2025
SpaTeD: Sparsity-Aware Tensor Decomposition-Based Representation Learning Framework for Phishing Scams Detection.
IEEE Trans. Comput. Soc. Syst., February, 2025
Near-Pruned single assignment transformation of programs.
J. Comput. Lang., 2025
CATALOG: Exploiting Joint Temporal Dependencies for Enhanced Phishing Detection on Ethereum.
Proceedings of the ACM on Web Conference 2025, 2025
TEMPER: Capturing Consistent and Fluctuating TEMPoral User Behaviour for EtheReum Phishing Scam Detection.
Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining, V.1, 2025
SolGen: Secure Smart Contract Code Generation Using Large Language Models Via Masked Prompting.
Proceedings of the 18th Innovations in Software Engineering Conference, 2025
2024
IITP-VDLand: A Comprehensive Dataset on Decentraland Parcels.
Dataset, December, 2024
AgroBLF: blockchain-based framework for smart agriculture.
Innov. Syst. Softw. Eng., September, 2024
Contextual attribute-based access control scheme for cloud storage using blockchain technology.
Softw. Pract. Exp., 2024
Detection Made Easy: Potentials of Large Language Models for Solidity Vulnerabilities.
CoRR, 2024
Strengthening Solidity Invariant Generation: From Post- to Pre-Deployment.
CoRR, 2024
FedSat: A Statistical Aggregation Approach for Class Imbalaced Clients in Federated Learning.
CoRR, 2024
IITP-VDLand: A Comprehensive Dataset on Decentraland Parcels.
CoRR, 2024
Masked Autoencoders for Spatial-Temporal Relationship in Video-Based Group Activity Recognition.
IEEE Access, 2024
Semantics-Based Static Vulnerability Detection in Solidity Using Abstract Interpretation.
Proceedings of the Information Systems Security - 20th International Conference, 2024
Metasurance: A Blockchain-Based Insurance Management Framework for Metaverse.
Proceedings of the 19th International Conference on Evaluation of Novel Approaches to Software Engineering, 2024
State-based Invariant Property Generation of Solidity Smart Contracts using Abstract Interpretation.
Proceedings of the IEEE International Conference on Blockchain, 2024
2023
Making Robotic Swarms Trustful: A Blockchain-Based Perspective.
J. Comput. Inf. Sci. Eng., December, 2023
${\sf FedRLChain}$: Secure Federated Deep Reinforcement Learning With Blockchain.
IEEE Trans. Serv. Comput., 2023
Formal verification of the pub-sub blockchain interoperability protocol using stochastic timed automata.
Frontiers Blockchain, 2023
An Automated Policy Verification and Enforcement Framework for Ethereum Applications.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
HealthChain: A Blockchain-aided Federated Healthcare Management System.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
A Lightweight Deep Learning-based Weapon Detection Model for Mobile Robots.
Proceedings of the 2023 6th International Conference on Advances in Robotics, 2023
2022
A blockchain-based integrated and interconnected hybrid platform for Smart City ecosystem.
Peer-to-Peer Netw. Appl., 2022
An efficient format-independent watermarking framework for large-scale data sets.
Expert Syst. Appl., 2022
Comparative Analysis of Relational Database Watermarking Techniques: An Empirical Study.
IEEE Access, 2022
Development of a Lizard-Inspired Wall-Climbing Robot Using Pressure Sensitive Adhesion.
IEEE Access, 2022
Decentralized Insurance Subrogation Using Blockchain.
Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, 2022
Blockchain-Enabled Emergency Detection and Response in Mobile Healthcare System.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022
SmartMixModel: Machine Learning-based Vulnerability Detection of Solidity Smart Contracts.
Proceedings of the IEEE International Conference on Blockchain, 2022
2021
Formal Verification of Database Applications Using Predicate Abstraction.
SN Comput. Sci., 2021
A deductive reasoning approach for database applications using verification conditions.
J. Syst. Softw., 2021
Traceability and ownership claim of data on big data marketplace using blockchain technology.
J. Inf. Telecommun., 2021
A unified blockchain-based platform for global e-waste management.
Int. J. Web Inf. Syst., 2021
Wait or Reset Gas Price?: A Machine Learning-based Prediction Model for Ethereum Transactions' Waiting Time.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Deep Reinforcement Learning-Based 3D Exploration with a Wall Climbing Robot.
Proceedings of the IEEE Region 10 Conference, 2021
Tailoring Taint Analysis for Database Applications in the K Framework.
Proceedings of the 10th International Conference on Data Science, 2021
An Automated Framework for Migrating Java Applications to Ethereum Solidity Applications.
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021
Blockchain Domain-Specific Languages: Survey, Classification, and Comparison.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
A Lizard-Inspired Quadruped Robot Based on Pressure Sensitive Adhesion Mechanism for Wall Climbing.
Proceedings of the AIR 2021: Advances in Robotics - 5th International Conference of The Robotics Society, Kanpur, India, 30 June 2021, 2021
An Integrated Platform for Vehicle-Related Services and Records Management Using Blockchain Technology.
Proceedings of the Recent Challenges in Intelligent Information and Database Systems, 2021
2020
Extending Abstract Interpretation to Dependency Analysis of Database Applications.
IEEE Trans. Software Eng., 2020
PoliceChain: Blockchain-Based Smart Policing System for Smart Cities.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
Blockchain-Based Forward and Reverse Supply Chains for E-waste Management.
Proceedings of the Future Data and Security Engineering - 7th International Conference, 2020
Blockchain-based Interoperable Healthcare using Zero-Knowledge Proofs and Proxy Re-Encryption.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020
BDmark: A Blockchain-Driven Approach to Big Data Watermarking.
Proceedings of the Intelligent Information and Database Systems - 12th Asian Conference, 2020
2018
Combining Symbolic and Numerical Domains for Information Leakage Analysis.
Trans. Comput. Sci., 2018
A Symbolic Model Checker for Database Programs.
Proceedings of the 13th International Conference on Software Technologies, 2018
K-Taint: An Executable Rewriting Logic Semantics for Taint Analysis in the K Framework.
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 2018
2017
Partitioning-Insensitive Watermarking Approach for Distributed Relational Databases.
Trans. Large Scale Data Knowl. Centered Syst., 2017
Adapting MapReduce for Efficient Watermarking of Large Relational Dataset.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Formal Verification of ROS-Based Robotic Applications Using Timed-Automata.
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017
Towards Generalization of Privacy Policy Specification and Property-Based Information Leakage.
Proceedings of the Information Systems Security - 13th International Conference, 2017
2016
Data Leakage Analysis of the Hibernate Query Language on a Propositional Formulae Domain.
Trans. Large Scale Data Knowl. Centered Syst., 2016
Refining dependencies for information flow analysis of database applications.
Int. J. Trust. Manag. Comput. Commun., 2016
Defining Abstract Semantics for Static Dependence Analysis of Relational Database Applications.
Proceedings of the Information Systems Security - 12th International Conference, 2016
A Watermarking Framework for Outsourced and Distributed Relational Databases.
Proceedings of the Future Data and Security Engineering - Third International Conference, 2016
2015
Data-Centric Refinement of Information Flow Analysis of Database Applications.
Proceedings of the Security in Computing and Communications, 2015
Verification of Hibernate Query Language by Abstract Interpretation.
Proceedings of the Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques, 2015
Data cleaning: An abstraction-based approach.
Proceedings of the 2015 International Conference on Advances in Computing, 2015
Policy-Based Slicing of Hibernate Query Language.
Proceedings of the Computer Information Systems and Industrial Management, 2015
Data-Flow Analysis-Based Approach of Database Watermarking.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015
On Preventing SQL Injection Attacks.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015
2014
Information leakage analysis of database query languages.
Proceedings of the Symposium on Applied Computing, 2014
Information-Flow Analysis of Hibernate Query Language.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014
2013
Abstract program slicing on dependence condition graphs.
Sci. Comput. Program., 2013
Abstract program slicing of database query languages.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Abstract Interpretation of Recursive Queries.
Proceedings of the Distributed Computing and Internet Technology, 2013
2012
Extending abstract interpretation to new applicative scenarios.
PhD thesis, 2012
Abstract interpretation of database query languages.
Comput. Lang. Syst. Struct., 2012
Tukra: An Abstract Program Slicing Tool.
Proceedings of the ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends, Rome, Italy, 24, 2012
2011
Cooperative Query Answering by Abstract Interpretation.
Proceedings of the SOFSEM 2011: Theory and Practice of Computer Science, 2011
Observation-Based Fine Grained Access Control for XML Documents.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011
2010
Watermarking Techniques for Relational Databases: Survey, Classification and Comparison.
J. Univers. Comput. Sci., 2010
Dependence condition graph for semantics-based abstract program slicing.
Proceedings of the of the Tenth Workshop on Language Descriptions, Tools and Applications, 2010
Obfuscation-based analysis of SQL injection attacks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
Fine Grained Access Control for Relational Databases by Abstract Interpretation.
Proceedings of the Software and Data Technologies - 5th International Conference, 2010
Observation-based Fine Grained Access Control for Relational Databases.
Proceedings of the ICSOFT 2010, 2010
A Persistent Public Watermarking of Relational Databases.
Proceedings of the Information Systems Security - 6th International Conference, 2010
2009
An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking.
Proceedings of the 22st Annual Symposium on Integrated Circuits and Systems Design: Chip on the Dunes, 2009