, eprint = {2003.12365}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-12365.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-13376, author = {Yansong Gao and Minki Kim and Sharif Abuadbba and Yeonjae Kim and Chandra Thapa and Kyuyeon Kim and Seyit Ahmet {\c{C}}amtepe and Hyoungshick Kim and Surya Nepal}, title = {End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things}, journal = {CoRR}, volume = {abs/2003.13376}, year = {2020}, url = {https://arxiv.org/abs/2003.13376}, eprinttype = {arXiv}, eprint = {2003.13376}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-13376.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-02354, author = {Minghua Wang and Zhi Zhang and Yueqiang Cheng and Surya Nepal}, title = {DRAMDig: {A} Knowledge-assisted Tool to Uncover {DRAM} Address Mapping}, journal = {CoRR}, volume = {abs/2004.02354}, year = {2020}, url = {https://arxiv.org/abs/2004.02354}, eprinttype = {arXiv}, eprint = {2004.02354}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-02354.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-08225, author = {Fanzhen Liu and Shan Xue and Jia Wu and Chuan Zhou and Wenbin Hu and C{\'{e}}cile Paris and Surya Nepal and Jian Yang and Philip S. Yu}, title = {Deep Learning for Community Detection: Progress, Challenges and Opportunities}, journal = {CoRR}, volume = {abs/2005.08225}, year = {2020}, url = {https://arxiv.org/abs/2005.08225}, eprinttype = {arXiv}, eprint = {2005.08225}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-08225.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-03208, author = {Sharif Abuadbba and Ayman Ibaida and Ibrahim Khalil and Naveen K. Chilamkurti and Surya Nepal and Xinghuo Yu}, title = {Can the Multi-Incoming Smart Meter Compressed Streams be Re-Compressed?}, journal = {CoRR}, volume = {abs/2006.03208}, year = {2020}, url = {https://arxiv.org/abs/2006.03208}, eprinttype = {arXiv}, eprint = {2006.03208}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-03208.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-09701, author = {Shuo Wang and Surya Nepal and Marthie Grobler and Carsten Rudolph and Tianle Chen and Shangyu Chen}, title = {Adversarial Defense by Latent Style Transformations}, journal = {CoRR}, volume = {abs/2006.09701}, year = {2020}, url = {https://arxiv.org/abs/2006.09701}, eprinttype = {arXiv}, eprint = {2006.09701}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-09701.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-14765, author = {Tingmin Wu and Wanlun Ma and Sheng Wen and Xin Xia and C{\'{e}}cile Paris and Surya Nepal and Yang Xiang}, title = {Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity}, journal = {CoRR}, volume = {abs/2006.14765}, year = {2020}, url = {https://arxiv.org/abs/2006.14765}, eprinttype = {arXiv}, eprint = {2006.14765}, timestamp = {Tue, 11 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-14765.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-08707, author = {Zhi Zhang and Yueqiang Cheng and Dongxi Liu and Surya Nepal and Zhi Wang and Yuval Yarom}, title = {PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses}, journal = {CoRR}, volume = {abs/2007.08707}, year = {2020}, url = {https://arxiv.org/abs/2007.08707}, eprinttype = {arXiv}, eprint = {2007.08707}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-08707.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-10760, author = {Yansong Gao and Bao Gia Doan and Zhi Zhang and Siqi Ma and Jiliang Zhang and Anmin Fu and Surya Nepal and Hyoungshick Kim}, title = {Backdoor Attacks and Countermeasures on Deep Learning: {A} Comprehensive Review}, journal = {CoRR}, volume = {abs/2007.10760}, year = {2020}, url = {https://arxiv.org/abs/2007.10760}, eprinttype = {arXiv}, eprint = {2007.10760}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-10760.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-13300, author = {Chandra Thapa and Jun Wen Tang and Sharif Abuadbba and Yansong Gao and Yifeng Zheng and Seyit Ahmet {\c{C}}amtepe and Surya Nepal and Mahathir Almashor}, title = {FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning}, journal = {CoRR}, volume = {abs/2007.13300}, year = {2020}, url = {https://arxiv.org/abs/2007.13300}, eprinttype = {arXiv}, eprint = {2007.13300}, timestamp = {Wed, 29 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-13300.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-03735, author = {Bedeuro Kim and Alsharif Abuadbba and Yansong Gao and Yifeng Zheng and Muhammad Ejaz Ahmed and Hyoungshick Kim and Surya Nepal}, title = {Decamouflage: {A} Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks}, journal = {CoRR}, volume = {abs/2010.03735}, year = {2020}, url = {https://arxiv.org/abs/2010.03735}, eprinttype = {arXiv}, eprint = {2010.03735}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-03735.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-07584, author = {Mohan Baruwal Chhetri and Abdur Rahim Mohammad Forkan and Anton V. Uzunov and Surya Nepal}, title = {Towards Self-Improving Hybrid Elasticity Control of Cloud-based Software Systems}, journal = {CoRR}, volume = {abs/2010.07584}, year = {2020}, url = {https://arxiv.org/abs/2010.07584}, eprinttype = {arXiv}, eprint = {2010.07584}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-07584.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-07474, author = {Hassan Ali and Surya Nepal and Salil S. Kanhere and Sanjay Jha}, title = {HaS-Nets: {A} Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios}, journal = {CoRR}, volume = {abs/2012.07474}, year = {2020}, url = {https://arxiv.org/abs/2012.07474}, eprinttype = {arXiv}, eprint = {2012.07474}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-07474.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuN20, author = {Dongxi Liu and Surya Nepal}, title = {Compact-LWE-MQ{\^{}}\{H\}: Public Key Encryption without Hardness Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {974}, year = {2020}, url = {https://eprint.iacr.org/2020/974}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/QiuZLPNWX19, author = {Junyang Qiu and Jun Zhang and Wei Luo and Lei Pan and Surya Nepal and Yu Wang and Yang Xiang}, title = {{A3CM:} Automatic Capability Annotation for Android Malware}, journal = {{IEEE} Access}, volume = {7}, pages = {147156--147168}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2946392}, doi = {10.1109/ACCESS.2019.2946392}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/QiuZLPNWX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YuLNYR19, author = {Bin Yu and Joseph K. Liu and Surya Nepal and Jiangshan Yu and Paul Rimba}, title = {Proof-of-QoS: QoS based blockchain consensus protocol}, journal = {Comput. Secur.}, volume = {87}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.101580}, doi = {10.1016/J.COSE.2019.101580}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/YuLNYR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/YangYKCYNHZ19, author = {Xu Yang and Xun Yi and Ibrahim Khalil and Hui Cui and Xuechao Yang and Surya Nepal and Xinyi Huang and Yali Zeng}, title = {A new privacy-preserving authentication protocol for anonymous web browsing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {31}, number = {21}, year = {2019}, url = {https://doi.org/10.1002/cpe.4706}, doi = {10.1002/CPE.4706}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/YangYKCYNHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/BaskaranNNH19, author = {Annie Gilda Roselin Arockia Baskaran and Priyadarsi Nanda and Surya Nepal and Sean He}, title = {Testbed evaluation of Lightweight Authentication Protocol {(LAUP)} for 6LoWPAN wireless sensor networks}, journal = {Concurr. Comput. Pract. Exp.}, volume = {31}, number = {23}, year = {2019}, url = {https://doi.org/10.1002/cpe.4868}, doi = {10.1002/CPE.4868}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/BaskaranNNH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/IslamBN19, author = {Chadni Islam and Muhammad Ali Babar and Surya Nepal}, title = {A Multi-Vocal Review of Security Orchestration}, journal = {{ACM} Comput. Surv.}, volume = {52}, number = {2}, pages = {37:1--37:45}, year = {2019}, url = {https://doi.org/10.1145/3305268}, doi = {10.1145/3305268}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/IslamBN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/RoselinNNHW19, author = {Annie Gilda Roselin and Priyadarsi Nanda and Surya Nepal and Xiangjian He and Jarod Wright}, title = {Exploiting the Remote Server Access Support of CoAP Protocol}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {6}, pages = {9338--9349}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2942085}, doi = {10.1109/JIOT.2019.2942085}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/RoselinNNHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/NepalCRK19, author = {Surya Nepal and Mohan Baruwal Chhetri and Rajiv Ranjan and Ryszard Kowalczyk}, title = {A Note on Quality of Service Issues in Smart Cities}, journal = {J. Parallel Distributed Comput.}, volume = {127}, pages = {116--117}, year = {2019}, url = {https://doi.org/10.1016/j.jpdc.2019.02.001}, doi = {10.1016/J.JPDC.2019.02.001}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/NepalCRK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/PuthalWNRC19, author = {Deepak Puthal and Xindong Wu and Surya Nepal and Rajiv Ranjan and Jinjun Chen}, title = {{SEEN:} {A} Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams}, journal = {{IEEE} Trans. Big Data}, volume = {5}, number = {3}, pages = {379--392}, year = {2019}, url = {https://doi.org/10.1109/TBDATA.2017.2702172}, doi = {10.1109/TBDATA.2017.2702172}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbd/PuthalWNRC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/WuTZWPNGX19, author = {Tingmin Wu and Lihong Tang and Rongjunchen Zhang and Sheng Wen and C{\'{e}}cile Paris and Surya Nepal and Marthie Grobler and Yang Xiang}, title = {Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {3}, number = {4}, pages = {36:1--36:21}, year = {2019}, url = {https://doi.org/10.1145/3317699}, doi = {10.1145/3317699}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcps/WuTZWPNGX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/DustdarNJ19, author = {Schahram Dustdar and Surya Nepal and James Joshi}, title = {Introduction to the Special Section on Advances in Internet-based Collaborative Technologies}, journal = {{ACM} Trans. Internet Techn.}, volume = {19}, number = {3}, year = {2019}, url = {https://doi.org/10.1145/3361071}, doi = {10.1145/3361071}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/DustdarNJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/YangYKZHNYC19, author = {Xu Yang and Xun Yi and Ibrahim Khalil and Yali Zeng and Xinyi Huang and Surya Nepal and Xuechao Yang and Hui Cui}, title = {A lightweight authentication scheme for vehicular ad hoc networks based on {MSR}}, journal = {Veh. Commun.}, volume = {15}, pages = {16--27}, year = {2019}, url = {https://doi.org/10.1016/j.vehcom.2018.11.001}, doi = {10.1016/J.VEHCOM.2018.11.001}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/YangYKZHNYC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/ChhetriFVNK19, author = {Mohan Baruwal Chhetri and Abdur Rahim Mohammad Forkan and Quoc Bao Vo and Surya Nepal and Ryszard Kowalczyk}, editor = {Elisa Bertino and Carl K. Chang and Peter Chen and Ernesto Damiani and Michael Goul and Katsunori Oyama}, title = {Towards Risk-Aware Cost-Optimal Resource Allocation for Cloud Applications}, booktitle = {2019 {IEEE} International Conference on Services Computing, {SCC} 2019, Milan, Italy, July 8-13, 2019}, pages = {210--214}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SCC.2019.00043}, doi = {10.1109/SCC.2019.00043}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEscc/ChhetriFVNK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimSBNL19, author = {Jongkil Kim and Willy Susilo and Joonsang Baek and Surya Nepal and Dongxi Liu}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Ciphertext-Delegatable {CP-ABE} for a Dynamic Credential: {A} Modular Approach}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {3--20}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_1}, doi = {10.1007/978-3-030-21548-4\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimSBNL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/XuPNS19, author = {Chang Xu and C{\'{e}}cile Paris and Surya Nepal and Ross Sparks}, editor = {Anna Korhonen and David R. Traum and Llu{\'{\i}}s M{\`{a}}rquez}, title = {Recognising Agreement and Disagreement between Stances with Reason Comparing Networks}, booktitle = {Proceedings of the 57th Conference of the Association for Computational Linguistics, {ACL} 2019, Florence, Italy, July 28- August 2, 2019, Volume 1: Long Papers}, pages = {4665--4671}, publisher = {Association for Computational Linguistics}, year = {2019}, url = {https://doi.org/10.18653/v1/p19-1460}, doi = {10.18653/V1/P19-1460}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/XuPNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GaoXW0RN19, author = {Yansong Gao and Chang Xu and Derui Wang and Shiping Chen and Damith Chinthana Ranasinghe and Surya Nepal}, editor = {David Balenson}, title = {{STRIP:} a defence against trojan attacks on deep neural networks}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {113--125}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359790}, doi = {10.1145/3359789.3359790}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GaoXW0RN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MaFLLNOBDMJ19, author = {Siqi Ma and Runhan Feng and Juanru Li and Yang Liu and Surya Nepal and Diethelm Ostry and Elisa Bertino and Robert H. Deng and Zhuo Ma and Sanjay Jha}, editor = {David Balenson}, title = {An empirical study of {SMS} one-time password authentication in Android apps}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {339--354}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359828}, doi = {10.1145/3359789.3359828}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MaFLLNOBDMJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/IslamBN19, author = {Chadni Islam and Muhammad Ali Babar and Surya Nepal}, editor = {Paolo Giorgini and Barbara Weber}, title = {Automated Interpretation and Integration of Security Tools Using Semantic Knowledge}, booktitle = {Advanced Information Systems Engineering - 31st International Conference, CAiSE 2019, Rome, Italy, June 3-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11483}, pages = {513--528}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21290-2\_32}, doi = {10.1007/978-3-030-21290-2\_32}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/IslamBN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LauerSRN19, author = {Hagen Lauer and Amin Sakzad and Carsten Rudolph and Surya Nepal}, editor = {Liqun Chen and Chris J. Mitchell and Thanassis Giannetsos and Daniele Sgandurra}, title = {Bootstrapping Trust in a "Trusted" Virtualized Platform}, booktitle = {Proceedings of the 1st {ACM} Workshop on Workshop on Cyber-Security Arms Race, CYSARM@CCS 2019, London, UK, November 15, 2019}, pages = {11--22}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338511.3357347}, doi = {10.1145/3338511.3357347}, timestamp = {Sat, 28 Aug 2021 16:06:52 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LauerSRN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimCSNB19, author = {Jongkil Kim and Seyit Camtepe and Willy Susilo and Surya Nepal and Joonsang Baek}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {55--66}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329825}, doi = {10.1145/3321705.3329825}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KimCSNB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Nepal19, author = {Surya Nepal}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Security is the Weakest Link: Prevalent Culture of Victim Blaming in Cyberattacks}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {255--256}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329914}, doi = {10.1145/3321705.3329914}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Nepal19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/SamantCVNK19, author = {Sunil Singh Samant and Mohan Baruwal Chhetri and Quoc Bao Vo and Surya Nepal and Ryszard Kowalczyk}, title = {Benchmarking for End-to-End QoS Sustainability in Cloud-Hosted Data Processing Pipelines}, booktitle = {5th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2019, Los Angeles, CA, USA, December 12-14, 2019}, pages = {39--48}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CIC48465.2019.00014}, doi = {10.1109/CIC48465.2019.00014}, timestamp = {Fri, 27 May 2022 15:04:14 +0200}, biburl = {https://dblp.org/rec/conf/coinco/SamantCVNK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/UzunovNC19, author = {Anton V. Uzunov and Surya Nepal and Mohan Baruwal Chhetri}, title = {Proactive Antifragility: {A} New Paradigm for Next-Generation Cyber Defence at the Edge}, booktitle = {5th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2019, Los Angeles, CA, USA, December 12-14, 2019}, pages = {246--255}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CIC48465.2019.00039}, doi = {10.1109/CIC48465.2019.00039}, timestamp = {Fri, 27 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coinco/UzunovNC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KermanshahiLSN19, author = {Shabnam Kasra Kermanshahi and Joseph K. Liu and Ron Steinfeld and Surya Nepal}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Generic Multi-keyword Ranked Search on Encrypted Cloud Data}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, pages = {322--343}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0\_16}, doi = {10.1007/978-3-030-29962-0\_16}, timestamp = {Mon, 05 Feb 2024 20:29:41 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KermanshahiLSN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MaBNLODJ19, author = {Siqi Ma and Elisa Bertino and Surya Nepal and Juanru Li and Diethelm Ostry and Robert H. Deng and Sanjay Jha}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Finding Flaws from Password Authentication Code in Android Apps}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {619--637}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_30}, doi = {10.1007/978-3-030-29959-0\_30}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MaBNLODJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icac/ChhetriUVNK19, author = {Mohan Baruwal Chhetri and Anton V. Uzunov and Bao Quoc Vo and Surya Nepal and Ryszard Kowalczyk}, title = {Self-Improving Autonomic Systems for Antifragile Cyber Defence: Challenges and Opportunities}, booktitle = {2019 {IEEE} International Conference on Autonomic Computing, {ICAC} 2019, Ume{\aa}, Sweden, June 16-20, 2019}, pages = {18--23}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICAC.2019.00013}, doi = {10.1109/ICAC.2019.00013}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icac/ChhetriUVNK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/0007VN19, author = {Nan Li and Vijay Varadharajan and Surya Nepal}, title = {Context-Aware Trust Management System for IoT Applications with Multiple Domains}, booktitle = {39th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019}, pages = {1138--1148}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDCS.2019.00116}, doi = {10.1109/ICDCS.2019.00116}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/0007VN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/WangNSR19, author = {Shuo Wang and Surya Nepal and Richard O. Sinnott and Carsten Rudolph}, editor = {Elisa Bertino and Carl K. Chang and Peter Chen and Ernesto Damiani and Michael Goul and Katsunori Oyama}, title = {{P-STM:} Privacy-Protected Social Tie Mining of Individual Trajectories}, booktitle = {2019 {IEEE} International Conference on Web Services, {ICWS} 2019, Milan, Italy, July 8-13, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICWS.2019.00014}, doi = {10.1109/ICWS.2019.00014}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icws/WangNSR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/KarmakarVNT19, author = {Kallol Krishna Karmakar and Vijay Varadharajan and Surya Nepal and Udaya Kiran Tupakula}, editor = {Joe Betser and Carol J. Fung and Alex Clemm and J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and Shingo Ata}, title = {{SDN} Enabled Secure IoT Architecture}, booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2019, Washington, DC, USA, April 09-11, 2019}, pages = {581--585}, publisher = {{IFIP}}, year = {2019}, url = {https://ieeexplore.ieee.org/document/8717819}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/KarmakarVNT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispw/IslamBN19, author = {Chadni Islam and Muhammad Ali Babar and Surya Nepal}, editor = {Stanley M. Sutton Jr. and Ove Armbrust and Regina Hebig}, title = {An ontology-driven approach to automating the process of integrating security software systems}, booktitle = {Proceedings of the International Conference on Software and System Processes, {ICSSP} 2019, Montreal, QC, Canada, May 25-26, 2019}, pages = {54--63}, publisher = {{IEEE} / {ACM}}, year = {2019}, url = {https://doi.org/10.1109/ICSSP.2019.00017}, doi = {10.1109/ICSSP.2019.00017}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispw/IslamBN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/QiuNL0T0019, author = {Junyang Qiu and Surya Nepal and Wei Luo and Lei Pan and Yonghang Tai and Jun Zhang and Yang Xiang}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Data-Driven Android Malware Intelligence: {A} Survey}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {183--202}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_14}, doi = {10.1007/978-3-030-30619-9\_14}, timestamp = {Tue, 27 Sep 2022 14:19:43 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/QiuNL0T0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/GaoSYCNR19, author = {Yansong Gao and Yang Su and Wei Yang and Shiping Chen and Surya Nepal and Damith Chinthana Ranasinghe}, title = {Building Secure {SRAM} {PUF} Key Generators on Resource Constrained Devices}, booktitle = {{IEEE} International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2019, Kyoto, Japan, March 11-15, 2019}, pages = {912--917}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PERCOMW.2019.8730781}, doi = {10.1109/PERCOMW.2019.8730781}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/percom/GaoSYCNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YuKSN19, author = {Bin Yu and Shabnam Kasra Kermanshahi and Amin Sakzad and Surya Nepal}, editor = {Ron Steinfeld and Tsz Hon Yuen}, title = {Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks}, booktitle = {Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11821}, pages = {303--318}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31919-9\_18}, doi = {10.1007/978-3-030-31919-9\_18}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/YuKSN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HamadZSN19, author = {Salma Abdalla Hamad and Wei Emma Zhang and Quan Z. Sheng and Surya Nepal}, title = {IoT Device Identification via Network-Flow Based Fingerprinting and Learning}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {103--111}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00023}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00023}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HamadZSN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LauerSRN19, author = {Hagen Lauer and Amin Sakzad and Carsten Rudolph and Surya Nepal}, title = {A Logic for Secure Stratified Systems and its Application to Containerized Systems}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {562--569}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00081}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00081}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LauerSRN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ZhangZYPN19, author = {Zizhu Zhang and Weiliang Zhao and Jian Yang and C{\'{e}}cile Paris and Surya Nepal}, editor = {Sihem Amer{-}Yahia and Mohammad Mahdian and Ashish Goel and Geert{-}Jan Houben and Kristina Lerman and Julian J. McAuley and Ricardo Baeza{-}Yates and Leila Zia}, title = {Learning Influence Probabilities and Modelling Influence Diffusion in Twitter}, booktitle = {Companion of The 2019 World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {1087--1094}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3308560.3316701}, doi = {10.1145/3308560.3316701}, timestamp = {Fri, 25 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/ZhangZYPN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icbc/2019, editor = {James Joshi and Surya Nepal and Qi Zhang and Liang{-}Jie Zhang}, title = {Blockchain - {ICBC} 2019 - Second International Conference, Held as Part of the Services Conference Federation, {SCF} 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11521}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23404-1}, doi = {10.1007/978-3-030-23404-1}, isbn = {978-3-030-23403-4}, timestamp = {Wed, 19 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbc/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-02067, author = {Derui Wang and Chaoran Li and Sheng Wen and Surya Nepal and Yang Xiang}, title = {Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples}, journal = {CoRR}, volume = {abs/1902.02067}, year = {2019}, url = {http://arxiv.org/abs/1902.02067}, eprinttype = {arXiv}, eprint = {1902.02067}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-02067.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-03031, author = {Yansong Gao and Yang Su and Wei Yang and Shiping Chen and Surya Nepal and Damith Chinthana Ranasinghe}, title = {Building Secure {SRAM} {PUF} Key Generators on Resource Constrained Devices}, journal = {CoRR}, volume = {abs/1902.03031}, year = {2019}, url = {http://arxiv.org/abs/1902.03031}, eprinttype = {arXiv}, eprint = {1902.03031}, timestamp = {Mon, 18 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-03031.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-06531, author = {Yansong Gao and Chang Xu and Derui Wang and Shiping Chen and Damith Chinthana Ranasinghe and Surya Nepal}, title = {{STRIP:} {A} Defence Against Trojan Attacks on Deep Neural Networks}, journal = {CoRR}, volume = {abs/1902.06531}, year = {2019}, url = {http://arxiv.org/abs/1902.06531}, eprinttype = {arXiv}, eprint = {1902.06531}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-06531.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-01392, author = {Chang Xu and C{\'{e}}cile Paris and Surya Nepal and Ross Sparks}, title = {Recognising Agreement and Disagreement between Stances with Reason Comparing Networks}, journal = {CoRR}, volume = {abs/1906.01392}, year = {2019}, url = {http://arxiv.org/abs/1906.01392}, eprinttype = {arXiv}, eprint = {1906.01392}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-01392.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-10218, author = {Yang Liu and Zhuo Ma and Ximeng Liu and Siqi Ma and Surya Nepal and Robert H. Deng}, title = {Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing}, journal = {CoRR}, volume = {abs/1907.10218}, year = {2019}, url = {http://arxiv.org/abs/1907.10218}, eprinttype = {arXiv}, eprint = {1907.10218}, timestamp = {Fri, 02 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-10218.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-06838, author = {Derui Wang and Chaoran Li and Sheng Wen and Surya Nepal and Yang Xiang}, title = {Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models}, journal = {CoRR}, volume = {abs/1910.06838}, year = {2019}, url = {http://arxiv.org/abs/1910.06838}, eprinttype = {arXiv}, eprint = {1910.06838}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-06838.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-10312, author = {Yansong Gao and Yeonjae Kim and Bao Gia Doan and Zhi Zhang and Gongxuan Zhang and Surya Nepal and Damith Chinthana Ranasinghe and Hyoungshick Kim}, title = {Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks}, journal = {CoRR}, volume = {abs/1911.10312}, year = {2019}, url = {http://arxiv.org/abs/1911.10312}, eprinttype = {arXiv}, eprint = {1911.10312}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-10312.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-03076, author = {Zhi Zhang and Yueqiang Cheng and Dongxi Liu and Surya Nepal and Zhi Wang}, title = {TeleHammer : {A} Stealthy Cross-Boundary Rowhammer Technique}, journal = {CoRR}, volume = {abs/1912.03076}, year = {2019}, url = {http://arxiv.org/abs/1912.03076}, eprinttype = {arXiv}, eprint = {1912.03076}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-03076.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangYNKH18, author = {Xuechao Yang and Xun Yi and Surya Nepal and Andrei Kelarev and Fengling Han}, title = {A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption}, journal = {{IEEE} Access}, volume = {6}, pages = {20506--20519}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2817518}, doi = {10.1109/ACCESS.2018.2817518}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YangYNKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CuiYN18, author = {Hui Cui and Xun Yi and Surya Nepal}, title = {Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks}, journal = {{IEEE} Access}, volume = {6}, pages = {30049--30059}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2844373}, doi = {10.1109/ACCESS.2018.2844373}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/CuiYN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BadshaYKLNL18, author = {Shahriar Badsha and Xun Yi and Ibrahim Khalil and Dongxi Liu and Surya Nepal and Kwok{-}Yan Lam}, title = {Privacy Preserving User Based Web Service Recommendations}, journal = {{IEEE} Access}, volume = {6}, pages = {56647--56657}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2871447}, doi = {10.1109/ACCESS.2018.2871447}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/BadshaYKLNL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cloudcomp/RanjanRNYJWBWJG18, author = {Rajiv Ranjan and Omer F. Rana and Surya Nepal and Mazin Yousif and Philip James and Zhenya Wen and Stuart L. Barr and Paul Watson and Prem Prakash Jayaraman and Dimitrios Georgakopoulos and Massimo Villari and Maria Fazio and Saurabh Kumar Garg and Rajkumar Buyya and Lizhe Wang and Albert Y. Zomaya and Schahram Dustdar}, title = {The Next Grand Challenges: Integrating the Internet of Things and Data Science}, journal = {{IEEE} Cloud Comput.}, volume = {5}, number = {3}, pages = {12--26}, year = {2018}, url = {https://doi.org/10.1109/MCC.2018.032591612}, doi = {10.1109/MCC.2018.032591612}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cloudcomp/RanjanRNYJWBWJG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cloudcomp/YuWNZLR18, author = {Bin Yu and Jarod Wright and Surya Nepal and Liming Zhu and Joseph K. Liu and Rajiv Ranjan}, title = {IoTChain: Establishing Trust in the Internet of Things Ecosystem Using Blockchain}, journal = {{IEEE} Cloud Comput.}, volume = {5}, number = {4}, pages = {12--23}, year = {2018}, url = {https://doi.org/10.1109/MCC.2018.043221010}, doi = {10.1109/MCC.2018.043221010}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cloudcomp/YuWNZLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CuiDLYN18, author = {Hui Cui and Robert H. Deng and Junzuo Lai and Xun Yi and Surya Nepal}, title = {An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited}, journal = {Comput. Networks}, volume = {133}, pages = {157--165}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.034}, doi = {10.1016/J.COMNET.2018.01.034}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/CuiDLYN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WangSN18, author = {Shuo Wang and Richard O. Sinnott and Surya Nepal}, title = {Privacy-protected statistics publication over social media user trajectory streams}, journal = {Future Gener. Comput. Syst.}, volume = {87}, pages = {792--802}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.08.002}, doi = {10.1016/J.FUTURE.2017.08.002}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/WangSN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcis/ParisND18, author = {C{\'{e}}cile Paris and Surya Nepal and Amanda Dennett}, title = {A Government-Run Online Community to Support Recipients of Welfare Payments}, journal = {Int. J. Cooperative Inf. Syst.}, volume = {27}, number = {2}, pages = {1850001:1--1850001:37}, year = {2018}, url = {https://doi.org/10.1142/S0218843018500016}, doi = {10.1142/S0218843018500016}, timestamp = {Wed, 18 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcis/ParisND18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/BahlCCCHIINRRSS18, author = {Victor Bahl and Barbara Carminati and James Caverlee and Ing{-}Ray Chen and Wynne Hsu and Toru Ishida and Val{\'{e}}rie Issarny and Surya Nepal and Indrakshi Ray and Kui Ren and Shamik Sural and Mei{-}Ling Shyu}, title = {Editorial}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {11}, number = {1}, pages = {1--4}, year = {2018}, url = {https://doi.org/10.1109/TSC.2018.2793681}, doi = {10.1109/TSC.2018.2793681}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/BahlCCCHIINRRSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/SamantCVKN18, author = {Sunil Singh Samant and Mohan Baruwal Chhetri and Quoc Bao Vo and Ryszard Kowalczyk and Surya Nepal}, title = {Towards End-to-End QoS and Cost-Aware Resource Scaling in Cloud-Based IoT Data Processing Pipelines}, booktitle = {2018 {IEEE} International Conference on Services Computing, {SCC} 2018, San Francisco, CA, USA, July 2-7, 2018}, pages = {287--290}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SCC.2018.00050}, doi = {10.1109/SCC.2018.00050}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/SamantCVKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/XuPNS18, author = {Chang Xu and C{\'{e}}cile Paris and Surya Nepal and Ross Sparks}, editor = {Iryna Gurevych and Yusuke Miyao}, title = {Cross-Target Stance Classification with Self-Attention Networks}, booktitle = {Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, {ACL} 2018, Melbourne, Australia, July 15-20, 2018, Volume 2: Short Papers}, pages = {778--783}, publisher = {Association for Computational Linguistics}, year = {2018}, url = {https://aclanthology.org/P18-2123/}, doi = {10.18653/V1/P18-2123}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/XuPNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adma/QiuLN00018, author = {Junyang Qiu and Wei Luo and Surya Nepal and Jun Zhang and Yang Xiang and Lei Pan}, editor = {Guojun Gan and Bohan Li and Xue Li and Shuliang Wang}, title = {Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware}, booktitle = {Advanced Data Mining and Applications - 14th International Conference, {ADMA} 2018, Nanjing, China, November 16-18, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11323}, pages = {238--254}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05090-0\_21}, doi = {10.1007/978-3-030-05090-0\_21}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/adma/QiuLN00018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aswec/ChhetriLUVKNR18, author = {Mohan Baruwal Chhetri and Hien P. Luong and Anton V. Uzunov and Quoc Bao Vo and Ryszard Kowalczyk and Surya Nepal and Isuru Rajapakse}, title = {{ADSL:} An Embedded Domain-Specific Language for Constraint-Based Distributed Self-Management}, booktitle = {25th Australasian Software Engineering Conference, {ASWEC} 2018, Adelaide, Australia, November 26-30, 2018}, pages = {101--110}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ASWEC.2018.00022}, doi = {10.1109/ASWEC.2018.00022}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aswec/ChhetriLUVKNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/ChhetriVKN18, author = {Mohan Baruwal Chhetri and Quoc Bao Vo and Ryszard Kowalczyk and Surya Nepal}, editor = {Esam El{-}Araby and Dhabaleswar K. Panda and Sandra Gesing and Amy W. Apon and Volodymyr V. Kindratenko and Massimo Cafaro and Alfredo Cuzzocrea}, title = {Towards Resource and Contract Heterogeneity Aware Rescaling for Cloud-Hosted Applications}, booktitle = {18th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid Computing, {CCGRID} 2018, Washington, DC, USA, May 1-4, 2018}, pages = {153--162}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CCGRID.2018.00030}, doi = {10.1109/CCGRID.2018.00030}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/ChhetriVKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SunYLSSVN18, author = {Shifeng Sun and Xingliang Yuan and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Viet Vo and Surya Nepal}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {763--780}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243782}, doi = {10.1145/3243734.3243782}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SunYLSSVN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/AhmedNK18, author = {Muhammad Ejaz Ahmed and Surya Nepal and Hyoungshick Kim}, title = {{MEDUSA:} Malware Detection Using Statistical Analysis of System's Behavior}, booktitle = {4th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2018, Philadelphia, PA, USA, October 18-20, 2018}, pages = {272--278}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CIC.2018.00044}, doi = {10.1109/CIC.2018.00044}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/AhmedNK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/ChhetriUVKDLRN18, author = {Mohan Baruwal Chhetri and Anton V. Uzunov and Quoc Bao Vo and Ryszard Kowalczyk and Michael Docking and Hien P. Luong and Isuru Rajapakse and Surya Nepal}, title = {AWaRE - Towards Distributed Self-Management for Resilient Cyber Systems}, booktitle = {23rd International Conference on Engineering of Complex Computer Systems, {ICECCS} 2018, Melbourne, Australia, December 12-14, 2018}, pages = {185--188}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICECCS2018.2018.00028}, doi = {10.1109/ICECCS2018.2018.00028}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/ChhetriUVKDLRN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws2/WangSN18, author = {Shuo Wang and Richard O. Sinnott and Surya Nepal}, editor = {Hai Jin and Qingyang Wang and Liang{-}Jie Zhang}, title = {A Privacy-Preserving Semantic Annotation Framework Using Online Social Media}, booktitle = {Web Services - {ICWS} 2018 - 25th International Conference, Held as Part of the Services Conference Federation, {SCF} 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10966}, pages = {353--372}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-94289-6\_23}, doi = {10.1007/978-3-319-94289-6\_23}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icws2/WangSN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YuLSNSRA18, author = {Bin Yu and Joseph K. Liu and Amin Sakzad and Surya Nepal and Ron Steinfeld and Paul Rimba and Man Ho Au}, editor = {Liqun Chen and Mark Manulis and Steve A. Schneider}, title = {Platform-Independent Secure Blockchain-Based Voting System}, booktitle = {Information Security - 21st International Conference, {ISC} 2018, Guildford, UK, September 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11060}, pages = {369--386}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99136-8\_20}, doi = {10.1007/978-3-319-99136-8\_20}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/YuLSNSRA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangCNLSR18, author = {Zhi Zhang and Yueqiang Cheng and Surya Nepal and Dongxi Liu and Qingni Shen and Fethi A. Rabhi}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {{KASR:} {A} Reliable and Practical Approach to Attack Surface Reduction of Commodity {OS} Kernels}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {691--710}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_32}, doi = {10.1007/978-3-030-00470-5\_32}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZhangCNLSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangSN18, author = {Shuo Wang and Richard O. Sinnott and Surya Nepal}, title = {{PAIRS:} Privacy-Aware Identification and Recommendation of Spatio-Friends}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {920--931}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00131}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00131}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangSN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangSN18a, author = {Shuo Wang and Richard O. Sinnott and Surya Nepal}, title = {{P-GENT:} Privacy-Preserving Geocoding of Non-Geotagged Tweets}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {972--983}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00137}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00137}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangSN18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/YangYNH18, author = {Xuechao Yang and Xun Yi and Surya Nepal and Fengling Han}, editor = {Hakim Hacid and Wojciech Cellary and Hua Wang and Hye{-}Young Paik and Rui Zhou}, title = {Decentralized Voting: {A} Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain}, booktitle = {Web Information Systems Engineering - {WISE} 2018 - 19th International Conference, Dubai, United Arab Emirates, November 12-15, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11233}, pages = {18--35}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-02922-7\_2}, doi = {10.1007/978-3-030-02922-7\_2}, timestamp = {Sun, 25 Oct 2020 22:33:15 +0100}, biburl = {https://dblp.org/rec/conf/wise/YangYNH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/YangYZKHN18, author = {Xu Yang and Xun Yi and Yali Zeng and Ibrahim Khalil and Xinyi Huang and Surya Nepal}, editor = {Hakim Hacid and Wojciech Cellary and Hua Wang and Hye{-}Young Paik and Rui Zhou}, title = {An Improved Lightweight {RFID} Authentication Protocol for Internet of Things}, booktitle = {Web Information Systems Engineering - {WISE} 2018 - 19th International Conference, Dubai, United Arab Emirates, November 12-15, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11233}, pages = {111--126}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-02922-7\_8}, doi = {10.1007/978-3-030-02922-7\_8}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wise/YangYZKHN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bpm/2018d, editor = {Wil M. P. van der Aalst and Fabio Casati and Raffaele Conforti and Massimiliano de Leoni and Marlon Dumas and Akhil Kumar and Jan Mendling and Surya Nepal and Brian T. Pentland and Barbara Weber}, title = {Proceedings of the Dissertation Award, Demonstration, and Industrial Track at {BPM} 2018 co-located with 16th International Conference on Business Process Management {(BPM} 2018), Sydney, Australia, September 9-14, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2196}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2196}, urn = {urn:nbn:de:0074-2196-3}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bpm/2018d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-07060, author = {Yueqiang Cheng and Zhi Zhang and Surya Nepal}, title = {Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation}, journal = {CoRR}, volume = {abs/1802.07060}, year = {2018}, url = {http://arxiv.org/abs/1802.07060}, eprinttype = {arXiv}, eprint = {1802.07060}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-07060.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-07062, author = {Zhi Zhang and Yueqiang Cheng and Surya Nepal and Dongxi Liu and Qingni Shen and Fethi A. Rabhi}, title = {A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity {OS}}, journal = {CoRR}, volume = {abs/1802.07062}, year = {2018}, url = {http://arxiv.org/abs/1802.07062}, eprinttype = {arXiv}, eprint = {1802.07062}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-07062.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-05123, author = {Derek Wang and Chaoran Li and Sheng Wen and Yang Xiang and Wanlei Zhou and Surya Nepal}, title = {Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks}, journal = {CoRR}, volume = {abs/1803.05123}, year = {2018}, url = {http://arxiv.org/abs/1803.05123}, eprinttype = {arXiv}, eprint = {1803.05123}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-05123.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-06187, author = {Rongjunchen Zhang and Xiao Chen and Jianchao Lu and Sheng Wen and Surya Nepal and Yang Xiang}, title = {Using {AI} to Hack {IA:} {A} New Stealthy Spyware Against Voice Assistance Functions in Smart Phones}, journal = {CoRR}, volume = {abs/1805.06187}, year = {2018}, url = {http://arxiv.org/abs/1805.06187}, eprinttype = {arXiv}, eprint = {1805.06187}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-06187.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-06593, author = {Chang Xu and C{\'{e}}cile Paris and Surya Nepal and Ross Sparks}, title = {Cross-Target Stance Classification with Self-Attention Networks}, journal = {CoRR}, volume = {abs/1805.06593}, year = {2018}, url = {http://arxiv.org/abs/1805.06593}, eprinttype = {arXiv}, eprint = {1805.06593}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-06593.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-07070, author = {Tingmin Wu and Lihong Tang and Zhiyu Xu and Sheng Wen and C{\'{e}}cile Paris and Surya Nepal and Marthie Grobler and Yang Xiang}, title = {Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps}, journal = {CoRR}, volume = {abs/1805.07070}, year = {2018}, url = {http://arxiv.org/abs/1805.07070}, eprinttype = {arXiv}, eprint = {1805.07070}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-07070.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-07530, author = {Raj Gaire and Chigulapalli Sriharsha and Deepak Puthal and Hendra Wijaya and Jongkil Kim and Prateeksha Keshari and Rajiv Ranjan and Rajkumar Buyya and Ratan K. Ghosh and R. K. Shyamasundar and Surya Nepal}, title = {Internet of Things (IoT) and Cloud Computing Enabled Disaster Management}, journal = {CoRR}, volume = {abs/1806.07530}, year = {2018}, url = {http://arxiv.org/abs/1806.07530}, eprinttype = {arXiv}, eprint = {1806.07530}, timestamp = {Tue, 03 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-07530.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-07534, author = {Raj Gaire and Ratan K. Ghosh and Jongkil Kim and Alexander Krumpholz and Rajiv Ranjan and R. K. Shyamasundar and Surya Nepal}, title = {Crowdsensing and privacy in smart city applications}, journal = {CoRR}, volume = {abs/1806.07534}, year = {2018}, url = {http://arxiv.org/abs/1806.07534}, eprinttype = {arXiv}, eprint = {1806.07534}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-07534.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-11046, author = {Yansong Gao and Marten van Dijk and Lei Xu and Surya Nepal and Damith Chinthana Ranasinghe}, title = {{TREVERSE:} Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs}, journal = {CoRR}, volume = {abs/1807.11046}, year = {2018}, url = {http://arxiv.org/abs/1807.11046}, eprinttype = {arXiv}, eprint = {1807.11046}, timestamp = {Sat, 22 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-11046.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-04218, author = {Xiao Chen and Chaoran Li and Derui Wang and Sheng Wen and Jun Zhang and Surya Nepal and Yang Xiang and Kui Ren}, title = {Android {HIV:} {A} Study of Repackaging Malware for Evading Machine-Learning Detection}, journal = {CoRR}, volume = {abs/1808.04218}, year = {2018}, url = {http://arxiv.org/abs/1808.04218}, eprinttype = {arXiv}, eprint = {1808.04218}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-04218.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-09566, author = {Jongkil Kim and Jonathon M. Smereka and Calvin Cheung and Surya Nepal and Marthie Grobler}, title = {Security and Performance Considerations in {ROS} 2: {A} Balancing Act}, journal = {CoRR}, volume = {abs/1809.09566}, year = {2018}, url = {http://arxiv.org/abs/1809.09566}, eprinttype = {arXiv}, eprint = {1809.09566}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-09566.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuLSNRSA18, author = {Bin Yu and Joseph K. Liu and Amin Sakzad and Surya Nepal and Paul Rimba and Ron Steinfeld and Man Ho Au}, title = {Platform-independent Secure Blockchain-Based Voting System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {657}, year = {2018}, url = {https://eprint.iacr.org/2018/657}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YuLSNRSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LinSNZXH17, author = {Guanjun Lin and Nan Sun and Surya Nepal and Jun Zhang and Yang Xiang and Houcine Hassan}, title = {Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability}, journal = {{IEEE} Access}, volume = {5}, pages = {11142--11154}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2710540}, doi = {10.1109/ACCESS.2017.2710540}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LinSNZXH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BouguettayaSHSD17, author = {Athman Bouguettaya and Munindar P. Singh and Michael N. Huhns and Quan Z. Sheng and Hai Dong and Qi Yu and Azadeh Ghari Neiat and Sajib Mistry and Boualem Benatallah and Brahim Medjahed and Mourad Ouzzani and Fabio Casati and Xumin Liu and Hongbing Wang and Dimitrios Georgakopoulos and Liang Chen and Surya Nepal and Zaki Malik and Abdelkarim Erradi and Yan Wang and M. Brian Blake and Schahram Dustdar and Frank Leymann and Michael P. Papazoglou}, title = {A service computing manifesto: the next 10 years}, journal = {Commun. {ACM}}, volume = {60}, number = {4}, pages = {64--72}, year = {2017}, url = {https://doi.org/10.1145/2983528}, doi = {10.1145/2983528}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BouguettayaSHSD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/NguGMNS17, author = {Anne Hee Hiong Ngu and Mario A. Gutierrez and Vangelis Metsis and Surya Nepal and Quan Z. Sheng}, title = {IoT Middleware: {A} Survey on Issues and Enabling Technologies}, journal = {{IEEE} Internet Things J.}, volume = {4}, number = {1}, pages = {1--20}, year = {2017}, url = {https://doi.org/10.1109/JIOT.2016.2615180}, doi = {10.1109/JIOT.2016.2615180}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/NguGMNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/PuthalNRC17, author = {Deepak Puthal and Surya Nepal and Rajiv Ranjan and Jinjun Chen}, title = {A dynamic prime number based efficient security mechanism for big sensing data streams}, journal = {J. Comput. Syst. Sci.}, volume = {83}, number = {1}, pages = {22--42}, year = {2017}, url = {https://doi.org/10.1016/j.jcss.2016.02.005}, doi = {10.1016/J.JCSS.2016.02.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/PuthalNRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZhangRMNSJW17, author = {Miranda Zhang and Rajiv Ranjan and Michael Menzel and Surya Nepal and Peter Strazdins and Wei Jie and Lizhe Wang}, title = {An Infrastructure Service Recommendation System for Cloud Applications with Real-time QoS Requirement Constraints}, journal = {{IEEE} Syst. J.}, volume = {11}, number = {4}, pages = {2960--2970}, year = {2017}, url = {https://doi.org/10.1109/JSYST.2015.2427338}, doi = {10.1109/JSYST.2015.2427338}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/ZhangRMNSJW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/NepalSFWCKYL17, author = {Surya Nepal and Richard O. Sinnott and Carsten Friedrich and Catherine Wise and Shiping Chen and Sehrish Kanwal and Jinhui Yao and Andrew Lonie}, title = {TruXy: Trusted Storage Cloud for Scientific Workflows}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {5}, number = {3}, pages = {428--442}, year = {2017}, url = {https://doi.org/10.1109/TCC.2015.2489638}, doi = {10.1109/TCC.2015.2489638}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/NepalSFWCKYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/PuthalNRC17, author = {Deepak Puthal and Surya Nepal and Rajiv Ranjan and Jinjun Chen}, title = {DLSeF: {A} Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {16}, number = {2}, pages = {51:1--51:24}, year = {2017}, url = {https://doi.org/10.1145/2937755}, doi = {10.1145/2937755}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/PuthalNRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/SharifWTNZ17, author = {Shaghayegh Sharif and Paul Watson and Javid Taheri and Surya Nepal and Albert Y. Zomaya}, title = {Privacy-Aware Scheduling SaaS in High Performance Computing Environments}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {28}, number = {4}, pages = {1176--1188}, year = {2017}, url = {https://doi.org/10.1109/TPDS.2016.2603153}, doi = {10.1109/TPDS.2016.2603153}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/SharifWTNZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/LiLN17, author = {Nan Li and Dongxi Liu and Surya Nepal}, title = {Lightweight Mutual Authentication for IoT and Its Applications}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {2}, number = {4}, pages = {359--370}, year = {2017}, url = {https://doi.org/10.1109/TSUSC.2017.2716953}, doi = {10.1109/TSUSC.2017.2716953}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsusc/LiLN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/NugrohoZYPN17, author = {Robertus Nugroho and Weiliang Zhao and Jian Yang and C{\'{e}}cile Paris and Surya Nepal}, title = {Using time-sensitive interactions to improve topic derivation in twitter}, journal = {World Wide Web}, volume = {20}, number = {1}, pages = {61--87}, year = {2017}, url = {https://doi.org/10.1007/s11280-016-0417-x}, doi = {10.1007/S11280-016-0417-X}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/NugrohoZYPN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/WangSN17, author = {Shuo Wang and Richard O. Sinnott and Surya Nepal}, editor = {Jian{-}Yun Nie and Zoran Obradovic and Toyotaro Suzumura and Rumi Ghosh and Raghunath Nambiar and Chonggang Wang and Hui Zang and Ricardo Baeza{-}Yates and Xiaohua Hu and Jeremy Kepner and Alfredo Cuzzocrea and Jian Tang and Masashi Toyoda}, title = {Privacy-protected place of activity mining on big location data}, booktitle = {2017 {IEEE} International Conference on Big Data {(IEEE} BigData 2017), Boston, MA, USA, December 11-14, 2017}, pages = {1101--1108}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/BigData.2017.8258035}, doi = {10.1109/BIGDATA.2017.8258035}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/WangSN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/WangSN17a, author = {Shuo Wang and Richard O. Sinnott and Surya Nepal}, editor = {Jian{-}Yun Nie and Zoran Obradovic and Toyotaro Suzumura and Rumi Ghosh and Raghunath Nambiar and Chonggang Wang and Hui Zang and Ricardo Baeza{-}Yates and Xiaohua Hu and Jeremy Kepner and Alfredo Cuzzocrea and Jian Tang and Masashi Toyoda}, title = {Sensitive gazetteer discovery and protection for mobile social media users}, booktitle = {2017 {IEEE} International Conference on Big Data {(IEEE} BigData 2017), Boston, MA, USA, December 11-14, 2017}, pages = {1109--1116}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/BigData.2017.8258036}, doi = {10.1109/BIGDATA.2017.8258036}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/WangSN17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimSGAN17, author = {Jongkil Kim and Willy Susilo and Fuchun Guo and Man Ho Au and Surya Nepal}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {An Efficient {KP-ABE} with Short Ciphertexts in Prime OrderGroups under Standard Assumption}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {823--834}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053003}, doi = {10.1145/3052973.3053003}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KimSGAN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/SamantCVKN17, author = {Sunil Singh Samant and Mohan Baruwal Chhetri and Quoc Bao Vo and Ryszard Kowalczyk and Surya Nepal}, title = {Towards Quality-Assured Data Delivery in Cloud-Based IoT Platforms for Smart Cities}, booktitle = {3rd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017}, pages = {291--298}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CIC.2017.00046}, doi = {10.1109/CIC.2017.00046}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/SamantCVKN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecon/PetriRBNA17, author = {Ioan Petri and Omer F. Rana and Joseph Bignell and Surya Nepal and Nitin Auluck}, editor = {Congduc Pham and J{\"{o}}rn Altmann and Jos{\'{e}} {\'{A}}ngel Ba{\~{n}}ares}, title = {Incentivising Resource Sharing in Edge Computing Applications}, booktitle = {Economics of Grids, Clouds, Systems, and Services - 14th International Conference, {GECON} 2017, Biarritz, France, September 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10537}, pages = {204--215}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68066-8\_16}, doi = {10.1007/978-3-319-68066-8\_16}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gecon/PetriRBNA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/PuthalNRC17, author = {Deepak Puthal and Surya Nepal and Rajiv Ranjan and Jinjun Chen}, editor = {Tung Bui}, title = {A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams}, booktitle = {50th Hawaii International Conference on System Sciences, {HICSS} 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017}, pages = {1--10}, publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)}, year = {2017}, url = {https://hdl.handle.net/10125/41889}, timestamp = {Tue, 03 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/PuthalNRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/YavariJGN17, author = {Ali Yavari and Prem Prakash Jayaraman and Dimitrios Georgakopoulos and Surya Nepal}, editor = {Tung Bui}, title = {ConTaaS: An Approach to Internet-Scale Contextualisation for Developing Efficient Internet of Things Applications}, booktitle = {50th Hawaii International Conference on System Sciences, {HICSS} 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017}, pages = {1--9}, publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)}, year = {2017}, url = {https://hdl.handle.net/10125/41879}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/YavariJGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/LiGMSN17, author = {Nan Li and Fuchun Guo and Yi Mu and Willy Susilo and Surya Nepal}, editor = {Kisung Lee and Ling Liu}, title = {Fuzzy Extractors for Biometric Identification}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {667--677}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.107}, doi = {10.1109/ICDCS.2017.107}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/LiGMSN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/NugrohoZYPN17, author = {Robertus Nugroho and Weiliang Zhao and Jian Yang and C{\'{e}}cile Paris and Surya Nepal}, editor = {Kisung Lee and Ling Liu}, title = {The Joint Effects of Tweet Content Similarity and Tweet Interactions for Topic Derivation}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {2338--2343}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.60}, doi = {10.1109/ICDCS.2017.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/NugrohoZYPN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/WangWXZZN17, author = {Derek Wang and Sheng Wen and Yang Xiang and Wanlei Zhou and Jun Zhang and Surya Nepal}, editor = {Kisung Lee and Ling Liu}, title = {Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {2417--2422}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.47}, doi = {10.1109/ICDCS.2017.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/WangWXZZN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/FuCYNZ17, author = {Min Fu and Shiping Chen and Jian Yang and Surya Nepal and Liming Zhu}, editor = {E. Michael Maximilien and Antonio Vallecillo and Jianmin Wang and Marc Oriol}, title = {ARA-Assessor: Application-Aware Runtime Risk Assessment for Cloud-Based Business Continuity}, booktitle = {Service-Oriented Computing - 15th International Conference, {ICSOC} 2017, Malaga, Spain, November 13-16, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10601}, pages = {511--527}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69035-3\_38}, doi = {10.1007/978-3-319-69035-3\_38}, timestamp = {Tue, 12 Sep 2023 07:57:22 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/FuCYNZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iissc/PuthalRNC17, author = {Deepak Puthal and Rajiv Ranjan and Surya Nepal and Jinjun Chen}, editor = {Antonella Longo and Marco Zappatore and Massimo Villari and Omer F. Rana and Dario Bruneo and Rajiv Ranjan and Maria Fazio and Philippe Massonet}, title = {IoT and Big Data: An Architecture with Data Flow and Security Issues}, booktitle = {Cloud Infrastructures, Services, and IoT Systems for Smart Cities - Second {EAI} International Conference, {IISSC} 2017 and CN4IoT 2017, Brindisi, Italy, April 20-21, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {189}, pages = {243--252}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67636-4\_25}, doi = {10.1007/978-3-319-67636-4\_25}, timestamp = {Sat, 31 Dec 2022 17:05:37 +0100}, biburl = {https://dblp.org/rec/conf/iissc/PuthalRNC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YangYCYNHZ17, author = {Xu Yang and Xun Yi and Hui Cui and Xuechao Yang and Surya Nepal and Xinyi Huang and YaLi Zeng}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {A Practical Authentication Protocol for Anonymous Web Browsing}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {468--482}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_28}, doi = {10.1007/978-3-319-72359-4\_28}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/YangYCYNHZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RoselinNN17, author = {Annie Gilda Roselin and Priyadarsi Nanda and Surya Nepal}, title = {Lightweight Authentication Protocol {(LAUP)} for 6LoWPAN Wireless Sensor Networks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {371--378}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.260}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.260}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RoselinNN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucc/SinghARJN17, author = {Anil Singh and Nitin Auluck and Omer F. Rana and Andrew Jones and Surya Nepal}, editor = {Ashiq Anjum and Alan Sill and Geoffrey C. Fox and Yong Chen}, title = {\emph{RT-SANE}: Real Time Security Aware Scheduling on the Network Edge}, booktitle = {Proceedings of the 10th International Conference on Utility and Cloud Computing, {UCC} 2017, Austin, TX, USA, December 5-8, 2017}, pages = {131--140}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3147213.3147216}, doi = {10.1145/3147213.3147216}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ucc/SinghARJN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/ZhangZYNPL17, author = {Zizhu Zhang and Weiliang Zhao and Jian Yang and Surya Nepal and C{\'{e}}cile Paris and Bing Li}, editor = {Athman Bouguettaya and Yunjun Gao and Andrey Klimenko and Lu Chen and Xiangliang Zhang and Fedor Dzerzhinskiy and Weijia Jia and Stanislav V. Klimenko and Qing Li}, title = {Exploiting Users' Rating Behaviour to Enhance the Robustness of Social Recommendation}, booktitle = {Web Information Systems Engineering - {WISE} 2017 - 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10570}, pages = {467--475}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68786-5\_37}, doi = {10.1007/978-3-319-68786-5\_37}, timestamp = {Tue, 24 Nov 2020 16:44:23 +0100}, biburl = {https://dblp.org/rec/conf/wise/ZhangZYNPL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/YangYRSHNS17, author = {Xuechao Yang and Xun Yi and Caspar Ryan and Ron G. van Schyndel and Fengling Han and Surya Nepal and Andy Song}, editor = {Athman Bouguettaya and Yunjun Gao and Andrey Klimenko and Lu Chen and Xiangliang Zhang and Fedor Dzerzhinskiy and Weijia Jia and Stanislav V. Klimenko and Qing Li}, title = {A Verifiable Ranked Choice Internet Voting System}, booktitle = {Web Information Systems Engineering - {WISE} 2017 - 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10570}, pages = {490--501}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68786-5\_39}, doi = {10.1007/978-3-319-68786-5\_39}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wise/YangYRSHNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/BadshaYKLNB17, author = {Shahriar Badsha and Xun Yi and Ibrahim Khalil and Dongxi Liu and Surya Nepal and Elisa Bertino}, editor = {Athman Bouguettaya and Yunjun Gao and Andrey Klimenko and Lu Chen and Xiangliang Zhang and Fedor Dzerzhinskiy and Weijia Jia and Stanislav V. Klimenko and Qing Li}, title = {Privacy Preserving Location Recommendations}, booktitle = {Web Information Systems Engineering - {WISE} 2017 - 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10570}, pages = {502--516}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68786-5\_40}, doi = {10.1007/978-3-319-68786-5\_40}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wise/BadshaYKLNB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/KimKMNPRSW17, author = {Sunghwan Mac Kim and Kyo Kageura and James McHugh and Surya Nepal and C{\'{e}}cile Paris and Bella Robinson and Ross Sparks and Stephen Wan}, editor = {Rick Barrett and Rick Cummings and Eugene Agichtein and Evgeniy Gabrilovich}, title = {Twitter Content Eliciting User Engagement: {A} Case Study on Australian Organisations}, booktitle = {Proceedings of the 26th International Conference on World Wide Web Companion, Perth, Australia, April 3-7, 2017}, pages = {807--808}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3041021.3054237}, doi = {10.1145/3041021.3054237}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/KimKMNPRSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuLKN17, author = {Dongxi Liu and Nan Li and Jongkil Kim and Surya Nepal}, title = {Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {685}, year = {2017}, url = {http://eprint.iacr.org/2017/685}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuLKN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/NepalP16, author = {Surya Nepal and Suraj Pandey}, title = {Guest Editorial: Cloud Computing and Scientific Applications {(CCSA)} - Big Data Analysis in the Cloud}, journal = {Comput. J.}, volume = {59}, number = {3}, pages = {285--286}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxv004}, doi = {10.1093/COMJNL/BXV004}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/NepalP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cloudcomp/PuthalNRC16, author = {Deepak Puthal and Surya Nepal and Rajiv Ranjan and Jinjun Chen}, title = {Threats to Networking Cloud and Edge Datacenters in the Internet of Things}, journal = {{IEEE} Cloud Comput.}, volume = {3}, number = {3}, pages = {64--71}, year = {2016}, url = {https://doi.org/10.1109/MCC.2016.63}, doi = {10.1109/MCC.2016.63}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cloudcomp/PuthalNRC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/Jang-JaccardNCY16, author = {Julian Jang{-}Jaccard and Surya Nepal and Branko G. Celler and Bo Yan}, title = {WebRTC-based video conferencing service for telehealth}, journal = {Computing}, volume = {98}, number = {1-2}, pages = {169--193}, year = {2016}, url = {https://doi.org/10.1007/s00607-014-0429-2}, doi = {10.1007/S00607-014-0429-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/Jang-JaccardNCY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dase/KimN16, author = {Jongkil Kim and Surya Nepal}, title = {A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage}, journal = {Data Sci. Eng.}, volume = {1}, number = {3}, pages = {149--160}, year = {2016}, url = {https://doi.org/10.1007/s41019-016-0014-0}, doi = {10.1007/S41019-016-0014-0}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dase/KimN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/WeberNZ16, author = {Ingo Weber and Surya Nepal and Liming Zhu}, title = {Developing Dependable and Secure Cloud Applications}, journal = {{IEEE} Internet Comput.}, volume = {20}, number = {3}, pages = {74--79}, year = {2016}, url = {https://doi.org/10.1109/MIC.2016.67}, doi = {10.1109/MIC.2016.67}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/WeberNZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/ThilakanathanCN16, author = {Danan Thilakanathan and Shiping Chen and Surya Nepal and Rafael A. Calvo}, title = {SafeProtect: Controlled Data Sharing With User-Defined Policies in Cloud-Based Collaborative Environment}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {4}, number = {2}, pages = {301--315}, year = {2016}, url = {https://doi.org/10.1109/TETC.2015.2502429}, doi = {10.1109/TETC.2015.2502429}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/ThilakanathanCN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/BertinoCGN16, author = {Elisa Bertino and Kim{-}Kwang Raymond Choo and Dimitrios Georgakopoulos and Surya Nepal}, title = {Internet of Things (IoT): Smart and Secure Service Delivery}, journal = {{ACM} Trans. Internet Techn.}, volume = {16}, number = {4}, pages = {22:1--22:7}, year = {2016}, url = {https://doi.org/10.1145/3013520}, doi = {10.1145/3013520}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/BertinoCGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/WangSN16, author = {Shuo Wang and Richard O. Sinnott and Surya Nepal}, editor = {James Joshi and George Karypis and Ling Liu and Xiaohua Hu and Ronay Ak and Yinglong Xia and Weijia Xu and Aki{-}Hiro Sato and Sudarsan Rachuri and Lyle H. Ungar and Philip S. Yu and Rama Govindaraju and Toyotaro Suzumura}, title = {Protecting the location privacy of mobile social media users}, booktitle = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016), Washington DC, USA, December 5-8, 2016}, pages = {1143--1150}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/BigData.2016.7840718}, doi = {10.1109/BIGDATA.2016.7840718}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/WangSN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/WangS0AN16, author = {Ruoyu Wang and Daniel Sun and Guoqiang Li and Muhammad Atif and Surya Nepal}, editor = {James Joshi and George Karypis and Ling Liu and Xiaohua Hu and Ronay Ak and Yinglong Xia and Weijia Xu and Aki{-}Hiro Sato and Sudarsan Rachuri and Lyle H. Ungar and Philip S. Yu and Rama Govindaraju and Toyotaro Suzumura}, title = {LogProv: Logging events as provenance of big data analytics pipelines with trustworthiness}, booktitle = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016), Washington DC, USA, December 5-8, 2016}, pages = {1402--1411}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/BigData.2016.7840748}, doi = {10.1109/BIGDATA.2016.7840748}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/WangS0AN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/NepalP16, author = {Surya Nepal and C{\'{e}}cile Paris}, title = {Why Is It Difficult for Welfare Recipients to Return to Work? {A} Case Study through a Collaborative Online Community}, booktitle = {2nd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016}, pages = {19--28}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIC.2016.017}, doi = {10.1109/CIC.2016.017}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/NepalP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/DennettNPR16, author = {Amanda Dennett and Surya Nepal and C{\'{e}}cile Paris and Bella Robinson}, title = {TweetRipple: Understanding Your Twitter Audience and the Impact of Your Tweets}, booktitle = {2nd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016}, pages = {256--265}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIC.2016.043}, doi = {10.1109/CIC.2016.043}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/DennettNPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/ParisN16, author = {C{\'{e}}cile Paris and Surya Nepal}, title = {Can a Government Use Social Media to Support Disadvantaged Citizens?}, booktitle = {2nd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016}, pages = {398--407}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIC.2016.059}, doi = {10.1109/CIC.2016.059}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/ParisN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eScience/WangSN16, author = {Shuo Wang and Richard O. Sinnott and Surya Nepal}, title = {Privacy-protected social media user trajectories calibration}, booktitle = {12th {IEEE} International Conference on e-Science, e-Science 2016, Baltimore, MD, USA, October 23-27, 2016}, pages = {293--302}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/eScience.2016.7870912}, doi = {10.1109/ESCIENCE.2016.7870912}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eScience/WangSN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/PuthalNRC16, author = {Deepak Puthal and Surya Nepal and Rajiv Ranjan and Jinjun Chen}, editor = {Jinjun Chen and Laurence T. Yang}, title = {A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud}, booktitle = {18th {IEEE} International Conference on High Performance Computing and Communications; 14th {IEEE} International Conference on Smart City; 2nd {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016}, pages = {1218--1225}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0170}, doi = {10.1109/HPCC-SMARTCITY-DSS.2016.0170}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/PuthalNRC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/ChenCLYWN16, author = {Shiping Chen and Tsz Lam Chim and Zhijie Li and Bo Yan and Hendra Wijaya and Surya Nepal}, editor = {Slimane Hammoudi and Leszek A. Maciaszek and Michele Missikoff and Olivier Camp and Jos{\'{e}} Cordeiro}, title = {{PBCP:} {A} Process-based Bussiness Collaboration Platform}, booktitle = {{ICEIS} 2016 - Proceedings of the 18th International Conference on Enterprise Information Systems, Volume 2, Rome, Italy, April 25-28, 2016}, pages = {575--582}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005834305750582}, doi = {10.5220/0005834305750582}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iceis/ChenCLYWN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/PradhanGN16, author = {Sojen Pradhan and Val{\'{e}}rie Gay and Surya Nepal}, editor = {P{\"{a}}r J. {\AA}gerfalk and Natalia Levina and Sia Siew Kien}, title = {Impact of Subjective Aspects in the Matching of Dentists and Patients in Dental Care Recommendation Systems}, booktitle = {Proceedings of the International Conference on Information Systems - Digital Innovation at the Crossroads, {ICIS} 2016, Dublin, Ireland, December 11-14, 2016}, publisher = {Association for Information Systems}, year = {2016}, url = {http://aisel.aisnet.org/icis2016/ISHealthcare/Presentations/12}, timestamp = {Tue, 23 May 2017 13:25:25 +0200}, biburl = {https://dblp.org/rec/conf/icis/PradhanGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/PradhanGN16, author = {Sojen Pradhan and Val{\'{e}}rie Gay and Surya Nepal}, editor = {Ting{-}Peng Liang and Shin{-}Yuan Hung and Patrick Y. K. Chau and She{-}I Chang}, title = {An Innovative Approach to Derive Trust from Social Networks and to Improve the Matching in Dental Care Recommendation Systems}, booktitle = {20th Pacific Asia Conference on Information Systems, {PACIS} 2016, Chiayi, Taiwan, June 27 - July 1, 2016}, pages = {328}, year = {2016}, url = {http://aisel.aisnet.org/pacis2016/328}, timestamp = {Tue, 08 Nov 2016 09:28:09 +0100}, biburl = {https://dblp.org/rec/conf/pacis/PradhanGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ci/NepalBP15, author = {Surya Nepal and Sanat Kumar Bista and C{\'{e}}cile Paris}, title = {Behavior-Based Propagation of Trust in Social Networks with Restricted and Anonymous Participation}, journal = {Comput. Intell.}, volume = {31}, number = {4}, pages = {642--668}, year = {2015}, url = {https://doi.org/10.1111/coin.12041}, doi = {10.1111/COIN.12041}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ci/NepalBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cloudcomp/NepalRC15, author = {Surya Nepal and Rajiv Ranjan and Kim{-}Kwang Raymond Choo}, title = {Trustworthy Processing of Healthcare Big Data in Hybrid Clouds}, journal = {{IEEE} Cloud Comput.}, volume = {2}, number = {2}, pages = {78--84}, year = {2015}, url = {https://doi.org/10.1109/MCC.2015.36}, doi = {10.1109/MCC.2015.36}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cloudcomp/NepalRC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cloudcomp/BertinoNR15, author = {Elisa Bertino and Surya Nepal and Rajiv Ranjan}, title = {Building Sensor-Based Big Data Cyberinfrastructures}, journal = {{IEEE} Cloud Comput.}, volume = {2}, number = {5}, pages = {64--69}, year = {2015}, url = {https://doi.org/10.1109/MCC.2015.106}, doi = {10.1109/MCC.2015.106}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cloudcomp/BertinoNR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/ChenN15, author = {Jinjun Chen and Surya Nepal}, title = {Guest editorial: Special issue on data intensive cloud computing}, journal = {Computing}, volume = {97}, number = {4}, pages = {333--335}, year = {2015}, url = {https://doi.org/10.1007/s00607-015-0449-6}, doi = {10.1007/S00607-015-0449-6}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/ChenN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/RanjanBNG15, author = {Rajiv Ranjan and Rajkumar Buyya and Surya Nepal and Dimitrios Georgakopoulos}, title = {A note on resource orchestration for cloud computing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {27}, number = {9}, pages = {2370--2372}, year = {2015}, url = {https://doi.org/10.1002/cpe.3421}, doi = {10.1002/CPE.3421}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/RanjanBNG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcim/FanHTZYNC15, author = {Yushun Fan and Keman Huang and Wei Tan and Yang Zhong and Jinhui Yao and Surya Nepal and Shiping Chen}, title = {Domain-aware reputable service recommendation in heterogeneous manufacturing service ecosystem}, journal = {Int. J. Comput. Integr. Manuf.}, volume = {28}, number = {11}, pages = {1178--1195}, year = {2015}, url = {https://doi.org/10.1080/0951192X.2014.961964}, doi = {10.1080/0951192X.2014.961964}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcim/FanHTZYNC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/ZhangDPNYLC15, author = {Xuyun Zhang and Wan{-}Chun Dou and Jian Pei and Surya Nepal and Chi Yang and Chang Liu and Jinjun Chen}, title = {Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud}, journal = {{IEEE} Trans. Computers}, volume = {64}, number = {8}, pages = {2293--2307}, year = {2015}, url = {https://doi.org/10.1109/TC.2014.2360516}, doi = {10.1109/TC.2014.2360516}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/ZhangDPNYLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/NepalPPFB15, author = {Surya Nepal and C{\'{e}}cile Paris and Payam Aghaei Pour and Jill Freyne and Sanat Kumar Bista}, title = {Interaction-Based Recommendations for Online Communities}, journal = {{ACM} Trans. Internet Techn.}, volume = {15}, number = {2}, pages = {6:1--6:21}, year = {2015}, url = {https://doi.org/10.1145/2774974}, doi = {10.1145/2774974}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/NepalPPFB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/YangLZNC15, author = {Chi Yang and Chang Liu and Xuyun Zhang and Surya Nepal and Jinjun Chen}, title = {A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {26}, number = {2}, pages = {329--339}, year = {2015}, url = {https://doi.org/10.1109/TPDS.2013.2295810}, doi = {10.1109/TPDS.2013.2295810}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/YangLZNC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/YaoTNCZRG15, author = {Jinhui Yao and Wei Tan and Surya Nepal and Shiping Chen and Jia Zhang and David De Roure and Carole A. Goble}, title = {ReputationNet: Reputation-Based Service Recommendation for e-Science}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {8}, number = {3}, pages = {439--452}, year = {2015}, url = {https://doi.org/10.1109/TSC.2014.2364029}, doi = {10.1109/TSC.2014.2364029}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/YaoTNCZRG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/NepalPB15, author = {Surya Nepal and C{\'{e}}cile Paris and Athman Bouguettaya}, title = {Trusting the Social Web: issues and challenges}, journal = {World Wide Web}, volume = {18}, number = {1}, pages = {1--7}, year = {2015}, url = {https://doi.org/10.1007/s11280-013-0252-2}, doi = {10.1007/S11280-013-0252-2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/NepalPB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/WiseFNCS15, author = {Catherine Wise and Carsten Friedrich and Surya Nepal and Shiping Chen and Richard O. Sinnott}, editor = {Calton Pu and Ajay Mohindra}, title = {Cloud Docs: Secure Scalable Document Sharing on Public Clouds}, booktitle = {8th {IEEE} International Conference on Cloud Computing, {CLOUD} 2015, New York City, NY, USA, June 27 - July 2, 2015}, pages = {532--539}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CLOUD.2015.77}, doi = {10.1109/CLOUD.2015.77}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/WiseFNCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdata/NugrohoZYPN15, author = {Robertus Nugroho and Youliang Zhong and Jian Yang and C{\'{e}}cile Paris and Surya Nepal}, editor = {Barbara Carminati and Latifur Khan}, title = {Matrix Inter-joint Factorization - {A} New Approach for Topic Derivation in Twitter}, booktitle = {2015 {IEEE} International Congress on Big Data, New York City, NY, USA, June 27 - July 2, 2015}, pages = {79--86}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/BigDataCongress.2015.21}, doi = {10.1109/BIGDATACONGRESS.2015.21}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/bigdata/NugrohoZYPN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdata/NugrohoYZPN15, author = {Robertus Nugroho and Jian Yang and Youliang Zhong and C{\'{e}}cile Paris and Surya Nepal}, editor = {Barbara Carminati and Latifur Khan}, title = {Deriving Topics in Twitter by Exploiting Tweet Interactions}, booktitle = {2015 {IEEE} International Congress on Big Data, New York City, NY, USA, June 27 - July 2, 2015}, pages = {87--94}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/BigDataCongress.2015.22}, doi = {10.1109/BIGDATACONGRESS.2015.22}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdata/NugrohoYZPN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdata/PuthalNPRC15, author = {Deepak Puthal and Surya Nepal and C{\'{e}}cile Paris and Rajiv Ranjan and Jinjun Chen}, editor = {Barbara Carminati and Latifur Khan}, title = {Efficient Algorithms for Social Network Coverage and Reach}, booktitle = {2015 {IEEE} International Congress on Big Data, New York City, NY, USA, June 27 - July 2, 2015}, pages = {467--474}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/BigDataCongress.2015.75}, doi = {10.1109/BIGDATACONGRESS.2015.75}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdata/PuthalNPRC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/ChenTXNC15, author = {Shiping Chen and Danan Thilakanathan and Donna Xu and Surya Nepal and Rafael A. Calvo}, title = {Self Protecting Data Sharing Using Generic Policies}, booktitle = {15th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2015, Shenzhen, China, May 4-7, 2015}, pages = {1197--1200}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CCGrid.2015.84}, doi = {10.1109/CCGRID.2015.84}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/ChenTXNC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/PradhanGN15, author = {Sojen Pradhan and Val{\'{e}}rie Gay and Surya Nepal}, editor = {Atreyi Kankanhalli and Andrew Burton{-}Jones and Thompson S. H. Teo}, title = {Analysing and Using Subjective Criteria to Improve Dental Care Recommendation Systems}, booktitle = {19th Pacific Asia Conference on Information Systems, {PACIS} 2015, Singapore, July 5-9, 2015}, pages = {99}, year = {2015}, url = {http://aisel.aisnet.org/pacis2015/99}, timestamp = {Sat, 12 Dec 2015 19:19:58 +0100}, biburl = {https://dblp.org/rec/conf/pacis/PradhanGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacling/NugrohoAYZPN15, author = {Robertus Nugroho and Diego Moll{\'{a}} Aliod and Jian Yang and Youliang Zhong and C{\'{e}}cile Paris and Surya Nepal}, editor = {K{\^{o}}iti Hasida and Ayu Purwarianti}, title = {Incorporating Tweet Relationships into Topic Derivation}, booktitle = {Computational Linguistics - 14th International Conference of the Pacific Association for Computational Linguistics, {PACLING} 2015, Bali, Indonesia, May 19-21, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {593}, pages = {177--190}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-981-10-0515-2\_13}, doi = {10.1007/978-981-10-0515-2\_13}, timestamp = {Thu, 09 Nov 2023 21:12:39 +0100}, biburl = {https://dblp.org/rec/conf/pacling/NugrohoAYZPN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PuthalNRC15, author = {Deepak Puthal and Surya Nepal and Rajiv Ranjan and Jinjun Chen}, title = {{DPBSV} - An Efficient and Secure Scheme for Big Sensing Data Stream}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {246--253}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.381}, doi = {10.1109/TRUSTCOM.2015.381}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PuthalNRC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/PuthalNRC15, author = {Deepak Puthal and Surya Nepal and Rajiv Ranjan and Jinjun Chen}, editor = {Jianyong Wang and Wojciech Cellary and Dingding Wang and Hua Wang and Shu{-}Ching Chen and Tao Li and Yanchun Zhang}, title = {A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream}, booktitle = {Web Information Systems Engineering - {WISE} 2015 - 16th International Conference, Miami, FL, USA, November 1-3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9419}, pages = {93--108}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26187-4\_7}, doi = {10.1007/978-3-319-26187-4\_7}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wise/PuthalNRC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/NugrohoZYPNM15, author = {Robertus Nugroho and Weiliang Zhao and Jian Yang and C{\'{e}}cile Paris and Surya Nepal and Yan Mei}, editor = {Jianyong Wang and Wojciech Cellary and Dingding Wang and Hua Wang and Shu{-}Ching Chen and Tao Li and Yanchun Zhang}, title = {Time-Sensitive Topic Derivation in Twitter}, booktitle = {Web Information Systems Engineering - {WISE} 2015 - 16th International Conference, Miami, FL, USA, November 1-3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9418}, pages = {138--152}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26190-4\_10}, doi = {10.1007/978-3-319-26190-4\_10}, timestamp = {Tue, 26 Jan 2021 13:51:20 +0100}, biburl = {https://dblp.org/rec/conf/wise/NugrohoZYPNM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/15/NepalPG15, author = {Surya Nepal and C{\'{e}}cile Paris and Dimitrios Georgakopoulos}, editor = {Surya Nepal and C{\'{e}}cile Paris and Dimitrios Georgakopoulos}, title = {Social Media for Government Services: An Introduction}, booktitle = {Social Media for Government Services}, pages = {3--24}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27237-5\_1}, doi = {10.1007/978-3-319-27237-5\_1}, timestamp = {Thu, 07 Mar 2024 22:43:02 +0100}, biburl = {https://dblp.org/rec/books/sp/15/NepalPG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/15/ParisN15, author = {C{\'{e}}cile Paris and Surya Nepal}, editor = {Surya Nepal and C{\'{e}}cile Paris and Dimitrios Georgakopoulos}, title = {Next Step: An Online Community for Delivering Human Services}, booktitle = {Social Media for Government Services}, pages = {169--196}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27237-5\_9}, doi = {10.1007/978-3-319-27237-5\_9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/15/ParisN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/15/NepalPB15, author = {Surya Nepal and C{\'{e}}cile Paris and Sanat Kumar Bista}, editor = {Surya Nepal and C{\'{e}}cile Paris and Dimitrios Georgakopoulos}, title = {Gamification on the Social Web}, booktitle = {Social Media for Government Services}, pages = {197--220}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27237-5\_10}, doi = {10.1007/978-3-319-27237-5\_10}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/15/NepalPB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:books/sp/NPG2015, editor = {Surya Nepal and C{\'{e}}cile Paris and Dimitrios Georgakopoulos}, title = {Social Media for Government Services}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27237-5}, doi = {10.1007/978-3-319-27237-5}, isbn = {978-3-319-27235-1}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/NPG2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhangRMNSW15, author = {Miranda Zhang and Rajiv Ranjan and Michael Menzel and Surya Nepal and Peter Strazdins and Lizhe Wang}, title = {A Cloud Infrastructure Service Recommendation System for Optimizing Real-time QoS Provisioning Constraints}, journal = {CoRR}, volume = {abs/1504.01828}, year = {2015}, url = {http://arxiv.org/abs/1504.01828}, eprinttype = {arXiv}, eprint = {1504.01828}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/ZhangRMNSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eetcc/BertinoGNSV14, author = {Elisa Bertino and Dimitrios Georgakopoulos and Surya Nepal and Mudhakar Srivatsa and Alessandro Vinciarelli}, title = {Guest Editorial: Selected Papers from {IEEE} {IEEE/EAI} CollaborateCom 2013}, journal = {{EAI} Endorsed Trans. Collab. Comput.}, volume = {1}, number = {1}, pages = {e2}, year = {2014}, url = {https://doi.org/10.4108/cc.1.1.e2}, doi = {10.4108/CC.1.1.E2}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eetcc/BertinoGNSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ThilakanathanCNCA14, author = {Danan Thilakanathan and Shiping Chen and Surya Nepal and Rafael A. Calvo and Leila Alem}, title = {A platform for secure monitoring and sharing of generic health data in the Cloud}, journal = {Future Gener. Comput. Syst.}, volume = {35}, pages = {102--113}, year = {2014}, url = {https://doi.org/10.1016/j.future.2013.09.011}, doi = {10.1016/J.FUTURE.2013.09.011}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ThilakanathanCNCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcis/BistaNPC14, author = {Sanat Kumar Bista and Surya Nepal and C{\'{e}}cile Paris and Nathalie Colineau}, title = {Gamification for Online Communities: {A} Case Study for Delivering Government Services}, journal = {Int. J. Cooperative Inf. Syst.}, volume = {23}, number = {2}, year = {2014}, url = {https://doi.org/10.1142/S0218843014410020}, doi = {10.1142/S0218843014410020}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcis/BistaNPC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/Jang-JaccardN14, author = {Julian Jang{-}Jaccard and Surya Nepal}, title = {A survey of emerging threats in cybersecurity}, journal = {J. Comput. Syst. Sci.}, volume = {80}, number = {5}, pages = {973--993}, year = {2014}, url = {https://doi.org/10.1016/j.jcss.2014.02.005}, doi = {10.1016/J.JCSS.2014.02.005}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/Jang-JaccardN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ZhangLNYDC14, author = {Xuyun Zhang and Chang Liu and Surya Nepal and Chi Yang and Wanchun Dou and Jinjun Chen}, title = {A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud}, journal = {J. Comput. Syst. Sci.}, volume = {80}, number = {5}, pages = {1008--1020}, year = {2014}, url = {https://doi.org/10.1016/j.jcss.2014.02.007}, doi = {10.1016/J.JCSS.2014.02.007}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/ZhangLNYDC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/NepalBP14, author = {Surya Nepal and Athman Bouguettaya and C{\'{e}}cile Paris}, title = {Guest Editorial: Special Issue on Clouds for Social Computing}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {7}, number = {3}, pages = {329--332}, year = {2014}, url = {https://doi.org/10.1109/TSC.2014.2313414}, doi = {10.1109/TSC.2014.2313414}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/NepalBP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/ThilakanathanCNCLZ14, author = {Danan Thilakanathan and Shiping Chen and Surya Nepal and Rafael A. Calvo and Dongxi Liu and John Zic}, title = {Secure Multiparty Data Sharing in the Cloud Using Hardware-Based {TPM} Devices}, booktitle = {2014 {IEEE} 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27 - July 2, 2014}, pages = {224--231}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CLOUD.2014.39}, doi = {10.1109/CLOUD.2014.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/ThilakanathanCNCLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdata/BistaNP14, author = {Sanat Kumar Bista and Surya Nepal and C{\'{e}}cile Paris}, title = {Multifaceted Visualisation of Annotated Social Media Data}, booktitle = {2014 {IEEE} International Congress on Big Data, Anchorage, AK, USA, June 27 - July 2, 2014}, pages = {699--706}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/BigData.Congress.2014.103}, doi = {10.1109/BIGDATA.CONGRESS.2014.103}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/bigdata/BistaNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbd/ThilakanathanZC14, author = {Danan Thilakanathan and Yu Zhao and Shiping Chen and Surya Nepal and Rafael A. Calvo and Abelardo Pardo}, title = {Protecting and Analysing Health Care Data on Cloud}, booktitle = {Second International Conference on Advanced Cloud and Big Data, {CBD} 2014, Huangshan, China, November 20-22, 2014}, pages = {143--149}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CBD.2014.25}, doi = {10.1109/CBD.2014.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cbd/ThilakanathanZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/SharifTZN14, author = {Shaghayegh Sharif and Javid Taheri and Albert Y. Zomaya and Surya Nepal}, title = {Online Multiple Workflow Scheduling under Privacy and Deadline in Hybrid Cloud Environment}, booktitle = {{IEEE} 6th International Conference on Cloud Computing Technology and Science, CloudCom 2014, Singapore, December 15-18, 2014}, pages = {455--462}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CloudCom.2014.128}, doi = {10.1109/CLOUDCOM.2014.128}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/SharifTZN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/PradhanGN14, author = {Sojen Pradhan and Val{\'{e}}rie Gay and Surya Nepal}, title = {Improving dental care recommendation systems using trust and social networks}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014}, pages = {4264--4269}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICC.2014.6883990}, doi = {10.1109/ICC.2014.6883990}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/PradhanGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/HuangLNFCT14, author = {Keman Huang and Yi Liu and Surya Nepal and Yushun Fan and Shiping Chen and Wei Tan}, editor = {Xavier Franch and Aditya K. Ghose and Grace A. Lewis and Sami Bhiri}, title = {A Novel Equitable Trustworthy Mechanism for Service Recommendation in the Evolving Service Ecosystem}, booktitle = {Service-Oriented Computing - 12th International Conference, {ICSOC} 2014, Paris, France, November 3-6, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8831}, pages = {510--517}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45391-9\_43}, doi = {10.1007/978-3-662-45391-9\_43}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/HuangLNFCT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/PradhanGN14, author = {Sojen Pradhan and Val{\'{e}}rie Gay and Surya Nepal}, editor = {Keng Siau and Qing Li and Xunhua Guo}, title = {Improving the Matching Process of Dental Care Recommendation Systems by using Subjective criteria for both patients and Dentists}, booktitle = {18th Pacific Asia Conference on Information Systems, {PACIS} 2014, Chengdu, China, June 24-28, 2014}, pages = {296}, year = {2014}, url = {http://aisel.aisnet.org/pacis2014/296}, timestamp = {Tue, 25 Nov 2014 12:58:45 +0100}, biburl = {https://dblp.org/rec/conf/pacis/PradhanGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/aws14/NepalSB14, author = {Surya Nepal and Wanita Sherchan and Athman Bouguettaya}, editor = {Athman Bouguettaya and Quan Z. Sheng and Florian Daniel}, title = {Service Trust Management for E-Government Applications}, booktitle = {Advanced Web Services}, pages = {339--362}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7535-4\_14}, doi = {10.1007/978-1-4614-7535-4\_14}, timestamp = {Sat, 19 Oct 2019 19:02:48 +0200}, biburl = {https://dblp.org/rec/books/sp/aws14/NepalSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icsoc/2013w, editor = {Alessio Lomuscio and Surya Nepal and Fabio Patrizi and Boualem Benatallah and Ivona Brandic}, title = {Service-Oriented Computing - {ICSOC} 2013 Workshops - CCSA, CSB, PASCEB, SWESE, WESOA, and PhD Symposium, Berlin, Germany, December 2-5, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8377}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06859-6}, doi = {10.1007/978-3-319-06859-6}, isbn = {978-3-319-06858-9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/2013w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ZhangLNYDC13, author = {Xuyun Zhang and Chang Liu and Surya Nepal and Chi Yang and Wanchun Dou and Jinjun Chen}, title = {SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud}, journal = {Concurr. Comput. Pract. Exp.}, volume = {25}, number = {18}, pages = {2561--2576}, year = {2013}, url = {https://doi.org/10.1002/cpe.3083}, doi = {10.1002/CPE.3083}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/ZhangLNYDC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/SherchanNP13, author = {Wanita Sherchan and Surya Nepal and C{\'{e}}cile Paris}, title = {A survey of trust in social networks}, journal = {{ACM} Comput. Surv.}, volume = {45}, number = {4}, pages = {47:1--47:33}, year = {2013}, url = {https://doi.org/10.1145/2501654.2501661}, doi = {10.1145/2501654.2501661}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/SherchanNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/RanjanBN13, author = {Rajiv Ranjan and Rajkumar Buyya and Surya Nepal}, title = {Model-driven provisioning of application services in hybrid computing environments}, journal = {Future Gener. Comput. Syst.}, volume = {29}, number = {5}, pages = {1211--1215}, year = {2013}, url = {https://doi.org/10.1016/j.future.2013.01.007}, doi = {10.1016/J.FUTURE.2013.01.007}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/RanjanBN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/PandeyN13, author = {Suraj Pandey and Surya Nepal}, title = {Cloud Computing and Scientific Applications - Big Data, Scalable Analytics, and Beyond}, journal = {Future Gener. Comput. Syst.}, volume = {29}, number = {7}, pages = {1774--1776}, year = {2013}, url = {https://doi.org/10.1016/j.future.2013.04.026}, doi = {10.1016/J.FUTURE.2013.04.026}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/PandeyN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/NepalPBS13, author = {Surya Nepal and C{\'{e}}cile Paris and Sanat Kumar Bista and Wanita Sherchan}, title = {A trust model-based analysis of social networks}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {1}, pages = {3--22}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.052522}, doi = {10.1504/IJTMCC.2013.052522}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/NepalPBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ZhangLNC13, author = {Xuyun Zhang and Chang Liu and Surya Nepal and Jinjun Chen}, title = {An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud}, journal = {J. Comput. Syst. Sci.}, volume = {79}, number = {5}, pages = {542--555}, year = {2013}, url = {https://doi.org/10.1016/j.jcss.2012.11.008}, doi = {10.1016/J.JCSS.2012.11.008}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/ZhangLNC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ZhangLNPC13, author = {Xuyun Zhang and Chang Liu and Surya Nepal and Suraj Pandey and Jinjun Chen}, title = {A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {24}, number = {6}, pages = {1192--1202}, year = {2013}, url = {https://doi.org/10.1109/TPDS.2012.238}, doi = {10.1109/TPDS.2012.238}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/ZhangLNPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdata/BistaNP13, author = {Sanat Kumar Bista and Surya Nepal and C{\'{e}}cile Paris}, title = {Data Abstraction and Visualisation in Next Step: Experiences from a Government Services Delivery Trial}, booktitle = {{IEEE} International Congress on Big Data, BigData Congress 2013, Santa Clara, CA, USA, June 27 2013-July 2, 2013}, pages = {263--270}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/BigData.Congress.2013.42}, doi = {10.1109/BIGDATA.CONGRESS.2013.42}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/bigdata/BistaNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bled/PradhanGN13, author = {Sojen Pradhan and Val{\'{e}}rie Gay and Surya Nepal}, title = {Social Networking and Dental Care: State of the Art and Analysis of the Impact on Dentists, Dental Practices and their Patients}, booktitle = {26th Bled eConference: eTrust: eInnovation: Challenges and Impacts for Individuals, Organizations and Society, Bled, Slovenia, June 9-13, 2013}, pages = {22}, year = {2013}, url = {http://aisel.aisnet.org/bled2013/22}, timestamp = {Fri, 25 Nov 2016 19:02:31 +0100}, biburl = {https://dblp.org/rec/conf/bled/PradhanGN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgc/ZhangYNLDC13, author = {Xuyun Zhang and Chi Yang and Surya Nepal and Chang Liu and Wanchun Dou and Jinjun Chen}, title = {A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud}, booktitle = {2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30 - October 2, 2013}, pages = {105--112}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CGC.2013.24}, doi = {10.1109/CGC.2013.24}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cgc/ZhangYNLDC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/NepalPPBF13, author = {Surya Nepal and C{\'{e}}cile Paris and Payam Aghaei Pour and Sanat Kumar Bista and Jill Freyne}, editor = {Elisa Bertino and Dimitrios Georgakopoulos and Mudhakar Srivatsa and Surya Nepal and Alessandro Vinciarelli}, title = {A social trust based friend recommender for online communities "invited paper"}, booktitle = {9th {IEEE} International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013}, pages = {419--428}, publisher = {{ICST} / {IEEE}}, year = {2013}, url = {https://doi.org/10.4108/icst.collaboratecom.2013.254213}, doi = {10.4108/ICST.COLLABORATECOM.2013.254213}, timestamp = {Fri, 15 Mar 2024 12:30:44 +0100}, biburl = {https://dblp.org/rec/conf/colcom/NepalPPBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/NepalJCYA13, author = {Surya Nepal and Julian Jang{-}Jaccard and Branko G. Celler and Bo Yan and Leila Alem}, editor = {Elisa Bertino and Dimitrios Georgakopoulos and Mudhakar Srivatsa and Surya Nepal and Alessandro Vinciarelli}, title = {Data architecture for telehealth services research: {A} case study of home tele-monitoring}, booktitle = {9th {IEEE} International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013}, pages = {458--467}, publisher = {{ICST} / {IEEE}}, year = {2013}, url = {https://doi.org/10.4108/icst.collaboratecom.2013.254220}, doi = {10.4108/ICST.COLLABORATECOM.2013.254220}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/NepalJCYA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/Jang-JaccardLNA13, author = {Julian Jang{-}Jaccard and Jane Li and Surya Nepal and Leila Alem}, editor = {Elisa Bertino and Dimitrios Georgakopoulos and Mudhakar Srivatsa and Surya Nepal and Alessandro Vinciarelli}, title = {Security analysis of mobile applications: {A} case study of a collaboration tool in healthcare}, booktitle = {9th {IEEE} International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013}, pages = {553--562}, publisher = {{ICST} / {IEEE}}, year = {2013}, url = {https://doi.org/10.4108/icst.collaboratecom.2013.254212}, doi = {10.4108/ICST.COLLABORATECOM.2013.254212}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/Jang-JaccardLNA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscw/BistaCNP13, author = {Sanat Kumar Bista and Nathalie Colineau and Surya Nepal and C{\'{e}}cile Paris}, editor = {Amy S. Bruckman and Scott Counts and Cliff Lampe and Loren G. Terveen}, title = {Next step: an online community to support parents in their transition to work}, booktitle = {Computer Supported Cooperative Work, {CSCW} 2013, San Antonio, TX, USA, February 23-27, 2013, Companion Volume}, pages = {5--10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2441955.2441958}, doi = {10.1145/2441955.2441958}, timestamp = {Tue, 15 Sep 2020 08:36:55 +0200}, biburl = {https://dblp.org/rec/conf/cscw/BistaCNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscw/ColineauPN13, author = {Nathalie Colineau and C{\'{e}}cile Paris and Surya Nepal}, editor = {Amy S. Bruckman and Scott Counts and Cliff Lampe and Loren G. Terveen}, title = {Designing for reflection and collaboration to support a transition from welfare to work}, booktitle = {Computer Supported Cooperative Work, {CSCW} 2013, San Antonio, TX, USA, February 23-27, 2013}, pages = {471--476}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2441776.2441830}, doi = {10.1145/2441776.2441830}, timestamp = {Tue, 15 Sep 2020 08:36:55 +0200}, biburl = {https://dblp.org/rec/conf/cscw/ColineauPN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/ThilakanathanCCN13, author = {Danan Thilakanathan and Rafael A. Calvo and Shiping Chen and Surya Nepal}, title = {Secure and Controlled Sharing of Data in Distributed Computing}, booktitle = {16th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2013, December 3-5, 2013, Sydney, Australia}, pages = {825--832}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CSE.2013.125}, doi = {10.1109/CSE.2013.125}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/ThilakanathanCCN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/YangLZNC13, author = {Chi Yang and Chang Liu and Xuyun Zhang and Surya Nepal and Jinjun Chen}, title = {Querying Streaming {XML} Big Data with Multiple Filters on Cloud}, booktitle = {16th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2013, December 3-5, 2013, Sydney, Australia}, pages = {1121--1127}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CSE.2013.163}, doi = {10.1109/CSE.2013.163}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cse/YangLZNC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/YaoNCLFN13, author = {Jinhui Yao and Alex Ng and Shiping Chen and Dongxi Liu and Carsten Friedrich and Surya Nepal}, editor = {Aditya K. Ghose and Huibiao Zhu and Qi Yu and Alex Delis and Quan Z. Sheng and Olivier Perrin and Jianmin Wang and Yan Wang}, title = {A Performance Evaluation of Public Cloud Using {TPC-C}}, booktitle = {Service-Oriented Computing - {ICSOC} 2012 Workshops - {ICSOC} 2012, International Workshops ASC, DISA, PAASC, SCEB, SeMaPS, WESOA, and Satellite Events, Shanghai, China, November 12-15, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7759}, pages = {3--13}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37804-1\_2}, doi = {10.1007/978-3-642-37804-1\_2}, timestamp = {Mon, 26 Jun 2023 20:44:14 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/YaoNCLFN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/BistaPCNP13, author = {Sanat Kumar Bista and Payam Aghaei Pour and Nathalie Colineau and Surya Nepal and C{\'{e}}cile Paris}, editor = {Aditya K. Ghose and Huibiao Zhu and Qi Yu and Alex Delis and Quan Z. Sheng and Olivier Perrin and Jianmin Wang and Yan Wang}, title = {TrustVis: {A} Trust Visualisation Service for Online Communities}, booktitle = {Service-Oriented Computing - {ICSOC} 2012 Workshops - {ICSOC} 2012, International Workshops ASC, DISA, PAASC, SCEB, SeMaPS, WESOA, and Satellite Events, Shanghai, China, November 12-15, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7759}, pages = {191--202}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37804-1\_20}, doi = {10.1007/978-3-642-37804-1\_20}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/BistaPCNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/PandeyN13, author = {Suraj Pandey and Surya Nepal}, editor = {Alessio Lomuscio and Surya Nepal and Fabio Patrizi and Boualem Benatallah and Ivona Brandic}, title = {Introduction to the 3rd International Workshop on Cloud Computing and Scientific Applications (CCSA'13)}, booktitle = {Service-Oriented Computing - {ICSOC} 2013 Workshops - CCSA, CSB, PASCEB, SWESE, WESOA, and PhD Symposium, Berlin, Germany, December 2-5, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8377}, pages = {279--280}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06859-6\_25}, doi = {10.1007/978-3-319-06859-6\_25}, timestamp = {Wed, 25 Sep 2019 18:15:03 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/PandeyN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/ChenBSWABKZNGT13, author = {Shiping Chen and Tomasz Bednarz and Piotr Szul and Dadong Wang and Yulia Arzhaeva and Neil Burdett and Alex Khassapov and John Zic and Surya Nepal and Tim Gurevey and John A. Taylor}, editor = {Alessio Lomuscio and Surya Nepal and Fabio Patrizi and Boualem Benatallah and Ivona Brandic}, title = {Galaxy + Hadoop: Toward a Collaborative and Scalable Image Processing Toolbox in Cloud}, booktitle = {Service-Oriented Computing - {ICSOC} 2013 Workshops - CCSA, CSB, PASCEB, SWESE, WESOA, and PhD Symposium, Berlin, Germany, December 2-5, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8377}, pages = {339--351}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06859-6\_30}, doi = {10.1007/978-3-319-06859-6\_30}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/ChenBSWABKZNGT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/HuangYFTNNC13, author = {Keman Huang and Jinhui Yao and Yushun Fan and Wei Tan and Surya Nepal and Yayu Ni and Shiping Chen}, editor = {Samik Basu and Cesare Pautasso and Liang Zhang and Xiang Fu}, title = {Mirror, Mirror, on the Web, Which Is the Most Reputable Service of Them All? - {A} Domain-Aware and Reputation-Aware Method for Service Recommendation}, booktitle = {Service-Oriented Computing - 11th International Conference, {ICSOC} 2013, Berlin, Germany, December 2-5, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8274}, pages = {343--357}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45005-1\_24}, doi = {10.1007/978-3-642-45005-1\_24}, timestamp = {Tue, 09 May 2023 12:51:34 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/HuangYFTNNC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ozchi/HuangANT13, author = {Weidong Huang and Leila Alem and Surya Nepal and Danan Thilakanathan}, editor = {Haifeng Shen and Ross T. Smith and Jeni Paay and Paul R. Calder and Theodor G. Wyeld}, title = {Supporting tele-assistance and tele-monitoring in safety-critical environments}, booktitle = {Augmentation, Application, Innovation, Collaboration, OzCHI '13, Adelaide, Australia - November 25 - 29, 2013}, pages = {539--542}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2541016.2541065}, doi = {10.1145/2541016.2541065}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ozchi/HuangANT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/SharifTZN13, author = {Shaghayegh Sharif and Javid Taheri and Albert Y. Zomaya and Surya Nepal}, editor = {Shi{-}Jinn Horng}, title = {{MPHC:} Preserving Privacy for Workflow Execution in Hybrid Clouds}, booktitle = {International Conference on Parallel and Distributed Computing, Applications and Technologies, {PDCAT} 2013, Taipei, Taiwan, December 16-18, 2013}, pages = {272--280}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/PDCAT.2013.49}, doi = {10.1109/PDCAT.2013.49}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/pdcat/SharifTZN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLNYDC13, author = {Xuyun Zhang and Chang Liu and Surya Nepal and Chi Yang and Wanchun Dou and Jinjun Chen}, title = {Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {501--508}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.235}, doi = {10.1109/TRUSTCOM.2013.235}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLNYDC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/um/BistaNP13, author = {Sanat Kumar Bista and Surya Nepal and C{\'{e}}cile Paris}, editor = {Shlomo Berkovsky and Eelco Herder and Pasquale Lops and Olga C. Santos}, title = {The Human Touch of Government Services}, booktitle = {Late-Breaking Results, Project Papers and Workshop Proceedings of the 21st Conference on User Modeling, Adaptation, and Personalization., Rome, Italy, June 10-14, 2013}, series = {{CEUR} Workshop Proceedings}, volume = {997}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-997/pegov2013\_paper\_3.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:25 +0100}, biburl = {https://dblp.org/rec/conf/um/BistaNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/um/BistaNP13a, author = {Sanat Kumar Bista and Surya Nepal and C{\'{e}}cile Paris}, editor = {Shlomo Berkovsky and Eelco Herder and Pasquale Lops and Olga C. Santos}, title = {Know Your Members' Trust}, booktitle = {Late-Breaking Results, Project Papers and Workshop Proceedings of the 21st Conference on User Modeling, Adaptation, and Personalization., Rome, Italy, June 10-14, 2013}, series = {{CEUR} Workshop Proceedings}, volume = {997}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-997/trum2013\_paper\_4.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/um/BistaNP13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/um/NepalPPFB13, author = {Surya Nepal and C{\'{e}}cile Paris and Payam Aghaei Pour and Jill Freyne and Sanat Kumar Bista}, editor = {Sandra Carberry and Stephan Weibelzahl and Alessandro Micarelli and Giovanni Semeraro}, title = {Interaction Based Content Recommendation in Online Communities}, booktitle = {User Modeling, Adaptation, and Personalization - 21th International Conference, {UMAP} 2013, Rome, Italy, June 10-14, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7899}, pages = {14--24}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38844-6\_2}, doi = {10.1007/978-3-642-38844-6\_2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/um/NepalPPFB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/colcom/2013, editor = {Elisa Bertino and Dimitrios Georgakopoulos and Mudhakar Srivatsa and Surya Nepal and Alessandro Vinciarelli}, title = {9th {IEEE} International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013}, publisher = {{ICST} / {IEEE}}, year = {2013}, url = {http://eudl.eu/proceedings/COLLABORATECOM/2013}, isbn = {978-1-936968-92-3}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ParisCNBB13, author = {C{\'{e}}cile Paris and Nathalie Colineau and Surya Nepal and Sanat Kumar Bista and Gina Beschorner}, title = {Ethical considerations in an online community: the balancing act}, journal = {CoRR}, volume = {abs/1311.4389}, year = {2013}, url = {http://arxiv.org/abs/1311.4389}, eprinttype = {arXiv}, eprint = {1311.4389}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ParisCNBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NepalPBS13, author = {Surya Nepal and C{\'{e}}cile Paris and Sanat Kumar Bista and Wanita Sherchan}, title = {A Trust Model Based Analysis of Social Networks}, journal = {CoRR}, volume = {abs/1311.4606}, year = {2013}, url = {http://arxiv.org/abs/1311.4606}, eprinttype = {arXiv}, eprint = {1311.4606}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NepalPBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiuLJNZ12, author = {Dongxi Liu and Jack Lee and Julian Jang and Surya Nepal and John Zic}, title = {A New Cloud Architecture of Virtual Trusted Platform Modules}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {95-D}, number = {6}, pages = {1577--1589}, year = {2012}, url = {https://doi.org/10.1587/transinf.E95.D.1577}, doi = {10.1587/TRANSINF.E95.D.1577}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiuLJNZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/NepalP12, author = {Surya Nepal and Mukaddim Pathan}, title = {Editorial}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {2/3}, pages = {101--118}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.046732}, doi = {10.1504/IJCC.2012.046732}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/NepalP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijngc/NepalB12, author = {Surya Nepal and Athman Bouguettaya}, title = {Issues and Challenges in Web Service Management Systems}, journal = {Int. J. Next Gener. Comput.}, volume = {3}, number = {2}, year = {2012}, url = {http://perpetualinnovation.net/ojs/index.php/ijngc/article/view/170}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijngc/NepalB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/SherchanNBC12, author = {Wanita Sherchan and Surya Nepal and Athman Bouguettaya and Shiping Chen}, title = {Context-sensitive user interfaces for semantic services}, journal = {{ACM} Trans. Internet Techn.}, volume = {11}, number = {3}, pages = {14:1--14:27}, year = {2012}, url = {https://doi.org/10.1145/2078316.2078322}, doi = {10.1145/2078316.2078322}, timestamp = {Mon, 18 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/SherchanNBC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/SunYZN12, author = {Haiyang Sun and Jian Yang and Weiliang Zhao and Surya Nepal}, editor = {Louise E. Moser and Manish Parashar and Patrick C. K. Hung}, title = {SOAC-Net: {A} Model to Manage Service-Based Business Process Authorization}, booktitle = {2012 {IEEE} Ninth International Conference on Services Computing, Honolulu, HI, USA, June 24-29, 2012}, pages = {376--383}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SCC.2012.37}, doi = {10.1109/SCC.2012.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/SunYZN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/YaoTNCZRG12, author = {Jinhui Yao and Wei Tan and Surya Nepal and Shiping Chen and Jia Zhang and David De Roure and Carole A. Goble}, editor = {Louise E. Moser and Manish Parashar and Patrick C. K. Hung}, title = {ReputationNet: {A} Reputation Engine to Enhance ServiceMap by Recommending Trusted Services}, booktitle = {2012 {IEEE} Ninth International Conference on Services Computing, Honolulu, HI, USA, June 24-29, 2012}, pages = {454--461}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SCC.2012.73}, doi = {10.1109/SCC.2012.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/YaoTNCZRG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/PandeyNC12, author = {Suraj Pandey and Surya Nepal and Shiping Chen}, title = {Business Process Engine Simulator}, booktitle = {12th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012, Ottawa, Canada, May 13-16, 2012}, pages = {711--713}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CCGrid.2012.130}, doi = {10.1109/CCGRID.2012.130}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/PandeyNC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgc/ZhangLNDC12, author = {Xuyun Zhang and Chang Liu and Surya Nepal and Wanchun Dou and Jinjun Chen}, editor = {Jianxun Liu and Jinjun Chen and Guandong Xu}, title = {Privacy-Preserving Layer over MapReduce on Cloud}, booktitle = {2012 Second International Conference on Cloud and Green Computing, {CGC} 2012, Xiangtan, Hunan, China, November 1-3, 2012}, pages = {304--310}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CGC.2012.43}, doi = {10.1109/CGC.2012.43}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cgc/ZhangLNDC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/Jang-JaccardMN12, author = {Julian Jang{-}Jaccard and Avnish Manraj and Surya Nepal}, editor = {Calton Pu and James Joshi and Surya Nepal}, title = {Portable key management service for cloud storage}, booktitle = {8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012}, pages = {147--156}, publisher = {{ICST} / {IEEE}}, year = {2012}, url = {https://doi.org/10.4108/icst.collaboratecom.2012.250488}, doi = {10.4108/ICST.COLLABORATECOM.2012.250488}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/Jang-JaccardMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/ZhangRHGMN12, author = {Miranda Zhang and Rajiv Ranjan and Armin Haller and Dimitrios Georgakopoulos and Michael Menzel and Surya Nepal}, editor = {Calton Pu and James Joshi and Surya Nepal}, title = {An ontology-based system for Cloud infrastructure services' discovery}, booktitle = {8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012}, pages = {524--530}, publisher = {{ICST} / {IEEE}}, year = {2012}, url = {https://doi.org/10.4108/icst.collaboratecom.2012.250650}, doi = {10.4108/ICST.COLLABORATECOM.2012.250650}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/ZhangRHGMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/BistaNCP12, author = {Sanat Kumar Bista and Surya Nepal and Nathalie Colineau and C{\'{e}}cile Paris}, editor = {Calton Pu and James Joshi and Surya Nepal}, title = {Using gamification in an online community}, booktitle = {8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012}, pages = {611--618}, publisher = {{ICST} / {IEEE}}, year = {2012}, url = {https://doi.org/10.4108/icst.collaboratecom.2012.250526}, doi = {10.4108/ICST.COLLABORATECOM.2012.250526}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/BistaNCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecon/ZhangRNMH12, author = {Miranda Zhang and Rajiv Ranjan and Surya Nepal and Michael Menzel and Armin Haller}, editor = {Kurt Vanmechelen and J{\"{o}}rn Altmann and Omer F. Rana}, title = {A Declarative Recommender System for Cloud Infrastructure Services Selection}, booktitle = {Economics of Grids, Clouds, Systems, and Services - 9th International Conference, {GECON} 2012, Berlin, Germany, November 27-28, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7714}, pages = {102--113}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35194-5\_8}, doi = {10.1007/978-3-642-35194-5\_8}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecon/ZhangRNMH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/SunZN12, author = {Haiyang Sun and Weiliang Zhao and Surya Nepal}, editor = {Chengfei Liu and Heiko Ludwig and Farouk Toumani and Qi Yu}, title = {PASOAC-Net: {A} Petri-Net Model to Manage Authorization in Service-Based Business Process}, booktitle = {Service-Oriented Computing - 10th International Conference, {ICSOC} 2012, Shanghai, China, November 12-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7636}, pages = {566--573}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34321-6\_41}, doi = {10.1007/978-3-642-34321-6\_41}, timestamp = {Mon, 26 Jun 2023 20:44:14 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/SunZN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobserv/PandeyN12, author = {Suraj Pandey and Surya Nepal}, editor = {Ling Liu and M. Brian Blake}, title = {Modeling Availability in Clouds for Mobile Computing}, booktitle = {2012 {IEEE} First International Conference on Mobile Services, {MS} 2012, 24-29 June, 2012, Honolulu, Hawaii, {USA}}, pages = {80--87}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MobServ.2012.11}, doi = {10.1109/MOBSERV.2012.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobserv/PandeyN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ozchi/BistaCNP12, author = {Sanat Kumar Bista and Nathalie Colineau and Surya Nepal and C{\'{e}}cile Paris}, editor = {Vivienne Farrell and Graham Farrell and Caslon Chua and Weidong Huang and Rajesh Vasa and Clinton Woodward}, title = {The design of an online community for welfare recipients}, booktitle = {The 24th Australian Computer-Human Interaction Conference, OzCHI '12, Melbourne, VIC, Australia - November 26 - 30, 2012}, pages = {38--41}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414536.2414543}, doi = {10.1145/2414536.2414543}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ozchi/BistaCNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BistaNP12, author = {Sanat Kumar Bista and Surya Nepal and C{\'{e}}cile Paris}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {Engagement and Cooperation in Social Networks: Do Benefits and Rewards Help?}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {1405--1410}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.145}, doi = {10.1109/TRUSTCOM.2012.145}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BistaNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/um/NepalBP12, author = {Surya Nepal and Sanat Kumar Bista and C{\'{e}}cile Paris}, editor = {Eelco Herder and Kalina Yacef and Li Chen and Stephan Weibelzahl}, title = {An association based approach to propagate social trust in social networks}, booktitle = {Workshop and Poster Proceedings of the 20th Conference on User Modeling, Adaptation, and Personalization, Montreal, Canada, July 16-20, 2012}, series = {{CEUR} Workshop Proceedings}, volume = {872}, publisher = {CEUR-WS.org}, year = {2012}, url = {https://ceur-ws.org/Vol-872/trum2012\_paper\_4.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:25 +0100}, biburl = {https://dblp.org/rec/conf/um/NepalBP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/um/NepalPB12, author = {Surya Nepal and C{\'{e}}cile Paris and Sanat Kumar Bista}, editor = {Eelco Herder and Kalina Yacef and Li Chen and Stephan Weibelzahl}, title = {SRec: a social behaviour based recommender for online communities}, booktitle = {Workshop and Poster Proceedings of the 20th Conference on User Modeling, Adaptation, and Personalization, Montreal, Canada, July 16-20, 2012}, series = {{CEUR} Workshop Proceedings}, volume = {872}, publisher = {CEUR-WS.org}, year = {2012}, url = {https://ceur-ws.org/Vol-872/srs2012\_paper\_7.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/um/NepalPB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/NepalB12, author = {Surya Nepal and Athman Bouguettaya}, editor = {Armin Haller and Guangyan Huang and Zhisheng Huang and Hye{-}young Paik and Quan Z. Sheng}, title = {Big Data and Cloud}, booktitle = {Web Information Systems Engineering - {WISE} 2011 and 2012 Workshops - Combined {WISE} 2011 and {WISE} 2012 Workshops, Sydney Australia, October 12-14, 2011 and Paphos, Cyprus, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7652}, pages = {237}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38333-5\_24}, doi = {10.1007/978-3-642-38333-5\_24}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wise/NepalB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/colcom/2012, editor = {Calton Pu and James Joshi and Surya Nepal}, title = {8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012}, publisher = {{ICST} / {IEEE}}, year = {2012}, url = {http://eudl.eu/proceedings/COLLABORATECOM/2012}, isbn = {978-1-4673-2740-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-2047, author = {Miranda Zhang and Rajiv Ranjan and Surya Nepal and Michael Menzel and Armin Haller}, title = {A Declarative Recommender System for Cloud Infrastructure Services Selection}, journal = {CoRR}, volume = {abs/1210.2047}, year = {2012}, url = {http://arxiv.org/abs/1210.2047}, eprinttype = {arXiv}, eprint = {1210.2047}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-2047.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1212-0156, author = {Miranda Zhang and Rajiv Ranjan and Armin Haller and Dimitrios Georgakopoulos and Michael Menzel and Surya Nepal}, title = {An Ontology based System for Cloud Infrastructure Services Discovery}, journal = {CoRR}, volume = {abs/1212.0156}, year = {2012}, url = {http://arxiv.org/abs/1212.0156}, eprinttype = {arXiv}, eprint = {1212.0156}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1212-0156.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/NepalZLJ11, author = {Surya Nepal and John Zic and Dongxi Liu and Julian Jang}, title = {A mobile and portable trusted computing platform}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2011}, pages = {75}, year = {2011}, url = {https://doi.org/10.1186/1687-1499-2011-75}, doi = {10.1186/1687-1499-2011-75}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/NepalZLJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijssoe/ChenN11, author = {Shiping Chen and Surya Nepal}, title = {A Service-Oriented User Interface for the Next Generation Web}, journal = {Int. J. Syst. Serv. Oriented Eng.}, volume = {2}, number = {2}, pages = {60--76}, year = {2011}, url = {https://doi.org/10.4018/jssoe.2011040104}, doi = {10.4018/JSSOE.2011040104}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijssoe/ChenN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijssoe/NepalC11, author = {Surya Nepal and Shiping Chen}, title = {Dynamic Business Collaborations Through Contract Services}, journal = {Int. J. Syst. Serv. Oriented Eng.}, volume = {2}, number = {4}, pages = {60--82}, year = {2011}, url = {https://doi.org/10.4018/jssoe.2011100104}, doi = {10.4018/JSSOE.2011100104}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijssoe/NepalC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jwsr/NepalMB11, author = {Surya Nepal and Zaki Malik and Athman Bouguettaya}, title = {Reputation Management for Composite Services in Service-Oriented Systems}, journal = {Int. J. Web Serv. Res.}, volume = {8}, number = {2}, pages = {29--52}, year = {2011}, url = {https://doi.org/10.4018/jwsr.2011040102}, doi = {10.4018/JWSR.2011040102}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jwsr/NepalMB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/NepalCYT11, author = {Surya Nepal and Shiping Chen and Jinhui Yao and Danan Thilakanathan}, editor = {Ling Liu and Manish Parashar}, title = {DIaaS: Data Integrity as a Service in the Cloud}, booktitle = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011, Washington, DC, USA, 4-9 July, 2011}, pages = {308--315}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CLOUD.2011.35}, doi = {10.1109/CLOUD.2011.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/NepalCYT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/PandeyNC11, author = {Suraj Pandey and Surya Nepal and Shiping Chen}, editor = {Dimitrios Georgakopoulos and James B. D. Joshi}, title = {A test-bed for the evaluation of business process prediction techniques}, booktitle = {7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA, 15-18 October, 2011}, pages = {382--391}, publisher = {{ICST} / {IEEE}}, year = {2011}, url = {https://doi.org/10.4108/icst.collaboratecom.2011.247129}, doi = {10.4108/ICST.COLLABORATECOM.2011.247129}, timestamp = {Fri, 15 Mar 2024 12:30:44 +0100}, biburl = {https://dblp.org/rec/conf/colcom/PandeyNC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/ChenNL11, author = {Shiping Chen and Surya Nepal and Ren Ping Liu}, editor = {Jang{-}Ping Sheu and Cho{-}Li Wang}, title = {Secure Connectivity for Intra-cloud and Inter-cloud Communication}, booktitle = {2011 International Conference on Parallel Processing Workshops, {ICPPW} 2011, Taipei, Taiwan, Sept. 13-16, 2011}, pages = {154--159}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICPPW.2011.54}, doi = {10.1109/ICPPW.2011.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/ChenNL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SherchanNB11, author = {Wanita Sherchan and Surya Nepal and Athman Bouguettaya}, title = {A Trust Prediction Model for Service Web}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {258--265}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.35}, doi = {10.1109/TRUSTCOM.2011.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SherchanNB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JangHN11, author = {Julian Jang and Hon Hwang and Surya Nepal}, title = {Biometric Enabled Portable Trusted Computing Platform}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {436--442}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.56}, doi = {10.1109/TRUSTCOM.2011.56}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JangHN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NepalSP11, author = {Surya Nepal and Wanita Sherchan and C{\'{e}}cile Paris}, title = {STrust: {A} Trust Model for Social Networks}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {841--846}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.112}, doi = {10.1109/TRUSTCOM.2011.112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NepalSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucc/NepalFHC11, author = {Surya Nepal and Carsten Friedrich and Leakha Henry and Shiping Chen}, title = {A Secure Storage Service in the Hybrid Cloud}, booktitle = {{IEEE} 4th International Conference on Utility and Cloud Computing, {UCC} 2011, Melbourne, Australia, December 5-8, 2011}, pages = {334--335}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/UCC.2011.55}, doi = {10.1109/UCC.2011.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ucc/NepalFHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/um/NepalSP11, author = {Surya Nepal and Wanita Sherchan and C{\'{e}}cile Paris}, editor = {Liliana Ardissono and Tsvi Kuflik}, title = {Building Trust Communities Using Social Trust}, booktitle = {Advances in User Modeling - {UMAP} 2011 Workshops, Girona, Spain, July 11-15, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7138}, pages = {243--255}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28509-7\_23}, doi = {10.1007/978-3-642-28509-7\_23}, timestamp = {Sat, 19 Oct 2019 20:27:24 +0200}, biburl = {https://dblp.org/rec/conf/um/NepalSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/MorelandNHZ10, author = {David Moreland and Surya Nepal and Hon Hwang and John Zic}, title = {A snapshot of trusted personal devices applicable to transaction processing}, journal = {Pers. Ubiquitous Comput.}, volume = {14}, number = {4}, pages = {347--361}, year = {2010}, url = {https://doi.org/10.1007/s00779-009-0235-6}, doi = {10.1007/S00779-009-0235-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/MorelandNHZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/BouguettayaNSZWCLLWL10, author = {Athman Bouguettaya and Surya Nepal and Wanita Sherchan and Xuan Zhou and Jemma Wu and Shiping Chen and Dongxi Liu and Lily Li and Hongbing Wang and Xumin Liu}, title = {End-to-End Service Support for Mashups}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {3}, number = {3}, pages = {250--263}, year = {2010}, url = {https://doi.org/10.1109/TSC.2010.34}, doi = {10.1109/TSC.2010.34}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/BouguettayaNSZWCLLWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/SherchanNHB10, author = {Wanita Sherchan and Surya Nepal and Jonathon Hunklinger and Athman Bouguettaya}, title = {A Trust Ontology for Semantic Services}, booktitle = {2010 {IEEE} International Conference on Services Computing, {SCC} 2010, Miami, Florida, USA, July 5-10, 2010}, pages = {313--320}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SCC.2010.42}, doi = {10.1109/SCC.2010.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/SherchanNHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/YaoCNLZ10, author = {Jinhui Yao and Shiping Chen and Surya Nepal and David Levy and John Zic}, title = {TrustStore: Making Amazon {S3} Trustworthy with Services Composition}, booktitle = {10th {IEEE/ACM} International Conference on Cluster, Cloud and Grid Computing, CCGrid 2010, 17-20 May 2010, Melbourne, Victoria, Australia}, pages = {600--605}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CCGRID.2010.17}, doi = {10.1109/CCGRID.2010.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/YaoCNLZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/LiuLJNZ10, author = {Dongxi Liu and Jack Lee and Julian Jang and Surya Nepal and John Zic}, title = {A Cloud Architecture of Virtual Trusted Platform Modules}, booktitle = {{IEEE/IFIP} 8th International Conference on Embedded and Ubiquitous Computing, {EUC} 2010, Hong Kong, China, 11-13 December 2010}, pages = {804--811}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/EUC.2010.125}, doi = {10.1109/EUC.2010.125}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/LiuLJNZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/NepalZLJ10, author = {Surya Nepal and John Zic and Dongxi Liu and Julian Jang}, title = {Trusted Computing Platform in Your Pocket}, booktitle = {{IEEE/IFIP} 8th International Conference on Embedded and Ubiquitous Computing, {EUC} 2010, Hong Kong, China, 11-13 December 2010}, pages = {812--817}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/EUC.2010.126}, doi = {10.1109/EUC.2010.126}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/NepalZLJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/BouguettayaCLLLNSWZ10, author = {Athman Bouguettaya and Shiping Chen and Lily Li and Dongxi Liu and Qing Liu and Surya Nepal and Wanita Sherchan and Jemma Wu and Xuan Zhou}, editor = {Paul P. Maglio and Mathias Weske and Jian Yang and Marcelo Fantinato}, title = {Managing Web Services: An Application in Bioinformatics}, booktitle = {Service-Oriented Computing - 8th International Conference, {ICSOC} 2010, San Francisco, CA, USA, December 7-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6470}, pages = {704--705}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17358-5\_64}, doi = {10.1007/978-3-642-17358-5\_64}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/BouguettayaCLLLNSWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/NepalSHB10, author = {Surya Nepal and Wanita Sherchan and Jonathon Hunklinger and Athman Bouguettaya}, title = {A Fuzzy Trust Management Framework for Service Web}, booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2010, Miami, Florida, USA, July 5-10, 2010}, pages = {321--328}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICWS.2010.52}, doi = {10.1109/ICWS.2010.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/NepalSHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/JangLNZ10, author = {Julian Jang and Dongxi Liu and Surya Nepal and John Zic}, editor = {Andreas U. Schmidt and Giovanni Russello and Antonio Lioy and Neeli R. Prasad and Shiguo Lian}, title = {User Authentication for Online Applications Using a USB-Based Trust Device}, booktitle = {Security and Privacy in Mobile Information and Communication Systems - Second International {ICST} Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {47}, pages = {15--26}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17502-2\_2}, doi = {10.1007/978-3-642-17502-2\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/JangLNZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soca/NepalSB10, author = {Surya Nepal and Wanita Sherchan and Athman Bouguettaya}, title = {A behaviour-based trust model for service web}, booktitle = {{IEEE} International Conference on Service-Oriented Computing and Applications, {SOCA} 2010, 13-15 December 2010, Perth, Australia}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SOCA.2010.5707183}, doi = {10.1109/SOCA.2010.5707183}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soca/NepalSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/ChenNB10, author = {Shiping Chen and Surya Nepal and Athman Bouguettaya}, editor = {Dickson K. W. Chiu and Ladjel Bellatreche and Hideyasu Sasaki and Ho{-}fung Leung and Shing{-}Chi Cheung and Haiyang Hu and Jie Shao}, title = {A Smart User Interface for Service-Oriented Web}, booktitle = {Web Information Systems Engineering - {WISE} 2010 Workshops - {WISE} 2010 International Symposium WISS, and International Workshops CISE, MBC, Hong Kong, China, December 12-14, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6724}, pages = {318--330}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-24396-7\_25}, doi = {10.1007/978-3-642-24396-7\_25}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wise/ChenNB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/ChenNCMZ09, author = {Shiping Chen and Surya Nepal and Jonathan Chan and David Moreland and John Zic}, title = {A Service-Oriented Architecture to enable virtual storage services: a dynamic collaboration context}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {4}, number = {2}, pages = {95--107}, year = {2009}, url = {https://doi.org/10.1504/IJAHUC.2009.023900}, doi = {10.1504/IJAHUC.2009.023900}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/ChenNCMZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jwsr/NepalZC09, author = {Surya Nepal and John Zic and Thi Chau}, title = {An Approach to Checking Compatibility of Service Contracts in Service-Oriented Applications}, journal = {Int. J. Web Serv. Res.}, volume = {6}, number = {2}, pages = {42--65}, year = {2009}, url = {https://doi.org/10.4018/jwsr.2009040103}, doi = {10.4018/JWSR.2009040103}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jwsr/NepalZC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/NepalMB09, author = {Surya Nepal and Zaki Malik and Athman Bouguettaya}, title = {Reputation Propagation in Composite Services}, booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2009, Los Angeles, CA, USA, 6-10 July 2009}, pages = {295--302}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICWS.2009.54}, doi = {10.1109/ICWS.2009.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/NepalMB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/JangNZ08, author = {Julian Jang and Surya Nepal and John Zic}, editor = {Qiang Wu and Xiangjian He and Quang Vinh Nguyen and Wenjing Jia and Mao Lin Huang}, title = {Trusted Email protocol: Dealing with privacy concerns from malicious email intermediaries}, booktitle = {Proceedings of 8th {IEEE} International Conference on Computer and Information Technology, {CIT} 2008, Sydney, Australia, July 8-11, 2008}, pages = {402--407}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIT.2008.4594709}, doi = {10.1109/CIT.2008.4594709}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEcit/JangNZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/NepalZ08, author = {Surya Nepal and John Zic}, title = {A Conflict Neighbouring Negotiation Algorithm for Resource Services in Dynamic Collaborations}, booktitle = {2008 {IEEE} International Conference on Services Computing {(SCC} 2008), 8-11 July 2008, Honolulu, Hawaii, {USA}}, pages = {283--290}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SCC.2008.18}, doi = {10.1109/SCC.2008.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/NepalZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/NepalZC08, author = {Surya Nepal and John Zic and Shiping Chen}, title = {{WSLA+:} Web Service Level Agreement Language for Collaborations}, booktitle = {2008 {IEEE} International Conference on Services Computing {(SCC} 2008), 8-11 July 2008, Honolulu, Hawaii, {USA}}, pages = {485--488}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SCC.2008.66}, doi = {10.1109/SCC.2008.66}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/NepalZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aswec/ChenMNZ08, author = {Shiping Chen and David Moreland and Surya Nepal and John Zic}, title = {Yet Another Performance Testing Framework}, booktitle = {19th Australian Software Engineering Conference {(ASWEC} 2008), March 25-28, 2008, Perth, Australia}, pages = {170--179}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.ieeecomputersociety.org/10.1109/ASWEC.2008.53}, doi = {10.1109/ASWEC.2008.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aswec/ChenMNZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/LiuNMCWZ08, author = {Dongxi Liu and Surya Nepal and David Moreland and Shiping Chen and Chen Wang and John Zic}, editor = {Elisa Bertino and James B. D. Joshi}, title = {Secure and Conditional Resource Coordination for Successful Collaborations}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {10}, pages = {287--303}, publisher = {Springer / {ICST}}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03354-4\_22}, doi = {10.1007/978-3-642-03354-4\_22}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/LiuNMCWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/NepalZC08, author = {Surya Nepal and John Zic and Shiping Chen}, editor = {Elisa Bertino and James B. D. Joshi}, title = {A Contract Language for Service-Oriented Dynamic Collaborations}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {10}, pages = {545--562}, publisher = {Springer / {ICST}}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03354-4\_41}, doi = {10.1007/978-3-642-03354-4\_41}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/NepalZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/ChenNWZ08, author = {Shiping Chen and Surya Nepal and Chen Wang and John Zic}, title = {Facilitating Dynamic Collaborations with eContract Services}, booktitle = {2008 {IEEE} International Conference on Web Services {(ICWS} 2008), September 23-26, 2008, Beijing, China}, pages = {521--528}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICWS.2008.122}, doi = {10.1109/ICWS.2008.122}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/ChenNWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/NepalZC08, author = {Surya Nepal and John Zic and Shiping Chen}, title = {{WS-CCDL:} {A} Framework for Web Service Collaborative Context Definition Language for Dynamic Collaborations}, booktitle = {2008 {IEEE} International Conference on Web Services {(ICWS} 2008), September 23-26, 2008, Beijing, China}, pages = {781--784}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICWS.2008.45}, doi = {10.1109/ICWS.2008.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/NepalZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/WangNCZ08, author = {Chen Wang and Surya Nepal and Shiping Chen and John Zic}, editor = {Robert Meersman and Zahir Tari}, title = {Cooperative Data Management Services Based on Accountable Contract}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2008, {OTM} 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and {ODBASE} 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {5331}, pages = {301--318}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88871-0\_21}, doi = {10.1007/978-3-540-88871-0\_21}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/WangNCZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhisi/NepalZJK07, author = {Surya Nepal and John Zic and Frederic Jaccard and Gregoire Kraehenbuehl}, title = {A Trusted System for Sharing Patient Electronic Medical Records in Autonomous Distributed Health Care Systems}, journal = {Int. J. Heal. Inf. Syst. Informatics}, volume = {2}, number = {1}, pages = {14--35}, year = {2007}, url = {https://doi.org/10.4018/jhisi.2007010102}, doi = {10.4018/JHISI.2007010102}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhisi/NepalZJK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/NepalCCMZ07, author = {Surya Nepal and Jonathan Chan and Shiping Chen and David Moreland and John Zic}, title = {An Infrastructure Virtualisation {SOA} for VNO-based Business Models}, booktitle = {2007 {IEEE} International Conference on Services Computing {(SCC} 2007), 9-13 July 2007, Salt Lake City, Utah, {USA}}, pages = {44--51}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SCC.2007.26}, doi = {10.1109/SCC.2007.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/NepalCCMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cidr/GreenfieldFJKN07, author = {Paul Greenfield and Alan D. Fekete and Julian Jang and Dean Kuo and Surya Nepal}, title = {Isolation Support for Service-based Applications: {A} Position Paper}, booktitle = {Third Biennial Conference on Innovative Data Systems Research, {CIDR} 2007, Asilomar, CA, USA, January 7-10, 2007, Online Proceedings}, pages = {314--323}, publisher = {www.cidrdb.org}, year = {2007}, url = {http://cidrdb.org/cidr2007/papers/cidr07p36.pdf}, timestamp = {Mon, 18 Jul 2022 17:13:00 +0200}, biburl = {https://dblp.org/rec/conf/cidr/GreenfieldFJKN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/NepalZHM07, author = {Surya Nepal and John Zic and Hon Hwang and David Moreland}, editor = {Robert Meersman and Zahir Tari}, title = {Trust Extension Device: Providing Mobility and Portability of Trust in Cooperative Information Systems}, booktitle = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, {OTM} Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4803}, pages = {253--271}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76848-7\_17}, doi = {10.1007/978-3-540-76848-7\_17}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/NepalZHM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/NepalZJ07, author = {Surya Nepal and John Zic and Julian Jang}, editor = {Robert Meersman and Zahir Tari}, title = {A Policy Based Approach to Managing Shared Data in Dynamic Collaborations}, booktitle = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, {OTM} Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4804}, pages = {1296--1303}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76843-2\_11}, doi = {10.1007/978-3-540-76843-2\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/NepalZJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/NepalZC07, author = {Surya Nepal and John Zic and Jonathan Chan}, editor = {David S. Munro and Hong Shen and Quan Z. Sheng and Henry Detmold and Katrina Falkner and Cruz Izu and Paul D. Coddington and Bradley Alexander and Si{-}Qing Zheng}, title = {A Distributed Approach for Negotiating Resource Contributions in Dynamic Collaboration}, booktitle = {Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies {(PDCAT} 2007), 3-6 December 2007, Adelaide, Australia}, pages = {82--86}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PDCAT.2007.34}, doi = {10.1109/PDCAT.2007.34}, timestamp = {Mon, 17 Jul 2023 13:04:30 +0200}, biburl = {https://dblp.org/rec/conf/pdcat/NepalZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/NepalJZ07, author = {Surya Nepal and Julian Jang and John Zic}, editor = {David S. Munro and Hong Shen and Quan Z. Sheng and Henry Detmold and Katrina Falkner and Cruz Izu and Paul D. Coddington and Bradley Alexander and Si{-}Qing Zheng}, title = {Anitya: An Ephemeral Data Management Service and Secure Data Access Protocols for Dynamic Collaborations}, booktitle = {Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies {(PDCAT} 2007), 3-6 December 2007, Adelaide, Australia}, pages = {219--226}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PDCAT.2007.33}, doi = {10.1109/PDCAT.2007.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/NepalJZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/ChenNCMZ07, author = {Shiping Chen and Surya Nepal and Jonathan Chan and David Moreland and John Zic}, title = {Virtual Storage Services for Dynamic Collaborations}, booktitle = {16th {IEEE} International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises {(WETICE} 2007), 18-20 June 2007, Paris, France}, pages = {186--191}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.ieeecomputersociety.org/10.1109/WETICE.2007.188}, doi = {10.1109/WETICE.2007.188}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/ChenNCMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/ChanNMHCZ07, author = {Jonathan Chan and Surya Nepal and David Moreland and Hon Hwang and Shiping Chen and John Zic}, title = {User-Controlled Collaborations in the Context of Trust Extended Environments}, booktitle = {16th {IEEE} International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises {(WETICE} 2007), 18-20 June 2007, Paris, France}, pages = {389--394}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.ieeecomputersociety.org/10.1109/WETICE.2007.186}, doi = {10.1109/WETICE.2007.186}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/ChanNMHCZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/NepalZC06, author = {Surya Nepal and John Zic and Thi Chau}, title = {Compatibility of Service Contracts in Service-Oriented Ap}, booktitle = {2006 {IEEE} International Conference on Services Computing {(SCC} 2006), 18-22 September 2006, Chicago, Illinois, {USA}}, pages = {28--35}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SCC.2006.33}, doi = {10.1109/SCC.2006.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/NepalZC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aswec/BhuiyanNZ06, author = {Jenny Bhuiyan and Surya Nepal and John J. Zic}, title = {Checking Conformance between Business Processes and Web Service Contract in Service Oriented Applications}, booktitle = {17th Australian Software Engineering Conference {(ASWEC} 2006), 18-21 April 2006, Sydney, Australia}, pages = {80--89}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ASWEC.2006.20}, doi = {10.1109/ASWEC.2006.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aswec/BhuiyanNZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eceh/NepalZKJ06, author = {Surya Nepal and John Zic and Gregoire Kraehenbuehl and Frederic Jaccard}, editor = {Henrik Stormer and Andreas Meier and Michael Schumacher}, title = {Secure Sharing of Electronic Patient Records}, booktitle = {European Conference on eHealth 2006, Proceedings of the ECEH'06, Fribourg, Switzerland, October 12-13, 2006}, series = {{LNI}}, volume = {{P-91}}, pages = {47--58}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24006}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eceh/NepalZKJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbtw/NepalZJK06, author = {Surya Nepal and John J. Zic and Frederic Jaccard and Gregoire Kraehenbuehl}, editor = {Torsten Grust and Hagen H{\"{o}}pfner and Arantza Illarramendi and Stefan Jablonski and Marco Mesiti and Sascha M{\"{u}}ller and Paula{-}Lavinia Patranjan and Kai{-}Uwe Sattler and Myra Spiliopoulou and Jef Wijsen}, title = {A Tag-Based Data Model for Privacy-Preserving Medical Applications}, booktitle = {Current Trends in Database Technology - {EDBT} 2006, {EDBT} 2006 Workshops PhD, DataX, IIDB, IIHA, ICSNW, QLQP, PIM, PaRMA, and Reactivity on the Web, Munich, Germany, March 26-31, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4254}, pages = {433--444}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11896548\_34}, doi = {10.1007/11896548\_34}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/edbtw/NepalZJK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/JangFGN06, author = {Julian Jang and Alan D. Fekete and Paul Greenfield and Surya Nepal}, title = {An Event-Driven Workflow Engine for Service-based Business Systems}, booktitle = {Tenth {IEEE} International Enterprise Distributed Object Computing Conference {(EDOC} 2006), 16-20 October 2006, Hong Kong, China}, pages = {233--242}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/EDOC.2006.16}, doi = {10.1109/EDOC.2006.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/JangFGN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/KuoFGNZPW06, author = {Dean Kuo and Alan D. Fekete and Paul Greenfield and Surya Nepal and John Zic and Savas Parastatidis and Jim Webber}, title = {Expressing and Reasoning about Service Contracts in Service-Oriented Computing}, booktitle = {2006 {IEEE} International Conference on Web Services {(ICWS} 2006), 18-22 September 2006, Chicago, Illinois, {USA}}, pages = {915--918}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICWS.2006.62}, doi = {10.1109/ICWS.2006.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/KuoFGNZPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/JangNZ06, author = {Julian Jang and Surya Nepal and John Zic}, editor = {Robert Meersman and Zahir Tari}, title = {Establishing a Trust Relationship in Cooperative Information Systems}, booktitle = {On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE, {OTM} Confederated International Conferences, CoopIS, DOA, GADA, and {ODBASE} 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4275}, pages = {426--443}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11914853\_26}, doi = {10.1007/11914853\_26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/JangNZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0612113, author = {Paul Greenfield and Alan D. Fekete and Julian Jang and Dean Kuo and Surya Nepal}, title = {Isolation Support for Service-based Applications: {A} Position Paper}, journal = {CoRR}, volume = {abs/cs/0612113}, year = {2006}, url = {http://arxiv.org/abs/cs/0612113}, eprinttype = {arXiv}, eprint = {cs/0612113}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0612113.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/SrinivasanPNLGB05, author = {Uma Srinivasan and Silvia Pfeiffer and Surya Nepal and Michael H. Lee and Lifang Gu and Stephen Barrass}, title = {A Survey of {MPEG-1} Audio, Video and Semantic Analysis Techniques}, journal = {Multim. Tools Appl.}, volume = {27}, number = {1}, pages = {105--141}, year = {2005}, url = {https://doi.org/10.1007/s11042-005-2716-6}, doi = {10.1007/S11042-005-2716-6}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/SrinivasanPNLGB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/NepalFGJKS05, author = {Surya Nepal and Alan D. Fekete and Paul Greenfield and Julian Jang and Dean Kuo and Tony Shi}, editor = {Robert Meersman and Zahir Tari and Mohand{-}Said Hacid and John Mylopoulos and Barbara Pernici and {\"{O}}zalp Babaoglu and Hans{-}Arno Jacobsen and Joseph P. Loyall and Michael Kifer and Stefano Spaccapietra}, title = {A Service-Oriented Workflow Language for Robust Interacting Applications}, booktitle = {On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE, {OTM} Confederated International Conferences CoopIS, DOA, and {ODBASE} 2005, Agia Napa, Cyprus, October 31 - November 4, 2005, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3760}, pages = {40--58}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11575771\_6}, doi = {10.1007/11575771\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/NepalFGJKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vldb/GreenfieldKNF05, author = {Paul Greenfield and Dean Kuo and Surya Nepal and Alan D. Fekete}, editor = {Klemens B{\"{o}}hm and Christian S. Jensen and Laura M. Haas and Martin L. Kersten and Per{-}{\AA}ke Larson and Beng Chin Ooi}, title = {Consistency for Web Services Applications}, booktitle = {Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30 - September 2, 2005}, pages = {1199--1203}, publisher = {{ACM}}, year = {2005}, url = {http://www.vldb.org/archives/website/2005/program/paper/thu/p1199-greenfield.pdf}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vldb/GreenfieldKNF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LeeNS03, author = {Michael H. Lee and Surya Nepal and Uma Srinivasan}, title = {Edge-based semantic classification of sports video sequences}, booktitle = {Proceedings of the 2003 {IEEE} International Conference on Multimedia and Expo, {ICME} 2003, 6-9 July 2003, Baltimore, MD, {USA}}, pages = {157--160}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICME.2003.1220878}, doi = {10.1109/ICME.2003.1220878}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/LeeNS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/NepalS03, author = {Surya Nepal and Uma Srinivasan}, title = {Adaptive video highlights for wired and wireless platforms}, booktitle = {Proceedings of the 2003 {IEEE} International Conference on Multimedia and Expo, {ICME} 2003, 6-9 July 2003, Baltimore, MD, {USA}}, pages = {269--272}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICME.2003.1220906}, doi = {10.1109/ICME.2003.1220906}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/NepalS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mir/NepalS03, author = {Surya Nepal and Uma Srinivasan}, editor = {Nicu Sebe and Michael S. Lew and Chabane Djeraba}, title = {{DAVE:} a system for quality driven adaptive video delivery}, booktitle = {Proceedings of the 5th {ACM} {SIGMM} International Workshop on Multimedia Information Retrieval, {MIR} 2003, November 7, 2003, Berkeley, CA, {USA}}, pages = {223--230}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/973264.973299}, doi = {10.1145/973264.973299}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mir/NepalS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/RatnaikeSN03, author = {A. Viranga Ratnaike and Bala Srinivasan and Surya Nepal}, editor = {Lawrence A. Rowe and Harrick M. Vin and Thomas Plagemann and Prashant J. Shenoy and John R. Smith}, title = {Making sense of video content}, booktitle = {Proceedings of the Eleventh {ACM} International Conference on Multimedia, Berkeley, CA, USA, November 2-8, 2003}, pages = {650--651}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/957013.957153}, doi = {10.1145/957013.957153}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/RatnaikeSN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adc/RamakrishnaNS02, author = {M. V. Ramakrishna and Surya Nepal and P. K. Srivastava}, editor = {Xiaofang Zhou}, title = {A Heuristic Algorithm for Combining Fuzzy Results in Multimedia Databases}, booktitle = {Database Technologies 2002, Thirteenth Australasian Database Conference (ADC2002), Monash University, Melbourne, Victoria, Australia, January/February 2002}, series = {{CRPIT}}, volume = {5}, publisher = {Australian Computer Society}, year = {2002}, timestamp = {Wed, 20 Nov 2019 16:52:44 +0100}, biburl = {https://dblp.org/rec/conf/adc/RamakrishnaNS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vdb/NepalS02, author = {Surya Nepal and Uma Srinivasan}, editor = {Xiaofang Zhou and Pearl Pu}, title = {Spatio-temporal Modelling and Querying Video Databases Using High-level Concepts}, booktitle = {Visual and Multimedia Information Management, {IFIP} {TC2/WG2.6} Sixth Working Conference on Visual Database Systems, May 29-31, 2002, Brisbane, Australia}, series = {{IFIP} Conference Proceedings}, volume = {216}, pages = {187--201}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vdb/NepalS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vip/LeeNS02, author = {Michael H. Lee and Surya Nepal and Uma Srinivasan}, editor = {Jesse S. Jin and Peter Eades and David Dagan Feng and Hong Yan}, title = {Role of Edge Detection in Video Semantics}, booktitle = {Visualisation 2002, Selected Papers from the Pan-Sydney Area Workshop on Visual Information Processing, {VIP2002}}, series = {{CRPIT}}, volume = {22}, pages = {59--68}, publisher = {Australian Computer Society}, year = {2002}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV22Lee.html}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vip/LeeNS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/NepalSR01, author = {Surya Nepal and Uma Srinivasan and Graham J. Reynolds}, title = {Semantic Based Retrieval Model for Digital Audio and Video}, booktitle = {Proceedings of the 2001 {IEEE} International Conference on Multimedia and Expo, {ICME} 2001, August 22-25, 2001, Tokyo, Japan}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ICME.2001.1237924}, doi = {10.1109/ICME.2001.1237924}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/NepalSR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/NepalSR01, author = {Surya Nepal and Uma Srinivasan and Graham J. Reynolds}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {Automatic detection of 'Goal' segments in basketball videos}, booktitle = {Proceedings of the 9th {ACM} International Conference on Multimedia 2001, Ottawa, Ontario, Canada, September 30 - October 5, 2001}, pages = {261--269}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/500141.500181}, doi = {10.1145/500141.500181}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mm/NepalSR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/irma/NepalR00, author = {Surya Nepal and M. V. Ramakrishna}, editor = {Mehdi Khosrowpour}, title = {An evaluation measure for query processing in {CBIR} systems}, booktitle = {Challenges of Information Technology Management in the 21st Century, 2000 Information Resources Management Association International Conference, Anchorage, Alaska, USA, May 21-24, 2000}, pages = {41--45}, publisher = {{IDEA} Group Publishing}, year = {2000}, timestamp = {Wed, 30 Aug 2006 11:04:01 +0200}, biburl = {https://dblp.org/rec/conf/irma/NepalR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasfaa/NepalRT99, author = {Surya Nepal and M. V. Ramakrishna and James A. Thom}, editor = {Arbee L. P. Chen and Frederick H. Lochovsky}, title = {A Fuzzy Object Query Language {(FOQL)} for Image Databases}, booktitle = {Database Systems for Advanced Applications, Proceedings of the Sixth International Conference on Database Systems for Advanced Applications (DASFAA), April 19-21, Hsinchu, Taiwan}, pages = {117--124}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/DASFAA.1999.765743}, doi = {10.1109/DASFAA.1999.765743}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasfaa/NepalRT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/NepalR99, author = {Surya Nepal and M. V. Ramakrishna}, editor = {Masaru Kitsuregawa and Michael P. Papazoglou and Calton Pu}, title = {Query Processing Issues in Image (Multimedia) Databases}, booktitle = {Proceedings of the 15th International Conference on Data Engineering, Sydney, Australia, March 23-26, 1999}, pages = {22--29}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/ICDE.1999.754894}, doi = {10.1109/ICDE.1999.754894}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/NepalR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adc/NepalRT98, author = {Surya Nepal and M. V. Ramakrishna and James A. Thom}, editor = {John F. Roddick}, title = {Four Layer Schema for Image Modeling}, booktitle = {Database Systems 98, Proceedings of the 9th Australasian Database Conference, {ADC} '98, Perth, Australia, 2-3 February 1998}, series = {Australian Computer Science Communications}, volume = {20}, number = {2}, pages = {189--200}, publisher = {Springer}, year = {1998}, timestamp = {Mon, 29 Sep 2014 17:13:50 +0200}, biburl = {https://dblp.org/rec/conf/adc/NepalRT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigir/NepalRT98, author = {Surya Nepal and M. V. Ramakrishna and James A. Thom}, editor = {W. Bruce Croft and Alistair Moffat and C. J. van Rijsbergen and Ross Wilkinson and Justin Zobel}, title = {A Research Prototype Image Retrieval System}, booktitle = {{SIGIR} '98: Proceedings of the 21st Annual International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval, August 24-28 1998, Melbourne, Australia}, pages = {386}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/290941.291075}, doi = {10.1145/290941.291075}, timestamp = {Tue, 06 Nov 2018 11:07:23 +0100}, biburl = {https://dblp.org/rec/conf/sigir/NepalRT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.