2025
Case Study 2: Mapping between an E-Voting Curriculum and the DHS/NSA CAE Knowledge Units.
Proceedings of the 56th ACM Technical Symposium on Computer Science Education V. 1, 2025
2024
Toward Multimodal Vertical Federated Learning: A Traffic Analysis Case Study.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Subjective Logic-based Decentralized Federated Learning for Non-IID Data.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Can We Trust the Similarity Measurement in Federated Learning?
CoRR, 2023
DSSP: A Distributed, SLO-aware, Sensing-domain-privacy-Preserving Architecture for Sensing-as-a-Service.
CoRR, 2023
Case Study: Mapping an E-Voting Based Curriculum to CSEC2017.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 1, 2023
Advancing Active Authentication for User Privacy and Revocability with BioCapsules.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023
An Adaptive Plug-and-Play (PnP) Interactive Platform for an E-Voting Based Cybersecurity Curricula.
Proceedings of the Human Aspects of Information Security and Assurance, 2023
Unsupervised Deep Learning for an Image Based Network Intrusion Detection System.
Proceedings of the IEEE Global Communications Conference, 2023
2022
Solving the Federated Edge Learning Participation Dilemma: A Truthful and Correlated Perspective.
IEEE Trans. Veh. Technol., 2022
Distributed Swift and Stealthy Backdoor Attack on Federated Learning.
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2022
An Experimental Evaluation of a Privacy-Preserving Authentication and Authorization Scheme.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022
2021
Learning Discriminative Features for Adversarial Robustness.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
Hardware Speculation Vulnerabilities and Mitigations.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021
Electronic Voting Technology Inspired Interactive Teaching and Learning Pedagogy and Curriculum Development for Cybersecurity Education.
Proceedings of the Information Security Education for Cyber Resilience, 2021
Energy-Efficient Device Selection in Federated Edge Learning.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Usability and Security of Different Authentication Methods for an Electronic Health Records System.
Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, 2021
2020
Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey.
IEEE Access, 2020
AuthN-AuthZ: Integrated, User-Friendly and Privacy-Preserving Authentication and Authorization.
Proceedings of the Second IEEE International Conference on Trust, 2020
Multi-Armed-Bandit-based Shilling Attack on Collaborative Filtering Recommender Systems.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020
Continuous Security through Integration Testing in an Electronic Health Records System.
Proceedings of the International Conference on Software Security and Assurance, 2020
User-Friendly Design of Cryptographically-Enforced Hierarchical Role-based Access Control Models.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
Deep Dynamic Clustering of Spam Reviewers using Behavior-Anomaly-based Graph Embedding.
Proceedings of the IEEE Global Communications Conference, 2020
Correlated Participation Decision Making for Federated Edge Learning.
Proceedings of the IEEE Global Communications Conference, 2020
2019
Design and Implementation of Privacy-Preserving, Flexible and Scalable Role-Based Hierarchical Access Control.
Proceedings of the First IEEE International Conference on Trust, 2019
Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Koinonia: verifiable e-voting with long-term privacy.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Local Differential Privately Anonymizing Online Social Networks Under HRG-Based Model.
IEEE Trans. Comput. Soc. Syst., 2018
2017
Receipt-freeness and coercion resistance in remote E-voting systems.
Int. J. Secur. Networks, 2017
Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election.
Cryptogr., 2017
Preserving Local Differential Privacy in Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
A Cancellable and Privacy-Preserving Facial Biometric Authentication Scheme.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017
2016
Survey of return-oriented programming defense mechanisms.
Secur. Commun. Networks, 2016
Privacy Preservation in Location Based Services.
J. Comput., 2016
A Survey of Secure Multiparty Computation Protocols for Privacy Preserving Genetic Tests.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016
2015
A 3D modeling approach to complex faults with multi-source data.
Comput. Geosci., 2015
Enhancing and Implementing Fully Transparent Internet Voting.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015
Temporal coverage based content distribution in heterogeneous smart device networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
Behavioral Malware Detection in Delay Tolerant Networks.
IEEE Trans. Parallel Distributed Syst., 2014
Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method.
IEEE Trans. Computers, 2014
A Two-Stage Deanonymization Attack against Anonymized Social Networks.
IEEE Trans. Computers, 2014
A taxonomy of privilege escalation attacks in Android applications.
Int. J. Secur. Networks, 2014
Analysis and Implementation of Internet Based Remote Voting.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
A taxonomy and comparison of remote voting schemes.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces.
Proceedings of the IEEE International Conference on Communications, 2014
2013
The Virtue of Patience: Offloading Topical Cellular Content through Opportunistic Links.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Smartphone strategic sampling in defending enterprise network security.
Proceedings of IEEE International Conference on Communications, 2013
T-dominance: Prioritized defense deployment for BYOD security.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
A viewable e-voting scheme for environments with conflict of interest.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
Active User Authentication for Mobile Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
Secure and privacy-preserving biometrics based active authentication.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012
A privacy-preserving social-aware incentive system for word-of-mouth advertisement dissemination on smart mobile devices.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012
Seed and Grow: An attack against anonymized social networks.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012
2011
New threats to health data privacy.
BMC Bioinform., 2011
Behavioral Detection and Containment of Proximity Malware in Delay Tolerant Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
A New Approach to Weighted Multi-Secret Sharing.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
Biometrics-Based Authentication: A New Approach.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
A New Scheme for Anonymous Secure Group Communication.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Personal genome privacy protection with feature-based hierarchical dual-stage encryption.
Proceedings of the 2011 IEEE International Workshop on Genomic Signal Processing and Statistics, 2011
2010
An efficient scheme for removing compromised sensor nodes from wireless sensor networks.
Secur. Commun. Networks, 2010
Fuzzy Closeness-Based Delegation Forwarding in Delay Tolerant Networks.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010
2009
A Proactive Secret Sharing Scheme in matrix projection method.
Int. J. Secur. Networks, 2009
An Efficient Time-Bound Access Control Scheme for Dynamic Access Hierarchy.
Proceedings of the MSN 2009, 2009
A Multiple Secret Sharing Scheme based on Matrix Projection.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
2008
An efficient and attack-resistant key agreement scheme for secure group communications in mobile ad-hoc networks.
Wirel. Commun. Mob. Comput., 2008
A novel Conference Key Management solution for Secure Dynamic Conferencing.
Int. J. Secur. Networks, 2008
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Notes on the CRTDH Group Key Agreement Protocol.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
A security framework for wireless sensor networks utilizing a unique session key.
Proceedings of the 5th International ICST Conference on Broadband Communications, 2008
Pervasive and Trustworthy Healthcare.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
Trust and Security in Collaborative Computing
Computer and Network Security 2, World Scientific, ISBN: 978-981-4476-62-1, 2008
2007
A Hierarchical Modeling and Analysis for Grid Service Reliability.
IEEE Trans. Computers, 2007
A dynamic key management solution to access hierarchy.
Int. J. Netw. Manag., 2007
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups.
Future Gener. Comput. Syst., 2007
KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007
Dependability and Security in Medical Information System.
Proceedings of the Human-Computer Interaction. HCI Applications and Services, 2007
2006
An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006
The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2006
A New Cryptographic Scheme for Securing Dynamic Conferences in Data Networks.
Proceedings of IEEE International Conference on Communications, 2006
Composing Access Control Policies of Distributed Components.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
Autonomic Security and Self-Protection based on Feature-Recognition with Virtual Neurons.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics System.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
2005
An effective method for 3D geological modeling with multi-source data integration.
Comput. Geosci., 2005
KTDCKM-SDC: A Distributed Conference Key Management Scheme for Secure Dynamic Conferencing.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005
Secure Group Communication Based Scheme for Differential Access Control in Dynamic Environments.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Secure Group Instant Messaging Using Cryptographic Primitives.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
A balanced key tree approach for dynamic secure group communication.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005
CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2005
2004
A block-free TGDH key agreement protocol for secure group communications.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004
A GCD attack resistant CRTHACS for secure group communications.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
A Simple Group Diffie-Hellman Key Agreement Protocol Without Member Serialization.
Proceedings of the Computational and Information Science, First International Symposium, 2004
2002
Efficient Key Management for Secure Group Communications with Bursty Behavior.
Proceedings of the IASTED International Conference on Communications, 2002
2001
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication.
Proceedings of the Information and Communications Security, Third International Conference, 2001
Hierarchy-based access control in distributed environments.
Proceedings of the IEEE International Conference on Communications, 2001