2025
Evaluating Large Language Models in Vulnerability Detection Under Variable Context Windows.
CoRR, February, 2025
Through the Looking Glass: LLM-Based Analysis of AR/VR Android Applications Privacy Policies.
CoRR, January, 2025
I Can Find You in Seconds! Leveraging Large Language Models for Code Authorship Attribution.
CoRR, January, 2025
Semantics-Preserving Node Injection Attacks Against GNN-Based ACFG Malware Classifiers.
IEEE Trans. Dependable Secur. Comput., 2025
2024
Troid: Temporal and Cross-Sectional Android Dataset and Its Applications.
Dataset, June, 2024
xr-droid: A Benchmark Dataset for AR/VR and Security Applications.
Dataset, May, 2024
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality.
IEEE/ACM Trans. Netw., February, 2024
Hierarchical Deep Reinforcement Learning-Based Propofol Infusion Assistant Framework in Anesthesia.
IEEE Trans. Neural Networks Learn. Syst., February, 2024
Learning Location From Shared Elevation Profiles in Fitness Apps: A Privacy Perspective.
IEEE Trans. Mob. Comput., January, 2024
RC-NVM: Recovery-Aware Reliability-Security Co-Design for Non-Volatile Memories.
IEEE Trans. Dependable Secur. Comput., 2024
Analyzing In-Browser Cryptojacking.
IEEE Trans. Dependable Secur. Comput., 2024
Measuring DNS-over-HTTPS Downgrades: Prevalence, Techniques, and Bypass Strategies.
PACMNET, 2024
Industry-Specific Vulnerability Assessment.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
Exposing the Limitations of Machine Learning for Malware Detection Under Concept Drift.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis.
Proceedings of the Information Security Applications - 25th International Conference, 2024
Dissecting the Infrastructure Used in Web-Based Cryptojacking: A Measurement Perspective.
Proceedings of the Information Security Applications - 25th International Conference, 2024
Enhancing Network Attack Detection with Distributed and In-Network Data Collection System.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auction.
Comput. Networks, April, 2023
Improving the Social Connectivity in Engineering Educational Networks and Implications.
IEEE Trans. Educ., February, 2023
Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications.
IEEE Trans. Intell. Transp. Syst., January, 2023
Exploration of Bitflip's Effect on Deep Neural Network Accuracy in Plaintext and Ciphertext.
IEEE Micro, 2023
Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations.
CoRR, 2023
Measuring and Modeling the Free Content Web.
CoRR, 2023
SHIELD: Thwarting Code Authorship Attribution.
CoRR, 2023
Enriching Vulnerability Reports Through Automated and Augmented Description Summarization.
Proceedings of the Information Security Applications - 24th International Conference, 2023
Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and Evaluation.
Proceedings of the Information Security Applications - 24th International Conference, 2023
Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
A Robust Counting Sketch for Data Plane Intrusion Detection.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors.
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Understanding the Privacy Dimension of Wearables through Machine Learning-enabled Inferences.
Proceedings of the 2023 on Systems and Network Telemetry and Analytics, 2023
Understanding the Country-Level Security of Free Content Websites and their Hosting Infrastructure.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
Untargeted Code Authorship Evasion with Seq2Seq Transformation.
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023
The Infrastructure Utilization of Free Contents Websites Reveal Their Security Characteristics.
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023
Understanding the Utilization of Cryptocurrency in the Metaverse and Security Implications.
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023
Entangled Clouds: Measuring the Hosting Infrastructure of the Free Contents Web.
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023
Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability Description.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Exploring Partitioning Attacks on the Bitcoin Network.
IEEE/ACM Trans. Netw., 2022
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet.
IEEE/ACM Trans. Netw., 2022
A One-Page Text Entry Method Optimized for Rectangle Smartwatches.
IEEE Trans. Mob. Comput., 2022
GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy.
IEEE Trans. Knowl. Data Eng., 2022
Cooperative Multiagent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control.
IEEE Trans. Ind. Informatics, 2022
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses.
IEEE Trans. Dependable Secur. Comput., 2022
Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM.
IEEE Trans. Dependable Secur. Comput., 2022
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification.
IEEE Trans. Dependable Secur. Comput., 2022
BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails.
IEEE Syst. J., 2022
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation.
IEEE Internet Things J., 2022
Do Content Management Systems Impact the Security of Free Content Websites? A Correlation Analysis.
CoRR, 2022
Miners in the Cloud: Measuring and Analyzing Cryptocurrency Mining in Public Clouds.
CoRR, 2022
FAT-PIM: Low-Cost Error Detection for Processing-In-Memory.
CoRR, 2022
Cooperative Multi-Agent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control.
CoRR, 2022
<i>RouteChain</i>: Towards Blockchain-based secure and efficient BGP routing.
Comput. Networks, 2022
Understanding Internet of Things malware by analyzing endpoints in their static artifacts.
Comput. Networks, 2022
WBC image classification and generative models based on convolutional neural network.
BMC Medical Imaging, 2022
Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions.
IEEE Access, 2022
Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches.
IEEE Access, 2022
Making Adversarially-Trained Language Models Forget with Model Retraining: A Case Study on Hate Speech Detection.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022
Measuring the Privacy Dimension of Free Content Websites through Automated Privacy Policy Analysis and Annotation.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022
AiRType: An Air-tapping Keyboard for Augmented Reality Environments.
Proceedings of the 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2022
A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces, 2022
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures.
Proceedings of the 2022 IEEE International Parallel and Distributed Processing Symposium, 2022
Filesystem Encryption or Direct-Access for NVM Filesystems? Let's Have Both!
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2022
Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts.
Proceedings of the CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 2022
Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study.
Proceedings of the CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 2022
Do Content Management Systems Impact the Security of Free Content Websites?
Proceedings of the Computational Data and Social Networks - 11th International Conference, 2022
Measuring Cryptocurrency Mining in Public Cloud Services: A Security Perspective.
Proceedings of the Computational Data and Social Networks - 11th International Conference, 2022
AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network Attacks.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Hierarchical Reinforcement Learning using Gaussian Random Trajectory Generation in Autonomous Furniture Assembly.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
AcousticType: Smartwatch-Enabled Cross-Device Text Entry Method Using Keyboard Acoustics.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
A Scalable and Dynamic ACL System for In-Network Defense.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
e-PoS: Making Proof-of-Stake Decentralized and Fair.
IEEE Trans. Parallel Distributed Syst., 2021
Large-scale and Robust Code Authorship Identification with Deep Feature Learning.
ACM Trans. Priv. Secur., 2021
Towards Low-Cost Mechanisms to Enable Restoration of Encrypted Non-Volatile Memories.
IEEE Trans. Dependable Secur. Comput., 2021
SSD-Assisted Ransomware Detection and Data Recovery Techniques.
IEEE Trans. Computers, 2021
Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools.
J. Netw. Comput. Appl., 2021
Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey.
IEEE Internet Things J., 2021
Empirically comparing the performance of blockchain's consensus algorithms.
IET Blockchain, 2021
HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality.
IACR Cryptol. ePrint Arch., 2021
Towards Semantically-Rich Spatial Network Representation Learning via Automated Feature Topic Pairing.
Frontiers Big Data, 2021
Count-Less: A Counting Sketch for the Data Plane of High Speed Switches.
CoRR, 2021
ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation.
CoRR, 2021
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation.
CoRR, 2021
A network-independent tool-based usable authentication system for Internet of Things devices.
Comput. Secur., 2021
Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699.
Comput. Networks, 2021
Domain name system security and privacy: A contemporary survey.
Comput. Networks, 2021
Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube.
Proceedings of the Companion of The Web Conference 2021, 2021
SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
TLDR: Deep Learning-Based Automated Privacy Policy Annotation with Key Policy Highlights.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
Measuring Healthcare Data Breaches.
Proceedings of the Information Security Applications - 22nd International Conference, 2021
ProMT: optimizing integrity tree updates for write-intensive pages in secure NVMs.
Proceedings of the ICS '21: 2021 International Conference on Supercomputing, 2021
Bitcoin Price Forecasting via Ensemble-based LSTM Deep Learning Networks.
Proceedings of the International Conference on Information Networking, 2021
Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems.
Proceedings of the International Conference on Information Networking, 2021
Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Adversarial Example Detection Using Latent Neighborhood Graph.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Automated Feature-Topic Pairing: Aligning Semantic and Embedding Spaces in Spatial Representation Learning.
Proceedings of the SIGSPATIAL '21: 29th International Conference on Advances in Geographic Information Systems, 2021
Systemically Evaluating the Robustness of ML-based IoT Malware Detectors.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Security Breaches in the Healthcare Domain: A Spatiotemporal Analysis.
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021
SyncAttack: Double-spending in Bitcoin Without Mining Power.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference.
IEEE Trans. Mob. Comput., 2020
A Data-Driven Study of DDoS Attacks and Their Dynamics.
IEEE Trans. Dependable Secur. Comput., 2020
Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation.
IEEE Trans. Dependable Secur. Comput., 2020
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions.
IEEE Syst. J., 2020
EAI Endorsed Trans. Security Safety, 2020
Measuring the Cost of Software Vulnerabilities.
EAI Endorsed Trans. Security Safety, 2020
Multi-χ: Identifying Multiple Authors from Source Code Files.
Proc. Priv. Enhancing Technol., 2020
Self-adaptive power control with deep reinforcement learning for millimeter-wave Internet-of-vehicles video caching.
J. Commun. Networks, 2020
AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors.
IEEE Internet Things J., 2020
Generating Adversarial Examples with an Optimized Quality.
CoRR, 2020
Domain Name System Security and Privacy: A Contemporary Survey.
CoRR, 2020
A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification.
CoRR, 2020
Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools.
CoRR, 2020
Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey.
CoRR, 2020
Exploring the Attack Surface of Blockchain: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2020
Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions.
Comput. Networks, 2020
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.
IEEE Access, 2020
Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks.
Proceedings of the Information Security Applications - 21st International Conference, 2020
From Blue-Sky to Practical Adversarial Learning.
Proceedings of the Second IEEE International Conference on Trust, 2020
SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Hiding in Plain Sight: A Measurement and Analysis of Kids' Exposure to Malicious URLs on YouTube.
Proceedings of the 5th IEEE/ACM Symposium on Edge Computing, 2020
On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020
Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube.
Proceedings of the CIKM 2020 Workshops co-located with 29th ACM International Conference on Information and Knowledge Management (CIKM 2020), 2020
2019
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
IEEE Trans. Netw. Serv. Manag., 2019
Android Malware Detection Using Complex-Flows.
IEEE Trans. Mob. Comput., 2019
Pricing Data Tampering in Automated Fare Collection with NFC-Equipped Smartphones.
IEEE Trans. Mob. Comput., 2019
Secure and transparent audit logs with <i>BlockAudit</i>.
J. Netw. Comput. Appl., 2019
Two-Stage IoT Device Scheduling With Dynamic Programming for Energy Internet Systems.
IEEE Internet Things J., 2019
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach.
IEEE Internet Things J., 2019
Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT.
Trans. Emerg. Telecommun. Technol., 2019
Phoenix: Towards Persistently Secure, Recoverable, and NVM Friendly Tree of Counters.
CoRR, 2019
You Can Run, But You Cannot Hide: Using Elevation Profiles to Breach Location Privacy through Trajectory Prediction.
CoRR, 2019
W-Net: A CNN-based Architecture for White Blood Cells Image Classification.
CoRR, 2019
COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection.
CoRR, 2019
A Privacy-Preserving Longevity Study of Tor's Hidden Services.
CoRR, 2019
Secure and Transparent Audit Logs with BlockAudit.
CoRR, 2019
Exploring the Attack Surface of Blockchain: A Systematic Overview.
CoRR, 2019
Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.
CoRR, 2019
Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table.
CoRR, 2019
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach.
CoRR, 2019
Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network.
CoRR, 2019
Analyzing Endpoints in the Internet of Things Malware.
CoRR, 2019
A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Analyzing endpoints in the internet of things malware: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Breaking graph-based IoT malware detection systems using adversarial examples: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.
Proceedings of the Information Security Applications - 20th International Conference, 2019
Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One.
Proceedings of the First IEEE International Conference on Trust, 2019
Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
XLF: A Cross-layer Framework to Secure the Internet of Things (IoT).
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Countering Selfish Mining in Blockchains.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
IoT malware ecosystem in the wild: a glimpse into analysis and exposures.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019
Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019
Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019
Examining the Security of DDoS Detection Systems in Software Defined Networks.
Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, 2019
Investigating DNS Manipulation by Open DNS Resolvers.
Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, 2019
Fighting Fake News Propagation with Blockchains.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
XMSS: eXtended Merkle Signature Scheme.
RFC, May, 2018
Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis.
IEEE/ACM Trans. Netw., 2018
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering.
EAI Endorsed Trans. Security Safety, 2018
Interference-Aware Adaptive Beam Alignment for Hyper-Dense IEEE 802.11ax Internet-of-Things Networks.
Sensors, 2018
End-to-End Analysis of In-Browser Cryptojacking.
CoRR, 2018
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks.
Comput. Secur., 2018
Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Proceedings of the Security and Privacy in Communication Networks, 2018
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
ABC: Enabling Smartphone Authentication with Built-in Camera.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Neural Network Syntax Analyzer for Embedded Standardized Deep Learning.
Proceedings of the 2nd International Workshop on Embedded and Mobile Deep Learning, 2018
Towards Blockchain-Driven, Secure and Transparent Audit Logs.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions.
Proceedings of the IEEE INFOCOM 2018, 2018
Proactive detection of algorithmically generated malicious domains.
Proceedings of the 2018 International Conference on Information Networking, 2018
SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
ShmCaffe: A Distributed Deep Learning Platform with Shared Memory Buffer for HPC Architecture.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
QOI: Assessing Participation in Threat Information Sharing.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Defending Internet of Things Against Malicious Domain Names using D-FENS.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018
Graph-Based Comparison of IoT and Android Malware.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018
POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Large-Scale and Language-Oblivious Code Authorship Identification.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures.
IEEE/ACM Trans. Netw., 2017
Crime Scene Reconstruction: Online Gold Farming Network Analysis.
IEEE Trans. Inf. Forensics Secur., 2017
Distributed and reliable decision-making for cloud-enabled mobile service platforms.
Int. J. Distributed Sens. Networks, 2017
Rethinking Information Sharing for Actionable Threat Intelligence.
CoRR, 2017
Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence.
CoRR, 2017
Highly-accurate rogue access point detection using intentional channel interference: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Two-level network monitoring and management in WLAN using software-defined networking: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Understanding Adversarial Strategies from Bot Recruitment to Scheduling.
Proceedings of the Security and Privacy in Communication Networks, 2017
Understanding the Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Assessing Quality of Contribution in Information Sharing for Threat Intelligence.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Poster: Android Malware Detection using Multi-Flows and API Patterns.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
Large-scale invisible attack on AFC systems with NFC-equipped smartphones.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Performance of deep learning computation with TensorFlow software library in GPU-capable multi-core computing platforms.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017
An Adversary-Centric Behavior Modeling of DDoS Attacks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
You've Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Understanding the effectiveness of typosquatting techniques.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017
Rethinking information sharing for threat intelligence.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.
Proceedings of the Financial Cryptography and Data Security, 2017
2016
Private Over-Threshold Aggregation Protocols over Distributed Datasets.
IEEE Trans. Knowl. Data Eng., 2016
Advances in Mobile Security Technologies.
Mob. Inf. Syst., 2016
Characterizing Collaboration in Social Network-enabled Routing.
KSII Trans. Internet Inf. Syst., 2016
Domain Name System Security and Privacy: Old Problems and New Challenges.
CoRR, 2016
Multimodal Game Bot Detection using User Behavioral Characteristics.
CoRR, 2016
Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles.
CoRR, 2016
Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph.
CoRR, 2016
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information.
Comput. Secur., 2016
Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications.
Proceedings of the 25th International Conference on World Wide Web, 2016
Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks.
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment.
Proceedings of the Information Security Applications - 17th International Workshop, 2016
A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
Proceedings of the Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, 2016
A user study of the effectiveness of typosquatting techniques.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Automatic alerts annotation for improving DDoS mitigation systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Assessing DNS privacy under partial deployment of special-use Domain Names.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Transparency of the new gTLD's centralized zone data service: A measurement study.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
WHAP: Web-hacking profiling using Case-Based Reasoning.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
The Landscape of Domain Name Typosquatting: Techniques and Countermeasures.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2015
HTTP-based Smart Transportation of DNS Queries and Applications.
Smart Comput. Rev., 2015
Interference impacts on 60 ghz real-time online video streaming in wireless smart tv platforms.
Multim. Tools Appl., 2015
Detecting and Classifying Android Malware Using Static Analysis along with Creator Information.
Int. J. Distributed Sens. Networks, 2015
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information.
Digit. Investig., 2015
AMAL: High-fidelity, behavior-based automated malware analysis and classification.
Comput. Secur., 2015
Transaction authentication using complementary colors.
Comput. Secur., 2015
Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents.
Proceedings of the Third IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015
Capturing DDoS Attack Dynamics Behind the Scenes.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Separation of benign and malicious network events for accurate malware family classification.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Measuring Botnets in the Wild: Some New Trends.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Trustworthy Distributed Computing on Social Networks.
IEEE Trans. Serv. Comput., 2014
Keylogging-Resistant Visual Authentication Protocols.
IEEE Trans. Mob. Comput., 2014
Parallel QRD-M encoder for multi-user MIMO systems.
Telecommun. Syst., 2014
Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks.
IEEE Commun. Lett., 2014
Kindred domains: detecting and clustering botnet domains using DNS traffic.
Proceedings of the 23rd International World Wide Web Conference, 2014
Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name system.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction.
Proceedings of the Information Security Applications - 15th International Workshop, 2014
AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification.
Proceedings of the Information Security Applications - 15th International Workshop, 2014
ADAM: Automated Detection and Attribution of Malicious Webpages.
Proceedings of the Information Security Applications - 15th International Workshop, 2014
A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014
Characterizing botnets-as-a-service.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
AV-Meter: An Evaluation of Antivirus Scans and Labels.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Chatter: Classifying malware families using system event ordering.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
POSTER: How Distributed Are Today's DDoS Attacks?
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Trading Optimality for Scalability in Large-Scale Opportunistic Routing.
IEEE Trans. Veh. Technol., 2013
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs.
IEEE Trans. Dependable Secur. Comput., 2013
The Sybil Attacks and Defenses: A Survey.
Smart Comput. Rev., 2013
Private Over-threshold Aggregation Protocols over Distributed Databases.
IACR Cryptol. ePrint Arch., 2013
Unveiling Zeus: automated classification of malware samples.
Proceedings of the 22nd International World Wide Web Conference, 2013
Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs.
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Towards a Methodical Evaluation of Antivirus Scans and Labels - "If You're Not Confused, You're Not Paying Attention".
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Babble: Identifying malware by its dialects.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
ADAM: Automated detection and attribution of malicious webpages.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Characterization of the dynamics and interactions of domain names and name server.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Dynamix: anonymity on dynamic social structures.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Private Top-k Aggregation Protocols.
IACR Cryptol. ePrint Arch., 2012
Measuring bias in the mixing time of social graphs due to graph sampling.
Proceedings of the 31st IEEE Military Communications Conference, 2012
DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Private Over-Threshold Aggregation Protocols.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Collaboration in social network-based information dissemination.
Proceedings of IEEE International Conference on Communications, 2012
Protecting access privacy of cached contents in information centric networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
On the mixing time of directed social graphs and security implications.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Attacks and Countermeasures for RFID Mutual Authentication Scheme in Pervasive Computing Environmen.
KSII Trans. Internet Inf. Syst., 2011
SocialCloud: Using Social Networks for Building Distributed Computing Services
CoRR, 2011
Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface
CoRR, 2011
Keep your friends close: Incorporating trust into social network-based Sybil defenses.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011
Understanding Social Networks Properties for Trustworthy Computing.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011
Parallel QRD-M Encoder for Decentralized Multi-User MIMO Systems.
Proceedings of IEEE International Conference on Communications, 2011
2010
On the Inefficiency of the Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network.
J. Commun., 2010
Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency.
IEICE Trans. Inf. Syst., 2010
Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering
CoRR, 2010
Measuring the mixing time of social graphs.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010
Losing control of the internet: using the data plane to attack the control plane.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Secure encounter-based social networks: requirements, challenges, and designs.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Designs to account for trust in social network-based sybil defenses.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Grid-Based Key Pre-Distribution in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2009
On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2009
Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks.
Int. J. Netw. Secur., 2009
Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering
CoRR, 2009
A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network.
Proceedings of the Advances in Information Security and Assurance, 2009
2008
Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2008
A computationally-efficient construction for the matrix-based key distribution in sensor network
CoRR, 2008
Privacy Preserving Association Rule Mining Revisited
CoRR, 2008
A Survey on Deep Packet Inspection for Intrusion Detection Systems
CoRR, 2008
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
Privacy in Location Based Services: Primitives Toward the Solution.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
2007
Secret Key Revocation in Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007
Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network.
Proceedings of the Computational Science and Its Applications, 2007
2006
Cooperative Public Key Authentication Protocol in Wireless Sensor Network.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks, Third European Workshop, 2006