Publications

Selected Publications


LINK
Private Graph Data Release: A Survey
Li, Yang and Purcell, Michael and Rakotoarivelo, Thierry and Smith, David and Ranbaduge, Thilina and Ng, Kee Siong
ACM Computing Surveys (CSUR), jan, 2023

LINK
Differentially private crowdsourcing with the public and private blockchain
Wang, Minghao and Zhu, Tianqing and Zuo, Xuhan and Yang, Mengmeng and Yu, Shui and Zhou, Wanlei
IEEE Internet of Things Journal, pp.1–1, 2022

LINK
Local Differentially Private Fuzzy Counting in Stream Data Using Probabilistic Data Structures
Vatsalan, Dinusha and Bhaskar, Raghav and Kaafar, Mohamed Ali
IEEE Transactions on Knowledge and Data Engineering (TKDE), pp.1–14, 2022

LINK
Blockchain-Enabled Federated Learning: A Survey
Qu, Youyang and Uddin, Md Palash and Gan, Chenquan and Xiang, Yong and Gao, Longxiang and Yearwood, John
ACM Computing Surveys (CSUR), feb, 2022

LINK
Making the Most of Parallel Composition in Differential Privacy
Josh Smith and Hassan Jameel Asghar and Gianpaolo Gioiosa and Sirine Mrabet and Serge Gaspers and Paul Tyler
Privacy Enhancing Technologies Symposium (PETS), pp.253–273, 2022

LINK
Low-Latency Federated Learning Over Wireless Channels With Differential Privacy
Wei, Kang and Li, Jun and Ma, Chuan and Ding, Ming and Chen, Cailian and Jin, Shi and Han, Zhu and Poor, H. Vincent
IEEE Journal on Selected Areas in Communications, pp.290–307, 2022

LINK
A Taxonomy for Privacy-preserving Record Linkage Attacks
Vidanage, Anushka and Ranbaduge, Thilina and Christen, Peter and Schnell, Rainer
Journal of Privacy and Confidentiality, 2022

LINK
When Machine Learning Meets Privacy: A Survey and Outlook
Liu, Bo and Ding, Ming and Shaham, Sina and Rahayu, Wenny and Farokhi, Farhad and Lin, Zihuai
ACM Computing Surveys (CSUR), pp.1–36, 2021

LINK
Differentially Private Release of Datasets using Gaussian Copula
Asghar, Hassan Jameel and Ding, Ming and Rakotoarivelo, Thierry and Mrabet, Sirine and Kaafar, Dali
Journal of Privacy and Confidentiality, February, 2021

LINK
Federated learning with differential privacy: Algorithms and performance analysis
Wei, Kang and Li, Jun and Ding, Ming and Ma, Chuan and Yang, Howard H and Farokhi, Farhad and Jin, Shi and Quek, Tony QS and Poor, H Vincent
IEEE Transactions on Information Forensics and Security (TIFS), pp.3454–3469, 2020

2024


LINK
Covert Model Poisoning Against Federated Learning: Algorithm Design and Optimization
Wei, Kang and Li, Jun and Ding, Ming and Ma, Chuan and Jeon, Yo-Seb and Poor, H. Vincent
IEEE Transactions on Dependable and Secure Computing, pp.1196-1209, 2024

LINK
IoTFuzz: Automated Discovery of Violations in Smart Homes With Real Environment
Ban, Xinbo and Ding, Ming and Liu, Shigang and Chen, Chao and Zhang, Jun
IEEE Internet of Things Journal, pp.10183-10196, 2024

LINK
PPFed: A Privacy-Preserving and Personalized Federated Learning Framework
Zhang, Guangsheng and Liu, Bo and Zhu, Tianqing and Ding, Ming and Zhou, Wanlei
IEEE Internet of Things Journal, pp.19380-19393, 2024

LINK
Design of Anti-Plagiarism Mechanisms in Decentralized Federated Learning
Shao, Yumeng and Li, Jun and Ding, Ming and Wei, Kang and Ma, Chuan and Shi, Long and Chen, Wen and Jin, Shi
IEEE Transactions on Services Computing, pp.1465-1479, 2024

LINK
Decentralized Privacy Preservation for Critical Connections in Graphs
Li, Conggai and Ni, Wei and Ding, Ming and Qu, Youyang and Chen, Jianjun and Smith, David and Zhang, Wenjie and Rakotoarivelo, Thierry
IEEE Transactions on Knowledge and Data Engineering, pp.1-14, 2024

LINK
Enhancing Resilience in Website Fingerprinting: Novel Adversary Strategies for Noisy Traffic Environments
Qian, Yuwen and Huang, Guodong and Ma, Chuan and Ding, Ming and Yuan, Long and Chen, Zi and Wang, Kai
IEEE Transactions on Information Forensics and Security, pp.7216-7231, 2024

LINK
How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers
Zhang, Guangsheng and Liu, Bo and Tian, Huan and Zhu, Tianqing and Ding, Ming and Zhou, Wanlei
33rd USENIX Security Symposium (USENIX Security’24), pp.6795–6812, 2024

LINK
Trusted data sharing for mineral exploration and mining tenements
Ming Ding and Dinusha Vatsalan and Ignacio Gonzalez-Alvarez and Sirine M’rabet and Paul Tyler and Jens Klump
Journal of Geochemical Exploration, pp.107580, 2024

LINK
When Fairness Meets Privacy: Exploring Privacy Threats in Fair Binary Classifiers via Membership Inference Attacks
Tian, Huan and Zhang, Guangsheng and Liu, Bo and Zhu, Tianqing and Ding, Ming and Zhou, Wanlei
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence (IJCAI’24), 2024

LINK
Encryption-based sub-string matching for privacy-preserving record linkage
Vaiwsri, Sirintra and Ranbaduge, Thilina and Christen, Peter
Journal of Information Security and Applications, pp.103712, 2024

LINK
Future-proofing genomic data and consent management: a comprehensive review of technology innovations
Oliva, Adrien and Kaphle, Anubhav and Reguant, Roc and Sng, Letitia MF and Twine, Natalie A and Malakar, Yuwan and Ranbaduge, Thilina and Wickramarachchi, Anuradha and Keller, Marcel and Chan, Eva KF and others
GigaScience, pp.giae021, 2024

2023


LINK
Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models
Zhang, Guangsheng and Liu, Bo and Zhu, Tianqing and Ding, Ming and Zhou, Wanlei
IEEE Transactions on Dependable and Secure Computing (TDSC), pp.1435–1449, 2023

LINK
Amplitude-Varying Perturbation for Balancing Privacy and Utility in Federated Learning
Yuan, Xin and Ni, Wei and Ding, Ming and Wei, Kang and Li, Jun and Poor, H. Vincent
IEEE Transactions on Information Forensics and Security, pp.1884-1897, 2023

LINK
User Pairing and Power Allocation in Untrusted Multiuser NOMA for Internet of Things
Yuan, Chaoying and Ni, Wei and Zhang, Kezhong and Bai, Jingpeng and Shen, Jun and Jamalipour, Abbas
IEEE Internet of Things Journal, pp.13155–13167, 2023

LINK
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
Sun, Nan and Ding, Ming and Jiang, Jiaojiao and Xu, Weikang and Mo, Xiaoxing and Tai, Yonghang and Zhang, Jun
IEEE Communications Surveys & Tutorials, pp.1748-1774, 2023

LINK
Digital Twin Enabled Remote Data Sharing for Internet of Vehicles: System and Incentive Design
Tan, Chenchen and Li, Xinghao and Gao, Longxiang and Luan, Tom H. and Qu, Youyang and Xiang, Yong and Lu, Rongxing
IEEE Transactions on Vehicular Technology, pp.1–16, 2023

LINK
Personalized Federated Learning With Differential Privacy and Convergence Guarantee
Wei, Kang and Li, Jun and Ma, Chuan and Ding, Ming and Chen, Wen and Wu, Jun and Tao, Meixia and Poor, H. Vincent
IEEE Transactions on Information Forensics and Security (TIFS), pp.4488–4503, 2023

LINK
Preserving the Privacy of Latent Information for Graph-Structured Data
Shan, Baoling and Yuan, Xin and Ni, Wei and Wang, Xin and Liu, Ren Ping and Dutkiewicz, Eryk
IEEE Transactions on Information Forensics and Security (TIFS), pp.5041–5055, 2023

LINK
Trusted AI in Multiagent Systems: An Overview of Privacy and Security for Distributed Learning
Ma, Chuan and Li, Jun and Wei, Kang and Liu, Bo and Ding, Ming and Yuan, Long and Han, Zhu and Vincent Poor, H.
Proceedings of the IEEE, pp.1097-1132, 2023

LINK
Privacy-preserving Deep Learning based Record Linkage
Ranbaduge, Thilina and Vatsalan, Dinusha and Ding, Ming
IEEE Transactions on Knowledge and Data Engineering, pp.1-12, 2023

LINK
Learn to Unlearn: A Survey on Machine Unlearning
Youyang Qu and Xin Yuan and Ming Ding and Wei Ni and Thierry Rakotoarivelo and David Smith
2023

LINK
NE-GConv: A lightweight node edge graph convolutional network for intrusion detection
Tanzeela Altaf and Xu Wang and Wei Ni and Ren Ping Liu and Robin Braun
Computers \& Security, pp.103285, 2023

LINK
Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic
Huang, Guodong and Ma, Chuan and Ding, Ming and Qian, Yuwen and Ge, Chunpeng and Fang, Liming and Liu, Zhe
Proceedings of the ACM Web Conference 2023, pp.1991–1999, 2023
A Lightweight Model-Based Evolutionary Consensus Protocol in Blockchain as a Service for IoT
Zhao, Yao and Qu, Youyang and Xiang, Yong and Zhang, Yushu and Gao, Longxiang
IEEE Transactions on Services Computing, 2023

LINK
Private Graph Data Release: A Survey
Li, Yang and Purcell, Michael and Rakotoarivelo, Thierry and Smith, David and Ranbaduge, Thilina and Ng, Kee Siong
ACM Computing Surveys (CSUR), jan, 2023
Proactive Deepfake Defence via Identity Watermarking
Zhao, Yuan and Liu, Bo and Ding, Ming and Liu, Baoping and Zhu, Tianqing and Yu, Xin
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, pp.4602–4611, 2023
TI2Net: Temporal Identity Inconsistency Network for Deepfake Detection
Liu, Baoping and Liu, Bo and Ding, Ming and Zhu, Tianqing and Yu, Xin
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, pp.4691–4700, 2023
A Vulnerability Assessment Framework for Privacy-Preserving Record Linkage
Vidanage, Anushka and Christen, Peter and Ranbaduge, Thilina and Schnell, Rainer
ACM Transactions on Privacy and Security (TOPS), 2023
Face image de-identification by feature space adversarial perturbation
Xue, Hanyu and Liu, Bo and Yuan, Xin and Ding, Ming and Zhu, Tianqing
Concurrency and Computation: Practice and Experience, pp.e7554, 2023

2022


LINK
Efficient Orchestration of Virtualization Resource in RAN Based on Chemical Reaction Optimization and Q-Learning
Zou, Sai and Wang, Wenyong and Ni, Wei and Wang, Lei and Tang, Yuliang
IEEE Internet of Things Journal, pp.3383–3396, 2022

LINK
LSTM-Characterized Deep Reinforcement Learning for Continuous Flight Control and Resource Allocation in UAV-Assisted Sensor Network
Li, Kai and Ni, Wei and Dressler, Falko
IEEE Internet of Things Journal, pp.4179–4189, 2022

LINK
Three-Dimensional Cooperative Positioning for Internet of Things Provenance
Bi, Siguo and Cui, Juntao and Ni, Wei and Jiang, Yi and Yu, Shui and Wang, Xin
IEEE Internet of Things Journal, pp.19945–19958, 2022

LINK
Federated Multi-agent Deep Reinforcement Learning for Resource Allocation of Vehicle-to-Vehicle Communications
Li, Xiang and Lu, Lingyun and Ni, Wei and Jamalipour, Abbas and Zhang, Dalin and Du, Haifeng
IEEE Transactions on Vehicular Technology, pp.1–1, 2022

LINK
Deep-Graph-Based Reinforcement Learning for Joint Cruise Control and Task Offloading for Aerial Edge Internet of Things (EdgeIoT)
Li, Kai and Ni, Wei and Yuan, Xin and Noor, Alam and Jamalipour, Abbas
IEEE Internet of Things Journal, pp.21676–21686, 2022

LINK
Personalized Location Privacy With Road Network-Indistinguishability
Ma, Baihe and Wang, Xu and Ni, Wei and Liu, Ren Ping
IEEE Transactions on Intelligent Transportation Systems, pp.1–13, 2022

LINK
Differentially private crowdsourcing with the public and private blockchain
Wang, Minghao and Zhu, Tianqing and Zuo, Xuhan and Yang, Mengmeng and Yu, Shui and Zhou, Wanlei
IEEE Internet of Things Journal, pp.1–1, 2022

LINK
When Internet of Things meets Metaverse: Convergence of Physical and Cyber Worlds
Kai Li and Yingping Cui and Weicai Li and Tiejun Lv and Xin Yuan and Shenghong Li and Wei Ni and Meryem Simsek and Falko Dressler
2022

LINK
Dispersed Pixel Perturbation-Based Imperceptible Backdoor Trigger for Image Classifier Models
Wang, Yulong and Zhao, Minghui and Li, Shenghong and Yuan, Xin and Ni, Wei
IEEE Transactions on Information Forensics and Security (TIFS), pp.3091–3106, jan, 2022

LINK
Exploring Deep Reinforcement Learning-Assisted Federated Learning for Online Resource Allocation in Privacy-Preserving EdgeIoT
Jingjing Zheng and Kai Li and Naram Mhaisen and Wei Ni and Eduardo Tovar and Mohsen Guizani
IEEE Internet of Things Journal, pp.21099–21110, 2022

LINK
Local Differentially Private Fuzzy Counting in Stream Data Using Probabilistic Data Structures
Vatsalan, Dinusha and Bhaskar, Raghav and Kaafar, Mohamed Ali
IEEE Transactions on Knowledge and Data Engineering (TKDE), pp.1–14, 2022

LINK
Privacy-Driven Learning Analytics
Joksimovi’c, Sre’cko and Marshall, Ruth and Rakotoarivelo, Thierry and Ladjal, Djazia and Zhan, Chen and Pardo, Abelardo
Manage Your Own Learning Analytics: Implement a Rasch Modelling Approach, pp.1–22, 2022

LINK
Technological frameworks on ethical and trustworthy learning analytics
Ladjal, Djazia and Joksimović, Srećko and Rakotoarivelo, Thierry and Zhan, Chen
British Journal of Educational Technology, pp.733–736, 2022

LINK
Enhancing Utility In The Watchdog Privacy Mechanism
Zarrabian, Mohammad Amin and Ding, Ni and Sadeghi, Parastoo and Rakotoarivelo, Thierry
ICASSP 2022 – 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.2979–2983, 2022
Implementing next generation privacy and ethics research in education technology
Marshall, Ruth and Pardo, Abelardo and Smith, David and Watson, Tony
British Journal of Educational Technology, pp.737–755, 2022

LINK
Blockchain-Enabled Federated Learning: A Survey
Qu, Youyang and Uddin, Md Palash and Gan, Chenquan and Xiang, Yong and Gao, Longxiang and Yearwood, John
ACM Computing Surveys (CSUR), feb, 2022
Differentially Private Distributed Frequency Estimation
Yang, Mengmeng and Tjuawinata, Ivan and Lam, Kwok-Yan and Zhu, Tianqing and Zhao, Jun
IEEE Transactions on Dependable and Secure Computing, 2022

LINK
Attaining Fairness in Communication for Omniscience
Ding, Ni and Sadeghi, Parastoo and Smith, David and Rakotoarivelo, Thierry
Entropy, 2022

LINK
Making the Most of Parallel Composition in Differential Privacy
Josh Smith and Hassan Jameel Asghar and Gianpaolo Gioiosa and Sirine Mrabet and Serge Gaspers and Paul Tyler
Privacy Enhancing Technologies Symposium (PETS), pp.253–273, 2022

LINK
Low-Latency Federated Learning Over Wireless Channels With Differential Privacy
Wei, Kang and Li, Jun and Ma, Chuan and Ding, Ming and Chen, Cailian and Jin, Shi and Han, Zhu and Poor, H. Vincent
IEEE Journal on Selected Areas in Communications, pp.290–307, 2022

LINK
A Taxonomy for Privacy-preserving Record Linkage Attacks
Vidanage, Anushka and Ranbaduge, Thilina and Christen, Peter and Schnell, Rainer
Journal of Privacy and Confidentiality, 2022

LINK
Privacy risk quantification in education data using Markov model
Vatsalan, Dinusha and Rakotoarivelo, Thierry and Bhaskar, Raghav and Tyler, Paul and Ladjal, Djazia
British Journal of Educational Technology (BJET), pp.1–18, 2022

LINK
Federated Learning for Smart Healthcare: A Survey
Nguyen, Dinh C. and Pham, Quoc-Viet and Pathirana, Pubudu N. and Ding, Ming and Seneviratne, Aruna and Lin, Zihuai and Dobre, Octavia and Hwang, Won-Joo
ACM Computing Surveys (CSUR), feb, 2022
When federated learning meets blockchain: A new distributed learning paradigm
Ma, Chuan and Li, Jun and Shi, Long and Ding, Ming and Wang, Taotao and Han, Zhu and Poor, H Vincent
IEEE Computational Intelligence Magazine, pp.26–33, 2022
Identitydp: Differential private identification protection for face images
Wen, Yunqian and Liu, Bo and Ding, Ming and Xie, Rong and Song, Li
Neurocomputing, pp.197–211, 2022

LINK
Multi-Agent Deep Reinforcement Learning-Based Interdependent Computing for Mobile Edge Computing-Assisted Robot Teams
Cui, Qimei and Zhao, Xiyu and Ni, Wei and Hu, Zheng and Tao, Xiaofeng and Zhang, Ping
IEEE Transactions on Vehicular Technology, pp.1–12, 2022

LINK
Deep Reinforcement Learning-Driven Secrecy Design for Intelligent Reflecting Surface-Based 6G-IoT Networks
Saleem, Rabbia and Ni, Wei and Ikram, Muhammad and Jamalipour, Abbas
IEEE Internet of Things Journal, pp.1–1, 2022
BASS: Blockchain-Based Asynchronous SignSGD for Robust Collaborative Data Mining
Xu, Chenhao and Qu, Youyang and Xiang, Yong and Gao, Longxiang and Smith, David and Yu, Shui
2022 IEEE 9th International Conference on Data Science and Advanced Analytics (DSAA), pp.1–7, 2022
An Efficient and Reliable Asynchronous Federated Learning Scheme for Smart Public Transportation
Xu, Chenhao and Qu, Youyang and Luan, Tom H and Eklund, Peter W and Xiang, Yong and Gao, Longxiang
IEEE Transactions on Vehicular Technology, 2022
Joint Front–Edge–Cloud IoVT Analytics: Resource-Effective Design and Scheduling
Chen, Youjia and Zhao, Tiesong and Cheng, Peng and Ding, Ming and Chen, Chang Wen
IEEE Internet of Things Journal, pp.23941–23953, 2022
Intelligent blockchain-based edge computing via deep reinforcement learning: Solutions and challenges
Nguyen, Dinh C and Nguyen, Van-Dinh and Ding, Ming and Chatzinotas, Symeon and Pathirana, Pubudu N and Seneviratne, Aruna and Dobre, Octavia and Zomaya, Albert Y
IEEE Network, pp.12–19, 2022
Fundamentals of Ultra-dense Wireless Networks
L’opez-P’erez, David and Ding, Ming
Cambridge University Press, 2022
Path Planning for the Dynamic UAV-Aided Wireless Systems Using Monte Carlo Tree Search
Qian, Yuwen and Sheng, Kexin and Ma, Chuan and Li, Jun and Ding, Ming and Hassan, Mahbub
IEEE Transactions on Vehicular Technology, pp.6716–6721, 2022
Client scheduling in wireless federated learning based on channel and learning qualities
Leng, Jichao and Lin, Zihuai and Ding, Ming and Wang, Peng and Smith, David and Vucetic, Branka
IEEE Wireless Communications Letters, pp.732–735, 2022
TAESim: a testbed for IoT security analysis of trigger-action environment
Ban, Xinbo and Ding, Ming and Liu, Shigang and Chen, Chao and Zhang, Jun and Xiang, Yang
Computer Security. ESORICS 2021 International Workshops: CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT\&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers, pp.218–237, 2022

2021


LINK
MmWave M2M Networks: Improving Delay Performance of Relaying
Z. Chen and D. Smith
IEEE Transactions on Wireless Communications, pp.1–1, January, 2021

LINK
User-Level Privacy-Preserving Federated Learning: Analysis and Performance Optimization
Wei, Kang and Li, Jun and Ding, Ming and Ma, Chuan and Su, Hang and Zhang, Bo and Poor, H. Vincent
IEEE Transactions on Mobile Computing, pp.1–1, 2021

LINK
Coordinated Charge and Discharge Scheduling of Electric Vehicles for Load Curve Shaping
Nimalsiri, Nanduni I. and Ratnam, Elizabeth L. and Smith, David B. and Mediwaththe, Chathurika P. and Halgamuge, Saman K.
IEEE Transactions on Intelligent Transportation Systems, pp.1–13, May, 2021
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services
Miao, Yuantian and Xue, Minhui and Chen, Chao and Pan, Lei and Zhang, Jun and Zhao, Benjamin Zi Hao and Kaafar, Dali and Xiang, Yang
Privacy Enhancing Technologies Symposium (PETS), pp.209–228, 2021
BEdgeHealth: A Decentralized Architecture for Edge-based IoMT Networks Using Blockchain
Nguyen, Dinh C and Pathirana, Pubudu N and Ding, Ming and Seneviratne, Aruna
IEEE Internet of Things Journal, 2021
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models
Benjamin Zi Hao Zhao and Aviral Agrawal and Catisha Coburn and Hassan Jameel Asghar and Raghav Bhaskar and Mohamed Ali Kaafar and Darren Webb and Peter Dickinson
IEEE European Symposium on Security and Privacy (EUROSP), 2021
Online Switch-Based Hybrid Beamforming for Massive MIMO Systems
Nosrati, Hamed and Aboutanios, Elias and Smith, David
European Signal Processing Conference (EUSIPCO), pp.1757–1761, 2021
Optimized Data Sharing with Differential Privacy: A Game-theoretic Approach
Wu, Nan and Smith, David and Kaafar, Mohamed Ali
AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-21), pp.1–9, February, 2021

LINK
Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems
Keshk, Marwa and Turnbull, Benjamin and Sitnikova, Elena and Vatsalan, Dinusha and Moustafa, Nour
IEEE Access, 2021
The Cost of Privacy in Asynchronous Differentially-Private Machine Learning
Farokhi, Farhad and Wu, Nan and Smith, David and Kaafar, Mohamed Ali
IEEE Transactions on Information Forensics and Security (TIFS), pp.2118–2129, January, 2021

LINK
When Machine Learning Meets Privacy: A Survey and Outlook
Liu, Bo and Ding, Ming and Shaham, Sina and Rahayu, Wenny and Farokhi, Farhad and Lin, Zihuai
ACM Computing Surveys (CSUR), pp.1–36, 2021

LINK
Differentially Private Release of Datasets using Gaussian Copula
Asghar, Hassan Jameel and Ding, Ming and Rakotoarivelo, Thierry and Mrabet, Sirine and Kaafar, Dali
Journal of Privacy and Confidentiality, February, 2021

LINK
Hold On! Your Emotion and Behaviour when Falling for Fake News in Social Media
Vatsalan, Dinusha and Arachchilage, Nalin Asanka Gamagedara
2021 CHI Workshop on Technologies to Support Critical Thinking in an Age of Misinformation, 2021
Realistic Differentially-Private Transmission Power Flow Data Release
Smith, David and Geth, Frederik and Vercoe, Elliott and Feutrill, Andrew and Ding, Ming and Chan, Jonathan and Foster, James and Rakotoarivelo, Thierry
arXiv preprint arXiv:2103.14036, March, 2021
Coordinated charging and discharging control of electric vehicles to manage supply voltages in distribution networks: Assessing the customer benefit
Nimalsiri, Nanduni I and Ratnam, Elizabeth L and Mediwaththe, Chathurika P and Smith, David B and Halgamuge, Saman K
Applied Energy, pp.116857, June, 2021

LINK
Modern Privacy-Preserving Record LinkageTechniques: An Overview
Aris Gkoulalas-Divanis, Dinusha Vatsalan, Dimitrios Karapiperis, and Murat Kantarcioglu
IEEE Transactions on Information Forensics and Security (TIFS), pp.4966–4987, 2021

LINK
Federated Learning Meets Blockchain in Edge Computing: Opportunities and Challenges
Nguyen, Dinh C. and Ding, Ming and Pham, Quoc-Viet and Pathirana, Pubudu N. and Le, Long Bao and Seneviratne, Aruna and Li, Jun and Niyato, Dusit and Poor, H. Vincent
IEEE Internet of Things Journal, pp.12806–12825, 2021
Privacy Preserving Text Data Encoding and Topic Modelling
Dinusha Vatsalan, Raghav Bhaskar, Aris Gkoulalas-Divanis, and Dimitrios Karapiperis
Big Data Conference Proceedings, 2021

LINK
Federated Learning for Internet of Things: A Comprehensive Survey
Nguyen, Dinh C. and Ding, Ming and Pathirana, Pubudu N. and Seneviratne, Aruna and Li, Jun and Vincent Poor, H.
IEEE Communications Surveys and Tutorials, pp.1622–1658, 2021

LINK
Federated Learning With Unreliable Clients: Performance Analysis and Mechanism Design
Ma, Chuan and Li, Jun and Ding, Ming and Wei, Kang and Chen, Wen and Poor, H. Vincent
IEEE Internet of Things Journal, pp.17308–17319, 2021

LINK
Cooperative Task Offloading and Block Mining in Blockchain-based Edge Computing with Multi-agent Deep Reinforcement Learning
Nguyen, Dinh and Ding, Ming and Pathirana, Pubudu and Seneviratne, Aruna and Li, Jun and Poor, Vincent
IEEE Transactions on Mobile Computing, pp.1–1, 2021

LINK
6G Internet of Things: A Comprehensive Survey
Nguyen, Dinh C. and Ding, Ming and Pathirana, Pubudu N. and Seneviratne, Aruna and Li, Jun and Niyato, Dusit and Dobre, Octavia and Poor, H. Vincent
IEEE Internet of Things Journal, pp.1–1, 2021

LINK
Federated Learning for COVID-19 Detection with Generative Adversarial Networks in Edge Cloud Computing
Nguyen, Dinh C. and Ding, Ming and Pathirana, Pubudu N. and Seneviratne, Aruna and Zomaya, Albert Y.
IEEE Internet of Things Journal, pp.1–1, 2021

LINK
Performance Analysis of Reconfigurable Intelligent Surface Assisted Wireless System With Low-Density Parity-Check Code
Hu, Yunkai and Wang, Peng and Lin, Zihuai and Ding, Ming
IEEE Communications Letters, pp.2879–2883, 2021
A critique and attack on “Blockchain-based privacy-preserving record linkage”
Christen, Peter and Schnell, Rainer and Ranbaduge, Thilina and Vidanage, Anushka
Information Systems, pp.101930, 2021
Blockchain assisted decentralized federated learning (BLADE-FL): Performance analysis and resource allocation
Li, Jun and Shao, Yumeng and Wei, Kang and Ding, Ming and Ma, Chuan and Shi, Long and Han, Zhu and Poor, H Vincent
IEEE Transactions on Parallel and Distributed Systems, pp.2401–2415, 2021
Secure computation offloading in blockchain based IoT networks with deep reinforcement learning
Nguyen, Dinh C and Pathirana, Pubudu N and Ding, Ming and Seneviratne, Aruna
IEEE Transactions on Network Science and Engineering, pp.3192–3208, 2021
Data level privacy preserving: A stochastic perturbation approach based on differential privacy
Ma, Chuan and Yuan, Long and Han, Li and Ding, Ming and Bhaskar, Raghav and Li, Jun
IEEE Transactions on Knowledge and Data Engineering (TKDE), 2021

2020


LINK
Privacy-Preserving Public Release of Datasets for Support Vector Machine Classification
F. Farokhi
IEEE Transactions on Big Data, pp.1–1, 2020

LINK
Privacy Preserving Location Data Publishing: A Machine Learning Approach
S. Shaham and M. Ding and B. Liu and S. Dang and Z. Lin and J. Li
IEEE Transactions on Knowledge and Data Engineering (TKDE), pp.1–1, 2020

LINK
Privacy-Preserving Constrained Quadratic Optimization With Fisher Information
F. Farokhi
IEEE Signal Processing Letters, pp.545–549, 2020

LINK
Privacy-Preserved Optimal Energy Trading, Statistics, and Forecasting for a Neighborhood Area Network
D. Smith and P. Wang and M. Ding and J. Chan and B. Spak and X. Guan and P. Tyler and T. Rakotoarivelo and Z. Lin and T. Abbasi
Computer, pp.25–34, May, 2020

LINK
Privacy Preservation in Location-Based Services: A Novel Metric and Attack Model
S. Shaham and M. Ding and B. Liu and S. Dang and Z. Lin and J. Li
IEEE Transactions on Mobile Computing, pp.1–1, 2020

LINK
P4Mobi: A Probabilistic Privacy-Preserving Framework for Publishing Mobility Datasets
Q. Yang and Y. Shen and D. Vatsalan and J. Zhang and M. A. Kaafar and W. Hu
IEEE Transactions on Vehicular Technology, pp.6987–6999, 2020

LINK
Temporally Discounted Differential Privacy for Evolving Datasets on an Infinite Horizon
F. Farokhi
ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), pp.1–8, 2020

LINK
A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store
N. Karunanayake and J. Rajasegaran and A. Gunathillake and S. Seneviratne and G. Jourjon
IEEE Transactions on Mobile Computing, pp.1–1, 2020

LINK
The Value of Collaboration in Convex Machine Learning with Differential Privacy
N. Wu and F. Farokhi and D. Smith and M. Kaafar
IEEE Symposium on Security and Privacy (SP), pp.304–317, May, 2020

LINK
An Explicit Formula for the Zero-Error Feedback Capacity of a Class of Finite-State Additive Noise Channels
A. Saberi and F. Farokhi and G. N. Nair
IEEE International Symposium on Information Theory (ISIT), pp.2108–2113, 2020

LINK
Power Control for Body Area Networks: Accurate Channel Prediction by Lightweight Deep Learning
Y. Yang and D. Smith and J. Rajasegaran and S. Seneviratne
IEEE Internet of Things Journal, pp.1–1, September, 2020

LINK
Private routing and ride-sharing using homomorphic encryption
F. Farokhi and I. Shames and K. H. Johansson
IET Cyber-Physical Systems: Theory and Applications, pp.311–320, 2020

LINK
Understanding Traffic Fingerprinting CNNs
T. Dahanayaka and G. Jourjon and S. Seneviratne
IEEE Conference on Local Computer Networks (LCN), pp.65–76, November, 2020
A Decentralized Electric Vehicle Charge Scheduling Scheme for Tracking Power Profiles
Nimalsiri, Nanduni and Smith, David and Ratnam, Elizabeth and Mediwaththe, Chathurika and Halgamuge, Saman
IEEE Power \& Energy Society Innovative Smart Grid Technologies Conference (ISGT), pp.1–5, February, 2020

LINK
Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms
Hassan Jameel Asghar and Dali Kaafar
Privacy Enhancing Technologies Symposium (PETS), pp.358–378, 2020
Blockchain for 5G and beyond networks: A state of the art survey
Nguyen, Dinh C and Pathirana, Pubudu N and Ding, Ming and Seneviratne, Aruna
Journal of Network and Computer Applications, pp.102693, 2020
Enabling AI in Future Wireless Networks: A Data Life Cycle Perspective
Nguyen, Dinh C and Cheng, Peng and Ding, Ming and Lopez-Perez, David and Pathirana, Pubudu N and Li, Jun and Seneviratne, Aruna and Li, Yonghui and Poor, H Vincent
IEEE Communications Surveys and Tutorials, 2020

LINK
Fairness-Aware Privacy-Preserving Record Linkage
Vatsalan, Dinusha and Yu, Joyce and Henecka, Wilko and Thorne, Brian
Data Privacy Management, Cryptocurrencies and Blockchain Technology, pp.3–18, 2020

LINK
Federated learning with differential privacy: Algorithms and performance analysis
Wei, Kang and Li, Jun and Ding, Ming and Ma, Chuan and Yang, Howard H and Farokhi, Farhad and Jin, Shi and Quek, Tony QS and Poor, H Vincent
IEEE Transactions on Information Forensics and Security (TIFS), pp.3454–3469, 2020
From Load to Net Energy Forecasting: Short-Term Residential Forecasting for the Blend of Load and PV Behind the Meter
Razavi, S Ehsan and Arefi, Ali and Ledwich, Gerard and Nourbakhsh, Ghavameddin and Smith, David and Minakshi, Manickam
IEEE Access, December, 2020

LINK
Hyper-Parameter Optimization for Privacy-Preserving Record Linkage
Yu, Joyce and Nabaglo, Jakub and Vatsalan, Dinusha and Henecka, Wilko and Thorne, Brian
Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp.281–296, 2020

LINK
Implementing homomorphic encryption based secure feedback control
Julian Tran and Farhad Farokhi and Michael Cantoni and Iman Shames
Control Engineering Practice, pp.104350, 2020

LINK
Incremental clustering techniques for multi-party Privacy-Preserving Record Linkage
Dinusha Vatsalan and Peter Christen and Erhard Rahm
Data & Knowledge Engineering, pp.101809, 2020
Integration of blockchain and cloud of things: Architecture, applications and challenges
Nguyen, Dinh C and Pathirana, Pubudu N and Ding, Ming and Seneviratne, Aruna
IEEE Communications Surveys and Tutorials, pp.2521–2549, 2020
Invisible backdoor attacks on deep neural networks via steganography and regularization
Li, Shaofeng and Xue, Minhui and Zhao, Benjamin and Zhu, Haojin and Zhang, Xinpeng
IEEE Transactions on Dependable and Secure Computing, 2020
Multi-stage antenna selection for adaptive beamforming in MIMO radar
Nosrati, Hamed and Aboutanios, Elias and Smith, David
IEEE Transactions on Signal Processing, pp.1374–1389, 2020
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning
Zhao, Benjamin Zi Hao and Kaafar, Mohamed Ali and Kourtellis, Nicolas
ACM SIGSAC Conference on Cloud Computing Security Workshop, pp.15–26, 2020

LINK
On Properties and Optimization of Information-theoretic Privacy Watchdog
Parastoo Sadeghi and Ni Ding and Thierry Rakotoarivelo
IEEE Information Theory Workshop (ITW), 10, 2020

LINK
On safeguarding privacy and security in the framework of federated learning
Ma, Chuan and Li, Jun and Ding, Ming and Yang, Howard H and Shu, Feng and Quek, Tony QS and Poor, H Vincent
IEEE Networks, pp.242–248, 2020

LINK
On the Resilience of Biometric Authentication Systems against Random Inputs
Zhao, Benjamin Zi Hao and Asghar, Hassan Jameel and Kaafar, Mohamed Ali
Network and Distributed System Security Symposium (NDSS), 2020

LINK
P-Signature-Based Blocking to Improve the Scalability of Privacy-Preserving Record Linkage
Vatsalan, Dinusha and Yu, Joyce and Thorne, Brian and Henecka, Wilko
Data Privacy Management, Cryptocurrencies and Blockchain Technology, pp.35–51, 2020
PALOR: Poisoning Attacks Against Logistic Regression
Wen, Jialin and Zhao, Benjamin Zi Hao and Xue, Minhui and Qian, Haifeng
Australasian Conference on Information Security and Privacy, pp.447–460, 2020
Peer-to-peer trading in electricity networks: An overview
Tushar, Wayes and Saha, Tapan Kumar and Yuen, Chau and Smith, David and Poor, H Vincent
IEEE Transactions on Smart Grid, pp.3185–3200, January, 2020

LINK
Privacy-preserved task offloading in mobile blockchain with deep reinforcement learning
Nguyen, Dinh C and Pathirana, Pubudu N and Ding, Ming and Seneviratne, Aruna
IEEE Transactions on Network and Service Management, pp.2536–2549, 2020

LINK
Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems
Keshk, Marwa and Moustafa, Nour and Sitnikova, Elena and Turnbull, Benjamin and Vatsalan, Dinusha
IEEE Conference on Mobility, Sensing and Networking (MSN), pp.711–717, 2020

LINK
Privacy-Utility Tradeoff in a Guessing Framework Inspired by Index Coding
Y. Liu and N. Ding and P. Sadeghi and T. Rakotoarivelo
IEEE International Symposium on Information Theory (ISIT), pp.926–931, 2020

LINK
Sequence Data Matching and Beyond: New Privacy-Preserving Primitives Based on Bloom Filters
Xue, Wanli and Vatsalan, Dinusha and Hu, Wen and Seneviratne, Aruna
IEEE Transactions on Information Forensics and Security (TIFS), pp.2973–2987, 2020
Skin-MIMO: Vibration-based MIMO Communication over Human Skin
Ma, Dong and Wu, Yuezhong and Ding, Ming and Hassan, Mahbub and Hu, Wen
IEEE INFOCOM Conference on Computer Communications, pp.784–793, 2020
Secure Multi-party Summation Protocols: Are They Secure Enough Under Collusion?
Ranbaduge, Thilina and Vatsalan, Dinusha and Christen, Peter
Transactions on Data Privacy, pp.25–60, 04, 2020
Accelerating astronomy using Atomic COTS
Hampson, Grant and Humphrey, D and Jourjon, G and Bunton, John and Bengston, K and Bolin, Andrew and Chen, Yuqing and Troup, Euan
RadioNet Workshop on Future Trends in Radio Astronomy Instrumentation, 09, 2020

LINK
Measuring and analysing the chain of implicit trust: a study of third-party resources loading
Muhammad Ikram and Rahat Masood and Gareth Tyson and Kaafar, Mohamed Ali and Noha Loizon and Roya Ensafi
ACM Transactions on Privacy and Security (TOPS), pp.1–27, April, 2020

LINK
Challenges and prospects for negawatt trading in light of recent technological developments
Tushar, Wayes and Saha, Tapan K. and Yuen, Chau and Smith, David and Ashworth, Peta and Poor, H. Vincent and Basnet, Subarna
Nature Energy, pp.834–841, November, 2020

LINK
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes
Zhao, Benjamin Zi Hao and Asghar, Hassan Jameel and Kaafar, Mohamed Ali and Trevisan, Francesca and Yuan, Haiyue
ACM Transactions on Privacy and Security (TOPS), September, 2020

LINK
Not All Attributes are Created Equal: dX-Private Mechanisms for Linear Queries
Kamalaruban, Parameswaran and Perrier, Victor and Asghar, Hassan Jameel and Kaafar, Mohamed Ali
Privacy Enhancing Technologies Symposium (PETS), pp.103–125, January, 2020
Who let the DOGS out: Anonymous but Auditable communications using Group Signature schemes with Distributed Opening
Dehez-Clementi, Marina and Deneuville, Jean-Christophe and Lacan, J’erome and Asghar, Hassan and Kaafar, Mohamed Ali
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, Revised Selected Papers, pp.437, 2020

LINK
Feature-Based Adversarial Attacks Against Machine Learnt Mobile Malware Detectors
Shahpasand, Maryam and Hamey, Leonard and Kaafar, Mohamed Ali and Vatsalan, Dinusha
2020 30th International Telecommunication Networks and Applications Conference (ITNAC), pp.1–8, 2020

LINK
Phishing email strategies: Understanding cybercriminals’ strategies of crafting phishing emails
Stojnic, Tatyana and Vatsalan, Dinusha and Arachchilage, Nalin AG
Security and Privacy, pp.e165, 2020

2019


LINK
Flexible Resource Allocation in Device-to-Device Communications Using Stackelberg Game Theory
N. Sawyer and D. B. Smith
IEEE Transactions on Communications, pp.653–667, 2019

LINK
Precise and Fast Cryptanalysis for Bloom Filter Based Privacy-Preserving Record Linkage
P. Christen and T. Ranbaduge and D. Vatsalan and R. Schnell
IEEE Transactions on Knowledge and Data Engineering (TKDE), pp.2164–2177, 2019

LINK
The Impact of Adverse Weather Conditions on Autonomous Vehicles: How Rain, Snow, Fog, and Hail Affect the Performance of a Self-Driving Car
Zang, Shizhe and Ding, Ming and Smith, David and Tyler, Paul and Rakotoarivelo, Thierry and Kaafar, Mohamed Ali
IEEE Vehicular Technology Magazine, pp.103–111, 2019
A decade of mal-activity reporting: A retrospective analysis of internet malicious activity blacklists
Zhao, Benjamin Zi Hao and Ikram, Muhammad and Asghar, Hassan Jameel and Kaafar, Mohamed Ali and Chaabane, Abdelberi and Thilakarathna, Kanchana
ACM Asia Conference on Computer and Communications Security (AsiaCCS), pp.193–205, 2019

LINK
A Fundamental Bound on Performance of Non-Intrusive Load Monitoring with Application to Smart Meter Privacy
Farhad Farokhi
2019

LINK
A privacy-preserving-framework-based blockchain and deep learning for protecting smart power networks
Keshk, Marwa and Turnbull, Benjamin and Moustafa, Nour and Vatsalan, Dinusha and Choo, Kim-Kwang Raymond
IEEE Transactions on Industrial Informatics, pp.5110–5118, 2019
A survey of algorithms for distributed charging control of electric vehicles in smart grid
Nimalsiri, Nanduni I and Mediwaththe, Chathurika P and Ratnam, Elizabeth L and Shaw, Marnie and Smith, David B and Halgamuge, Saman K
IEEE Transactions on Intelligent Transportation Systems, pp.4497–4515, 2019
Adversarial attacks on mobile malware detection
Shahpasand, Maryam and Hamey, Len and Vatsalan, Dinusha and Xue, Minhui
IEEE Workshop on Artificial Intelligence for Mobile (AI4Mobile), pp.17–20, 2019

LINK
Ensuring privacy with constrained additive noise by minimizing Fisher information
Farhad Farokhi and Henrik Sandberg
Automatica, pp.275–288, 2019
Experimental analysis of cross-layer optimization for distributed wireless body-to-body networks
Shimly, Samiya M and Smith, David B and Movassaghi, Samaneh
IEEE Sensors Journal, pp.12494–12509, 2019

LINK
Fast privacy-preserving network function outsourcing
Hassan Jameel Asghar and Emiliano De Cristofaro and Guillaume Jourjon and Mohammed Ali Kaafar and Laurent Mathy and Luca Melis and Craig Russell and Mang Yu
Computer Networks, pp.106893, 2019
Multi-Tier mmWave Networks: Improving Fairness for Spectrally-Efficient Downlink Scheduling
Chen, Ziqi and Smith, David B
Vehicular Technology Conference (VTC), pp.1–5, 2019

LINK
On Inferring Training Data Attributes in Machine Learning Models
Hao Zhao, Benjamin Zi and Jameel Asghar, Hassan and Bhaskar, Raghav and Kaafar, Mohamed Ali
Workshop on Privacy Preserving Machine Learning, ACM CCS, 2019
Online Privacy in Mobile and Web Platforms: Risk Quantification and Obfuscation Techniques
Masood, Rahat
PhD Thesis, University of New South Wales, 2019

LINK
Private continual release of real-valued data streams
Victor Perrier and Asghar, Hassan Jameel and Dali Kaafar
Network and Distributed System Security Symposium (NDSS), pp.1–13, 2019
Repairing of Record Linkage: Turning Errors into Insight.
Bui-Nguyen, Quyen and Wang, Qing and Shao, Jingyu and Vatsalan, Dinusha
International Conference on Extending Database Technology (EDBT), pp.638–641, 2019
Robust frequency, phase, and amplitude estimation in power systems considering harmonics
Sun, Jiadong and Aboutanios, Elias and Smith, David B and Fletcher, John E
IEEE Transactions on Power Delivery, pp.1158–1168, 2019
Switch-based hybrid precoding in mmWave massive MIMO systems
Nosrati, Hamed and Aboutanios, Elias and Smith, David and others
European Signal Processing Conference (EUSIPCO), pp.1–5, 2019

LINK
The Attack of the Clones against Proof-of-Authority
Parinya Ekparinya and Vincent Gramoli and Guillaume Jourjon
Network and Distributed System Security Symposium (NDSS), 2019

LINK
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading
Muhammad Ikram and Rahat Masood and Gareth Tyson and Mohamed Ali Kaafar and Noha Loizon and Roya Ensafi
The World Wide Web Conference (WWW), 2019

LINK
A Submodularity-based Clustering Algorithm for the Information Bottleneck and Privacy Funnel
N. Ding and P. Sadeghi
IEEE Information Theory Workshop (ITW), pp.1–5, August, 2019

LINK
Evolutionary Games for Correlation-Aware Clustering in Massive Machine-to-Machine Networks
N. Sawyer and M. Naderi Soorki and W. Saad and D. B. Smith and N. Ding
IEEE Transactions on Communications, pp.6527–6543, September, 2019

2018


LINK
Fisher Information as a Measure of Privacy: Preserving Privacy of Households With Smart Meters Using Batteries
F. Farokhi and H. Sandberg
IEEE Transactions on Smart Grid, pp.4726–4734, 2018

LINK
Determining Optimal Rates for Communication for Omniscience
N. Ding and C. Chan and Q. Zhou and R. A. Kennedy and P. Sadeghi
IEEE Transactions on Information Theory, pp.1919–1944, 2018

LINK
Distributed Data Compression in Sensor Clusters: A Maximum Independent Flow Approach
N. Ding and P. Sadeghi and D. Smith and T. Rakotoarivelo
IEEE International Symposium on Information Theory (ISIT), pp.2221–2225, 2018

LINK
{DLibOS: Performance and Protection with a Network-on-Chip}
Stephen Mallon and Vincent Gramoli and Guillaume Jourjon
Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp.737–750, 2018
A scalable and efficient subgroup blocking scheme for multidatabase record linkage
Ranbaduge, Thilina and Vatsalan, Dinusha and Christen, Peter
Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), pp.15–27, 2018
An Overview of Big Data Issues in Privacy-Preserving Record Linkage
Vatsalan, Dinusha and Karapiperis, Dimitrios and Gkoulalas-Divanis, Aris
International Symposium on Algorithmic Aspects of Cloud Computing, pp.118–136, 2018

LINK
Improving Computational Efficiency of Communication for Omniscience and Successive Omniscience
N. Ding and P. Sadeghi and T. Rakotoarivelo
Allerton Conference on Communication, Control, and Computing (Allerton), pp.1073–1080, 2018

LINK
Incognito: A Method for Obfuscating Web Data
Masood, Rahat and Vatsalan, Dinusha and Ikram, Muhammad and Kaafar, Mohamed Ali
The World Wide Web Conference (WWW), pp.267–276, 2018

LINK
Touch and you’re trapp(ck)ed: quantifying the uniqueness of touch gestures for tracking
Rahat Masood and Zhao, Benjamin Zi Hao and Asghar, Hassan Jameel and Kaafar, Mohamed Ali
Privacy Enhancing Technologies Symposium (PETS), pp.122–142, 2018

LINK
Fairness in Multiterminal Data Compression: A Splitting Method for the Egalitarian Solution
N. Ding and D. Smith and P. Sadeghi and T. Rakotoarivelo
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.6383–6387, April, 2018

LINK
Fairness in Multiterminal Data Compression: Decomposition of Shapley Value
N. Ding and D. Smith and T. Rakotoarivelo and P. Sadeghi
IEEE International Symposium on Information Theory (ISIT), pp.886–890, June, 2018

LINK
DLibOS: Performance and Protection with a Network-on-Chip
Mallon, Stephen and Gramoli, Vincent and Jourjon, Guillaume
SIGPLAN Not., pp.737–750, mar, 2018

LINK
Human Context Detection From Kinetic Energy Harvesting Wearables
Khalifa, Sara and Lan, Guohao and Hassan, Mahbub and Hu, Wen and Seneviratne, Aruna
, 012018

2017


LINK
Price Discrimination for Energy Trading in Smart Grid: A Game Theoretic Approach
Tushar, Wayes and Yuen, Chau and Smith, David B. and Poor, H. Vincent
IEEE Transactions on Smart Grid, pp.1790–1801, 2017

LINK
Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
Thilakarathna, Kanchana and Viana, Aline Carneiro and Seneviratne, Aruna and Petander, Henrik
IEEE Transactions on Mobile Computing, pp.702–715, 2017

LINK
Enabling Fast and Slow Lanes for Content Providers Using Software Defined Networking
Habibi Gharakheili, Hassan and Sivaraman, Vijay and Moors, Tim and Vishwanath, Arun and Matthews, John and Russell, Craig
IEEE/ACM Transactions on Networking, pp.1373–1385, 2017

LINK
A Small-Cell Caching System in Mobile Cellular Networks With LoS and NLoS Channels
Li, Jun and Chen, Youjia and Ding, Ming and Shu, Feng and Vucetic, Branka and You, Xiaohu
IEEE Access, pp.1296–1305, 2017

LINK
Uplink Performance Analysis of Dense Cellular Networks With LoS and NLoS Transmissions
Ding, Tian and Ding, Ming and Mao, Guoqiang and Lin, Zihuai and López-Pérez, David and Zomaya, Albert Y.
IEEE Transactions on Wireless Communications, pp.2601–2613, 2017

LINK
On the Estimation of the Parameters of a Real Sinusoid in Noise
Ye, Shanglin and Sun, Jiadong and Aboutanios, Elias
IEEE Signal Processing Letters, pp.638–642, 2017

LINK
App Miscategorization Detection: A Case Study on Google Play
Surian, Didi and Seneviratne, Suranga and Seneviratne, Aruna and Chawla, Sanjay
IEEE Transactions on Knowledge and Data Engineering, pp.1591–1604, 2017
Kryptein: A Compressive-Sensing-Based Encryption Scheme for the Internet of Things
Xue, Wanli and Luo, Chenwen and Lan, Guohao and Rana, Rajib and Hu, Wen and Seneviratne, Aruna
2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pp.169–180, 2017

LINK
Garbage Collection of Forwarding Rules in Software Defined Networks
M. T. I. ul Huque and G. Jourjon and V. Gramoli
IEEE Communications Magazine, pp.39–45, 2017

LINK
Dynamic base station repositioning to improve spectral efficiency of drone small cells
Fotouhi, Azade and Ding, Ming and Hassan, Mahbub
2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp.1–9, 2017

LINK
Understanding autonomous drone maneuverability for Internet of Things applications
Fotouhi, Azade and Ding, Ming and Hassan, Mahbub
2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp.1–6, 2017

LINK
A Survey of Wearable Devices and Challenges
Seneviratne, Suranga and Hu, Yining and Nguyen, Tham and Lan, Guohao and Khalifa, Sara and Thilakarathna, Kanchana and Hassan, Mahbub and Seneviratne, Aruna
IEEE Communications Surveys & Tutorials, pp.2573–2620, 2017

LINK
Stratosphere: Dynamic IP Overlay Above the Clouds
Ekparinya, Parinya and Gramoli, Vincent and Jourjon, Guillaume and Zhu, Liming
2017 IEEE 42nd Conference on Local Computer Networks (LCN), pp.583–586, 2017

LINK
MPTCP energy enhancement paradox: A Q-learning approach
Shamani, Mohammad Javad and Rezaei, Saeid and Jourjon, Guillaume and Seneviratne, Aruna
2017 27th International Telecommunication Networks and Applications Conference (ITNAC), pp.1–4, 2017

LINK
KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting
Xu, Weitao and Lan, Guohao and Lin, Qi and Khalifa, Sara and Bergmann, Neil and Hassan, Mahbub and Hu, Wen
Network and Distributed System Security Symposium (NDSS), 2017

LINK
POSTER: TouchTrack: How Unique Are Your Touch Gestures?
Masood, Rahat and Zhao, Benjamin Zi Hao and Asghar, Hassan Jameel and Kaafar, Moahmed Ali
ACM SIGSAC Conference on Computer and Communications Security (CCS), pp.2555–2557, 2017

LINK
Privacy-Preserving Record Linkage for Big Data: Current Approaches and Research Challenges
Vatsalan, Dinusha and Sehili, Ziad and Christen, Peter and Rahm, Erhard
Handbook of Big Data Technologies, pp.851–895, 2017

LINK
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning
Muhammad Ikram and Hassan Jameel Asghar and Mohamed Ali Kaafar and Anirban Mahanti and Balachandar Krishnamurthy
Privacy Enhancing Technologies Symposium (PETS), pp.79–99, 2017

LINK
Measuring, Characterizing, and Detecting Facebook Like Farms
Ikram, Muhammad and Onwuzurike, Lucky and Farooqi, Shehroze and Cristofaro, Emiliano De and Friedman, Arik and Jourjon, Guillaume and Kaafar, Mohammed Ali and Shafiq, M. Zubair
ACM Transactions on Privacy and Security (TOPS), September, 2017

LINK
A deep dive into location-based communities in social discovery networks
Kanchana Thilakarathna and Suranga Seneviratne and Kamal Gupta and Mohamed Ali Kaafar and Aruna Seneviratne
Computer Communications, pp.78–90, 2017
Crowd-cache: Leveraging on spatio-temporal correlation in content popularity for mobile networking in proximity
Thilakarathna, Kanchana and Jiang, Fang-Zhou and Mrabet, Sirine and Kaafar, Mohamed Ali and Seneviratne, Aruna and Xie, Gaogang
Computer Communications, pp.104–117, 2017
Efficient content distribution in Dooh advertising networks exploiting urban geo-social connectivity
Jiang, Fang-Zhou and Thilakarathna, Kanchana and Hassan, Mahbub and Ji, Yusheng and Seneviratne, Aruna
Proceedings of the 26th International Conference on World Wide Web Companion, pp.1363–1370, 2017
Airborne disease propagation on large scale social contact networks
Shahzamal, Md and Jurdak, Raja and Arablouei, Reza and Kim, Minkyoung and Thilakarathna, Kanchana and Mans, Bernard
Proceedings of the 2nd International Workshop on Social Sensing, pp.35–40, 2017

LINK
BreathPrint: Breathing Acoustics-Based User Authentication
Chauhan, Jagmohan and Hu, Yining and Seneviratne, Suranga and Misra, Archan and Seneviratne, Aruna and Lee, Youngki
Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, pp.278–291, 2017

LINK
Implementing Geo-Blocking and Spoofing Protection in Multi-Domain Software Defined Interconnects
Kumar, Himal and Mercian, Anu and Banerjee, Sujata and Russell, Craig and Sivaraman, Vijay
Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures, 2017
Veh-com: Demodulating vibration energy harvesting for short range communication
Lan, Guohao and Xu, Weitao and Khalifa, Sara and Hassan, Mahbub and Hu, Wen
2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp.170–179, 2017
KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting.
Xu, Weitao and Lan, Guohao and Lin, Qi and Khalifa, Sara and Bergmann, Neil and Hassan, Mahbub and Hu, Wen
NDSS, pp.0–4, 2017
Spam mobile apps: Characteristics, detection, and in the wild analysis
Seneviratne, Suranga and Seneviratne, Aruna and Kaafar, Mohamed Ali and Mahanti, Anirban and Mohapatra, Prasant
ACM Transactions on the Web (TWEB), pp.1–29, 2017
Garbage collection of forwarding rules in software defined networks
ul Huque, Md Tanvir Ishtaique and Jourjon, Guillaume and Gramoli, Vincent
IEEE Communications Magazine, pp.39–45, 2017
e-DASH: Modelling an energy-aware DASH player
Varghese, Benoy and Jourjon, Guillaume and Thilakarathne, Kanchana and Seneviratne, Aruna
2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp.1–9, 2017
BehavioCog: An observation resistant authentication scheme
Chauhan, Jagmohan and Zhao, Benjamin Zi Hao and Asghar, Hassan Jameel and Chan, Jonathan and Kaafar, Mohamed Ali
Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers 21, pp.39–58, 2017
Performance analysis of dense small cell networks with generalized fading
Yang, Bin and Ding, Ming and Mao, Guoqiang and Ge, Xiaohu
2017 IEEE International Conference on Communications (ICC), pp.1–7, 2017
Uplink performance analysis of dense cellular networks with LoS and NLoS transmissions
Ding, Tian and Ding, Ming and Mao, Guoqiang and Lin, Zihuai and L’opez-P’erez, David and Zomaya, Albert Y
IEEE Transactions on Wireless Communications, pp.2601–2613, 2017
Characterizing key stakeholders in an online black-hat marketplace
Farooqi, Shehroze and Jourjon, Guillaume and Ikram, Muhammad and Kaafar, Mohamed Ali and De Cristofaro, Emiliano and Shafiq, Zubair and Friedman, Arik and Zaffar, Fareed
2017 APWG Symposium on Electronic Crime Research (eCrime), pp.17–27, 2017
Large-scale dynamic controller placement
ul Huque, Md Tanvir Ishtaique and Si, Weisheng and Jourjon, Guillaume and Gramoli, Vincent
IEEE Transactions on Network and Service Management, pp.63–76, 2017
On the performance of practical ultra-dense networks: The major and minor factors
Ding, Ming and L’opez-P’erez, David
2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), pp.1–8, 2017
LWIP and Wi-Fi boost flow control
L’opez-P’erez, David and Ling, Jonathan and Kim, Bong Ho and Subramanian, Vasudevan and Kanugovi, Satish and Ding, Ming
2017 IEEE Wireless Communications and Networking Conference (WCNC), pp.1–6, 2017
A spectral-based clustering for structural health monitoring of the Sydney Harbour Bridge
Alamdari, Mehrisadat Makki and Rakotoarivelo, Thierry and Khoa, Nguyen Lu Dang
Mechanical Systems and Signal Processing, pp.384–400, 2017
Matched filter constrained MIMO array spatial thinning for interference mitigation
Nosrati, Hamed and Aboutanios, Elias and Smith, David B
2017 IEEE Radar Conference (RadarConf), pp.1408–1412, 2017
Competitive energy trading framework for demand-side management in neighborhood area networks
Mediwaththe, Chathurika P and Stephens, Edward R and Smith, David B and Mahanti, Anirban
IEEE Transactions on Smart Grid, pp.4313–4322, 2017
Receiver-transmitter pair selection in MIMO phased array radar
Nosrati, Hamed and Aboutanios, Elias and Smith, David B
2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.3206–3210, 2017

2016


LINK
A Dynamic Game for Electricity Load Management in Neighborhood Area Networks
C. P. Mediwaththe and E. R. Stephens and D. B. Smith and A. Mahanti
IEEE Transactions on Smart Grid, pp.1329–1336, 2016

LINK
Performance Impact of LoS and NLoS Transmissions in Dense Cellular Networks
Ding, Ming and Wang, Peng and López-Pérez, David and Mao, Guoqiang and Lin, Zihuai
IEEE Transactions on Wireless Communications, pp.2365–2380, 2016

LINK
On Dynamic Time-Division-Duplex Transmissions for Small-Cell Networks
Ding, Ming and López-Pérez, David and Xue, Ruiqi and Vasilakos, Athanasios V. and Chen, Wen
IEEE Transactions on Vehicular Technology, pp.8933–8951, 2016

LINK
Energy Storage Sharing in Smart Grid: A Modified Auction-Based Approach
Tushar, Wayes and Chai, Bo and Yuen, Chau and Huang, Shisheng and Smith, David B. and Poor, H. Vincent and Yang, Zaiyue
IEEE Transactions on Smart Grid, pp.1462–1475, 2016

LINK
Microscopic Analysis of the Uplink Interference in FDMA Small Cell Networks
Ding, Ming and López-Pérez, David and Mao, Guoqiang and Lin, Zihuai
IEEE Transactions on Wireless Communications, pp.4277–4291, 2016

LINK
uDrop: Pushing drop-box to the edge of mobile network
Jiang, Fangzhou and Thilakarathna, Kanchana and Mrabet, Sirine and Kaafar, Mohamed Ali
2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp.1–3, 2016

LINK
A Bayesian framework for energy-neutral activity monitoring with self-powered wearable sensors
Khalifa, Sara and Lan, Guohao and Hassan, Mahbub and Hu, Wen
2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp.1–6, 2016

LINK
Challenge-response trust assessment model for personal space IoT
Nguyen, Tham and Hoang, Doan and Seneviratne, Aruna
2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp.1–6, 2016

LINK
Characterization of early smartwatch apps
Chauhan, Jagmohan and Seneviratne, Suranga and Kaafar, Mohamed Ali and Mahanti, Anirban and Seneviratne, Aruna
2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp.1–6, 2016

LINK
A lattice algorithm for optimal phase unwrapping in noise
Li, Wenchao and Wang, Xuezhi and Moran, Bill
2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.2896–2900, 2016

LINK
Privacy-Aware Multipath Video Caching for Content-Centric Networks
Q. Wu and Z. Li and G. Tyson and S. Uhlig and M. A. Kaafar and G. Xie
IEEE Journal on Selected Areas in Communications, pp.2219–2230, 2016

LINK
DNA-GA: A new approach of network performance analysis
Ding, Ming and Pérez, David López and Mao, Guoqiang and Lin, Zihuai
2016 IEEE International Conference on Communications (ICC), pp.1–7, 2016

LINK
Feasibility and accuracy of hotword detection using vibration energy harvester
Khalifa, Sara and Hassan, Mahbub and Seneviratne, Aruna
2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp.1–9, 2016

LINK
Controlling the shape and scale of triangular formations using landmarks and bearing-only sensing
Manuel, Isaac L. and Bishop, Adrian N. and Anderson, Brian D.O. and Yu, Changbin
2016 35th Chinese Control Conference (CCC), pp.7532–7537, 2016

LINK
A Space-Time Analysis of LTE and Wi-Fi Inter-Working
Chen, Youjia and Ding, Ming and López-Pérez, David and Lin, Zihuai and Mao, Guoqiang
IEEE Journal on Selected Areas in Communications, pp.2981–2998, 2016

LINK
SDN APIs and Models for Two-Sided Resource Management in Broadband Access Networks
Habibi Gharakheili, Hassan and Sivaraman, Vijay and Vishwanath, Arun and Exton, Luke and Matthews, John and Russell, Craig
IEEE Transactions on Network and Service Management, pp.823–834, 2016

LINK
Robust and rapid estimation of the parameters of harmonic signals in three phase power systems
Sun, Jiadong and Ye, Shanglin and Aboutanios, Elias
2016 24th European Signal Processing Conference (EUSIPCO), pp.408–412, 2016

LINK
Boosted WiFi through LTE small cells: The solution for an all-wireless enterprise
López-Pérez, David and Ling, Jonathan and Kim, Bong Ho and Subramanian, Vasudevan and Kanugovi, Satish and Ding, Ming
2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp.1–6, 2016

LINK
TransFetch: A Viewing Behavior Driven Video Distribution Framework in Public Transport
Jiang, Fangzhou and Liu, Zhi and Thilakarathna, Kanchana and Li, Zhenyu and Ji, Yusheng and Seneviratne, Aruna
2016 IEEE 41st Conference on Local Computer Networks (LCN), pp.147–155, 2016

LINK
Endpoint-Transparent Multipath Transport with Software-Defined Networks
Banfi, Dario and Mehani, Olivier and Jourjon, Guillaume and Schwaighofer, Lukas and Holz, Ralph
2016 IEEE 41st Conference on Local Computer Networks (LCN), pp.307–315, 2016

LINK
Study on the Idle Mode Capability with LoS and NLoS Transmissions
Ding, Ming and Lopez Perez, David and Mao, Guoqiang and Lin, Zihuai
2016 IEEE Global Communications Conference (GLOBECOM), pp.1–6, 2016

LINK
Dynamic Base Station Repositioning to Improve Performance of Drone Small Cells
Fotouhi, Azade and Ding, Ming and Hassan, Mahbub
2016 IEEE Globecom Workshops (GC Wkshps), pp.1–6, 2016

LINK
On the Performance of Multi-Tier Heterogeneous Networks under LoS and NLoS Transmissions
Wang, Jiaqi and Chu, Xiaoli and Ding, Ming and Lopez-Perez, David
2016 IEEE Globecom Workshops (GC Wkshps), pp.1–6, 2016

LINK
Socially Aware Distributed Caching in Device-to-Device Communication Networks
Ma, Chuan and Ding, Ming and Chen, He and Lin, Zihuai and Mao, Guoqiang and Li, Xu
2016 IEEE Globecom Workshops (GC Wkshps), pp.1–6, 2016

LINK
A Software-Defined Flexible Inter-Domain Interconnect Using ONOS
Kumar, Himal and Russell, Craig and Sivaraman, Vijay and Banerjee, Sujata
2016 Fifth European Workshop on Software-Defined Networks (EWSDN), pp.43–48, 2016

LINK
An Analysis of the Privacy and Security Risks of Android VPN Permission-Enabled Apps
Ikram, Muhammad and Vallina-Rodriguez, Narseo and Seneviratne, Suranga and Kaafar, Mohamed Ali and Paxson, Vern
Internet Measurement Conference (IMC), pp.349–364, 2016
Sum secrecy rate maximization for relay-aided multiple-source multiple-destination networks
Zhang, Meng and Ding, Ming and Gui, Lin and Luo, Hanwen and Bennis, Mehdi
IEEE Transactions on Vehicular Technology, pp.4098–4109, 2016
Probabilistic small-cell caching: Performance analysis and optimization
Chen, Youjia and Ding, Ming and Li, Jun and Lin, Zihuai and Mao, Guoqiang and Hanzo, Lajos
IEEE Transactions on Vehicular Technology, pp.4341–4354, 2016
Efficient and scalable runtime monitoring for cyber–physical system
Zheng, Xi and Julien, Christine and Podorozhny, Rodion and Cassez, Franck and Rakotoarivelo, Thierry
IEEE Systems Journal, pp.1667–1678, 2016
Long term evolution-wireless local area network aggregation flow control
L’opez-P’erez, David and Laselva, Daniela and Wallmeier, Eugen and Purovesi, P”aivi and Lund’en, Petteri and Virtej, Elena and Lechowicz, Piotr and Malkamaki, Esa and Ding, Ming
IEEE Access, pp.9860–9869, 2016
Towards seamless tracking-free web: Improved detection of trackers via one-class learning
Ikram, Muhammad and Asghar, Hassan Jameel and Kaafar, Mohamed Ali and Krishnamurthy, Balachander and Mahanti, Anirban
arXiv preprint arXiv:1603.06289, 2016
Price discrimination for energy trading in smart grid: A game theoretic approach
Tushar, Wayes and Yuen, Chau and Smith, David B and Poor, H Vincent
IEEE Transactions on Smart Grid, pp.1790–1801, 2016
An Experimental-Based Analysis of Inter-BAN Co-Channel Interference Using the $$backslash$kappa $-$$backslash$mu $ Fading Model
Bhargav, Nidhi and Cotton, Simon L and Smith, David B
IEEE Transactions on Antennas and Propagation, pp.983–988, 2016

LINK
AFV: Enabling Application Function Virtualization and Scheduling in Wearable Networks
Kolamunna, Harini and Hu, Yining and Perino, Diego and Thilakarathna, Kanchana and Makaroff, Dwight and Guan, Xinlong and Seneviratne, Aruna
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp.981–991, 2016
A differential privacy framework for matrix factorization recommender systems
Friedman, Arik and Berkovsky, Shlomo and Kaafar, Mohamed Ali
User Modeling and User-Adapted Interaction, pp.425–458, 2016
The early bird gets the botnet: A markov chain based early warning system for botnet attacks
Abaid, Zainab and Sarkar, Dilip and Kaafar, Mohamed Ali and Jha, Sanjay
2016 IEEE 41st Conference on Local Computer Networks (LCN), pp.61–68, 2016

LINK
Please Lower Small Cell Antenna Heights in 5G
Ming Ding and David Lopez Perez
2016 IEEE Global Communications Conference (GLOBECOM), dec, 2016

LINK
Are Today’s SDN Controllers Ready for Primetime?
Stephen Mallon and Vincent Gramoli and Guillaume Jourjon
2016

LINK
SplitBox: Toward Efficient Private Network Function Virtualization
Hassan Jameel Asghar and Luca Melis and Cyril Soldani and Emiliano De Cristofaro and Mohamed Ali Kaafar and Laurent Mathy
2016
HEAP: reliable assessment of BGP hijacking attacks
Schlamp, Johann and Holz, Ralph and Jacquemart, Quentin and Carle, Georg and Biersack, Ernst W
IEEE Journal on Selected Areas in Communications, pp.1849–1861, 2016
Diversity and cooperative communications in body area networks
Smith, DB and Abolhasan, M
Advances in Body-Centric Wireless Communication: Applications and State-of-the-Art, 2016

LINK
Gesture-based Continuous Authentication for Wearable Devices: the Google Glass Case
Jagmohan Chauhan and Hassan Jameel Asghar and Mohamed Ali Kaafar and Anirban Mahanti
2016
Applying a methodology for the design, delivery and evaluation of learning resources for remote experimentation
Mikroyannidis, Alexander and Domingue, John and Pareit, Daan and Vanhie-Van Gerwen, Jono and Tranoris, Christos and Jourjon, Guillaume and Marquez-Barja, Johann M
2016 IEEE Global Engineering Education Conference (EDUCON), pp.448–454, 2016

LINK
Private Processing of Outsourced Network Functions: Feasibility and Constructions
Melis, Luca and Asghar, Hassan Jameel and De Cristofaro, Emiliano and Kaafar, Mohamed Ali
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, pp.39–44, 2016

LINK
TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication
Ralph Holz and Johanna Amann and Olivier Mehani and Matthias Wachs and Mohamed Ali Kaafar
Proceedings 2016 Network and Distributed System Security Symposium, 2016

LINK
Cooperative communications for sleep monitoring in wireless body area networks
S.M. Shimly and S. Movassaghi and D.B. Smith
Electronics Letters, pp.594–596, apr, 2016