Publications 2020

Conference

 

  • Zhang, Yuyao; Ma, Slivia; Li, Juanru; Li, Kailai; Nepal, Surya; Gu, Dawu, ‘SMARTSHIELD: Automatic Smart Contract Protection Made Easy’, IEEE International Conference on Software Analysis, Evolution, and Reengineering. https://siqima.me/publications/saner20a.pdf
  • Ma, Slivia; Feng, Runhan; Li, Juanru; Liu, Yang; Nepal, Surya; Ostry, Diet; Bertino, Elisa; Deng, Robert H.; Ma, Zhuo; Jha, Sanjay, ‘An Empirical Study of SMS One-Time Password Authentication in Android Apps’, The Annual Computer Security Applications Conference. https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=5631&context=sis_research
  • Rasheed, Osama; Rextin, Aimal; Nasim, Mehwish; ‘Adult or Child: Recognizing through Touch Gestures on Smartphones’, 2019 Digital Image Computing: Techniques and Applications (DICTA).https://ieeexplore.ieee.org/abstract/document/8945816
  • Singh, Mayank; Pal, Arindam; Dey, Lipika; Mukherjee, Animesh, ‘Innovation and Revenue: Deep Diving into the Temporal Rank-shifts of Fortune 500 Companies’, ACM India Joint International Conference on Data Science and Management of Data (CoDS-COMAD) 2020. https://www.researchgate.net/publication/338627498_Innovation_and_Revenue_Deep_Diving_into_the_Temporal_Rank-shifts_of_Fortune_500_Companies
  • Bhattacharya, Paheli; Ghosh, Kripabandhu; Pal, Arindam; Ghosh, Saptarshi, ‘Methods for Computing Legal Document Similarity: A Comparative Study’, International Conference on Legal Knowledge and Information Systems (JURIX 2019).https://www.researchgate.net/publication/340963744_Methods_for_Computing_Legal_Document_Similarity_A_Comparative_Study
  • Jalal, Jagriti; Singh, Mayank; Pal, Arindam; Dey, Lipika; Mukherjee, Animesh, ‘Identification, Tracking and Impact: Understanding the trade secret of catchphrases’, ACM/IEEE Joint Conference on Digital Libraries (JCDL 2020).
  • Yao, Jing; Zheng, Yifeng; Guo, Yu; Wang, Cong, ‘SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search’, ACM AsiaCCS Workshop on Security in Blockchain and Cloud Computing (SBC).
  • Weber, Derek; Nasim, Mehwish; Falzon, Lucia; Mitchell, Lewis; ‘#ArsonEmergency and Australia’s `”Black Summer”: Polarisation and misinformation on social media’, Multidisciplinary International Symposium on Disinformation in Open Online Media.https://arxiv.org/abs/2004.00742
  • Samant, Sunil; Baruwal Chhetri, Mohan; Vo, Quoc Bao; Nepal, Surya; Kowalczyk, Ryszard, ‘Benchmarking for end-to-end QoS sustainability in Cloud-hosted Data Processing Pipelines’, 5th IEEE International Conference on Collaboration and Internet Computing. https://www.researchgate.net/publication/339264106_Benchmarking_for_End-to-End_QoS_Sustainability_in_Cloud-Hosted_Data_Processing_Pipelines
  • Purwanto, Rizka; Pal, Arindam; Blair, Alan; Jha, Sanjay; ‘PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites’, IEEE Conference on Communications and Network Security.
  • Mazumdar, Subhra; Ruj, Sushmita; Singh, Ram Govind; Pal, Arindam, ‘HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments’, IEEE International Conference on Blockchain and Cryptocurrencyhttps://www.researchgate.net/publication/339228056_HushRelay_A_Privacy-Preserving_Efficient_and_Scalable_Routing_Algorithm_for_Off-Chain_Payments ; https://arxiv.org/abs/2002.05071
  • Islam, Md Zahidul; Liu, Jixue; Liu, Lin; Li, Jiuyong; Kang, Wei, ‘Evidence Weighted Tree Ensembles for Text Classification’, International ACM SIGIR Conference on Research and Development in Information Retrieval.
  • Abuadbba, Sharif; Camtepe, Seyit; Gao, Garrison; Thapa, Chandra; Nepal, Surya; Kim, Hyoungshick; Kim, Minki; Kim, Kyuyeon, ‘Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?’, ACM ASIACCS 2020. (accepted) https://arxiv.org/abs/2003.12365
  • Bhattacharya, Paheli; Ghosh, Kripabandhu; Pal, Arindam; Ghosh, Saptarshi, ‘Hier-SPCNet: A Legal Statute Hierarchy-based Heterogeneous Network for Computing Legal Document Similarity’, International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2020). https://arxiv.org/abs/2007.03225
  • Le, Ba-Dung; Wang, Guanhua; Nasim, Mehwish; Babar, Ali, ‘Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification’, IEEE Cyber Worlds. https://ieeexplore.ieee.org/document/8919107
  • Giti, Jishan; Sakzad, Amin; Srinivasan, Balasubramaniam; Kamruzzaman, Joarder; Gaire, Raj, ‘Friendly Jammer against an Adaptive Eavesdropper in a Relay-aided Network’, The 16th International Wireless Communications & Mobile Computing (IWCMC) Conference.
  • Liu, Yang; Ma, Zhuo; Liu, Ximeng; Ma, Slivia; Nepal, Surya; Deng, Robert H.; Ren, Kui, ‘Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing’, International Conference on Distributed Computing Systemshttps://www.semanticscholar.org/paper/Boosting-Privately%3A-Privacy-Preserving-Federated-Liu-Ma/7c4e61068d7a46f49b2b202d6b2a8ef0ce94f340https://arxiv.org/pdf/1907.10218.pdf
  • Li, Teng; Ma, Jianfeng; Pei, Qingqi; Shen, Yulong; Lin, Chi; Ma, Slivia; ‘AClog: Attack Chain Construction Based on Log Correlation’, IEEE Global Communication Conference.
  • Mai, Long; Yan, Yuan; Jia, Songlin; Wang, Shuran; Wang, Jianqiang; Li, Juanru; Ma, Slivia; Gu, Dawu, ‘Accelerating SM2 Digital Signature Algorithm using Modern Processor Features’, International Conference on Information and Communications Security.
  • Karmakar, Kallol Krishna; Varadharajan, Vijay; Tupakula, Uday; Nepal, Surya; Thapa, Chandra, ‘Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT)’, 6th IEEE Conference on Network Softwarization.
  • Liu, Fanzhen; Xue, Emma; Wu, Jia; Zhou, Chuan; Hu, Wenbin; Paris, Cecile; Nepal, Surya; Yang, Jian; Yu, Philip S., ‘Deep learning for community detection: Progress, challenges and opportunities’, International Joint Conference on Artificial Intelligence. https://www.ijcai.org/Proceedings/2020/693
  • Le, Le; Duong, Dung Hoang; Susilo, Willy; Pieprzyk, Josef, ‘Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model’, 18th International Conference on Applied Cryptography and Network Security 2020.https://arxiv.org/abs/2007.06881
  • Le, Le; Duong, Dung Hoang; Susilo, Willy; Ha Thanh Nguyen, Tran; Viet Cuong, Trinh; Pieprzyk, Josef; Plantard, Thomas, ‘Lattice Blind Signatures with Forward Security’, 25th Australasian Conference on Information Security and Privacy 2020; Best Paper,https://arxiv.org/abs/2007.06884
  • Yuen, Tsz Hon; Sun, Shi-Feng; Liu, Joseph K.; Au, Man Ho; Esgin, Muhammed; Zhang, Qingzhao; Gu, Dawu, ‘RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security’, Financial Cryptography and Data Security. https://eprint.iacr.org/2019/508
  • Islam, Chadni; Babar, Muhammad Ali; Nepal, Surya, ‘An Ontology-Driven Approach to Automating the Process of Integrating Security Software Systems’, In ICSSP 2019 International Conference on Software and Systems Process (ICSSP’2019). https://www.researchgate.net/publication/335424992_An_Ontology-Driven_Approach_to_Automating_the_Process_of_Integrating_Security_Software_Systems
  • Qiu, Junyang; Nepal, Surya; Luo, Wei; Pan, Lei; Yonghang, Tai; Zhang, Jun; Xiang, Yang, ‘Data-Driven Android Malware Intelligence: A Survey’, International Conference on Machine Learning for Cyber Security. https://researchbank.swinburne.edu.au/items/f25a91c6-7671-49e3-ad71-46cb8c002037/1/
  • Baruwal Chhetri, Mohan; Uzunov, Anton; Vo, Quoc Bao; Nepal, Surya; Kowalczyk, Ryszard, ‘Self-Improving Autonomic Systems for Antifragile Cyber Defence: Challenges and Opportunities’, IEEE International Conference on Autonomic Computing (ICAC).https://dblp.org/db/conf/icac/icac2019
  • Lauer, Hagen; Sakzad, Amin; Rudolph, Carsten; Nepal, Surya, ‘Bootstrapping Trust in a “Trusted” Virtualized Platform’, Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, CYSARM@CCS 2019. https://dl.acm.org/doi/10.1145/3338511.3357347
  • Zhu, Xiaogang; Feng, Xiaotao; Jiao, Tengyun; Wen, Sheng; Xiang, Yang; Camtepe, Seyit; Xue, Jingling, ‘A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing’, ACM Asia Conference on Computer and Communications Security. https://researchbank.swinburne.edu.au/items/678d1f8d-e35e-4091-bb90-a5a0eb28b34b/1/

Journal