Publications

For a complete and updated list of our staff’s publications, please refer to their individual bios.

Selected Recent Publications

Journals

IEEE Transactions on Dependable and Secure Computing (CORE A)

  • Li, Yannan; Yang, Guomin; Susilo, Willy; Yu, Yong; Au, Man Ho; Liu, Dongxi, ‘Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability’, IEEE Transactions on Dependable and Secure Computing.
  • Cai, Chengjun; Zheng, Yifeng; Zhou, Anxin; Wang, Cong, ‘Building a Secure Knowledge Marketplace over Crowdsensed Data Streams’, IEEE Transactions on Dependable and Secure Computing.
  • Gao, Garrison; Dijk, Martin van; Xu, Lei; Yang, Wei; Nepal, Surya; Ranasinghe, Damith, ‘TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication with Simulatable PUFs’, IEEE Transactions on Dependable and Secure Computing. https://arxiv.org/abs/1807.11046
  • Li, Yannan Susilo, Willy; Yang, Guomin; Yong, Yu; Liu, Dongxi; Du, Xiaojiang; Mohsen, Guizani, ‘A Blockchain-based Self-tallying Voting Protocol in Decentralized Industrial IoT’, IEEE Transactions on Dependable and Secure Computing. https://arxiv.org/abs/1902.03710
  • Cheng, Yueqiang; Zhang, Zhi; Nepal, Surya; Wang, Zhi; ‘CATTmew: Defeating Software-only Physical Kernel Isolation’, IEEE Transactions on Dependable and Secure Computing.
  • Wang, Derek; Li, Chaoran; Wen, Sheng; Nepal, Surya; Xiang, Yang; ‘Defending against Adversarial Attack towards Deep Neural Networks via Collaborative Multi-Task Training’, IEEE Transactions on Dependable and Secure Computing.
  • Zhu, Xiaogang; Camtepe, Seyit; Feng, Xiaotao; Meng, Xiaozhu; Wen, Sheng; Xiang, Yang; Ren, Kui; Meng, Xiaozhu, ‘CSI-Fuzz: Full-speed Edge Tracing Using Coverage Sensitive Instrumentation’, IEEE Transactions on Dependable and Secure Computing

IEEE Transactions on Information Forensics & Security (CORE A)

  • Ahmed, Ejaz; Saeed Ullah; Kim, Hyoungshick, ‘Statistical Application Fingerprinting for DDoS Attack Mitigation’, IEEE Transactions on Information Forensics and Security.
  • Gao, Garrison; Su, Yang; Xu, Lei; Ranasinghe, Damith, ‘Lightweight (Reverse) Fuzzy Extractor with Multiple Reference PUF Responses’, IEEE Transactions on information forensics and security.
  • Kasra Kermanshahi, Shabnam, Liu, Joseph; Steinfeld, Ron; Nepal, Surya; Lai, Shangqi; Loh, Randolph; Zuo, Cong, ‘Multi-client Cloud-based Symmetric Searchable Encryption’, IEEE Transactions on information forensics and security.
  • Chen, Xiao; Li, Chaoran; Wang, Derek; Wen, Sheng; Zhang, Jun; Nepal, Surya; Xiang, Yang; Ren, Kui, ‘Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection’, IEEE Transactions on Information Forensics & Security.
  • Zhang, Zhi, Cheng, yueqiang; Gao, Garrison; Liu, Dongxi; Nepal, Surya; Zou, Yi, ‘Detecting Hardware-assisted Virtualization with Inconspicuous Features’, IEEE Transactions on Information Forensics and Security.
  • Palaniswamy, Basker; Camtepe, Seyit; Foo, Ernest; Pieprzyk, Josef, ‘An Efficient Authentication Scheme for Intra-vehicular Controller Area Network’, IEEE Transactions on Information Forensics and Security. https://ieeexplore.ieee.org/document/9046809
  • Cui, Hui; Wan, Zhiguo; Wei, Xinlei; Nepal, Surya; Yi, Xun , ‘Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain’, IEEE Transactions on Information Forensics and Security. https://ieeexplore.ieee.org/document/8998372
  • Moustafa, Nour; Camtepe, Seyit; Choo, Raymond; Radwan, Ibrahim, ‘Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog’, IEEE Transactions on Information Forensics and Security.

IEEE Transactions on Knowledge and Data Engineering (CORE A*)

  • Yi, Xun; Bertino, Elisa; Rao, Fang-Yu; Lam, Kwok-Yan; Nepal, Surya; Bouguettaya, Athman, ‘Privacy-Preserving User Profile Matching in Social Networks’, IEEE Transactions on Knowledge and Data Engineering. https://ieeexplore.ieee.org/document/8695745

ACM Computing Survey (CORE A*)

  • Islam, Chadni; Babar, Muhammad Ali; Nepal, Surya, ‘A Multi-Vocal Review of Security Orchestration’, ACM Computing Survey.

IEEE Communications Surveys and Tutorials ( IF=23.7)

  • Hamad, Salma Abdalla; Nepal, Surya, Sheng, Quan; Zhang, Wei Emma; ‘Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies’, IEEE Communications Surveys and Tutorials.

ACM Transactions on Privacy and Security (CORE A*)

  • Senarath, Awanthika Rasanjalee; Grobler, Marthie; Gamagedara Arachchilage, Nalin Asanka, ‘ “Will They Use It or Not?” Investigating Software Developers’ Intention to Follow Privacy Engineering Methodologies’, ACM Transactions on Privacy and Security.

IEEE Transactions on Service Computing (CORE A*)

  • Chhetri, Mohan; Forkan, Abdur Rahim Mohammad; Vo, Quoc Bao; Nepal, Surya; Kowalczyk, Ryszard, ‘Exploiting Heterogeneity for Opportunistic Resource Scaling in Cloud-hosted Applications’, IEEE Transactions on Service Computing.
  • Singh, Anil; Nitin, Auluck; Rana, Omer; Jones, Andrew; Nepal, Surya, ‘Scheduling Real-Time Security Aware tasks in Fog Networks’, IEEE Transactions on Service Computing.
  • Nugroho, Robertus; Yang, Jian; Zhao, Weiliang; Paris, Cecile; Nepal, Surya, ‘What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text’, IEEE Transactions on Services Computing Issue.
  • Badsha, Shahriar; Nepal, Surya; ‘Privacy Preserving Location-Aware Personalized Web Service Recommendations’, IEEE Transactions on Services Computing Issue
  • Wang, Shuo; ‘Backdoor Attacks against Transfer Learning withPre-trained Deep Learning Models’, IEEE Transactions on Services Computing Issue.

IEEE Cloud Computing (CORE A)

  • Yu, Bin; Nepal, Surya; Zhu, Liming; Wright, Jarod; Liu, Joseph K.; Ranjan, Rajiv, ‘TrustChain: Establishing Trust in the IoT-based Applications Ecosystem Using Blockchain’, IEEE Cloud Computing.
  • Ranjan, Rajiv; Nepal, Surya; Grobler, Marthie; Carsten, Rudolph, ‘The Next Grand Challenges: Integrating the Internet of Things and Data Science’, IEEE Cloud Computing.

IEEE Internet of Things Journal (CORE A)

  • Lai, Shangqi; Yuan, Xingliang; Sakzad, Amin; Salehi, Mahsa; Liu, Joseph K.; Liu, Dongxi, ‘Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets’, IEEE Internet of Things Journal.
  • Mahawaga Arachchige, Chamikara; Bertok, Peter; Khalil, Ibrahim; Liu, Dongxi; Camtepe, Seyit; Mohammed, Atiquzzaman, ‘Local Differential Privacy for Deep Learning’, IEEE Internet of Things Journal.
  • Roselin, Annie Gilda; Nanda, Priyadarsi; Nepal, Surya; He, Xiangjian; Wright, Jarod, ‘Exploiting the Remote Server Access Support of CoAP Protocol’, IEEE Internet of Things Journal. https://ieeexplore.ieee.org/document/8843970

IEEE Transactions on Computers (CORE A*)

  • Kara, Orhun; Esgin, Muhammed, ‘On Analysis of Lightweight Stream Ciphers with Keyed Update’, IEEE Transactions on Computers.

IEEE Journal of Biomedical and Health Informatics (CORE A*)

  • Li, Wei; Liu, Dongxi, Liu, Bonnie; Liu, Dongxi; Liu, Ren Ping; Wang, Peishun; Luo, Shoushan; Ni, Wei, ‘Unified Fine-grained Access Control for Personal Health Records in Cloud Computing’, IEEE Journal of Biomedical and Health Informatics.

 

Conferences

ACM Conference on Computer and Communications Security (ACM CCS) (CORE A*)

  • Esgin, Muhammed; Zhao, Raymond; Steinfeld, Ron; Liu, Joseph K.; Liu, Dongxi, ‘MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol’, The 26th ACM Conference on Computer and Communications Security.
  • Han, Joon Kuy; Kim, Hyoung; Woo, Simon S., ‘Nickel to Lego: Using Foolgle to Create Adversarial Examples to fool Google Cloud Speech-to-Text API’, CCS 2019.
  • Lee, Daehwa Rayer; Jang, Yunhee; Kim, Hyoung, ‘A Proof-of-Stake (PoS) Blockchain Protocol using Fair and Dynamic Sharding Management’, Conference on Computer and Communications Security (CCS’19).
  • Jang, Heejun; Jin, Beomjin; Hyun, Sangwon; Kim, Hyoung, ‘Kerberoid: A Practical Android App Decompilation System with Multiple Decompilers’, Conference on Computer and Communications Security (CCS’19).
  • Lai, Shangqi; Patranabis, Sikhar; Sakzad, Amin; Liu, Joseph K.; Mukhopadhyay, Debdeep; Steinfeld, Ron; Sun, Shifeng; Liu, Dongxi; Zuo, Cong, ‘Result Pattern Hiding Searchable Encryption for Conjunctive Queries’, The 25th ACM Conference on Computer and Communications Security.
  • Sun, Shifeng; Yuan, Xingliang; Liu, Joseph; Steinfeld, Ron; Sakzad, Amin; Vo, Viet; Nepal, Surya, ‘Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption’, ACM CCS.
  • Lee, Daehwa Rayer; Jang, Yunhee; Kim, Hyoung, ‘A Proof-of-Stake (PoS) Blockchain Protocol using Fair and Dynamic Sharding Management’, Conference on Computer and Communications Security (CCS’19).
  • Jang, Heejun; Jin, Beomjin; Hyun, Sangwon; Kim, Hyoung, ‘Kerberoid: A Practical Android App Decompilation System with Multiple Decompilers’, Conference on Computer and Communications Security (CCS’19).

IEEE Symposium on Security and Privacy (S&P) (CORE A*)

USENIX Security (CORE A*)

  • Ahmed, Ejaz; Kwak, Il-Youp; Huh, Jun Ho; Kim, Iljoo; Oh, Taekkyung; Kim, Hyoungshick, ‘Void: A fast and light voice liveness detection system’, USENIX Security.

Crypto (CORE A*)

  • Esgin, Muhammed; Steinfeld, Ron; Liu, Joseph K.; Liu, Dongxi, ‘Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications’, Crypto.

Networks and Distributed System Security (NDSS)(CORE A*)

Lauer, Hagen; Carsten, Rudolph; Salehi Shahraki, Ahmad; Nepal, Surya, ‘User-Centered Attestation for Layered and Decentralized Systems ‘, Networks and Distributed System Security.

International Conference on Research and Development in Information Retrieval (ACM SIGIR)(CORE A*)

  • Islam, Md Zahidul; Liu, Jixue; Liu, Lin; Li, Jiuyong; Kang, Wei, ‘Evidence Weighted Tree Ensembles for Text Classification’, International ACM SIGIR Conference on Research and Development in Information Retrieval.
  • Bhattacharya, Paheli; Ghosh, Kripabandhu; Pal, Arindam; Ghosh, Saptarshi, ‘Hier-SPCNet: A Legal Statute Hierarchy-based Heterogeneous Network for Computing Legal Document Similarity’, International ACM SIGIR Conference on Research and Development in Information Retrieval.

International Conference on Pervasive Computing and Communications (PERCOM) (CORE A*)

  • Gao, Garrison; Chen, Shiping; Nepal, Surya; ‘A Tutorial on Building Lightweight SRAM PUF Key Generators for Resource Limited IoTs’, International Conference on Pervasive Computing and Communications.
  • Gao, Garrison; Chen, Shiping; Nepal, Surya; ‘Building secure SRAM PUF key generators on resource constrained devices’, International Conference on Pervasive Computing and Communications.

International Joint Conference on Artificial Intelligence (IJCAI) (CORE A*)

  • Liu, Fanzhen; Xue, Emma; Wu, Jia; Zhou, Chuan; Hu, Wenbin; Paris, Cecile; Nepal, Surya; Yang, Jian; Yu, Philip S., ‘Deep learning for community detection: Progress, challenges and opportunities’, International Joint Conference on Artificial Intelligence. https://www.ijcai.org/Proceedings/2020/693

International Symposium on Research in Attacks, Intrusions and Defenses (RAID) (CORE A)

  • Wang, Jianqiang; Ma, Slivia; Zhang, Yuanyuan; Li, Juanru; Ma, Zheyu; Mai, Long; Chen, Tiancheng; Gu, Dawu, ‘NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification’, International Symposium on Research in Attacks, Intrusions and Defenses.
  • Zhang, Zhi; Cheng, Yueqiang; Nepal, Surya; Liu, Dongxi; Shen, Quingni; Rabhi, Fethi, ‘KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels’, RAID 2018.

European Symposium on Research in Computer Security (ESORICS) (CORE A)

  • Kasra Kermanshahi, Shabnam; Liu, Joseph K.; Steinfeld, Ron; Nepal, Surya, ‘Generic Multi-keyword Ranked Search on Encrypted Cloud Data’, ESORICS.
  • Ma, Slivia; Bertino, Elisa; Nepal, Surya; Li, Juanru; Ostry, Diet; Deng, Robert H.; Jha, Sanjay, ‘Finding Flaws from Password Authentication Code in Android apps’, The European Symposium on Research in Computer Security.
  • Phuong, Tran; Susilo, Willy; Kim, Jongkil; Yang, Guomin; Liu, Dongxi, ‘Puncturable Proxy Re-Encryption supporting to Group Messaging Service’, 24th European Symposium on Research in Computer Security (ESORICS2019).
  • Wang, Jianfeng; Chen, Xiaofeng; Sun, Shifeng; Liu, Joseph K.; Au, Man Ho; Zhn, Zhi-Hui, ‘Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database’, European Symposium on Research in Computer Security (ESORICS) 2018.
  • Zuo, Cong; Sun, Shi-Feng; Liu, Joseph K.; Shao, Jun; Pieprzyk, Josef, ‘Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security’, 23rd European Symposium on Research in Computer Security.
  • Esgin, Muhammed; Ersoy, Oguzhan; Erkin, Zekeriya, ‘Post-Quantum Adaptor Signatures and Payment Channel Networks’, ESORICS.
  • Sultan, Nazatul; Varadharajan, Vijay; Camtepe, Seyit; Nepal, Surya, ‘An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation’, 25th European Symposium on Research in Computer Security.

Annual Computer Security Applications Conference (ACSAC)  (CORE A)

  • Ma, Slivia; Feng, Runhan; Li, Juanru; Liu, Yang; Nepal, Surya; Ostry, Diet; Bertino, Elisa; Deng, Robert H.; Ma, Zhuo; Jha, Sanjay, ‘An Empirical Study of SMS One-Time Password Authentication in Android Apps’, The Annual Computer Security Applications Conference. https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=5631&context=sis_research
  • Gao, Garrison; Xu, Chang; Wang, Derek; Chen, Shiping; Ranasinghe, Damith; Nepal, Surya, ‘STRIP: A Defence Against Trojan Attacks on Deep Neural Networks’, Annual Computer Security Applications Conference (ACSAC).

International Symposium on Reliable Distributed Systems (SRDS) (CORE A)

  • Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit A. Camtepe, Hyoungshick Kim, and Surya Nepal, ‘

    End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things’, SRDS.

ACM International Conference on Information and Knowledge Management (CIKM) (CORE A)

  • Liu, Jixue; Kwashie, Selasi; Li, Jiuyong; Liu, Lin; Bewong, Michael, ‘Linking Graph Entities with Multiplicity and Provenance’, ACM International Conference on Information and Knowledge Management (CIKM).
  • Islam, Md Zahidul; Liu, Jixue; Li, Jiuyong; Liu, Lin; Kang, Wei, ‘A Semantics Aware Random Forest for Text Classification’, ACM International Conference on Information and Knowledge Management.

IEEE International Conference on Service Computing (SCC) (CORE A)

  • Chhetri, Mohan; Forkan, Abdur Rahim Mohammad; Vo, Quoc Bao; Nepal, Surya; Kowalczyk, Ryszard, ‘Towards Risk-Aware Cost-Optimal Resource Allocation for Cloud Applications’, IEEE International Conference on Service Computing.
  • Samant, Sunil; Chhetri, Mohan; Vo, Bao; Kowalczyk, Ryszard; Nepal, Surya, ‘Towards end-to-end QoS and cost-aware resource scaling in cloud-based IoT data processing pipelines’, IEEE International Conference on Services Computing.

IEEE International Conference on Web Services (ICWS) (CORE A)

  • Wang, Shuo; Sinnott, Richard; Rudolph, Carsten; Nepal, Surya, ‘P-STM: Privacy-protected Social Tie Mining of Individual Trajectories’, IEEE International Conference on Web Services.
  • Wang, Shuo; Sinnott, Richard; Nepal, Surya, ‘A Privacy-Preserving Semantic Annotation Framework Using Online Social Media’, ICWS 2018.

International Conference on Distributed Computing Systems (ICDCS) (CORE A)

  • Liu, Yang; Ma, Zhuo; Liu, Ximeng; Ma, Slivia; Nepal, Surya; Deng, Robert H.; Ren, Kui, ‘Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing’, International Conference on Distributed Computing Systemshttps://www.semanticscholar.org/paper/Boosting-Privately%3A-Privacy-Preserving-Federated-Liu-Ma/7c4e61068d7a46f49b2b202d6b2a8ef0ce94f340https://arxiv.org/pdf/1907.10218.pdf
  • Li, Nan; Varadharajan, Vijay; Nepal, Surya, ‘Context-Aware Trust Management System for IoT Applications with Multiple Domains’, 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019).
  • Wang, Derek; Wen, Sheng; Xiang, Yang; Zhou, Wanlei; Zhang, Jun; Nepal, Surya, ‘Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks’, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
  • Nugroho, Robertus; Zhao, Weiliang; Yang, Jian; Paris, Cecile; Nepal, Surya, ‘The Joint Effects of Tweet Content Similarity and Tweet Interactions for Topic Derivation’, International Conference on Distributed Computing Systems.
  • Li, Nan; Ma, Zhuo; Liu, Ximeng; Ma, Slivia; Nepal, Surya; Deng, Robert H.; Ren, Kui, ‘Fuzzy Extractors for Biometric Identification’, IEEE International Conference on Distributed Computing Systems.

International Conference on Web Information Systems Engineering (WISE) (CORE A)

  • Yang, Terry; Yi, Xun; Nepal, Surya; Han, Fengling , ‘Decentralized Voting: A Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain’, WISE 2018.
  • Yang, Xu; Yi, Xun; Zeng, Yali; Khalil, Ibrahim; Huang, Xinyi; Nepal, Surya, ‘An Improved Lightweight RFID Authentication Protocol for Internet of Things’, IEE WISe 2018.
  • Badsha, Shahriar; Yi, Xun; Khalil, Ibrahim; Liu, Dongxi; Nepal, Surya; Bertino, Elisa, ‘Privacy Preserving Location Recommendations’, 18th International Conference on Web Information Systems Engineering.
  • Yang, Xu; Yi, Xun; Cui, Hui; Yang, Terry; Nepal, Surya; Huang, Xinyi; Zeng, Yali, ‘A Practical Authentication Protocol for Anonymous Web Browsing’, The 18th International Conference on Web Information Systems Engineering.
  • Yang, Terry; Yi, Xun; Ryan, Casper; Van Schyndel, Ron; Han, Fengling; Nepal, Surya; Song, Andy, ‘A Verifiable Ranked Choice Internet Voting System’, 18th International Conference on Web Information Systems Engineering – WISE 2017.
  • Tang, Lihong; Ma, Wanlun; Wen, Sheng; Grobler, Marthie; Xiang, Yang; Zhou, Wanlei, ‘My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media’, Web Information Systems Engineering (WISE) 2017.

ACM Asia Conference on Computer and Communications Security (ASIACCS) (CORE B)

  • Zhu, Xiaogang; Feng, Xiaotao; Jiao, Tengyun; Wen, Sheng; Xiang, Yang; Camtepe, Seyit; Xue, Jingling, ‘A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing’, ACM Asia Conference on Computer and Communications Security. https://researchbank.swinburne.edu.au/items/678d1f8d-e35e-4091-bb90-a5a0eb28b34b/1/
  • Abuadbba, Sharif; Camtepe, Seyit; Gao, Garrison; Thapa, Chandra; Nepal, Surya; Kim, Hyoungshick; Kim, Minki; Kim, Kyuyeon, ‘Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?’, ACM ASIACCS 2020. (accepted) https://arxiv.org/abs/2003.12365
  • Lai, Shangqi; Yuan, Xingliang; Sun, Shifeng; Liu, Yuhong; Liu, Joseph K.; Liu, Dongxi, ‘GraphSE^2: An Encrypted Graph Database for Privacy-Preserving Social Search’, The 14th ACM ASIA Conference on Computer and Communications Security.
  • Nepal, Surya, ‘Security is the Weakest Link: Prevalent Culture of Victim Blaming in Cyberattacks’, ASIA CCS.
  • Wijaya, Dimaz; Liu, Joseph; Steinfeld, Ron; Liu, Dongxi; Yu, Jiangshan, ‘On The Unforkability of Monero’, 14th ACM ASIA Conference on Computer and Communications Security.
  • Wu, Tina; Zhang, Rongjunchen; Ma, Wanlun; Wen, Sheng; Xia, Xin; Paris, Cecile; Nepal, Surya; Xiang, Yang, ‘What risk? I don’t understand. An Empirical Study on Users’ Understanding of the Terms Used in Security Texts’, Asia CCS 2020.
  • Kim, Jongkil; Camtepe, Seyit; Susilo, Willy; Nepal, Surya; Baek, Joonsang, ‘Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing’, ACM Asia Conference on Computer and Communications Security.

All Publications