Surya Nepal
Orcid: 0000-0002-3289-6599
According to our database1,
Surya Nepal
authored at least 489 papers
between 1998 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
Alert Prioritisation in Security Operations Centres: A Systematic Survey on Criteria and Methods.
ACM Comput. Surv., February, 2025
2024
Can differential privacy practically protect collaborative deep learning inference for IoT?
Wirel. Networks, August, 2024
IEEE Trans. Neural Networks Learn. Syst., April, 2024
IEEE Trans. Software Eng., March, 2024
Inf. Sci., January, 2024
IEEE Trans. Serv. Comput., 2024
ACM Trans. Internet Techn., 2024
IEEE Trans. Multim., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proc. Priv. Enhancing Technol., 2024
From Solitary Directives to Interactive Encouragement! LLM Secure Code Generation by Natural Language Prompting.
CoRR, 2024
Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning.
CoRR, 2024
SAFE: Advancing Large Language Models in Leveraging Semantic and Syntactic Relationships for Software Vulnerability Detection.
CoRR, 2024
Systematic Literature Review of AI-enabled Spectrum Management in 6G and Future Networks.
CoRR, 2024
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure.
CoRR, 2024
Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone?
CoRR, 2024
A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection.
CoRR, 2024
CoRR, 2024
Comput. J., 2024
AI Commun., 2024
Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme.
Ad Hoc Networks, 2024
Privacy-Preserving and Fairness-Aware Federated Learning for Critical Infrastructure Protection and Resilience.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the 3rd ACM Workshop on the Security Implications of Deepfakes and Cheapfakes, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Exploiting Layerwise Feature Representation Similarity For Backdoor Defence in Federated Learning.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
ACM Trans. Internet Techn., August, 2023
Dataset, August, 2023
Dataset, August, 2023
IEEE Trans. Knowl. Data Eng., April, 2023
IEEE Trans. Big Data, April, 2023
Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT.
IEEE Trans. Sustain. Comput., 2023
IEEE Trans. Serv. Comput., 2023
ACM Trans. Internet Techn., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks.
IEEE Trans. Dependable Secur. Comput., 2023
NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions.
IEEE Trans. Dependable Secur. Comput., 2023
AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity.
CoRR, 2023
Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks.
CoRR, 2023
Proceedings of the ACM Web Conference 2023, 2023
AgrEvader: Poisoning Membership Inference against Byzantine-robust Federated Learning.
Proceedings of the ACM Web Conference 2023, 2023
Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps.
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 5th IEEE International Conference on Trust, 2023
Proceedings of the 5th IEEE International Conference on Trust, 2023
Digital Twins and the Future of Their Use Enabling Shift Left and Shift Right Cybersecurity Operations.
Proceedings of the 5th IEEE International Conference on Trust, 2023
TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the 18th Asian Internet Engineering Conference, 2023
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Int. J. Intell. Syst., December, 2022
NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions.
Dataset, June, 2022
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
Guest Editorial: Special Issue on Services Computing for COVID-19 and Future Pandemics.
IEEE Trans. Serv. Comput., 2022
OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning.
IEEE Trans. Parallel Distributed Syst., 2022
Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity.
ACM Trans. Internet Techn., 2022
ACM Trans. Internet Techn., 2022
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2022
TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs.
IEEE Trans. Dependable Secur. Comput., 2022
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples.
IEEE Trans. Cybern., 2022
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things.
IEEE Trans. Computers, 2022
Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
CoRR, 2022
Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms.
CoRR, 2022
CoRR, 2022
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World.
CoRR, 2022
CoRR, 2022
Comput. Secur., 2022
SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022
Proceedings of the 4th IEEE International Conference on Trust, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control.
Proceedings of the Information Security - 25th International Conference, 2022
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022
R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy.
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE Trans. Serv. Comput., 2021
Exploiting Heterogeneity for Opportunistic Resource Scaling in Cloud-Hosted Applications.
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems.
IEEE Trans. Emerg. Top. Comput., 2021
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things.
IEEE Trans. Comput. Soc. Syst., 2021
Pers. Ubiquitous Comput., 2021
IEEE Internet Things J., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Frontiers Big Data, 2021
ACM Comput. Surv., 2021
OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning.
CoRR, 2021
CoRR, 2021
Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?
CoRR, 2021
DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN.
CoRR, 2021
Comput. Secur., 2021
Comput. J., 2021
Intelligent Anomaly Detection for Large Network Traffic With Optimized Deep Clustering (ODC) Algorithm.
IEEE Access, 2021
Can pre-trained Transformers be used in detecting complex sensitive sentences? - A Monsanto case study.
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021
Proceedings of the IEEE World Congress on Services, 2021
Proceedings of the 6th South-East Europe Design Automation, 2021
DeepiSign: invisible fragile watermark to protect the integrity and authenticity of CNN.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves.
Proceedings of the Applied Cryptography and Network Security, 2021
2020
What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text.
IEEE Trans. Serv. Comput., 2020
IEEE Trans. Knowl. Data Eng., 2020
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Knowl. Inf. Syst., 2020
IACR Cryptol. ePrint Arch., 2020
Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities.
Future Gener. Comput. Syst., 2020
HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios.
CoRR, 2020
CoRR, 2020
Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks.
CoRR, 2020
FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning.
CoRR, 2020
CoRR, 2020
Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies.
IEEE Commun. Surv. Tutorials, 2020
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
A Needle in a Haystack: Finding a Suitable Lightweight IoT Authentication Protocol and Improving Its Usability.
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020
Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
A Behavioural Network Traffic Novelty Detection for the Internet of Things Infrastructures.
Proceedings of the Parallel Architectures, Algorithms and Programming, 2020
Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT).
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
Proceedings of the 53rd Annual IEEE/ACM International Symposium on Microarchitecture, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Proceedings of the Service-Oriented Computing - ICSOC 2020 Workshops, 2020
Proceedings of the Information Systems Security - 16th International Conference, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020
An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation.
Proceedings of the Computer Security - ESORICS 2020, 2020
Architecture-Centric Support for Integrating Security Tools in a Security Orchestration Platform.
Proceedings of the Software Architecture - 14th European Conference, 2020
DAN: Dual-View Representation Learning for Adapting Stance Classifiers to New Domains.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
Proceedings of the 28th International Conference on Computational Linguistics, 2020
What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the Applications and Techniques in Information Security, 2020
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution.
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Veh. Commun., 2019
Introduction to the Special Section on Advances in Internet-based Collaborative Technologies.
ACM Trans. Internet Techn., 2019
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
ACM Trans. Cyber Phys. Syst., 2019
SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams.
IEEE Trans. Big Data, 2019
J. Parallel Distributed Comput., 2019
IEEE Internet Things J., 2019
Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing.
CoRR, 2019
Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples.
CoRR, 2019
Concurr. Comput. Pract. Exp., 2019
Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks.
Concurr. Comput. Pract. Exp., 2019
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Provable Security, 2019
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
An ontology-driven approach to automating the process of integrating security software systems.
Proceedings of the International Conference on Software and System Processes, 2019
Proceedings of the 2019 IEEE International Conference on Web Services, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Self-Improving Autonomic Systems for Antifragile Cyber Defence: Challenges and Opportunities.
Proceedings of the 2019 IEEE International Conference on Autonomic Computing, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proactive Antifragility: A New Paradigm for Next-Generation Cyber Defence at the Edge.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
Benchmarking for End-to-End QoS Sustainability in Cloud-Hosted Data Processing Pipelines.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019
Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the Advanced Information Systems Engineering, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
Recognising Agreement and Disagreement between Stances with Reason Comparing Networks.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019
2018
Int. J. Cooperative Inf. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
Future Gener. Comput. Syst., 2018
TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs.
CoRR, 2018
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
CoRR, 2018
Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones.
CoRR, 2018
Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks.
CoRR, 2018
A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS.
CoRR, 2018
Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation.
CoRR, 2018
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.
Comput. Networks, 2018
IEEE Cloud Comput., 2018
IEEE Cloud Comput., 2018
A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018
Decentralized Voting: A Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the Web Services - ICWS 2018, 2018
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Towards Resource and Contract Heterogeneity Aware Rescaling for Cloud-Hosted Applications.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018
ADSL: An Embedded Domain-Specific Language for Constraint-Based Distributed Self-Management.
Proceedings of the 25th Australasian Software Engineering Conference, 2018
Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018
Towards End-to-End QoS and Cost-Aware Resource Scaling in Cloud-Based IoT Data Processing Pipelines.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018
2017
World Wide Web, 2017
IEEE Trans. Sustain. Comput., 2017
IEEE Trans. Parallel Distributed Syst., 2017
DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream.
ACM Trans. Embed. Comput. Syst., 2017
IEEE Trans. Cloud Comput., 2017
An Infrastructure Service Recommendation System for Cloud Applications with Real-time QoS Requirement Constraints.
IEEE Syst. J., 2017
A dynamic prime number based efficient security mechanism for big sensing data streams.
J. Comput. Syst. Sci., 2017
IEEE Internet Things J., 2017
Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication.
IACR Cryptol. ePrint Arch., 2017
Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability.
IEEE Access, 2017
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Exploiting Users' Rating Behaviour to Enhance the Robustness of Social Recommendation.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017
ARA-Assessor: Application-Aware Runtime Risk Assessment for Cloud-Based Business Continuity.
Proceedings of the Service-Oriented Computing - 15th International Conference, 2017
Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
The Joint Effects of Tweet Content Similarity and Tweet Interactions for Topic Derivation.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
ConTaaS: An Approach to Internet-Scale Contextualisation for Developing Efficient Internet of Things Applications.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2017
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
2016
ACM Trans. Internet Techn., 2016
SafeProtect: Controlled Data Sharing With User-Defined Policies in Cloud-Based Collaborative Environment.
IEEE Trans. Emerg. Top. Comput., 2016
A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage.
Data Sci. Eng., 2016
IEEE Cloud Comput., 2016
Guest Editorial: Cloud Computing and Scientific Applications (CCSA) - Big Data Analysis in the Cloud.
Comput. J., 2016
An Innovative Approach to Derive Trust from Social Networks and to Improve the Matching in Dental Care Recommendation Systems.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016
Impact of Subjective Aspects in the Matching of Dentists and Patients in Dental Care Recommendation Systems.
Proceedings of the International Conference on Information Systems, 2016
Proceedings of the ICEIS 2016, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Proceedings of the 12th IEEE International Conference on e-Science, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Why Is It Difficult for Welfare Recipients to Return to Work? A Case Study through a Collaborative Online Community.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
LogProv: Logging events as provenance of big data analytics pipelines with trustworthiness.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
2015
IEEE Trans. Serv. Comput., 2015
IEEE Trans. Parallel Distributed Syst., 2015
ACM Trans. Internet Techn., 2015
Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud.
IEEE Trans. Computers, 2015
Domain-aware reputable service recommendation in heterogeneous manufacturing service ecosystem.
Int. J. Comput. Integr. Manuf., 2015
A Cloud Infrastructure Service Recommendation System for Optimizing Real-time QoS Provisioning Constraints.
CoRR, 2015
Concurr. Comput. Pract. Exp., 2015
IEEE Cloud Comput., 2015
Behavior-Based Propagation of Trust in Social Networks with Restricted and Anonymous Participation.
Comput. Intell., 2015
A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Computational Linguistics, 2015
Analysing and Using Subjective Criteria to Improve Dental Care Recommendation Systems.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
Proceedings of the Social Media for Government Services, 2015
Proceedings of the Social Media for Government Services, 2015
Proceedings of the Social Media for Government Services, 2015
2014
IEEE Trans. Serv. Comput., 2014
A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud.
J. Comput. Syst. Sci., 2014
Gamification for Online Communities: A Case Study for Delivering Government Services.
Int. J. Cooperative Inf. Syst., 2014
Future Gener. Comput. Syst., 2014
EAI Endorsed Trans. Collab. Comput., 2014
Improving the Matching Process of Dental Care Recommendation Systems by using Subjective criteria for both patients and Dentists.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014
A Novel Equitable Trustworthy Mechanism for Service Recommendation in the Evolving Service Ecosystem.
Proceedings of the Service-Oriented Computing - 12th International Conference, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Online Multiple Workflow Scheduling under Privacy and Deadline in Hybrid Cloud Environment.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
Proceedings of the Advanced Web Services, 2014
2013
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud.
IEEE Trans. Parallel Distributed Syst., 2013
An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud.
J. Comput. Syst. Sci., 2013
Int. J. Trust. Manag. Comput. Commun., 2013
Future Gener. Comput. Syst., 2013
Cloud Computing and Scientific Applications - Big Data, Scalable Analytics, and Beyond.
Future Gener. Comput. Syst., 2013
SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud.
Concurr. Comput. Pract. Exp., 2013
Proceedings of the User Modeling, Adaptation, and Personalization, 2013
Proceedings of the Late-Breaking Results, 2013
Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the International Conference on Parallel and Distributed Computing, 2013
Proceedings of the Augmentation, Application, Innovation, Collaboration, OzCHI '13, Adelaide, Australia - November 25, 2013
Proceedings of the Service-Oriented Computing - ICSOC 2012 Workshops, 2013
Introduction to the 3rd International Workshop on Cloud Computing and Scientific Applications (CCSA'13).
Proceedings of the Service-Oriented Computing - ICSOC 2013 Workshops, 2013
Mirror, Mirror, on the Web, Which Is the Most Reputable Service of Them All? - A Domain-Aware and Reputation-Aware Method for Service Recommendation.
Proceedings of the Service-Oriented Computing - 11th International Conference, 2013
Galaxy + Hadoop: Toward a Collaborative and Scalable Image Processing Toolbox in Cloud.
Proceedings of the Service-Oriented Computing - ICSOC 2013 Workshops, 2013
Proceedings of the Service-Oriented Computing - ICSOC 2012 Workshops, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Designing for reflection and collaboration to support a transition from welfare to work.
Proceedings of the Computer Supported Cooperative Work, 2013
Proceedings of the Computer Supported Cooperative Work, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
Data architecture for telehealth services research: A case study of home tele-monitoring.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
Security analysis of mobile applications: A case study of a collaboration tool in healthcare.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013
Social Networking and Dental Care: State of the Art and Analysis of the Impact on Dentists, Dental Practices and their Patients.
Proceedings of the 26th Bled eConference: eTrust: eInnovation: Challenges and Impacts for Individuals, 2013
Data Abstraction and Visualisation in Next Step: Experiences from a Government Services Delivery Trial.
Proceedings of the IEEE International Congress on Big Data, 2013
2012
ACM Trans. Internet Techn., 2012
Int. J. Next Gener. Comput., 2012
IEICE Trans. Inf. Syst., 2012
CoRR, 2012
Proceedings of the Web Information Systems Engineering - WISE 2011 and 2012 Workshops, 2012
Proceedings of the Workshop and Poster Proceedings of the 20th Conference on User Modeling, 2012
Proceedings of the Workshop and Poster Proceedings of the 20th Conference on User Modeling, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 24th Australian Computer-Human Interaction Conference, OzCHI '12, Melbourne, VIC, Australia - November 26, 2012
Proceedings of the 2012 IEEE First International Conference on Mobile Services, 2012
PASOAC-Net: A Petri-Net Model to Manage Authorization in Service-Based Business Process.
Proceedings of the Service-Oriented Computing - 10th International Conference, 2012
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012
ReputationNet: A Reputation Engine to Enhance ServiceMap by Recommending Trusted Services.
Proceedings of the 2012 IEEE Ninth International Conference on Services Computing, 2012
Proceedings of the 2012 IEEE Ninth International Conference on Services Computing, 2012
2011
Int. J. Web Serv. Res., 2011
Int. J. Syst. Serv. Oriented Eng., 2011
Int. J. Syst. Serv. Oriented Eng., 2011
EURASIP J. Wirel. Commun. Netw., 2011
Proceedings of the Advances in User Modeling, 2011
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 2011 International Conference on Parallel Processing Workshops, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
Pers. Ubiquitous Comput., 2010
Proceedings of the Web Information Systems Engineering - WISE 2010 Workshops, 2010
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
Proceedings of the IEEE International Conference on Web Services, 2010
Proceedings of the Service-Oriented Computing - 8th International Conference, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the 10th IEEE/ACM International Conference on Cluster, 2010
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010
2009
An Approach to Checking Compatibility of Service Contracts in Service-Oriented Applications.
Int. J. Web Serv. Res., 2009
A Service-Oriented Architecture to enable virtual storage services: a dynamic collaboration context.
Int. J. Ad Hoc Ubiquitous Comput., 2009
Proceedings of the IEEE International Conference on Web Services, 2009
2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
WS-CCDL: A Framework for Web Service Collaborative Context Definition Language for Dynamic Collaborations.
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the 19th Australian Software Engineering Conference (ASWEC 2008), 2008
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008
A Conflict Neighbouring Negotiation Algorithm for Resource Services in Dynamic Collaborations.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008
Trusted Email protocol: Dealing with privacy concerns from malicious email intermediaries.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008
2007
A Trusted System for Sharing Patient Electronic Medical Records in Autonomous Distributed Health Care Systems.
Int. J. Heal. Inf. Syst. Informatics, 2007
Proceedings of the 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2007), 2007
Proceedings of the 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2007), 2007
A Distributed Approach for Negotiating Resource Contributions in Dynamic Collaboration.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007
Anitya: An Ephemeral Data Management Service and Secure Data Access Protocols for Dynamic Collaborations.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Trust Extension Device: Providing Mobility and Portability of Trust in Cooperative Information Systems.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the Third Biennial Conference on Innovative Data Systems Research, 2007
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007
2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006
Proceedings of the Current Trends in Database Technology - EDBT 2006, 2006
Proceedings of the European Conference on eHealth 2006, 2006
Checking Conformance between Business Processes and Web Service Contract in Service Oriented Applications.
Proceedings of the 17th Australian Software Engineering Conference (ASWEC 2006), 2006
Proceedings of the 2006 IEEE International Conference on Services Computing (SCC 2006), 2006
2005
Multim. Tools Appl., 2005
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005
Proceedings of the On the Move to Meaningful Internet Systems 2005: CoopIS, 2005
2003
Proceedings of the Eleventh ACM International Conference on Multimedia, 2003
Proceedings of the 5th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2003
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003
2002
Proceedings of the Visualisation 2002, 2002
Spatio-temporal Modelling and Querying Video Databases Using High-level Concepts.
Proceedings of the Visual and Multimedia Information Management, 2002
A Heuristic Algorithm for Combining Fuzzy Results in Multimedia Databases.
Proceedings of the Database Technologies 2002, 2002
2001
Proceedings of the 9th ACM International Conference on Multimedia 2001, Ottawa, Ontario, Canada, September 30, 2001
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001
2000
An evaluation measure for query processing in CBIR systems.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000
1999
Proceedings of the 15th International Conference on Data Engineering, 1999
Proceedings of the Database Systems for Advanced Applications, 1999
1998
Proceedings of the SIGIR '98: Proceedings of the 21st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 1998
Four Layer Schema for Image Modeling.
Proceedings of the Database Systems 98, 1998