Publications 2018

Conference

 

  • Camp, Jean; Grobler, Marthie; Jang-Jaccard, Julian; Probst, Christian W; Renaud, Karen; Watters, Paul, ‘Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks’, Hawaii International Conference on System Sciences (HICSS) 2019.
  • Lauer, Hagen; Carsten, Rudolph; Salehi Shahraki, Ahmad; Nepal, Surya, ‘User-Centered Attestation for Layered and Decentralized Systems’, Networks and Distributed System Security.
  • Truong, Tri; Harwood, Aaron; Sinnott, Richard; Chen, Shiping, ‘Performance Analysis of Large-scale Distributed Stream Processing Systems on the Cloud’, IEEE Cloud 2018.
  • Samant, Sunil; Chhetri, Mohan; Vo, Bao; Kowalczyk, Ryszard; Nepal, Surya, ‘Towards end-to-end QoS and cost-aware resource scaling in cloud-based IoT data processing pipelines’, IEEE International Conference on Services Computing.
  • Eze, Peter; Parampalli, Udaya; Liu, Dongxi; Evans, Robin John, ‘Spread Spectrum Steganographic Capacity Improvement for Medical Image Security in Teleradiology’, 40th International Conference of the IEEE Engineering in Medicine and Biology Society.
  • Tang, Lihong; Ma, Wanlun; Wen, Sheng; Grobler, Marthie; Xiang, Yang; Zhou, Wanlei, ‘My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media’, Web Information Systems Engineering (WISE) 2017.
  • Wang, Derek; Wen, Sheng; Xiang, Yang; Zhou, Wanlei; Zhang, Jun; Nepal, Surya, ‘Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks’, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
  • Wang, Jianfeng; Chen, Xiaofeng; Sun, Shifeng; Liu, Joseph K.; Au, Man Ho; Zhn, Zhi-Hui, ‘Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database’, European Symposium on Research in Computer Security (ESORICS) 2018.
  • Yang, Xu; Yi, Xun; Cui, Hui; Yang, Terry; Nepal, Surya; Huang, Xinyi; Zeng, Yali, ‘A Practical Authentication Protocol for Anonymous Web Browsing’, 13th International Conference on Information Security Practice and Experience.
  • Zuo, Cong; Sun, Shi-Feng; Liu, Joseph K.; Shao, Jun; Pieprzyk, Josef, ‘Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security’, 23rd European Symposium on Research in Computer Security.
  • Senarath, Awanthika Rasanjalee; Gamagedara Arachchilage, Nalin Asanka; Grobler, Marthie, ‘A model for system developers to measure the perceived privacy risk of users’, Hawaii International Conference on System Sciences (HICSS) 2019.
  • Masombuka, Mmalerato; Grobler, Marthie; Watson, Bruce, ‘Towards an Artificial Intelligence Framework to Actively Defend Cyberspace’, 17th European Conference on Cyber Warfare and Security (ECCWS).
  • Yu, Bin; Liu, Joseph; Sakzad, Amin; Nepal, Surya; Rimba, Paul; Steinfeld, Ron; Au, Man Ho, ‘Platform-independent Secure Blockchain-Based Voting System’, 21st Information Security Conference.
  • Nosouhi, Mohammad; Yu, Shui; Grobler, Marthie; Xiang, Yong; Zhu, Zuqing, ‘SPARSE: Privacy–Aware and Collusion Resistant Location Proof Generation and Verification’, IEEE Global Communications Conference.
  • Sun, Shifeng; Yuan, Xingliang; Liu, Joseph; Steinfeld, Ron; Sakzad, Amin; Vo, Viet; Nepal, Surya, ‘Practical Backward-Secure Searchable Encryption from Symmetric Puncturable’, Encryption ACM CCS.
  • Zhang, Zhi; Cheng, Yueqiang; Nepal, Surya; Liu, Dongxi; Shen, Quingni; Rabhi, Fethi, ‘KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels’, RAID 2018.
  • Wang, Shuo; Nepal, Surya; Sinnott, Richard, ‘PAIRS: Privacy-Aware Identification and Recommendation of Spatio-Friends’, TrustCom 2018.
  • Chhetri, Mohan; Vo, Quoc Bao; Kowalczyk, Ryszard; Nepal, Surya, ‘Towards Resource and Contract Heterogeneity Aware Rescaling for Cloud-hosted Applications’, CCGRID 2018.
  • Yang, Terry; Yi, Xun; Nepal, Surya; Han, Fengling , ‘Decentralized Voting: A Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain’, WISE 2018.
  • Wang, Shuo; Sinnott, Richard; Nepal, Surya, ‘A Privacy-Preserving Semantic Annotation Framework Using Online Social Media’, ICWS 2018.
  • Puthal, Deepak; Nepal, Surya; Ranjan, Raj; Chen, Jinjun, ‘A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams’, HICSS 2017.
  • Puthal, Deepak; Nepal, Surya; Ranjan, Raj; Chen, Jinjun, ‘A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud’, HPCC 2016.
  • Ahmed, Ejaz; Nepal, Surya; Kim, Hyoungshick, ‘MEDUSA: Malware detection using statistical analysis of system’s behavior’, IEEE International Conference on Collaboration and Internet Computing.
  • Baqais, Abdulrahman; Baig, Zubair; Grobler, Marthie, ‘Transparency and Opacity in AI Systems: An Overview’, OcChi.
  • Malik, Muhammad; Grobler, Marthie; Mcateer, Ian; Hannay, Peter; Baig, Zubair; Firdous, Syed, ‘Security Vulnerabilities and Cyber Threat Analysis of the XMPP Protocol in an IoT Ecosystem’, SRI Security Congress.
  • Gao, Garrison; Chen, Shiping; Nepal, Surya; ‘A Tutorial on Building Lightweight SRAM PUF Key Generators for Resource Limited IoTs’, International Conference on Pervasive Computing and Communications.
  • Yu, Lei; Chen, Shiping, ‘Crawled Data Analysis on Baidu API Website for Improving SaaS Platform’, CollaborateCom 2018.
  • Yang, Xu; Yi, Xun; Zeng, Yali; Khalil, Ibrahim; Huang, Xinyi; Nepal, Surya, ‘An Improved Lightweight RFID Authentication Protocol for Internet of Things’, IEE WISe 2018.
  • Wu, Diyu; Chen, Shiping; Chen, Shiping; Xue, Jingling, ‘Precise Static Happens-Before Analysis for Detecting UAF Order Violations in Android’, 12the IEEE International Conference on Software Testing, Verfication and Validation.

Journal

 

  • Chernyshev, Maxim; Baig, Zubair; Zeadally, Sherali; Baig, Zubair; Woodward, Andrew, ‘Internet of Things Forensics: The Need, Process Models, and Open Issues ‘, IEEE IT Professional.
  • Malik, Muhammad; Baig, Zubair; Mcateer, Ian; Hannay, Peter, ‘Preparing for Secure Wireless Medical Environment in 2050: A Vision’, IEEE Access.
  • Li, Wei; Liu, Bonnie; Liu, Dongxi; Liu, Ren Ping; Wang, Peishun; Luo, Shoushan; Ni, Wei, ‘Unified Fine-grained Access Control for Personal Health Records in Cloud Computing’, IEEE Journal of Biomedical and Health Informatics.
  • Yang, Xu; Yi, Xun; Khalil, Ibrahim; Cui, Hui; Yang, Terry; Nepal, Surya; Huang, Xinyi; Zeng, Yali , ‘A New Privacy-Preserving Authentication Protocol for Anonymous Web Browsing’, Concurrency and Computation: Practice and Experience.
  • Yang, Terry; Yi, Xun; Nepal, Surya; Kelarev, Andrei; Han, Fengling, ‘A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption’, IEEE Access.
  • Cui, Hui; Deng, Robert; Lai, Junzuo; Yi, Xun; Nepal, Surya, ‘An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures, Revisited’, Computer Networks.
  • Cui, Hui; Yi, Xun; Nepal, Surya, ‘Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks’, IEEE Access.
  • Badsha, Shahriar; Yi, Xun; Khalil, Ibrahim; Liu, Dongxi; Nepal, Surya; Bertino, Elisa; Lam, Kwok-Yan, ‘Privacy Preserving Location-Aware Personalized Web Service Recommendations’, IEEE Transactions on Service Computing.
  • Puthal, Deepak; Wu, Xindong; Nepal, Surya; Rajiv, Ranjan; Chen, Jinjun, ‘SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams’, IEEE Transactions on Big Data.
  • Paris, Cecile; Nepal, Surya; Dennett, Amanda, ‘A Government-Run Online Community to Support Recipients of Welfare Payments’, International Journal of Cooperative Information Systems.
  • Tran, Duc-Dung; Baig, Zubair; Ha, Dac-Binh; Vo, Van; So-In, Chakchai; Tran, Hung; Ngueyn, Tria; Sanguanpong, Surasak, ‘Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks With NOMA and SWIPT Over Nakagami-mFading’, IEEE Access.
  • Chernyshev, Maxim; Baig, Zubair; Zeadally, Sherali, ‘Healthcare Data Breaches: Implications for Digital Forensic Readiness’; Journal of Medical Systems.
  • Ahmed, Ejaz; Saeed Ullah; Kim, Hyoungshick, ‘Statistical Application Fingerprinting for DDoS Attack Mitigation’, Transactinos on Information Forensics and Security.
  • Gao, Garrison; Su, Yang; Xu, Lei; Ranasinghe, Damith, ‘Lightweight (Reverse) Fuzzy Extractor with Multiple Reference PUF Responses’, IEEE Transactions on information forensics and security.
  • Wang, Haifang; Chen, Shiping; Hu, Sihang; Wang, Zhongjie; Xu, Xiaofei; Tu, Zhiying, ‘A Fine-grained Knowledge Graph for Effective Personalized Service Recommendations’, Future Generation Computer Systems.
  • Yu, Bin; Wright, Jarod; Nepal, Surya; Zhu, Liming; Liu, Joseph K.; Ranjan, Rajiv, ‘TrustChain: Establishing Trust in the IoT-based Applications Ecosystem Using Blockchain’, IEEE Cloud Computing.
  • Yang, Xu; Yi, Xun; Khalil, Ibrahim; Zeng, Yali; Xinyi, Huang; Nepal, Surya; Yang, Terry; Cui, Hui, ‘A lightweight authentication scheme for vehicular ad hoc networks based on MSR’, Vehicular Communication.
  • Badsha, Shahriar; Yi, Xun; Khalil, Ibrahim; Liu, Dongxi; Nepal, Surya; Lam, Kwok-Yan, ‘Privacy Preserving User Based Web Service Recommendations’, IEEE Access.
  • Li, Yannan; Susilo, Willy; Yang, Guomin; Yu, Yong; Du, Xiaojiang; Liu, Dongxi; Guizani, Nadra, ‘Toward Privacy and Regulation in Blockchain-based Cryptocurrencies’, IEEE Network.
  • Sun, Daniel; Chen, Shiping; Li, Guoqiang; Zhang, Yuanyuan; Atif, Muhammad, ‘Multi-objective Optimisation of Online Distributed Software Update for DevOps in Clouds’, IEEE Transactions on Internet Technology.