2024
Large Language Models for Cyber Security: A Systematic Literature Review.
CoRR, 2024
Detecting and Mitigating Sampling Bias in Cybersecurity with Unlabeled Data.
Proceedings of the 33rd USENIX Security Symposium, 2024
Publishing Common Neighbors Histograms of Social Networks under Edge Differential Privacy.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
Proc. ACM Meas. Anal. Comput. Syst., December, 2023
DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference.
ACM Trans. Priv. Secur., 2023
TPMDP: Threshold Personalized Multi-party Differential Privacy via Optimal Gaussian Mechanism.
CoRR, 2023
2022
Ten Years after ImageNet: A 360° Perspective on AI.
CoRR, 2022
Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior.
CoRR, 2022
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
CoRR, 2022
SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Finding MNEMON: Reviving Memories of Node Embeddings.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Permutation-Invariant Subgraph Discovery.
CoRR, 2021
Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs.
Proceedings of the 30th USENIX Security Symposium, 2021
EOSAFE: Security Analysis of EOSIO Smart Contracts.
Proceedings of the 30th USENIX Security Symposium, 2021
CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference.
ACM Trans. Priv. Secur., 2020
Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users.
CoRR, 2020
Security Analysis of EOSIO Smart Contracts.
CoRR, 2020
Mobile Device Usage Recommendation based on User Context Inference Using Embedded Sensors.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
2019
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference.
CoRR, 2019
Towards Large-Scale Hunting for Android Negative-Day Malware.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
k-Skyband query answering with differential privacy.
J. Comput. Secur., 2018
A Survey on Malicious Domains Detection through DNS Data Analysis.
ACM Comput. Surv., 2018
A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Exact Detection of Information Leakage: Decidability and Complexity.
Trans. Large Scale Data Knowl. Centered Syst., 2017
Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis.
J. Comput. Secur., 2017
Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage.
CoRR, 2017
Distributed Cardinality Estimation of Set Operations with Differential Privacy.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Differentially Private K-Skyband Query Answering Through Adaptive Spatial Decomposition.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Generating Synthetic Decentralized Social Graphs with Local Differential Privacy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Dynamic and Efficient Private Keyword Search over Inverted Index-Based Encrypted Data.
ACM Trans. Internet Techn., 2016
DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud.
IEEE Trans. Multim., 2016
Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data.
Proceedings of the Information Security Theory and Practice, 2016
Publishing Attributed Social Graphs with Formal Privacy Guarantees.
Proceedings of the 2016 International Conference on Management of Data, 2016
PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data.
Proceedings of the IEEE International Conference on Web Services, 2016
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Discovering Malicious Domains through Passive DNS Data Graph Analysis.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Privacy and Access Control: How are These Two concepts Related?
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Interactive preference-aware query optimization.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
Conservative or liberal? Personalized differential privacy.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Exact Detection of Information Leakage in Database Access Control.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2015
Dimensions of Risk in Mobile Applications: A User Study.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
WaveCluster with Differential Privacy.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015
2014
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds.
IEEE Trans. Parallel Distributed Syst., 2014
Obtaining Information about Queries behind Views and Dependencies.
CoRR, 2014
Revealing and incorporating implicit communities to improve recommender systems.
Proceedings of the ACM Conference on Economics and Computation, 2014
PAQO: Preference-aware query optimization for decentralized database systems.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
Data Anonymization: The Challenge from Theory to Practice.
Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), 2014
A Privacy-Preserving Framework for Personalized, Social Recommendations.
Proceedings of the 17th International Conference on Extending Database Technology, 2014
Integrity Assurance for Outsourced Databases without DBMS Modification.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
COMPARS: toward an empirical approach for comparing the resilience of reputation systems.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
2013
Protecting Sensitive Labels in Social Network Data Anonymization.
IEEE Trans. Knowl. Data Eng., 2013
PAQO: A Preference-Aware Query Optimizer for PostgreSQL.
Proc. VLDB Endow., 2013
Bounding Trust under Uncertain Topology Information in Reputation-Based Trust Systems.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013
Enabling intensional access control via preference-aware query optimization.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Mining frequent graph patterns with differential privacy.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013
Empirical privacy and empirical utility of anonymized data.
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
iBigTable: practical data integrity for bigtable in public cloud.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
UMicS: from anonymized data to usable microdata.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
2012
VRank: A Context-Aware Approach to Vulnerability Scoring and Ranking in SOA.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Ensuring authorization privileges for cascading user obligations.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Aggregate Query Answering on Possibilistic Data with Cardinality Constraints.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012
Differentially Private Spatial Decompositions.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012
Bounding trust in reputation systems with incomplete information.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
Differentially Private Spatial Decompositions
CoRR, 2011
Defending Multiple-User-Multiple-Target Attacks in Online Reputation Systems.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
On the management of user obligations.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
EMFS: Email-based Personal Cloud Storage.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011
Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing.
Proceedings of the Computer Security - ESORICS 2011, 2011
Identity management for cloud computing: developments and directions.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
On mouse dynamics as a behavioral biometric for authentication.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Poster: on trust evaluation with missing information in reputation systems.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
A Timed Logic for Modeling and Reasoning about Security Protocols.
IACR Cryptol. ePrint Arch., 2010
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles.
IACR Cryptol. ePrint Arch., 2010
Investigating privacy-aware distributed query evaluation.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Failure Feedback for User Obligation Systems.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
Enhancing personalized ranking quality through multidimensional modeling of inter-item competition.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
Toward practical authorization-dependent user obligation systems.
Proceedings of the 5th ACM Symposium on Information, 2010
Effective trust management through a hybrid logical and relational approach.
Proceedings of the 5th ACM Symposium on Information, 2010
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures.
Proceedings of the 5th ACM Symposium on Information, 2010
On verifying stateful dataflow processing services in large-scale cloud systems.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the Encyclopedia of Database Systems, 2009
Distribution-based Microdata Anonymization.
Proc. VLDB Endow., 2009
On the Modeling of Honest Players in Reputation Systems.
J. Comput. Sci. Technol., 2009
Denial of service attacks and defenses in decentralized trust management.
Int. J. Inf. Sec., 2009
Towards a dynamic and composable model of trust.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Security policy testing via automated program code generation.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Towards secure dataflow processing in open distributed systems.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009
SecureMR: A Service Integrity Assurance Framework for MapReduce.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008
Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007).
SIGMOD Rec., 2008
Anonymizing bipartite graph data using safe groupings.
Proc. VLDB Endow., 2008
Avoiding information leakage in security-policy-aware planning.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Adaptive Request Scheduling for Parallel Scientific Web Services.
Proceedings of the Scientific and Statistical Database Management, 2008
Enforcing security properties in task-based systems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Assigning Responsibility for Failed Obligations.
Proceedings of the Trust Management II, 2008
On the Modeling of Honest Players in Reputation Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
2007
Automated Trust Negotiation in Open Systems.
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
A roadmap for comprehensive online privacy policy management.
Commun. ACM, 2007
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Aggregate Query Answering on Anonymized Tables.
Proceedings of the 23rd International Conference on Data Engineering, 2007
2006
Integrating XML data sources using approximate joins.
ACM Trans. Database Syst., 2006
A semantics based approach to privacy languages.
Comput. Syst. Sci. Eng., 2006
A Framework for Identifying Compromised Nodes in Sensor Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Defining and Measuring Policy Coverage in Testing Access Control Policies.
Proceedings of the Information and Communications Security, 8th International Conference, 2006
On the modeling and analysis of obligations.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Determining user privacy preferences by asking the right questions: an automated approach.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Preventing attribute information leakage in automated trust negotiation.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
A compressed accessibility map for XML.
ACM Trans. Database Syst., 2004
An identifiability-based access control model for privacy protection in open systems.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
A formal semantics for P3P.
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004
A Classification Scheme for Trust Functions in Reputation-Based Trust Management.
Proceedings of the ISWC*04 Workshop on Trust, 2004
How to Exploit Ontologies for Trust Negotiation.
Proceedings of the ISWC*04 Workshop on Trust, 2004
Proceedings of the 20th International Conference on Data Engineering, 2004
2003
Automated Trust Establishment in Open Systems
PhD thesis, 2003
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation.
ACM Trans. Inf. Syst. Secur., 2003
Policy migration for sensitive credentials in trust negotiation.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
A Unified Scheme for Resource Protection in Automated Trust Negotiation.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Index-Based Approximate XML Joins.
Proceedings of the 19th International Conference on Data Engineering, 2003
Trust Negotiation in Dynamic Coalitions.
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
Negotiating Trust on the Web.
IEEE Internet Comput., 2002
Compressed Accessibility Map: Efficient Access Control for XML.
Proceedings of 28th International Conference on Very Large Data Bases, 2002
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, 2002
Requirements for Policy Languages for Trust Negotiation.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
Protecting Privacy during On-Line Trust Negotiation.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002
2001
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
Proceedings of the Network and Distributed System Security Symposium, 2001
Interoperable strategies in automated trust negotiation.
Proceedings of the CCS 2001, 2001
2000
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet.
Proceedings of the CCS 2000, 2000