Publications 2019

Conference

 

  • Lai, Shangqi; Yuan, Xingliang; Sun, Shifeng; Liu, Yuhong; Liu, Joseph K.; Liu, Dongxi, ‘GraphSE^2: An Encrypted Graph Database for Privacy-Preserving Social Search’, The 14th ACM ASIA Conference on Computer and Communications Security.
  • Kasra Kermanshahi, Shabnam; Liu, Joseph K.; Steinfeld, Ron; Nepal, Surya, ‘Generic Multi-keyword Ranked Search on Encrypted Cloud Data’, ESORICS.
  • Sellak, Hamza; Grobler, Marthie, ‘Towards intelligent, multi-dimensional context-aware personalised healthcare and wellness support services’, Health Informatics Conference (HIC).
  • Esgin, Muhammed; Steinfeld, Ron; Sakzad, Amin; Liu, Joseph K.; Liu, Dongxi, ‘Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures’, Conference on Applied Cryptography and Network Security.
  • Esgin, Muhammed; Steinfeld, Ron; Liu, Joseph K.; Liu, Dongxi, ‘Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications’, Crypto.
  • Nosouhi, Mohammad; Sood, Keshav; Yu, Shui; Grobler, Marthie, ‘HSDC-net: Secure Anonymous Messaging in Social Networks’, IEEE TrustCom Conference.
  • Wang, Jianqiang; Ma, Slivia; Zhang, Yuanyuan; Li, Juanru; Ma, Zheyu; Mai, Long; Chen, Tiancheng; Gu, Dawu, ‘NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification’, International Symposium on Research in Attacks, Intrusions and Defenses.
  • Ma, Slivia; Bertino, Elisa; Nepal, Surya; Li, Juanru; Ostry, Diet; Deng, Robert H.; Jha, Sanjay, ‘Finding Flaws from Password Authentication Code in Android apps’, The European Symposium on Research in Computer Security.
  • Phuong, Tran; Susilo, Willy; Kim, Jongkil; Yang, Guomin; Liu, Dongxi, ‘Puncturable Proxy Re-Encryption supporting to Group Messaging Service’, 24th European Symposium on Research in Computer Security (ESORICS2019).
  • Chhetri, Mohan; Luong, Hein; Uzunov, Anton; Vo, Quoc Bao; Kowalczyk, Ryszard; Nepal, Surya; Rajapakse, Isuru, ‘ADSL: An Embedded Domain-Specific Language for Constraint-Based Distributed Self-Management’, 25th Australasian Software Engineering Conference (ASWEC).
  • Chhetri, Mohan; Uzunov, Anton; Vo, Quoc Bao; Kowalczyk, Ryszard; Docking, Michael; Luong, Hein; Rajapakse, Isuru; Nepal, Surya, ‘AWaRE – Towards Distributed Self-Management for Resilient Cyber Systems’, 23rd International Conference on Engineering of Complex Computer Systems (ICECCS).
  • Karmakar, Kallol Krishna; Varadharajan, Vijay; Nepal, Surya; Tupakula, Uday, ’SDN Enabled Secure IoT Architecture’, IFIP/IEEE International Symposium on Integrated Network Management (IM2019).
  • Qiu, Junyang; Luo, Wei; Nepal, Surya; Zhang, Jun; Xiang, Yang; Pan, Lei , ‘Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware’, Advanced Data Mining and Applications: 14th International Conference, ADMA 2018.
  • Islam, Chadni; Babar, Muhammad Ali; Nepal, Surya, ‘Automated Interpretation and Integration of Security Tools Using Semantic Knowledge’, CAiSE 2019.
  • Nepal, Surya, ‘Security is the Weakest Link: Prevalent Culture of Victim Blaming in Cyberattacks’, ASIA CCS.
  • Hamad, Salma Abdalla; Zhang, Wei Emma; Sheng, Quan; Nepal, Surya, ‘IoT Device Identification via Network-Flow Based Fingerprinting and Learning’, TrustCom 2019.
  • Li, Nan; Varadharajan, Vijay; Nepal, Surya, ‘Context-Aware Trust Management System for IoT Applications with Multiple Domains’, 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019).
  • Lauer, Hagen; Sakzad, Amin; Rudolph, Carsten; Nepal, Surya, ‘A Logic for Secure Stratified Systems and its Application to Containerized Systems’, TrustCom 2019.
  • Wang, Shuo; Sinnott, Richard; Rudolph, Carsten; Nepal, Surya, ‘P-STM: Privacy-protected Social Tie Mining of Individual Trajectories’, IEEE International Conference on Web Services.
  • Chhetri, Mohan; Forkan, Abdur Rahim Mohammad; Vo, Quoc Bao; Nepal, Surya; Kowalczyk, Ryszard, ‘Towards Risk-Aware Cost-Optimal Resource Allocation for Cloud Applications’, IEEE International Conference on Service Computing.
  • Yu, Bin; Kasra Kermanshahi, Shabnam; Sakzad, Amin; Nepal, Surya, ‘Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks’, The 13th International Conference on Provable and Practical Security (PROVSEC 2019).
  • Wijaya, Dimaz; Liu, Joseph; Steinfeld, Ron; Liu, Dongxi; Yu, Jiangshan, ‘On The Unforkability of Monero’, 14th ACM ASIA Conference on Computer and Communications Security.
  • Esgin, Muhammed; Zhao, Raymond; Steinfeld, Ron; Liu, Joseph K.; Liu, Dongxi, ‘MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol’, The 26th ACM Conference on Computer and Communications Security.
  • Liu, Jixue; Kwashie, Selasi; Li, Jiuyong; Liu, Lin; Bewong, Michael, ‘Linking Graph Entities with Multiplicity and Provenance’, ACM International Conference on Information and Knowledge Management (CIKM).
  • Islam, Md Zahidul; Liu, Jixue; Li, Jiuyong; Liu, Lin; Kang, Wei, ‘A Semantics Aware Random Forest for Text Classification’, ACM International Conference on Information and Knowledge Management.
  • Gao, Garrison; Xu, Chang; Wang, Derek; Chen, Shiping; Ranasinghe, Damith; Nepal, Surya, ‘STRIP: A Defence Against Trojan Attacks on Deep Neural Networks’, Annual Computer Security Applications Conference (ACSAC).
  • Han, Joon Kuy; Kim, Hyoung; Woo, Simon S., ‘Nickel to Lego: Using Foolgle to Create Adversarial Examples to fool Google Cloud Speech-to-Text API’, CCS 2019.
  • Lee, Daehwa Rayer; Jang, Yunhee; Kim, Hyoung, ‘A Proof-of-Stake (PoS) Blockchain Protocol using Fair and Dynamic Sharding Management’, Conference on Computer and Communications Security (CCS’19).
  • Jang, Heejun; Jin, Beomjin; Hyun, Sangwon; Kim, Hyoung, ‘Kerberoid: A Practical Android App Decompilation System with Multiple Decompilers’, Conference on Computer and Communications Security (CCS’19).
  • Jeong, Jay; Grobler, Marthie; Mahawaga Arachchige, Chamikara; Rudolph, Carsten, ‘Fuzzy Logic Application to Link National Culture and Cybersecurity Maturity’, 2019 Humans and Cyber Security (HACS-2019) workshop.
  • Ahmed, Ejaz; Kwak, Il-Youp; Huh, Jun Ho; Kim, Iljoo; Oh, Taekkyung; Kim, Hyoungshick, ‘Void: A fast and light voice liveness detection system’, USENIX Security.
  • Colman, Alan; Chowdhury, Jabed Morshed; Baruwal Chhetri, Mohan, ‘Towards a trusted marketplace for wearable data’, 2019 Humans and Cyber Security (HACS-2019) Workshop.
  • Uzunov, Anton; Nepal, Surya; Baruwal Chhetri, Mohan, ‘Proactive Antifragility: A New Paradigm for Next-Generation Cyber Defence at the Edge’, IEEE Conference on Collaboration and Internet Computing.
  • Chatterjee, Ranit; Ruj, Sushmita; Das Bit, Sipra, ‘Public Key Infrastructure for Named Data Networks’, ICDCN.
  • Lai, Shangqi; Zuo, Cong; Yuan, Xingliang; Liu, Joseph K.; Qian, Haifeng, ‘An Encrypted Database with Enforced Access Control and Blockchain Validation’, The 14th International Conference on Information Security and Cryptology.
  • Wu, Tina; Zhang, Rongjunchen; Ma, Wanlun; Wen, Sheng; Xia, Xin; Paris, Cecile; Nepal, Surya; Xiang, Yang, ‘What risk? I don’t understand. An Empirical Study on Users’ Understanding of the Terms Used in Security Texts’, Asia CCS 2020.
  • Yao, Jing; Zheng, Yifeng; Wang, Cong; Nepal, Surya, ‘Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness’, The 17th International Conference on Security and Cryptography (SECRYPT 2020).

Journal

 

  • Senarath, Awanthika Rasanjalee; Grobler, Marthie; Gamagedara Arachchilage, Nalin Asanka, ‘ “Will They Use It or Not?” Investigating Software Developers’ Intention to Follow Privacy Engineering Methodologies’, ACM Transactions on Privacy and Security.
  • Arabnezhad-Khanoki, Hossein; Sadeghiyan, Babak; Pieprzyk, Josef, ‘S-boxes Representation and Efficiency of Algebraic Attack’, IET Information Security.
  • Bansal, Tarun; Boyen, Xavier; Pieprzyk, Josef, ‘Signcryption schemes with insider security in ideal permutation model’, Journal of Mathematical Cryptology.
  • Lai, Hong; Luo, Mingxing; Pieprzyk, Josef; Pan, Lei; Zhang, Jun; Orgun, Mehmet, ‘Efficient quantum private queries based on quantum key distribution with pulse-position modulation’, Laser Physics.
  • Pieprzyk, Josef, ‘Integer Factorization – Cryptology Meets Number Theory’, Scientific Journal of Gdynia Maritime University.
  • Thapa, Chandra; Ong, Lawrence; Johnson, Sarah; Li, Min, ‘Structural Characteristics of Two-Sender Index Coding’, Entropy: Multiuser Information Theory II (special edition).
  • Ali, Amjad; Ahmed, Ejaz; Ali, Farman; Tran, Nguyen H.; Niyato, Dusit; Pack, Sangheon, ‘NOn-parametric Bayesian channEls clustering (NOBEL) Scheme for Wireless Multimedia Cognitive Radio Networks’, Journal on Selected Areas in Communications (JSAC) special issue on Machine Learning in Wireless Communications.
  • Mahawaga Arachchige, Chamikara; Bertok, Peter; Liu, Dongxi; Camtepe, Seyit; Khalil, Ibrahim, ‘Efficient privacy preservation of big data for accurate data mining’, Information Sciences.
  • Tang, Lihong; Wanlun, Ma; Grobler, Marthie; Meng, Weizhi; Wang, Yu; Wen, Sheng, ‘Faces are Protected as Privacy: An Automatic Tagging Framework against Unpermitted Photo Sharing in Social Media’, IEEE Access.
  • Lai, Shangqi; Yuan, Xingliang; Sakzad, Amin; Salehi, Mahsa; Liu, Joseph K.; Liu, Dongxi, ‘Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets’, IEEE Internet of Things Journal.
  • Diwelwatta Gamage, Chamila Dilshan Wijayarat; Grobler, Marthie; Gamagedara Arachchilage, Nalin Asanka, ‘Software Developers need Help too! Developing a Methodology to Analyse Cognitive Dimension Based Feedback on Usability’, Behaviour & Information Technology.
  • Mahawaga Arachchige, Chamikara; Bertok, Peter; Liu, Dongxi; Camtepe, Seyit; Khalil, Ibrahim, ‘An Efficient and Scalable Privacy Preserving Algorithm for Big Data and Data Streams’, Computers & Security.
  • Nepal, Surya; Chhetri, Mohan; Ranjan, Rajiv; Kowalczyk, Ryszard, ‘A Note on Quality of Service Issues in Smart Cities’, Journal of Parallel and Distributed Computing.
  • Yu, Bin; Nepal, Surya; Zhu, Liming; Wright, Jarod; Liu, Joseph K.; Ranjan, Rajiv, ‘TrustChain: Establishing Trust in the IoT-based Applications Ecosystem Using Blockchain’, IEEE Cloud Computing.
  • Chhetri, Mohan; Forkan, Abdur Rahim Mohammad; Vo, Quoc Bao; Nepal, Surya; Kowalczyk, Ryszard, ‘Exploiting Heterogeneity for Opportunistic Resource Scaling in Cloud-hosted Applications’, IEEE Transactions on Service Computing.
  • Singh, Anil; Nitin, Auluck; Rana, Omer; Jones, Andrew; Nepal, Surya, ‘Scheduling Real-Time Security Aware tasks in Fog Networks’, IEEE Transactions on Service Computing.
  • Islam, Chadni; Babar, Muhammad Ali; Nepal, Surya, ‘A Multi-Vocal Review of Security Orchestration’, ACM Computing Survey.
  • Chen, Xiao; Li, Chaoran; Wang, Derek; Wen, Sheng; Zhang, Jun; Nepal, Surya; Xiang, Yang; Ren, Kui, ‘Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection’, IEEE Transactions on Information Forensics & Security.
  • Li, Yannan; Yang, Guomin; Susilo, Willy; Yu, Yong; Au, Man Ho; Liu, Dongxi, ‘Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability’, IEEE Transactions on Dependable and Secure Computing.
  • Baee, Mir Ali Rezazadeh; Simpson, Leonie; Foo, Ernest; Pieprzyk, Josef, ‘Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2’, IEEE Transactions on Vehicular Technology.
  • Fatima, Mehk; Rextin, Aimal; Hayat, Shamaila; Nasim, Mehwish, ‘Exploiting Contextual Information to Improve Call Prediction’, PLoS ONE.
  • Mahawaga Arachchige, Chamikara; Bertok, Peter; Khalil, Ibrahim; Liu, Dongxi; Camtepe, Seyit; Mohammed, Atiquzzaman, ‘Local Differential Privacy for Deep Learning’, IEEE Internet of Things Journal.
  • Cai, Chengjun; Zheng, Yifeng; Zhou, Anxin; Wang, Cong, ‘Building a Secure Knowledge Marketplace over Crowdsensed Data Streams’, IEEE Transactions on Dependable and Secure Computing.
  • Sengupta, Jayasree; Ruj, Sushmita; Das Bit, Sipra, ‘A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT’, Journal of Network and Computer Applications.
  • Giti, Jishan; Sakzad, Amin; Srinivasan, Balasubramaniam; Kamruzzaman, Joarder; Gaire, Raj, ‘Secrecy Capacity against Adaptive Eavesdroppers in a Random Wireless Network using Friendly Jammers and Protected Zone’, Journal of Network and Computer Applications.
  • Nosouhi, Mohammad; Yu, Shui; Zhou, Wanlei; Grobler, Marthie; Keshtiar, Habiba, ‘Blockchain for Secure Location Verification’, Journal of Parallel and Distributed Computing.
  • Nosouhi, Mohammad; Sood, Keshav; Yu, Shui; Grobler, Marthie; Zhang, Jingwen, ‘PASPORT: A Secure and Private Location Proof Generation and Verification Framework’, IEEE Transactions on Computational Social Systems.