default search action
17th TrustCom / 12th BigDataSE 2018: New York, NY, USA
- 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018. IEEE 2018, ISBN 978-1-5386-4388-4
IEEE TrustCom 2018
Track 1: Trust Track 1
- Scot Tucker:
Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust. 1-9 - Yubiao Wang, Junhao Wen, Wei Zhou, Fengji Luo:
A Novel Dynamic Cloud Service Trust Evaluation Model in Cloud Computing. 10-15 - Yongkai Fan, Shengle Liu, Gang Tan, Xiaodong Lin, Guanqun Zhao, Jianrong Bai:
One Secure Access Scheme Based on Trusted Execution Environment. 16-21 - Tianao Ma, Wei Hu, Yonghao Wang, Dalia El-Banna, John Grant, Hongjun Dai:
Evaluation of Flexilink as Deterministic Unified Real-Time Protocol for Industrial Networks. 22-27
Track 1: Trust Track 2
- Ghada El Haddad, Esma Aïmeur, Hicham Hage:
Understanding Trust, Privacy and Financial Fears in Online Payment. 28-36 - Sebastian Friebe, Ingo Sobik, Martina Zitterbart:
DecentID: Decentralized and Privacy-Preserving Identity Storage System Using Smart Contracts. 37-42 - Monika Ewa Rakoczy, Amel Bouzeghoub, Alda Lopes Gançarski, Katarzyna Wegrzyn-Wolska:
Reputation Prediction Using Influence Conversion. 43-48 - Mostafa Kahla, Mohamed Azab, Ahmed Mansour:
Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments. 49-54
Track 1: Trust Track 3
- Mohamed Azab, Ahmed Hamdy, Ahmed Mansour:
Repoxy: Replication Proxy for Trustworthy SDN Controller Operation. 55-60 - Concepcion Sanchez Aleman, Niki Pissinou, Sheila Alemany, Georges A. Kamhoua:
A Dynamic Trust Weight Allocation Technique for Data Reconstruction in Mobile Wireless Sensor Networks. 61-67 - Jian Chen, Ziyang Chen, Peijia Zheng, Jianting Guo, Wei Zhang, Jiwu Huang:
Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio Watermarking. 68-73 - Bumjin Gwak, Jin-Hee Cho, Dongman Lee, Heesuk Son:
TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things. 74-85
Track 1: Trust Track 4
- Jian Chen, Peijia Zheng, Jianting Guo, Wei Zhang, Jiwu Huang:
A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication and Protection. 86-91 - Manu Elappila, Suchismita Chinara:
Dynamic Survivable Path Routing for Fast Changing IoT Network Topologies. 92-97 - Zhaojun Lu, Qian Wang, Gang Qu, Zhenglin Liu:
BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs. 98-103 - Abu Shohel Ahmed, Tuomas Aura:
Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure. 104-111
Track 1: Trust Track 5
- Ibrahim Tariq Javed, Khalifa Toumi, Noël Crespi:
N-Combat: A Nuisance Call Combating Framework for Internet Telephony. 112-117 - Muhammad Saleem Khan, Saira Waris, Idrees Ahmed, Majid Iqbal Khan:
A Comprehensive Analysis of Packet Loss in MANETs. 118-123 - Sheikh Mahbub Habib, Nikolaos Alexopoulos, Md Monirul Islam, Jens Heider, Stephen Marsh, Max Mühlhäuser:
Trust4App: Automating Trustworthiness Assessment of Mobile Applications. 124-135 - Shunan Ma, Xunbo Shuai, Zhaohua Zhou, Kechun Qiao:
Bionic Mechanism Based Dynamic Trust Evaluation Method in Cloud Environment. 136-141
Track 1: Trust Track 6
- Keju Meng, Fuyou Miao, Yue Yu, Changbin Lu:
A Universal Secret Sharing Scheme with General Access Structure Based on CRT. 142-148 - Gaosheng Liu, Xin Wang, Xiaohong Li, Jianye Hao, Zhiyong Feng:
ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning. 149-155 - Antonio Caliò, Andrea Tagarelli:
Trust-Based Dynamic Linear Threshold Models for Non-competitive and Competitive Influence Propagation. 156-162 - Syed Rizvi, Andrew Kurtz, Joseph R. Pfeffer III, Mohammad Rizvi:
Securing the Internet of Things (IoT): A Security Taxonomy for IoT. 163-168
Track 1: Trust Track 7
- Dapeng Qu, Dengyu Liang, Songlin Wu, Jie Li, Weihong Xuan, Xingwei Wang:
A Trust Energy-Efficient QoS Routing Scheme for Mobile Peer-to-Peer Networks. 169-176 - Tao Sun, Xin Guo, Ting Zhang:
Testing Sequence Generation Method Based on Unrelated Behaviors Serializing. 177-183 - Mark J. Carman, Mark Koerber, Jiuyong Li, Kim-Kwang Raymond Choo, Helen Ashman:
Manipulating Visibility of Political and Apolitical Threads on Reddit via Score Boosting. 184-190 - Ruidan Li, Errin W. Fulp:
Using Evolutionary Approaches to Manage Surveillance Cameras in Dynamic Environments. 191-196 - Jie Zhou, Min Tian:
An Elite Clone Parallel Genetic Algorithm for Trust Monitoring Assignment Problem in Adaptive Wireless Sensor Networks. 197-203 - Hamza Baqa, Nguyen Binh Truong, Noël Crespi, Gyu Myoung Lee, Franck Le Gall:
Quality of Information as an indicator of Trust in the Internet of Things. 204-211
Track 2: Security Track 1
- Mehdi Yousefi, Nhamo Mtetwa, Yan Zhang, Huaglory Tianfield:
A Reinforcement Learning Approach for Attack Graph Analysis. 212-217 - Wenli Shang, Junrong Cui, Chunhe Song, Jianming Zhao, Peng Zeng:
Research on Industrial Control Anomaly Detection Based on FCM and SVM. 218-222 - Sha Ma:
Authorized Equality Test of Encrypted Data for Secure Cloud Databases. 223-230
Track 2: Security Track 2
- Weitao Xu, Sanjay Jha, Wen Hu:
Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN. 231-236 - Jiewen Mao, Weijun Deng, Fuke Shen:
DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple Traffic Features. 237-243 - Martin Schanzenbach, Christian Banse, Julian Schütte:
Practical Decentralized Attribute-Based Delegation Using Secure Name Systems. 244-251 - Lingtao Qi, Haiping Huang, Peng Wang, Ru Chuan Wang:
Abnormal Item Detection Based on Time Window Merging for Recommender Systems. 252-259
Track 2: Security Track 3
- Ekaterina Volodina, Adnan Aziz, Erwin P. Rathgeb, Tobias Hoßfeld:
Application of Visual Analysis to Detect and Analyze Patterns in VoIP Attack Traffic. 260-268 - Qiang Li, Zhengwei Jiang, Zeming Yang, Baoxu Liu, Xin Wang, Yunan Zhang:
A Quality Evaluation Method of Cyber Threat Intelligence in User Perspective. 269-276 - Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Towards Better Ocular Recognition for Secure Real-World Applications. 277-282 - Pengfei Wang, Fengyu Wang, Fengbo Lin, Zhenzhong Cao:
Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis. 283-288
Track 2: Security Track 4
- Julian Schütte, Gerd Stefan Brost:
LUCON: Data Flow Control for Message-Based IoT Systems. 289-299 - Yiwen Gao, Wei Cheng, Hailong Zhang, Yongbin Zhou:
Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages. 300-306 - Hui Xie, Kun Lv, Changzhen Hu:
An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis. 307-315 - Devu Manikantan Shila, Emeka Eyisi:
Adversarial Gait Detection on Mobile Devices Using Recurrent Neural Networks. 316-321
Track 2: Security Track 5
- Liting Yu, Dongrong Zhang, Liang Wu, Shuguo Xie, Donglin Su, Xiaoxiao Wang:
AES Design Improvements Towards Information Security Considering Scan Attack. 322-326 - Lal Hussain, Wajid Aziz, Sharjil Saeed, Saima Rathore, Muhammad Rafique:
Automated Breast Cancer Detection Using Machine Learning Techniques by Extracting Different Feature Extracting Strategies. 327-331 - Zhenya Chen, Weifeng Liu, Ying Yang, Jizhi Wang, Meng Guo, Lijuan Chen, Guang Yang, Jie Zhou:
Electronic Evidence Service Research in Cloud Computing Environment. 332-338
Track 2: Security Track 6
- Shuang Wei, Shuaifu Dai, Xinfeng Wu, Xinhui Han:
STDC: A SDN-Oriented Two-Stage DDoS Detection and Defence System Based on Clustering. 339-347 - Yang Lu, Richard O. Sinnott, Karin Verspoor:
Semantic-Based Policy Composition for Privacy-Demanding Data Linkage. 348-359 - Jiarong Wang, Lijun Cai, Aimin Yu, Min Zhu, Dan Meng:
TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records. 360-371 - Shao-Chien Chen, Yi-Ruei Chen, Wen-Guey Tzeng:
Effective Botnet Detection Through Neural Networks on Convolutional Features. 372-378
Track 2: Security Track 7
- Talal Halabi, Martine Bellaïche, Adel Abusitta:
Online Allocation of Cloud Resources Based on Security Satisfaction. 379-384 - Katarzyna Kapusta, Gérard Memmi:
Enhancing Data Protection in a Distributed Storage Environment Using Structure-Wise Fragmentation and Dispersal of Encrypted Data. 385-390 - Sumit Kumar Tetarave, Somanath Tripathy, Ezhil Kalaimannan, Caroline John:
eBot: Approach Towards Modeling an Advanced P2P Botnet. 391-396 - Huikang Cao, Ruixuan Li, Wenlong Tian, Zhiyong Xu, Weijun Xiao:
A Practical Accountability Scheme for Oblivious RAM in Cloud Storage. 397-402
Track 2: Security Track 8
- Nour El Madhoun, Emmanuel Bertin, Guy Pujolle:
For Small Merchants: A Secure Smartphone-Based Architecture to Process and Accept NFC Payments. 403-411 - Noboru Kunihiro, Wenjie Lu, Takashi Nishide, Jun Sakuma:
Outsourced Private Function Evaluation with Privacy Policy Enforcement. 412-423 - Fabrizio Biondi, Thomas Given-Wilson, Axel Legay:
Universal Optimality of Apollonian Cell Encoders. 424-435 - Firas Saidi, Zouheir Trabelsi, Henda Ben Ghézala:
An Evidential Clustering Based Framework for Cyber Terrorist Cells Topology Identification. 436-443
Track 2: Security Track 9
- Nilesh Chakraborty, Shreya Singh, Samrat Mondal:
On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness. 444-455 - Hatem Ismail, Stefanie Roos, Neeraj Suri:
A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems. 456-464 - Filipe Apolinario, Miguel L. Pardal, Miguel Correia:
S-Audit: Efficient Data Integrity Verification for Cloud Storage. 465-474 - Zechun Cao, Shou-Hsuan Stephen Huang:
Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection. 475-480
Track 2: Security Track 10
- Iakovos Gurulian, Konstantinos Markantonakis, Eibe Frank, Raja Naeem Akram:
Good Vibrations: Artificial Ambience-Based Relay Attack Detection. 481-489 - Stephen C. Adams, Bryan T. Carter, Cody H. Fleming, Peter A. Beling:
Selecting System Specific Cybersecurity Attack Patterns Using Topic Modeling. 490-497 - William Ledbetter, William Bradley Glisson, Todd McDonald, Todd R. Andel, George Grispos, Kim-Kwang Raymond Choo:
Digital Blues: An Investigation Into the Use of Bluetooth Protocols. 498-503 - Meera Sridhar, Abhinav Mohanty, Fadi Yilmaz, Vasant Tendulkar, Kevin W. Hamlen:
Inscription: Thwarting ActionScript Web Attacks From Within. 504-515
Track 2: Security Track 11
- George W. Clark, Michael V. Doran, William Glisson:
A Malicious Attack on the Machine Learning Policy of a Robotic System. 516-521 - Hidehito Gomi, Shuji Yamaguchi, Kota Tsubouchi, Naomi Sasaya:
Continuous Authentication System Using Online Activities. 522-532 - Mehdi Nobakht, Yulei Sui, Aruna Seneviratne, Wen Hu:
Permission Analysis of Health and Fitness Apps in IoT Programming Frameworks. 533-538 - Taku Noguchi, Mayuko Hayakawa:
Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks. 539-544
Track 2: Security Track 12
- Tong Liu, Gang Shi, Liwei Chen, Fei Zhang, Yaxuan Yang, Jihu Zhang:
TMDFI: Tagged Memory Assisted for Fine-Grained Data-Flow Integrity Towards Embedded Systems Against Software Exploitation. 545-550 - A. S. M. Kayes, J. Wenny Rahayu, Tharam S. Dillon, Elizabeth Chang:
Accessing Data from Multiple Sources Through Context-Aware Access Control. 551-559 - Chunhua Li, Weirui Xie, Ke Zhou:
Efficient Binary-Encoding Access Control Policy Combination for Large-Scale Collaborative Scenarios. 560-566 - Luis Sacramento, Iberia Medeiros, Joao Bota, Miguel Correia:
FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data Using Network Flows. 567-572
Track 2: Security Track 13
- Hooman Alavizadeh, Julian Jang-Jaccard, Dong Seong Kim:
Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing. 573-578 - Dilli Prasad Sharma, Dong Seong Kim, Seunghyun Yoon, Hyuk Lim, Jin-Hee Cho, Terrence J. Moore:
FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. 579-587 - Simon Yusuf Enoch, Jin B. Hong, Dong Seong Kim:
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models. 588-595 - Andrea Saracino, Francesco Restuccia, Fabio Martinelli:
Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots. 596-607
Track 2: Security Track 14
- Youcef Imine, Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Ahmed Lounis:
MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture. 608-613 - Zechao Liu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Ruoqing Zhang, Yulin Wu:
A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage. 614-623 - Judong Bao, Yongqiang He, Weiping Wen:
DroidPro: An AOTC-Based Bytecode-Hiding Scheme for Packing the Android Applications. 624-632 - Rocio Lopez Perez, Florian Adamsky, Ridha Soua, Thomas Engel:
Machine Learning for Reliable Network Attack Detection in SCADA Systems. 633-638
Track 2: Security Track 15
- Jeffery Garae, Ryan K. L. Ko, Mark D. Apperley:
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach. 639-650 - Eric Klieme, Christian Tietz, Christoph Meinel:
Beware of SMOMBIES: Verification of Users Based on Activities While Walking. 651-660 - Samir G. Sayed, Mohmed Shawkey:
Data Mining Based Strategy for Detecting Malicious PDF Files. 661-667 - Glaidson Menegazzo Verzeletti, Emerson Ribeiro de Mello, Michelle Silva Wangham:
A National Mobile Identity Management Strategy for Electronic Government Services. 668-673
Track 2: Security Track 16
- Nisha Malik, Priyadarsi Nanda, Arushi Arora, Xiangjian He, Deepak Puthal:
Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks. 674-679 - Xiehua Li, Jie Jiang, Yichen Chen:
Fully Decentralized Authentication and Revocation Scheme in Data Sharing Systems. 680-686 - Menghao Zhang, Jun Bi, Jiasong Bai, Guanyu Li:
FloodShield: Securing the SDN Infrastructure Against Denial-of-Service Attacks. 687-698 - Wei Zhang, Dongdai Lin, Hailong Zhang, Xiaojun Zhou, Yiwen Gao:
A Lightweight FourQ Primitive on ARM Cortex-M0. 699-704
Track 2: Security Track 17
- Danjun Liu, Jingyuan Wang, Zelin Rong, Xianya Mi, Fangyu Gai, Yong Tang, Baosheng Wang:
Pangr: A Behavior-Based Automatic Vulnerability Detection and Exploitation Framework. 705-712 - Xiang Liu, Jie Huang, Guowen Zong:
Public Auditing for Network Coding Based Secure Cloud Storage. 713-720 - Syed Rizvi, Joseph Gualdoni, Abdul Razaque:
Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol. 721-726 - Qiwen Wang, Jianguo Jiang, Zhixin Shi, Wen Wang, Bin Lv, Biao Qi, Qilei Yin:
A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios. 727-736
Track 2: Security Track 18
- Guolin Tan, Peng Zhang, Qingyun Liu, Xinran Liu, Chunge Zhu, Fenghu Dou:
Adaptive Malicious URL Detection: Learning in the Presence of Concept Drifts. 737-743 - Liya Su, Yepeng Yao, Ning Li, Junrong Liu, Zhigang Lu, Baoxu Liu:
Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection. 744-753 - Biao Qi, Jianguo Jiang, Zhixin Shi, Rui Mao, Qiwen Wang:
BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection. 754-762 - Guang Yang, Lijun Cai, Aimin Yu, Dan Meng:
A General and Expandable Insider Threat Detection System Using Baseline Anomaly Detection and Scenario-Driven Alarm Filters. 763-773
Track 2: Security Track 19
- Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura:
Provably Secure Password Reset Protocol: Model, Definition, and Construction. 774-782 - Xiang Tian, Yujia Zhu, Zhao Li, Chao Zheng, Yong Sun, Qingyun Liu:
VegaStar: An Illegal Domain Detection System on Large-Scale Video Traffic. 783-789 - Rudrapatna K. Shyamasundar, N. V. Narendra Kumar, Abhijit Taware, Parjanya Vyas:
An Experimental Flow Secure File System. 790-799 - Danjun Liu, Yao Li, Yong Tang, Baosheng Wang, Wei Xie:
VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS. 800-807
Track 2: Security Track 20
- Anshul Arora, Sateesh Kumar Peddoju:
NTPDroid: A Hybrid Android Malware Detector Using Network Traffic and System Permissions. 808-813 - Mohannad Mostafa, Tanushree Banerjee, M. Anwar Hasan:
Energy Exhaustion Attack on Barrett's Reduction. 814-818 - Trusit Shah, Subbarayan Venkatesan:
Authentication of IoT Device and IoT Server Using Secure Vaults. 819-824 - Errin W. Fulp, H. Donald Gage:
Using Feature Selection to Identify Chains of Insecure Software Configuration Parameters. 825-830 - Nouha Oualha:
Reinforcing IoT-Enforced Security Policies. 831-836
Track 2: Security Track 21
- Ruichun Gu, Xiaolong Zhang, Yu Lei, Junxing Zhang:
Enhancing Security and Scalability in Software Defined LTE Core Networks. 837-842 - Jagannadh Vempati, Ram Dantu, Mark A. Thompson:
Uninterrupted Video Surveillance in the Face of an Attack. 843-848 - Wuxu Peng, Linda Huang, Julia Jia, Emma Ingram:
Enhancing the Naive Bayes Spam Filter Through Intelligent Text Modification Detection. 849-854 - Junjie Hou, Yongxin Zhu, Linghe Kong, Zhe Wang, Sen Du, Shijin Song, Tian Huang:
A Case Study of Accelerating Apache Spark with FPGA. 855-860 - Hongbo Chen, Hongjun Dai, Meikang Qiu:
A Multiple Layer Sercurity Architecture for Internet of Things into MVC Design. 861-866
Track 2: Security Track 22
- Kinza Sarwar, Sira Yongchareon, Jian Yu:
Lightweight ECC with Fragile Zero-Watermarking for Internet of Things Security. 867-872 - Kevin Atighehchi, Morgan Barbier:
Signature Renewal for Low Entropy Data. 873-884
Track 2: Security Track 23
- Manmeet Singh Gill, Dale Lindskog, Pavol Zavarsky:
Profiling Network Traffic Behavior for the Purpose of Anomaly-Based Intrusion Detection. 885-890 - Bernd Troegeler, Paul A. Watters:
Steganographic Transports: A Vector for Hidden Secret Internets? 891-896 - Xin Tang, Linna Zhou, Yongfeng Huang, Chin-Chen Chang:
Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption. 897-904 - Gökhan Kul, Shambhu J. Upadhyaya, Varun Chandola:
Detecting Data Leakage from Databases on Android Apps with Concept Drift. 905-913
Track 3: Privacy Track 1
- Wanli Xue, Yiran Shen, Chengwen Luo, Wen Hu, Aruna Seneviratne:
Acies: A Privacy-Preserving System for Edge-Based Classification. 914-919 - Shuo Wang, Richard O. Sinnott, Surya Nepal:
PAIRS: Privacy-Aware Identification and Recommendation of Spatio-Friends. 920-931 - Boyang Wang, Xinxin Fan:
Lightweight Verification for Searchable Encryption. 932-937 - Peter Aaby, Juanjo Mata De Acuna, Richard Macfarlane, William J. Buchanan:
Privacy Parameter Variation Using RAPPOR on a Malware Dataset. 938-945
Track 3: Privacy Track 2
- Martin Schanzenbach, Georg Bramm, Julian Schütte:
reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption. 946-957 - Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Yang Yang, Yinghui Zhang:
PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains. 958-963 - Vaibhav Kulkarni, Arielle Moro, Bertil Chapuis, Benoît Garbinato:
Capstone: Mobility Modeling on Smartphones to Achieve Privacy by Design. 964-971 - Shuo Wang, Richard O. Sinnott, Surya Nepal:
P-GENT: Privacy-Preserving Geocoding of Non-Geotagged Tweets. 972-983
Track 3: Privacy Track 3
- Yuxiang Ma, Yulei Wu, Jingguo Ge, Jun Li:
A Flow-Level Architecture for Balancing Accountability and Privacy. 984-989 - Meng Liu, Priyadarsi Nanda, Xuyun Zhang, Chi Yang, Shui Yu, Jianxin Li:
Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem. 990-995 - Clemens Zeidler, Muhammad Rizwan Asghar:
AuthStore: Password-Based Authentication and Encrypted Data Storage in Untrusted Environments. 996-1001 - Rocco Salvia, Pietro Ferrara, Fausto Spoto, Agostino Cortesi:
SDLI: Static Detection of Leaks Across Intents. 1002-1007
Track 3: Privacy Track 4
- Zijun Yu, Chun Shan, Limin Mao, Changzhen Hu, Wenjie Xiong:
Software System Representation Methods Based on Algebraic Component. 1008-1013 - Wei Zhang, Dongdai Lin, Hailong Zhang, Xiaojun Zhou, Yiwen Gao, Cong Chen:
A Lightweight Multi-precision Squaring on Embedded Processors for ECC. 1014-1019
Track 3: Privacy Track 5
- Yun Feng, Baoxu Liu, Xiang Cui, Chaoge Liu, Xuebin Kang, Junwei Su:
A Systematic Method on PDF Privacy Leakage Issues. 1020-1029 - Yi Qin, Chuan Yue:
Website Fingerprinting by Power Estimation Based Side-Channel Attacks on Android 7. 1030-1039 - Felix Beierle:
Do You Like What I Like? Similarity Estimation in Proximity-Based Mobile Social Networks. 1040-1047 - Fadi Mohsen, Hamed Abdelhaq, Halil Bisgin, Andrew Jolly, Michael Szczepanski:
Countering Intrusiveness Using New Security-Centric Ranking Algorithm Built on Top of Elasticsearch. 1048-1057
Track 3: Privacy Track 6
- Oksana Kulyk, Peter Mayer, Melanie Volkamer, Oliver Kafer:
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface. 1058-1063 - Haibat Khan, Benjamin Dowling, Keith M. Martin:
Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks. 1064-1069 - Yang Wang, Stephen C. Adams, Peter A. Beling, Steven Greenspan, Sridhar Rajagopalan, Maria C. Velez-Rojas, Serge Mankovski, Steven M. Boker, Donald E. Brown:
Privacy Preserving Distributed Deep Learning and Its Application in Credit Card Fraud Detection. 1070-1078 - Yang Lu, Richard O. Sinnott, Karin Verspoor, Udaya Parampalli:
Privacy-Preserving Access Control in Electronic Health Record Linkage. 1079-1090
Track 3: Privacy Track 7
- Muhammad Arif, Guojun Wang, Tao Peng:
Track me if you can? Query Based Dual Location Privacy in VANETs for V2V and V2I. 1091-1096 - Runhua Xu, Balaji Palanisamy, James Joshi:
QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for Edge Computing. 1097-1106 - Zheng He, Shiran Pan, Dongdai Lin:
PMDA: Privacy-Preserving Multi-functional Data Aggregation Without TTP in Smart Grid. 1107-1114 - Zheng Wang:
Understanding the Performance and Challenges of DNS Query Name Minimization. 1115-1120
Track 3: Privacy Track 8
- Fuwen Liu, Jin Peng, Min Zuo:
Toward a Secure Access to 5G Network. 1121-1128 - Chunkai Zhang, Ao Yin, Yulin Wu, Yingyang Chen, Xuan Wang:
Fast Time Series Discords Detection with Privacy Preserving. 1129-1139 - Toru Nakanishi, Takeshi Kanatani:
An Efficient Blacklistable Anonymous Credential System with Reputation Using Pairing-Based Accumulator. 1140-1148 - Keke Gai, Yulu Wu, Liehuang Zhu, Meikang Qiu:
Privacy-Preserving Data Synchronization Using Tensor-Based Fully Homomorphic Encryption. 1149-1156
Track 3: Privacy Track 9
- Thomas Lenz, Vesna Krnjic:
Towards Domain-Specific and Privacy-Preserving Qualified eID in a User-Centric Identity Model. 1157-1163 - Bin Li, Yijie Wang:
RZKPB: A Privacy-Preserving Blockchain-Based Fair Transaction Method for Sharing Economy. 1164-1169 - Jinpei Yan, Yong Qi, Qifan Rao, Saiyu Qi:
Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones. 1170-1179 - Zhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang, Hao Li:
A Flexible Mix-Zone Selection Scheme Towards Trajectory Privacy Protection. 1180-1186 - Wesam Fadheel, Raed M. Salih, Leszek Lilien:
PHeDHA: Protecting Healthcare Data in Health Information Exchanges with Active Data Bundles. 1187-1195
Track 4: Forensics and Analytics Track 1
- Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Monero Ring Attack: Recreating Zero Mixin Transaction Effect. 1196-1201 - Manoranjan Mohanty, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello:
PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution. 1202-1207 - Wenjuan Li, Weizhi Meng, Yu Wang, Lam For Kwok, Rongxing Lu:
Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks. 1208-1213 - Tilo Fischer:
Testing Cryptographically Secure Pseudo Random Number Generators with Artificial Neural Networks. 1214-1223
Track 4: Forensics and Analytics Track 2
- Xulyu Zhu, Zheng Yan, Jianfei Ruan, Qinghua Zheng, Bo Dong:
IRTED-TL: An Inter-Region Tax Evasion Detection Method Based on Transfer Learning. 1224-1235 - Liangfu Lu, Xinhe Zhu, Xuyun Zhang, Junhan Liu, Md. Zakirul Alam Bhuiyan, Guangtai Cui:
One Intrusion Detection Method Based On Uniformed Conditional Dynamic Mutual Information. 1236-1241 - Mary C. Michel, Marco Carvalho, Heather Crawford, Albert C. Esterline:
Cyber Identity: Salient Trait Ontology and Computational Framework to Aid in Solving Cybercrime. 1242-1249
Track 4: Forensics and Analytics Track 3
- K. Aditya, Slawomir Grzonkowski, Nhien An LeKhac:
Enabling Trust in Deep Learning Models: A Digital Forensics Case Study. 1250-1255 - Tina Wu, Andrew Martin:
Bluetooth Low Energy Used for Memory Acquisition from Smart Health Care Devices. 1256-1261
Track 4: Forensics and Analytics Track 4
- Hongbin Liu, Ming Xu, Yiming Wu, Ning Zheng, Yuangfang Chen, Md. Zakirul Alam Bhuiyan:
Resilient Bipartite Consensus for Multi-agent Networks with Antagonistic Interactions. 1262-1269 - Cheng Guo, Xinyu Tang, Yuanfang Chen, Pengxu Tian, Md. Zakirul Alam Bhuiyan:
An Efficient Distributed Approach on High Dimensional Data Similarity Searchable Encryption. 1270-1275 - Aaron Koehl:
Autoblog Forensics and Attribution. 1276-1286
Track 5: Emerging Tech Track 1
- Peter Mell:
Managed Blockchain Based Cryptocurrencies with Consensus Enforced Rules and Transparency. 1287-1296 - Yuyin Qian, Peng Zeng, Zuming Shen, Kim-Kwang Raymond Choo:
A Lightweight Path Authentication Protocol for RFID-Based Supply Chains. 1297-1302 - Saqib Ali, Guojun Wang, Bebo White, Roger Leslie Cottrell:
A Blockchain-Based Decentralized Data Storage and Access Framework for PingER. 1303-1308 - Huangjie Zheng, Yuchen Wang, Chen Han, Fangjie Le, Ruan He, Jialiang Lu:
Learning and Applying Ontology for Machine Learning in Cyber Attack Detection. 1309-1315
Track 5: Emerging Tech Track 2
- Changli Zhou, Tian Wang, Wenxian Jiang, Hui Tian:
Practical K Nearest Neighbor Query Scheme with Two-Party Guarantees in Road Networks. 1316-1321 - Marcos Antonio Simplicio Junior, Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius Maciel da Silva:
Privacy-Preserving Method for Temporarily Linking/Revoking Pseudonym Certificates in VANETs. 1322-1329 - Mohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han, Paul Sarda:
Blockchain as a Notarization Service for Data Sharing with Personal Data Store. 1330-1335 - Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu:
Superscalar Encrypted RISC: The Measure of a Secret Computer. 1336-1341
Track 5: Emerging Tech Track 3
- Freya Sheer Hardwick, Raja Naeem Akram, Konstantinos Markantonakis:
Fair and Transparent Blockchain Based Tendering Framework - A Step Towards Open Governance. 1342-1347 - Mohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han, Paul Sarda:
Blockchain Versus Database: A Critical Analysis. 1348-1353 - Xinbo Liu, Yaping Lin, Qin Liu, Xin Yao:
A Privacy-Preserving Principal Component Analysis Outsourcing Framework. 1354-1359 - Ji Huang, Pei Wang, Tianning Zang, Qian Qiang, Yipeng Wang, Miao Yu:
Detecting Domain Generation Algorithms with Convolutional Neural Language Models. 1360-1367
Track 5: Emerging Tech Track 4
- Bin Li, Yijie Wang, Peichang Shi, Huan Chen, Li Cheng:
FPPB: A Fast and Privacy-Preserving Method Based on the Permissioned Blockchain for Fair Transactions in Sharing Economy. 1368-1373 - Anastasia Theodouli, Stelios Arakliotis, Konstantinos Moschou, Konstantinos Votis, Dimitrios Tzovaras:
On the Design of a Blockchain-Based System to Facilitate Healthcare Data Sharing. 1374-1379 - James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis:
Consumer Centric Data Control, Tracking and Transparency - A Position Paper. 1380-1385 - Qin Liu, Shuyu Pei, Kang Xie, Jie Wu, Tao Peng, Guojun Wang:
Achieving Secure and Effective Search Services in Cloud Computing. 1386-1391
Track 5: Emerging Tech Track 5
- Yizhi Ren, Mengjin Jiang, Ye Yao, Ting Wu, Zhen Wang, Mengkun Li, Kim-Kwang Raymond Choo:
Node Immunization in Networks with Uncertainty. 1392-1397 - Zhiju Yang, Rui Zhao, Chuan Yue:
Effective Mobile Web User Fingerprinting via Motion Sensors. 1398-1405 - Andreas Abraham, Kevin Theuermann, Emanuel Kirchengast:
Qualified eID Derivation Into a Distributed Ledger Based IdM System. 1406-1412 - Chao Yang, Xinghe Chen, Tingting Song, Bin Jiang, Qin Liu:
A Hybrid Recommendation Algorithm Based on Heuristic Similarity and Trust Measure. 1413-1418 - Jiaqi Chen, Fan Zhang, Lei Zou:
SPARQL Multi-Query Optimization. 1419-1425
Track 5: Emerging Tech Track 6
- Feipeng Yan, Ming Xu, Tong Qiao, Ting Wu, Xue Yang, Ning Zheng, Kim-Kwang Raymond Choo:
Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic. 1426-1432 - Nicholas Mata, Nicole Beebe, Kim-Kwang Raymond Choo:
Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis. 1433-1439 - Taylor Cloyd, Trey Osborn, Brian Ellingboe, William Bradley Glisson, Kim-Kwang Raymond Choo:
Browser Analysis of Residual Facebook Data. 1440-1445 - Arnoud Goudbeek, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
A Forensic Investigation Framework for Smart Home Environment. 1446-1451
Track 6: Hardware Security Track 1
- Mingfu Xue, Rongzhen Bian, Jian Wang, Weiqiang Liu:
A Co-training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models. 1452-1457 - Rongzhen Bian, Mingfu Xue, Jian Wang:
Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique. 1458-1463 - Minyi Lu, Ao Fan, Jiaming Xu, Weiwei Shan:
A Compact, Lightweight and Low-Cost 8-Bit Datapath AES Circuit for IoT Applications in 28nm CMOS. 1464-1469 - Jiaming Xu, Ao Fan, Minyi Lu, Weiwei Shan:
Differential Power Analysis of 8-Bit Datapath AES for IoT Applications. 1470-1473
Track 6: Hardware Security Track 2
- Shenghua Chen, Wei Ge, Jinjiang Yang, Bo Liu, Jun Yang:
A Power Analysis Attack Countermeasure Based on Random Execution. 1474-1479 - Yi Yao, Jun Zhou, Bo Yan, Yuqian Li:
RNS-Based Embedding Scheme for Data Hiding in Digital Images. 1480-1483 - Xi Chen, Zhaojun Lu, Gang Qu, Aijiao Cui:
Partial Scan Design Against Scan-Based Side Channel Attacks. 1484-1489
IEEE TrustCom Short Papers
- James Obert, Adrian R. Chavez, Jay Johnson:
Behavioral Based Trust Metrics and the Smart Grid. 1490-1493 - Guoqiang Bai, Hailiang Fu, Wei Li, Xingjun Wu:
Differential Power Attack on SM4 Block Cipher. 1494-1497 - Salih Ergun:
Cryptanalysis of a Chaotic Ring Oscillator Based Random Number Generator. 1498-1501 - Markus Jäger, Stefan Nadschläger, Josef Küng:
Concepts for Trust Propagation in Knowledge Processing Systems - A Brief Introduction and Overview. 1502-1505 - Ameneh Deljoo, Tom M. van Engers, Ralph Koning, Leon Gommans, Cees de Laat:
Towards Trustworthy Information Sharing by Creating Cyber Security Alliances. 1506-1510
Track 2: Security Track 1
- Zhijun Wu, Qingbo Pan, Meng Yue, Shaopu Ma:
An Approach of Security Protection for VSAT Network. 1511-1516 - Amira Zrelli, Tahar Ezzedine:
Monitoring of Temperature and Pressure Through Brillouin Optical Sensors for Disasters Systems. 1517-1520 - Sarvjot kaur Kang, Dale Lindskog, Hamman Samuel:
An Implementation of Hierarchical Intrusion Detection Systems Using Snort and Federated Databases. 1521-1525 - Chaoqun Yang, Xiangyu Li, Shujuan Yin:
Low-Cost Energy-Efficient Side-Channel Attacks Resistant AES S-Box with Power-Aware Hiding Inverter in GF(2^4). 1526-1530 - Yin Huang, Wei Liang, Jing Long, Jianbo Xu, Kuan-Ching Li:
A Novel Identity Authentication for FPGA Based IP Designs. 1531-1536
Track 2: Security Track 2
- Sarika Choudhary, Nishtha Kesswani:
Detection and Prevention of Routing Attacks in Internet of Things. 1537-1540 - Rongxuan Ma, Wei Hu, Yonghao Wang:
Low Delay and Low Cost Audio Surveillance System via a New Optimum FIR Digtal Filter. 1541-1546 - Syed Muhammad Sajjad, Muhammad Yousaf:
UCAM: Usage, Communication and Access Monitoring Based Detection System for IoT Botnets. 1547-1550 - KiHwan Kim, HoonJae Lee:
Proposal of Multi-channel Operation Technique Using PingPong256. 1551-1554 - Gyan Singh Yadav, Aparajita Ojha:
A Reversible Data Hiding Scheme with High Security and Improved Embedding Capacity. 1555-1559
Track 2: Security Track 3
- Hajredin Daku, Pavol Zavarsky, Yasir Malik:
Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning. 1560-1564 - Jianguo Jiang, Qian Yu, Min Yu, Gang Li, Jiuming Chen, Kunying Liu, Chao Liu, Weiqing Huang:
ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS. 1565-1569 - Mimouna Alkhonaini, Hoda El-Sayed:
Migrating Data Between Physical Server and Cloud: Improving Accuracy and Data Integrity. 1570-1574 - Md. Nazmul Hossain, Md. Alam Hossain, Md. Zobayer Hossain, Md. Hasan Imam Sohag, Shawon S. M. Rahman:
OAuth-SSO: A Framework to Secure the OAuth-Based SSO Service for Packaged Web Applications. 1575-1578 - Tanushree Banerjee, M. Anwar Hasan:
Energy Efficiency Analysis of Elliptic Curve Based Cryptosystems. 1579-1583
Track 2: Security Track 4
- Daniel Tse, Xuan Weng, Xin Wan, Lan Yao, Wensong Zhang:
Research on Information Security Perception of Sina Weibo Users Based on KISCAP Model. 1584-1588 - Henry Okonofua, Shawon Rahman:
Evaluating the Risk Management Plan and Addressing Factors for Successes in Government Agencies. 1589-1592 - Ashwag Albakri, Mahesh Maddumala, Lein Harn:
Hierarchical Polynomial-Based Key Management Scheme in Fog Computing. 1593-1597 - Nestori Syynimaa:
Who Would you Like to be Today?: Impersonation by Fake Azure Active Directory Identity Federation. 1598-1604 - Kevin Atighehchi:
On the Incremental Digital Signatures. 1605-1609
Track 3: Privacy Track
- Kai-Cheng Liu, Chuan-Wei Kuo, Wen-Chiuan Liao, Pang-Chieh Wang:
Optimized Data de-Identification Using Multidimensional k-Anonymity. 1610-1614 - Erica Shuford, Tara Kavanaugh, Brian Ralph, Ebrima N. Ceesay, Paul A. Watters:
Measuring Personal Privacy Breaches Using Third-Party Trackers. 1615-1618 - Peter Mell, Assane Gueye, Christopher Schanzle:
Quantifying Information Exposure in Internet Routing. 1619-1623 - Shujie Cui, Sana Belguith, Pramodya De Alwis, Muhammad Rizwan Asghar, Giovanni Russello:
Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe Systems. 1624-1627 - Haotian Zhou, Xiao-Yang Liu, Cai Fu, Chen Shang, Xinyi Chang:
Differentially Private Matrix Completion via Distributed Matrix Factorization. 1628-1631
Track 1&3: Trust & Privacy Track
- Daniel Tse, Chung-kin Chow, Ting-pong Ly, Chung-yan Tong, Kwok-wah Tam:
The Challenges of Big Data Governance in Healthcare. 1632-1636 - Jerzy Konorski:
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions. 1637-1641 - Soham Kelkar, Timothy Kraus, Daria Morgan, Junjie Zhang, Rui Dai:
Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications. 1642-1645 - Cai Chen, Manyuan Zhang, Huanzhi Zhang, Zhenyun Huang, Yong Li:
Privacy-Preserving Sensory Data Recovery. 1646-1650 - Sebastian Burkhart, Andreas Unterweger, Günther Eibl, Dominik Engel:
Detecting Swimming Pools in 15-Minute Load Data. 1651-1655
Track 4: Forensics and Analytics Track
- Yang Wei, Xiu-Li Bi, Bin Xiao:
C2R Net: The Coarse to Refined Network for Image Forgery Detection. 1656-1659 - Anping Xiong, Yi Huang, Yunsong Wu, Jun Zhang, Linbo Long:
An Adaptive Sliding Window Algorithm for Mining Frequent Itemsets in Computer Forensics. 1660-1663 - Xiaoning Liu, Xingliang Yuan, Joseph K. Liu:
Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data. 1664-1668 - Yazeed Albabtain, Baijian Yang:
The Process of Reverse Engineering GPU Malware and Provide Protection to GPUS. 1669-1673 - Xiaoyu Du, Paul Ledwith, Mark Scanlon:
Deduplicated Disk Image Evidence Acquisition and Forensically-Sound Reconstruction. 1674-1679
Track 5: Emerging Tech Track
- Robert A. Bridges, Jarilyn Hernández Jiménez, Jeffrey Nichols, Katerina Goseva-Popstojanova, Stacy J. Prowell:
Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics. 1680-1684 - Hossein Sayadi, Hosein Mohammadi Makrani, Onkar Randive, Sai Manoj Pudukotai Dinakarrao, Setareh Rafatirad, Houman Homayoun:
Customized Machine Learning-Based Hardware-Assisted Malware Detection in Embedded Devices. 1685-1688 - HyunKyung Yoo, Jongchoul Yim, Sunme Kim:
The Blockchain for Domain Based Static Sharding. 1689-1692 - Hongyang Yang, Xiao-Yang Liu, Qingwei Wu:
A Practical Machine Learning Approach for Dynamic Stock Recommendation. 1693-1697 - Yangxin Wu, Peijia Zheng, Jianting Guo, Wei Zhang, Jiwu Huang:
A Controllable Efficient Content Distribution Framework Based on Blockchain and ISODATA. 1698-1701
Track 4 & 5: Forensics and Analytics & Emerging Tech Track
- Na Huang, Jingsha He, Nafei Zhu:
A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network. 1702-1705 - Ashar Neyaz, Narasimha K. Shashidhar, Umit Karabiyik:
Forensic Analysis of Wear Leveling on Solid-State Media. 1706-1710 - Everton de Matos, Ramão Tiago Tiburski, Leonardo Albernaz Amaral, Fabiano Hessel:
Providing Context-Aware Security for IoT Environments Through Context Sharing Feature. 1711-1715 - Usman Ahmad, Hong Song, Awais Bilal, Shahzad Saleem, Asad Ullah:
Securing Insulin Pump System Using Deep Learning and Gesture Recognition. 1716-1719
IEEE TrustCom Poster Papers
- Jitto Joseph, Ron Ruhl, Hamman Samuel:
Reducing Traffic Congestion for Machine to Machine Type Communication Over 4G-LTE Network by Decreasing Total Bytes Transmitted. 1720-1721 - Lanlan Pan, Xuebiao Yuchi, Jian Wang, Anlei Hu:
A Public Key Based EDNS Privacy Tunnel for DNS. 1722-1724 - Behrooz Sezari, Dietmar P. F. Möller, Andreas Deutschmann:
Anomaly-Based Network Intrusion Detection Model Using Deep Learning in Airports. 1725-1729
IEEE BigDataSE 2018
IEEE BigDataSE 1
- Kyriakos Kritikos:
Towards Dynamic and Optimal Big Data Placement. 1730-1737 - Saptashwa Mitra, Yu Qiu, Haley Moss, Kaigang Li, Sangmi Lee Pallickara:
Effective Integration of Geotagged, Ancilliary Longitudinal Survey Datasets to Improve Adulthood Obesity Predictive Models. 1738-1746 - Meng Wang, Chase Q. Wu, Huiyan Cao, Yang Liu, Yongqiang Wang, Aiqin Hou:
On MapReduce Scheduling in Hadoop Yarn on Heterogeneous Clusters. 1747-1754 - Mohamed Adel Serhani, Hadeel T. El Kassabi, Nabeel A. Y. Al-Qirim, Alramzana Nujum Navaz:
Towards a Multi-model Cloud Workflow Resource Monitoring, Adaptation, and Prediction. 1755-1762
IEEE BigDataSE 2
- Anasse Bari, Goktug Saatcioglu:
Emotion Artificial Intelligence Derived from Ensemble Learning. 1763-1770 - Rashid Mohammad:
AMI Smart Meter Big Data Analytics for Time Series of Electricity Consumption. 1771-1776 - Huihui Xie, Kun Lv, Changzhen Hu:
An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets. 1777-1784 - Hengyi Ren, Jian Guo, Lijuan Sun, Chong Han:
Prediction Algorithm Based on Weather Forecast for Energy-Harvesting Wireless Sensor Networks. 1785-1790 - Yibing Yang, M. Omair Shafiq:
Large Scale and Parallel Sentiment Analysis Based on Label Propagation in Twitter Data. 1791-1798
IEEE BigDataSE Short Papers
- Yu Zheng, Yongxin Zhu, Shijin Song, Peng Xiong, Zihao Cao, Junjie Hou:
Improved Weighted Label Propagation Algorithm in Social Network Computing. 1799-1803 - Jinfeng Yang, David J. Lilja:
Reducing Relational Database Performance Bottlenecks Using 3D XPoint Storage Technology. 1804-1808 - Alaa Alsaig, Vangular Alagar, Olga Ormandjieva:
A Critical Analysis of the V-Model of Big Data. 1809-1813
IEEE SPTIoT 2018
IEEE SPTIoT 1
- Shahrooz Pouryousef, Mariam Rezaiee, Ata Chizari:
Let me Join Two Worlds! Analyzing the Integration of Web and Native Technologies in Hybrid Mobile Apps. 1814-1819 - Jakub Klemsa, Lukas Kencl, Tomas Vanek:
VeraGreg: A Framework for Verifiable Privacy-Preserving Data Aggregation. 1820-1825 - William W. Lidster, Shawon S. M. Rahman:
Obstacles to Implementation of Information Security Governance. 1826-1831
IEEE SPTIoT 2
- Qingqing Tan, Chong Han, Lijuan Sun, Jian Guo, Hai Zhu:
A CSI Frequency Domain Fingerprint-Based Method for Passive Indoor Human Detection. 1832-1837 - Stephen C. Adams, Peter A. Beling, Steven Greenspan, Maria C. Velez-Rojas, Serge Mankovski:
Model-Based Trust Assessment for Internet of Things Networks. 1838-1843
IEEE SPTIoT 3
- Gianpiero Costantino, Antonio La Marra, Fabio Martinelli, Paolo Mori, Andrea Saracino:
Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things. 1844-1851 - Abdur R. Shahid, Niki Pissinou, S. S. Iyengar, Kia Makki:
Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks. 1852-1857
IEEE PSTCI 2018
IEEE PSTCI 1
- Paul Sarda, Mohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han:
Blockchain for Fraud Prevention: A Work-History Fraud Prevention System. 1858-1863
IEEE PSTCI 2
- Sudarshan S. Chawathe:
Improving Email Security with Fuzzy Rules. 1864-1869 - Sudarshan S. Chawathe:
Monitoring Blockchains with Self-Organizing Maps. 1870-1875 - Doyeon Kim, Dongil Shin, Dongkyoo Shin:
Unauthorized Access Point Detection Using Machine Learning Algorithms for Information Protection. 1876-1878 - Çiçek Güven, Mike Holenderski, Tanir Özçelebi, Johan Lukkien:
Using Artificial Neurons in Evidence Based Trust Computation. 1879-1884
IEEE PSTCI 3
- Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan, Kurt Rohloff, Yuriy Polyakov:
Intrusion-Resilient Classifier Approximation: From Wildcard Matching to Range Membership. 1885-1890
IEEE HSAT 2018
IEEE HSAT 1
- Kento Hasegawa, Youhua Shi, Nozomu Togawa:
Hardware Trojan Detection Utilizing Machine Learning Approaches. 1891-1896 - Aiguo Bu, Wentao Dai, Minyi Lu, Hao Cai, Weiwei Shan:
Correlation-Based Electromagnetic Analysis Attack Using Haar Wavelet Reconstruction with Low-Pass Filtering on an FPGA Implementaion of AES. 1897-1900
IEEE HSAT 2
- Jun Shi, Bo Lv, Yangyang Li, Yue Jia, Rui Wang, Yong Liao:
A New Wavelet Thresholding Method Based on Cyclostationarity for Enhancing the Interception of Computer Video Leakage Signals. 1901-1906
IWCPSA18
- Casimer M. DeCusatis, Kulvinder Lotay:
Secure, Decentralized Energy Resource Management Using the Ethereum Blockchain. 1907-1913 - Xiaolin Zhao, Yiman Zhang, Xuhui Li, Quanbao Chen:
Research on Malicious Code Homology Analysis Method Based on Texture Fingerprint Clustering. 1914-1921 - Mouslim Tolba, Salem Benferhat, Karim Tabia, Abdelkader Belkhir:
Handling Capabilities in Security Policies. 1922-1927 - Vladimir Marbukh:
On Mitigation Inefficiency of Selfish Investment in Network Recovery from High Loss SIS Infection. 1928-1933
WCSF 2018
- Maximilian Uphoff, Matthäus Wander, Torben Weis, Marian Waltereit:
SecureCloud: An Encrypted, Scalable Storage for Cloud Forensics. 1934-1941 - John Sheppard:
Cloud Investigations of Illegal IPTV Networks. 1942-1947 - Hina Tufail, Kashif Zafar, Abdul Rauf Baig:
Digital Watermarking for Relational Database Security Using mRMR Based Binary Bat Algorithm. 1948-1954 - Henry Okonofua, Shawon S. M. Rahman:
Cybersecurity: An Analysis of the Protection Mechanisms in a Cloud-centered Environment. 1955-1962
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.