Laurent Njilla

Orcid: 0000-0001-8902-7418

According to our database1, Laurent Njilla authored at least 122 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-Based E-Voting Mechanisms: A Survey and a Proposal.
Network, 2024

Adaptive learning-based hybrid recommender system for deception in Internet of Thing.
Comput. Networks, 2024

Two-Layer Deception Model Based on Signaling Games Against Cyber Attacks on Cyber-Physical Systems.
IEEE Access, 2024

An Edge-Cloud Approach for Dynamic Resource Allocation in Drone Communication Networks.
Proceedings of the IEEE INFOCOM 2024, 2024

Bayesian Game for Cyber Deception Against Remote Attack on Automotive Systems.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

FLAS: A Federated Learning Framework for Adaptive Security in Edge-Driven UAV Networks.
Proceedings of the IEEE International Conference on Communications, 2024

A Decentralized Smart Grid Communication Framework Using SDN-Enabled Blockchain.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent Systems.
Proceedings of the Ubiquitous Security, 2023

AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

Q-SECURE: A Quantum Resistant Security for Resource Constrained IoT Device Encryption.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023

A-C: An NDN-based Blockchain Network With Erasure Coding.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Game and Prospect Theoretic Hardware Trojan Testing.
Proceedings of the 57th Annual Conference on Information Sciences and Systems, 2023

2022
Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment.
Network, 2022

Blockchain-based automated and robust cyber security management.
J. Parallel Distributed Comput., 2022

Adversarial Attacks and Defenses Toward AI-Assisted UAV Infrastructure Inspection.
IEEE Internet Things J., 2022

Secure machine learning against adversarial samples at test time.
EURASIP J. Inf. Secur., 2022

Smarkchain: An Amendable and Correctable Blockchain Based on Smart Markers.
Proceedings of the IEEE International Conference on Trust, 2022

A Survey of Blockchain-Based Electronic Voting Mechanisms in Sensor Networks.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

Optimal Auction Design with Malicious Sellers.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Optimization of Survivability of a Mission Critical System in the Presence of Hardware Trojans.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

2021
Low-Latency Privacy-Preserving Outsourcing of Deep Neural Network Inference.
IEEE Internet Things J., 2021

Toward long-range adaptive communication via information centric networking.
Intell. Converged Networks, 2021

A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses.
ACM Comput. Surv., 2021

Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement.
IEEE Access, 2021

Collaborative Trajectory Optimization for Outage-aware Cellular-Enabled UAVs.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

vCDS: A Virtualized Cross Domain Solution Architecture.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Lightweight and Reliable Decentralized Reward System using Blockchain.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Blur the Eyes of UAV: Effective Attacks on UAV-based Infrastructure Inspection.
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021

Game Theoretic Hardware Trojan Testing Under Cost Considerations.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Distributed Network Optimization for Secure Operation of Interdependent Complex Networks.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

On Distributed Optimization in the Presence of Malicious Agents.
Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021

Strategic Hardware Trojan Testing with Hierarchical Trojan Types.
Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021

2020
PCBChain: Lightweight Reconfigurable Blockchain Primitives for Secure IoT Applications.
IEEE Trans. Very Large Scale Integr. Syst., 2020

Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection.
IEEE Trans. Dependable Secur. Comput., 2020

Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation.
IEEE Trans. Dependable Secur. Comput., 2020

A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising.
IEEE Trans. Dependable Secur. Comput., 2020

Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions.
Cryptogr., 2020

Exploring the Attack Surface of Blockchain: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2020

Measuring Decentrality in Blockchain Based Systems.
IEEE Access, 2020

Empowering Named Data Networks for Ad-Hoc Long-Range Communication.
Proceedings of the 29th Wireless and Optical Communications Conference, 2020

A Blockchain Simulator for Evaluating Consensus Algorithms in Diverse Networking Environments.
Proceedings of the Spring Simulation Conference, 2020

Achieving Sensor Identification and Data Flow Integrity in Critical Cyber-Physical Infrastructures.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Detecting Counterfeit ICs with Blockchain-based Verification Framework.
Proceedings of the IEEE International Smart Cities Conference, 2020

Robust Machine Learning against Adversarial Samples at Test Time.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

CyVi: Visualization of Cyber-Attack and Defense Effects in Geographically Referenced Networks.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

Fusion of Named Data Networking and Blockchain for Resilient Internet-of-Battlefield-Things.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
Thwarting Security Threats From Malicious FPGA Tools With Novel FPGA-Oriented Moving Target Defense.
IEEE Trans. Very Large Scale Integr. Syst., 2019

Attacker Capability based Dynamic Deception Model for Large-Scale Networks.
EAI Endorsed Trans. Security Safety, 2019

Exploring the Attack Surface of Blockchain: A Systematic Overview.
CoRR, 2019

Data Provenance in the Cloud: A Blockchain-Based Approach.
IEEE Consumer Electron. Mag., 2019

Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.
Proceedings of the Information Security Applications - 20th International Conference, 2019

LightChain: On the Lightweight Blockchain for the Internet-of-Things.
Proceedings of the IEEE International Conference on Smart Computing, 2019

Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework.
Proceedings of the Security and Privacy in Communication Networks, 2019

Quantifying location privacy in permissioned blockchain-based internet of things (IoT).
Proceedings of the MobiQuitous 2019, 2019

Scalable Blockchain Implementation for Edge-based Internet of Things Platform.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Demo: Towards the Development of a Differentially Private Lightweight and Scalable Blockchain for IoT.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019

Triad-NVM: persistency for integrity-protected and encrypted non-volatile memories.
Proceedings of the 46th International Symposium on Computer Architecture, 2019

Consensus of Whom? A Spectrum of Blockchain Consensus Protocols and New Directions.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019

Hardware Assisted Chaos Based IoT Authentication.
Proceedings of the 16th IEEE International Conference on Networking, Sensing and Control, 2019

FastChain: Lightweight Blockchain with Sharding for Internet of Battlefield-Things in NS-3.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

A Method for Scalable First-Order Rule Learning on Twitter Data.
Proceedings of the 35th IEEE International Conference on Data Engineering Workshops, 2019

Countering Selfish Mining in Blockchains.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

An LSTM Enabled Dynamic Stackelberg Game Theoretic Method for Resource Allocation in the Cloud.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Edge-Assisted Learning for Real-Time UAV Imagery via Predictive Offloading.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Game Theoretic-Based Approaches for Cybersecurity-Aware Virtual Machine Placement in Public Cloud Clusters.
Proceedings of the 19th IEEE/ACM International Symposium on Cluster, 2019

Internet of Things Anomaly Detection using Machine Learning.
Proceedings of the 48th IEEE Applied Imagery Pattern Recognition Workshop, 2019

2018
Towards Blockchain Empowered Trusted and Accountable Data Sharing and Collaboration in Mobile Healthcare Applications.
EAI Endorsed Trans. Pervasive Health Technol., 2018

Triad-NVM: Persistent-Security for Integrity-Protected and Encrypted Non-Volatile Memories (NVMs).
CoRR, 2018

A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory.
Proceedings of the IEEE 61st International Midwest Symposium on Circuits and Systems, 2018

A Generic Paradigm for Blockchain Design.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) Architecture.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Securing FPGA-based obsolete component replacement for legacy systems.
Proceedings of the 19th International Symposium on Quality Electronic Design, 2018

A stochastic game approach to cyber-physical security with applications to smart grid.
Proceedings of the IEEE INFOCOM 2018, 2018

A reputation-based stackelberg game model to enhance secrecy rate in spectrum leasing to selfish IoT devices.
Proceedings of the IEEE INFOCOM 2018, 2018

iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity.
Proceedings of the 2018 International Conference on Computing, 2018

Diversity Modeling to Evaluate Security of Multiple SDN Controllers.
Proceedings of the 2018 International Conference on Computing, 2018

Enabling Cooperative IoT Security via Software Defined Networks (SDN).
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

QOI: Assessing Participation in Threat Information Sharing.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

FPGA-oriented moving target defense against security threats from malicious FPGA tools.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

SecureCASH: Securing Context-Aware Distributed Storage and Query Processing in Hybrid Cloud Framework.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Aggregated-Query-as-a-Secure-Service for RF Spectrum Database-Driven Opportunistic Wireless Communications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Malware Classification using Deep Convolutional Neural Networks.
Proceedings of the 47th IEEE Applied Imagery Pattern Recognition Workshop, 2018

CloudPoS: A Proof-of-Stake Consensus Design for Blockchain Integrated Cloud.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

ChainFS: Blockchain-Secured Cloud Storage.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Rethinking Information Sharing for Actionable Threat Intelligence.
CoRR, 2017

Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence.
CoRR, 2017

Consensus protocols for blockchain-based data provenance: Challenges and opportunities.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Game theoretic analysis for resource allocation in dynamic multi-hop networks with arbitration.
Proceedings of the 2017 Annual IEEE International Systems Conference, 2017

Understanding the Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Assessing Quality of Contribution in Information Sharing for Threat Intelligence.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Approach to detect non-adversarial overlapping collusion in crowdsourcing.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Preventing Colluding Identity Clone Attacks in Online Social Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

A Markov Game Theoritic Approach for Power Grid Security.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

A game theoretic approach for inspecting web-based malvertising.
Proceedings of the IEEE International Conference on Communications, 2017

Rethinking information sharing for threat intelligence.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

Synthesis of hardware sandboxes for Trojan mitigation in systems on chip.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Majority is Not Always Supreme: Less Can Be More When Voting with Compromised Nodes.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Cyber Security Resource Allocation: A Markov Decision Process Approach.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Automatic Generation of Hardware Sandboxes for Trojan Mitigation in Systems on Chip (Abstract Only).
Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2017

Combating Data Leakage Trojans in Sequential Circuits Through Randomized Encoding.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Approximate Power Grid Protection Against False Data Injection Attacks.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Estimation of Safe Sensor Measurements of Autonomous System Under Attack.
Proceedings of the 54th Annual Design Automation Conference, 2017

Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

Scalable Score Computation for Learning Multinomial Bayesian Networks over Distributed Data.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Game theoretic modeling of security and trust relationship in cyberspace.
Int. J. Commun. Syst., 2016

A game-theoretic approach on resource allocation with colluding nodes in MANETs.
Proceedings of the Annual IEEE Systems Conference, 2016

Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

Monitoring colluding behavior in MANETs using game theory.
Proceedings of the 21st IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2016

Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious Content.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Dynamics of data delivery in mobile ad-hoc networks: A bargaining game approach.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015


  Loading...