Publications 2020
Conference
- Zhang, Yuyao; Ma, Slivia; Li, Juanru; Li, Kailai; Nepal, Surya; Gu, Dawu, ‘SMARTSHIELD: Automatic Smart Contract Protection Made Easy’, IEEE International Conference on Software Analysis, Evolution, and Reengineering. https://siqima.me/publications/saner20a.pdf
- Ma, Slivia; Feng, Runhan; Li, Juanru; Liu, Yang; Nepal, Surya; Ostry, Diet; Bertino, Elisa; Deng, Robert H.; Ma, Zhuo; Jha, Sanjay, ‘An Empirical Study of SMS One-Time Password Authentication in Android Apps’, The Annual Computer Security Applications Conference. https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=5631&context=sis_research
- Rasheed, Osama; Rextin, Aimal; Nasim, Mehwish; ‘Adult or Child: Recognizing through Touch Gestures on Smartphones’, 2019 Digital Image Computing: Techniques and Applications (DICTA).https://ieeexplore.ieee.org/abstract/document/8945816
- Singh, Mayank; Pal, Arindam; Dey, Lipika; Mukherjee, Animesh, ‘Innovation and Revenue: Deep Diving into the Temporal Rank-shifts of Fortune 500 Companies’, ACM India Joint International Conference on Data Science and Management of Data (CoDS-COMAD) 2020. https://www.researchgate.net/publication/338627498_Innovation_and_Revenue_Deep_Diving_into_the_Temporal_Rank-shifts_of_Fortune_500_Companies
- Bhattacharya, Paheli; Ghosh, Kripabandhu; Pal, Arindam; Ghosh, Saptarshi, ‘Methods for Computing Legal Document Similarity: A Comparative Study’, International Conference on Legal Knowledge and Information Systems (JURIX 2019).https://www.researchgate.net/publication/340963744_Methods_for_Computing_Legal_Document_Similarity_A_Comparative_Study
- Jalal, Jagriti; Singh, Mayank; Pal, Arindam; Dey, Lipika; Mukherjee, Animesh, ‘Identification, Tracking and Impact: Understanding the trade secret of catchphrases’, ACM/IEEE Joint Conference on Digital Libraries (JCDL 2020).
- Yao, Jing; Zheng, Yifeng; Guo, Yu; Wang, Cong, ‘SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search’, ACM AsiaCCS Workshop on Security in Blockchain and Cloud Computing (SBC).
- Weber, Derek; Nasim, Mehwish; Falzon, Lucia; Mitchell, Lewis; ‘#ArsonEmergency and Australia’s `”Black Summer”: Polarisation and misinformation on social media’, Multidisciplinary International Symposium on Disinformation in Open Online Media.https://arxiv.org/abs/2004.00742
- Samant, Sunil; Baruwal Chhetri, Mohan; Vo, Quoc Bao; Nepal, Surya; Kowalczyk, Ryszard, ‘Benchmarking for end-to-end QoS sustainability in Cloud-hosted Data Processing Pipelines’, 5th IEEE International Conference on Collaboration and Internet Computing. https://www.researchgate.net/publication/339264106_Benchmarking_for_End-to-End_QoS_Sustainability_in_Cloud-Hosted_Data_Processing_Pipelines
- Purwanto, Rizka; Pal, Arindam; Blair, Alan; Jha, Sanjay; ‘PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites’, IEEE Conference on Communications and Network Security.
- Mazumdar, Subhra; Ruj, Sushmita; Singh, Ram Govind; Pal, Arindam, ‘HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments’, IEEE International Conference on Blockchain and Cryptocurrency. https://www.researchgate.net/publication/339228056_HushRelay_A_Privacy-Preserving_Efficient_and_Scalable_Routing_Algorithm_for_Off-Chain_Payments ; https://arxiv.org/abs/2002.05071
- Islam, Md Zahidul; Liu, Jixue; Liu, Lin; Li, Jiuyong; Kang, Wei, ‘Evidence Weighted Tree Ensembles for Text Classification’, International ACM SIGIR Conference on Research and Development in Information Retrieval.
- Abuadbba, Sharif; Camtepe, Seyit; Gao, Garrison; Thapa, Chandra; Nepal, Surya; Kim, Hyoungshick; Kim, Minki; Kim, Kyuyeon, ‘Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?’, ACM ASIACCS 2020. (accepted) https://arxiv.org/abs/2003.12365
- Bhattacharya, Paheli; Ghosh, Kripabandhu; Pal, Arindam; Ghosh, Saptarshi, ‘Hier-SPCNet: A Legal Statute Hierarchy-based Heterogeneous Network for Computing Legal Document Similarity’, International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2020). https://arxiv.org/abs/2007.03225
- Le, Ba-Dung; Wang, Guanhua; Nasim, Mehwish; Babar, Ali, ‘Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification’, IEEE Cyber Worlds. https://ieeexplore.ieee.org/document/8919107
- Giti, Jishan; Sakzad, Amin; Srinivasan, Balasubramaniam; Kamruzzaman, Joarder; Gaire, Raj, ‘Friendly Jammer against an Adaptive Eavesdropper in a Relay-aided Network’, The 16th International Wireless Communications & Mobile Computing (IWCMC) Conference.
- Liu, Yang; Ma, Zhuo; Liu, Ximeng; Ma, Slivia; Nepal, Surya; Deng, Robert H.; Ren, Kui, ‘Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing’, International Conference on Distributed Computing Systems. https://www.semanticscholar.org/paper/Boosting-Privately%3A-Privacy-Preserving-Federated-Liu-Ma/7c4e61068d7a46f49b2b202d6b2a8ef0ce94f340 ; https://arxiv.org/pdf/1907.10218.pdf
- Li, Teng; Ma, Jianfeng; Pei, Qingqi; Shen, Yulong; Lin, Chi; Ma, Slivia; ‘AClog: Attack Chain Construction Based on Log Correlation’, IEEE Global Communication Conference.
- Mai, Long; Yan, Yuan; Jia, Songlin; Wang, Shuran; Wang, Jianqiang; Li, Juanru; Ma, Slivia; Gu, Dawu, ‘Accelerating SM2 Digital Signature Algorithm using Modern Processor Features’, International Conference on Information and Communications Security.
- Karmakar, Kallol Krishna; Varadharajan, Vijay; Tupakula, Uday; Nepal, Surya; Thapa, Chandra, ‘Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT)’, 6th IEEE Conference on Network Softwarization.
- Liu, Fanzhen; Xue, Emma; Wu, Jia; Zhou, Chuan; Hu, Wenbin; Paris, Cecile; Nepal, Surya; Yang, Jian; Yu, Philip S., ‘Deep learning for community detection: Progress, challenges and opportunities’, International Joint Conference on Artificial Intelligence. https://www.ijcai.org/Proceedings/2020/693
- Le, Le; Duong, Dung Hoang; Susilo, Willy; Pieprzyk, Josef, ‘Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model’, 18th International Conference on Applied Cryptography and Network Security 2020.https://arxiv.org/abs/2007.06881
- Le, Le; Duong, Dung Hoang; Susilo, Willy; Ha Thanh Nguyen, Tran; Viet Cuong, Trinh; Pieprzyk, Josef; Plantard, Thomas, ‘Lattice Blind Signatures with Forward Security’, 25th Australasian Conference on Information Security and Privacy 2020; Best Paper,https://arxiv.org/abs/2007.06884
- Yuen, Tsz Hon; Sun, Shi-Feng; Liu, Joseph K.; Au, Man Ho; Esgin, Muhammed; Zhang, Qingzhao; Gu, Dawu, ‘RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security’, Financial Cryptography and Data Security. https://eprint.iacr.org/2019/508
- Islam, Chadni; Babar, Muhammad Ali; Nepal, Surya, ‘An Ontology-Driven Approach to Automating the Process of Integrating Security Software Systems’, In ICSSP 2019 International Conference on Software and Systems Process (ICSSP’2019). https://www.researchgate.net/publication/335424992_An_Ontology-Driven_Approach_to_Automating_the_Process_of_Integrating_Security_Software_Systems
- Qiu, Junyang; Nepal, Surya; Luo, Wei; Pan, Lei; Yonghang, Tai; Zhang, Jun; Xiang, Yang, ‘Data-Driven Android Malware Intelligence: A Survey’, International Conference on Machine Learning for Cyber Security. https://researchbank.swinburne.edu.au/items/f25a91c6-7671-49e3-ad71-46cb8c002037/1/
- Baruwal Chhetri, Mohan; Uzunov, Anton; Vo, Quoc Bao; Nepal, Surya; Kowalczyk, Ryszard, ‘Self-Improving Autonomic Systems for Antifragile Cyber Defence: Challenges and Opportunities’, IEEE International Conference on Autonomic Computing (ICAC).https://dblp.org/db/conf/icac/icac2019
- Lauer, Hagen; Sakzad, Amin; Rudolph, Carsten; Nepal, Surya, ‘Bootstrapping Trust in a “Trusted” Virtualized Platform’, Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, CYSARM@CCS 2019. https://dl.acm.org/doi/10.1145/3338511.3357347
- Zhu, Xiaogang; Feng, Xiaotao; Jiao, Tengyun; Wen, Sheng; Xiang, Yang; Camtepe, Seyit; Xue, Jingling, ‘A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing’, ACM Asia Conference on Computer and Communications Security. https://researchbank.swinburne.edu.au/items/678d1f8d-e35e-4091-bb90-a5a0eb28b34b/1/
Journal
- Lin, Wenmin; Zhang, Xuyun; Qi, Lianyong; Li, Weimin; Li, Shancang; Sheng, Victor S; Nepal, Surya, ‘Location-aware Service Recommendations with Privacy-preservation in the Internet of Things’, IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS. (accepted) https://www.researchgate.net/publication/339037218_Location-Aware_Service_Recommendations_With_Privacy-Preservation_in_the_Internet_of_Things
- Hayat, Shamaila; Rextin, Aimal; Idris, Adnan; Nasim, Mehwish, ‘Text and phone calls: user behaviour and dual-channel communication prediction’, Human-centric Computing and Information Sciences. https://hcis-journal.springeropen.com/articles/10.1186/s13673-020-00217-x
- Mahawaga Arachchige, Chamikara; Bertok, Peter; Khalil, Ibrahim; Liu, Dongxi; Camtepe, Seyit; Mohammed, Atiquzzaman, ‘A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems’, IEEE Transactions on Industrial Informatics. https://ieeexplore.ieee.org/document/9000905
- Li, Yannan Susilo, Willy; Yang, Guomin; Yong, Yu; Liu, Dongxi; Du, Xiaojiang; Mohsen, Guizani, ‘A Blockchain-based Self-tallying Voting Protocol in Decentralized Industrial IoT’, IEEE Transactions on Dependable and Secure Computing. https://arxiv.org/abs/1902.03710
- Zhang, Zhi cheng, yueqiang; Gao, Garrison; Liu, Dongxi; Nepal, Surya; Zou, Yi, ‘Detecting Hardware-assisted Virtualization with Inconspicuous Features’, IEEE Transactions on Information Forensics and Security.
- Palaniswamy, Basker; Camtepe, Seyit; Foo, Ernest; Pieprzyk, Josef, ‘An Efficient Authentication Scheme for Intra-vehicular Controller Area Network’, IEEE Transactions on Information Forensics and Security. https://ieeexplore.ieee.org/document/9046809
- Phan, Raphael; Abe, Masayuki; Batten, Lynn; Cheon, Jung; Dawson, Ed; Galbraith, Steven; Guo, Jian; Hui, Lucas; Kim, Kwangjo; Lai, Xuejia; Lee, Dong Hoon; Matsui, Mitsuru; Matsumoto, Tsutomu; Moriai, Shiho; Nguyen, Phong; Pei, Dingyi; Phan, Duong Hieu; Pieprzyk, Josef; Wang, Huaxiong; Wolfe, Hank; Wong, Duncan; Wu, Tzong-Chen; Yang, Bo-Yin; Yu, Yu; Yiu, Siu-Ming; Zhou, Jianying, ‘Advances in Security Research in the Asiacrypt Region’, Communications of the ACM. https://dl.acm.org/doi/fullHtml/10.1145/3378428
- Lai, Hong; Pieprzyk, Josef; Orgun, Mehmet, ‘Novel quantum key distribution with shift operations based on Fibonacci and Lucas valued orbital angular momentum entangled states’, Physica A. https://researchers.mq.edu.au/en/publications/novel-quantum-key-distribution-with-shift-operations-based-on-fib
- Tuke, Jonathon Simon; Nguyen, Andrew; Nasim, Mehwish; Wickramasinghe, Asanga; Bean, Nigel; Mitchell, Lewis, ‘Pachinko Prediction: A Bayesian method for event prediction from social media data’, Information processing and management. https://doi.org/10.1016/j.ipm.2019.102147
- Wu, Qing Lu, Xiaojin; Xue, Emma; Wang, Chao; Wu, Xundong; Fan, Jin, ‘SBNN: Slimming binarized neural network’, Neurocomputing.
- Liu, Fanzhen; Wu, Jia; Xue, Emma; Zhou, Chuan; Yang, Jian; Sheng, Quanzheng, ‘Detecting the evolving community structure in dynamic social networks’, World Wide Web. https://researchers.mq.edu.au/en/publications/detecting-the-evolving-community-structure-in-dynamic-social-netw
- Mahawaga Arachchige, Chamikara; Bertok, Peter; Khalil, Ibrahim; Liu, Dongxi; Camtepe, Seyit, ‘Privacy Preserving Face Recognition Utilizing Differential Privacy’, Journal of Computers & Security. https://arxiv.org/abs/2007.02013
- Yang, Xuechao; Yi, Xun; Nepal, Surya; Kelarev, Andrei; Han, Fengling, ‘Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities’, Future Generation Computer Systems. https://www.researchgate.net/publication/342540515_Blockchain_voting_Publicly_verifiable_online_voting_protocol_without_trusted_tallying_authorities
- Ma, Siqi; Liu, Yang; Nepal, Surya, ‘Are Android Apps Being Protected Well Against Attacks?’, IEEE Wireless Communications. https://espace.library.uq.edu.au/view/UQ:66eed0b
- Gao, Garrison; Dijk, Martin van; Xu, Lei; Yang, Wei; Nepal, Surya; Ranasinghe, Damith, ‘TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication with Simulatable PUFs’, IEEE Transactions on Dependable and Secure Computing. https://arxiv.org/abs/1807.11046
- Hamad, Salma Abdalla; Sheng, Quan; Zhang, Wei Emma; Nepal, Surya, ‘Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies’, IEEE Communications Surveys and Tutorials. https://ieeexplore.ieee.org/document/9011598
- Cui, Hui; Wan, Zhiguo; Wei, Xinlei; Nepal, Surya; Yi, Xun , ‘Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain’, IEEE Transactions on Information Forensics and Security. https://ieeexplore.ieee.org/document/8998372
- Yi, Xun; Bertino, Elisa; Rao, Fang-Yu; Lam, Kwok-Yan; Nepal, Surya; Bouguettaya, Athman, ‘Privacy-Preserving User Profile Matching in Social Networks’, IEEE Transactions on Knowledge and Data Engineering. https://ieeexplore.ieee.org/document/8695745
- Dustdar, Schahram; Nepal, Surya; Joshi, James, ‘Introduction to the Special Section on Advances in Internet-based Collaborative Technologies, ACM Transactions on Internet Technology. https://dl.acm.org/doi/10.1145/3361071
- Roselin, Annie Gilda; Nanda, Priyadarsi; Nepal, Surya; He, Xiangjian; Wright, Jarod, ‘Exploiting the Remote Server Access Support of CoAP Protocol’, IEEE Internet of Things Journal. https://ieeexplore.ieee.org/document/8843970
- Qiu, Junyang; Zhang, Jun; Luo, Wei; Pan, Lei; Nepal, Surya; Wang, Yu; Xiang, Yang, ‘A3CM: Automatic Capability Annotation for Android Malware’, IEEE ACCESS. https://ieeexplore.ieee.org/document/8863494
- Palaniswamy, Basker; Camtepe, Seyit; Foo, Ernest; Simpson, Leonie; Baee, Mir Ali Rezazadeh; Pieprzyk, Josef, ‘Continuous authentication for VANET’, Elsevier Vehicular Communication. https://www.sciencedirect.com/science/article/abs/pii/S2214209620300267