


default search action
17th TrustCom / 12th BigDataSE 2018: New York, NY, USA
- 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018. IEEE 2018, ISBN 978-1-5386-4388-4

IEEE TrustCom 2018
Track 1: Trust Track 1
- Scot Tucker:

Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust. 1-9 - Yubiao Wang, Junhao Wen, Wei Zhou, Fengji Luo:

A Novel Dynamic Cloud Service Trust Evaluation Model in Cloud Computing. 10-15 - Yongkai Fan, Shengle Liu, Gang Tan

, Xiaodong Lin, Guanqun Zhao, Jianrong Bai:
One Secure Access Scheme Based on Trusted Execution Environment. 16-21 - Tianao Ma, Wei Hu, Yonghao Wang

, Dalia El-Banna, John Grant, Hongjun Dai:
Evaluation of Flexilink as Deterministic Unified Real-Time Protocol for Industrial Networks. 22-27
Track 1: Trust Track 2
- Ghada El Haddad, Esma Aïmeur, Hicham Hage:

Understanding Trust, Privacy and Financial Fears in Online Payment. 28-36 - Sebastian Friebe, Ingo Sobik, Martina Zitterbart:

DecentID: Decentralized and Privacy-Preserving Identity Storage System Using Smart Contracts. 37-42 - Monika Ewa Rakoczy

, Amel Bouzeghoub, Alda Lopes Gançarski, Katarzyna Wegrzyn-Wolska
:
Reputation Prediction Using Influence Conversion. 43-48 - Mostafa Kahla, Mohamed Azab, Ahmed Mansour:

Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments. 49-54
Track 1: Trust Track 3
- Mohamed Azab, Ahmed Hamdy, Ahmed Mansour:

Repoxy: Replication Proxy for Trustworthy SDN Controller Operation. 55-60 - Concepcion Sanchez Aleman, Niki Pissinou, Sheila Alemany, Georges A. Kamhoua:

A Dynamic Trust Weight Allocation Technique for Data Reconstruction in Mobile Wireless Sensor Networks. 61-67 - Jian Chen, Ziyang Chen, Peijia Zheng, Jianting Guo, Wei Zhang, Jiwu Huang:

Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio Watermarking. 68-73 - Bumjin Gwak, Jin-Hee Cho, Dongman Lee, Heesuk Son:

TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things. 74-85
Track 1: Trust Track 4
- Jian Chen, Peijia Zheng, Jianting Guo, Wei Zhang, Jiwu Huang:

A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication and Protection. 86-91 - Manu Elappila

, Suchismita Chinara:
Dynamic Survivable Path Routing for Fast Changing IoT Network Topologies. 92-97 - Zhaojun Lu, Qian Wang, Gang Qu, Zhenglin Liu:

BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs. 98-103 - Abu Shohel Ahmed, Tuomas Aura

:
Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure. 104-111
Track 1: Trust Track 5
- Ibrahim Tariq Javed, Khalifa Toumi, Noël Crespi:

N-Combat: A Nuisance Call Combating Framework for Internet Telephony. 112-117 - Muhammad Saleem Khan, Saira Waris, Idrees Ahmed

, Majid Iqbal Khan:
A Comprehensive Analysis of Packet Loss in MANETs. 118-123 - Sheikh Mahbub Habib

, Nikolaos Alexopoulos, Md Monirul Islam, Jens Heider, Stephen Marsh, Max Mühlhäuser:
Trust4App: Automating Trustworthiness Assessment of Mobile Applications. 124-135 - Shunan Ma, Xunbo Shuai, Zhaohua Zhou, Kechun Qiao:

Bionic Mechanism Based Dynamic Trust Evaluation Method in Cloud Environment. 136-141
Track 1: Trust Track 6
- Keju Meng, Fuyou Miao, Yue Yu, Changbin Lu:

A Universal Secret Sharing Scheme with General Access Structure Based on CRT. 142-148 - Gaosheng Liu, Xin Wang, Xiaohong Li, Jianye Hao, Zhiyong Feng:

ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning. 149-155 - Antonio Caliò, Andrea Tagarelli:

Trust-Based Dynamic Linear Threshold Models for Non-competitive and Competitive Influence Propagation. 156-162 - Syed Rizvi, Andrew Kurtz, Joseph R. Pfeffer III, Mohammad Rizvi:

Securing the Internet of Things (IoT): A Security Taxonomy for IoT. 163-168
Track 1: Trust Track 7
- Dapeng Qu, Dengyu Liang, Songlin Wu, Jie Li, Weihong Xuan, Xingwei Wang:

A Trust Energy-Efficient QoS Routing Scheme for Mobile Peer-to-Peer Networks. 169-176 - Tao Sun, Xin Guo, Ting Zhang:

Testing Sequence Generation Method Based on Unrelated Behaviors Serializing. 177-183 - Mark J. Carman, Mark Koerber

, Jiuyong Li
, Kim-Kwang Raymond Choo
, Helen Ashman
:
Manipulating Visibility of Political and Apolitical Threads on Reddit via Score Boosting. 184-190 - Ruidan Li, Errin W. Fulp:

Using Evolutionary Approaches to Manage Surveillance Cameras in Dynamic Environments. 191-196 - Jie Zhou, Min Tian:

An Elite Clone Parallel Genetic Algorithm for Trust Monitoring Assignment Problem in Adaptive Wireless Sensor Networks. 197-203 - Hamza Baqa, Nguyen Binh Truong, Noël Crespi, Gyu Myoung Lee, Franck Le Gall

:
Quality of Information as an indicator of Trust in the Internet of Things. 204-211
Track 2: Security Track 1
- Mehdi Yousefi, Nhamo Mtetwa, Yan Zhang, Huaglory Tianfield

:
A Reinforcement Learning Approach for Attack Graph Analysis. 212-217 - Wenli Shang, Junrong Cui, Chunhe Song, Jianming Zhao, Peng Zeng

:
Research on Industrial Control Anomaly Detection Based on FCM and SVM. 218-222 - Sha Ma:

Authorized Equality Test of Encrypted Data for Secure Cloud Databases. 223-230
Track 2: Security Track 2
- Weitao Xu

, Sanjay Jha
, Wen Hu
:
Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN. 231-236 - Jiewen Mao

, Weijun Deng, Fuke Shen:
DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple Traffic Features. 237-243 - Martin Schanzenbach

, Christian Banse
, Julian Schütte:
Practical Decentralized Attribute-Based Delegation Using Secure Name Systems. 244-251 - Lingtao Qi, Haiping Huang, Peng Wang, Ru Chuan Wang:

Abnormal Item Detection Based on Time Window Merging for Recommender Systems. 252-259
Track 2: Security Track 3
- Ekaterina Volodina, Adnan Aziz, Erwin P. Rathgeb, Tobias Hoßfeld

:
Application of Visual Analysis to Detect and Analyze Patterns in VoIP Attack Traffic. 260-268 - Qiang Li, Zhengwei Jiang, Zeming Yang, Baoxu Liu, Xin Wang, Yunan Zhang:

A Quality Evaluation Method of Cyber Threat Intelligence in User Perspective. 269-276 - Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo

:
Towards Better Ocular Recognition for Secure Real-World Applications. 277-282 - Pengfei Wang, Fengyu Wang, Fengbo Lin, Zhenzhong Cao:

Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis. 283-288
Track 2: Security Track 4
- Julian Schütte, Gerd Stefan Brost:

LUCON: Data Flow Control for Message-Based IoT Systems. 289-299 - Yiwen Gao

, Wei Cheng, Hailong Zhang, Yongbin Zhou:
Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages. 300-306 - Hui Xie, Kun Lv, Changzhen Hu:

An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis. 307-315 - Devu Manikantan Shila, Emeka Eyisi:

Adversarial Gait Detection on Mobile Devices Using Recurrent Neural Networks. 316-321
Track 2: Security Track 5
- Liting Yu, Dongrong Zhang, Liang Wu, Shuguo Xie, Donglin Su, Xiaoxiao Wang:

AES Design Improvements Towards Information Security Considering Scan Attack. 322-326 - Lal Hussain

, Wajid Aziz
, Sharjil Saeed, Saima Rathore, Muhammad Rafique
:
Automated Breast Cancer Detection Using Machine Learning Techniques by Extracting Different Feature Extracting Strategies. 327-331 - Zhenya Chen, Weifeng Liu, Ying Yang, Jizhi Wang, Meng Guo, Lijuan Chen, Guang Yang, Jie Zhou:

Electronic Evidence Service Research in Cloud Computing Environment. 332-338
Track 2: Security Track 6
- Shuang Wei, Shuaifu Dai, Xinfeng Wu, Xinhui Han:

STDC: A SDN-Oriented Two-Stage DDoS Detection and Defence System Based on Clustering. 339-347 - Yang Lu

, Richard O. Sinnott, Karin Verspoor
:
Semantic-Based Policy Composition for Privacy-Demanding Data Linkage. 348-359 - Jiarong Wang, Lijun Cai, Aimin Yu, Min Zhu, Dan Meng:

TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records. 360-371 - Shao-Chien Chen, Yi-Ruei Chen, Wen-Guey Tzeng:

Effective Botnet Detection Through Neural Networks on Convolutional Features. 372-378
Track 2: Security Track 7
- Talal Halabi

, Martine Bellaïche, Adel Abusitta:
Online Allocation of Cloud Resources Based on Security Satisfaction. 379-384 - Katarzyna Kapusta, Gérard Memmi:

Enhancing Data Protection in a Distributed Storage Environment Using Structure-Wise Fragmentation and Dispersal of Encrypted Data. 385-390 - Sumit Kumar Tetarave, Somanath Tripathy, Ezhil Kalaimannan, Caroline John:

eBot: Approach Towards Modeling an Advanced P2P Botnet. 391-396 - Huikang Cao, Ruixuan Li, Wenlong Tian, Zhiyong Xu, Weijun Xiao:

A Practical Accountability Scheme for Oblivious RAM in Cloud Storage. 397-402
Track 2: Security Track 8
- Nour El Madhoun

, Emmanuel Bertin, Guy Pujolle:
For Small Merchants: A Secure Smartphone-Based Architecture to Process and Accept NFC Payments. 403-411 - Noboru Kunihiro

, Wenjie Lu, Takashi Nishide, Jun Sakuma:
Outsourced Private Function Evaluation with Privacy Policy Enforcement. 412-423 - Fabrizio Biondi, Thomas Given-Wilson, Axel Legay:

Universal Optimality of Apollonian Cell Encoders. 424-435 - Firas Saidi, Zouheir Trabelsi, Henda Ben Ghézala

:
An Evidential Clustering Based Framework for Cyber Terrorist Cells Topology Identification. 436-443
Track 2: Security Track 9
- Nilesh Chakraborty, Shreya Singh, Samrat Mondal

:
On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness. 444-455 - Hatem Ismail, Stefanie Roos, Neeraj Suri

:
A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems. 456-464 - Filipe Apolinario

, Miguel L. Pardal
, Miguel Correia:
S-Audit: Efficient Data Integrity Verification for Cloud Storage. 465-474 - Zechun Cao

, Shou-Hsuan Stephen Huang
:
Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection. 475-480
Track 2: Security Track 10
- Iakovos Gurulian, Konstantinos Markantonakis

, Eibe Frank, Raja Naeem Akram
:
Good Vibrations: Artificial Ambience-Based Relay Attack Detection. 481-489 - Stephen C. Adams, Bryan T. Carter, Cody H. Fleming, Peter A. Beling:

Selecting System Specific Cybersecurity Attack Patterns Using Topic Modeling. 490-497 - William Ledbetter, William Bradley Glisson

, Todd McDonald, Todd R. Andel, George Grispos
, Kim-Kwang Raymond Choo
:
Digital Blues: An Investigation Into the Use of Bluetooth Protocols. 498-503 - Meera Sridhar, Abhinav Mohanty, Fadi Yilmaz

, Vasant Tendulkar, Kevin W. Hamlen:
Inscription: Thwarting ActionScript Web Attacks From Within. 504-515
Track 2: Security Track 11
- George W. Clark, Michael V. Doran, William Glisson

:
A Malicious Attack on the Machine Learning Policy of a Robotic System. 516-521 - Hidehito Gomi, Shuji Yamaguchi, Kota Tsubouchi

, Naomi Sasaya:
Continuous Authentication System Using Online Activities. 522-532 - Mehdi Nobakht

, Yulei Sui
, Aruna Seneviratne, Wen Hu
:
Permission Analysis of Health and Fitness Apps in IoT Programming Frameworks. 533-538 - Taku Noguchi

, Mayuko Hayakawa:
Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks. 539-544
Track 2: Security Track 12
- Tong Liu, Gang Shi, Liwei Chen, Fei Zhang, Yaxuan Yang, Jihu Zhang:

TMDFI: Tagged Memory Assisted for Fine-Grained Data-Flow Integrity Towards Embedded Systems Against Software Exploitation. 545-550 - A. S. M. Kayes

, J. Wenny Rahayu, Tharam S. Dillon, Elizabeth Chang
:
Accessing Data from Multiple Sources Through Context-Aware Access Control. 551-559 - Chunhua Li, Weirui Xie, Ke Zhou:

Efficient Binary-Encoding Access Control Policy Combination for Large-Scale Collaborative Scenarios. 560-566 - Luis Sacramento, Iberia Medeiros

, Joao Bota, Miguel Correia:
FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data Using Network Flows. 567-572
Track 2: Security Track 13
- Hooman Alavizadeh

, Julian Jang-Jaccard
, Dong Seong Kim
:
Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing. 573-578 - Dilli Prasad Sharma

, Dong Seong Kim
, Seunghyun Yoon
, Hyuk Lim, Jin-Hee Cho, Terrence J. Moore
:
FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. 579-587 - Simon Yusuf Enoch

, Jin B. Hong
, Dong Seong Kim
:
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models. 588-595 - Andrea Saracino

, Francesco Restuccia, Fabio Martinelli:
Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots. 596-607
Track 2: Security Track 14
- Youcef Imine

, Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Ahmed Lounis
:
MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture. 608-613 - Zechao Liu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Ruoqing Zhang, Yulin Wu:

A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage. 614-623 - Judong Bao, Yongqiang He, Weiping Wen:

DroidPro: An AOTC-Based Bytecode-Hiding Scheme for Packing the Android Applications. 624-632 - Rocio Lopez Perez, Florian Adamsky, Ridha Soua, Thomas Engel:

Machine Learning for Reliable Network Attack Detection in SCADA Systems. 633-638
Track 2: Security Track 15
- Jeffery Garae, Ryan K. L. Ko

, Mark D. Apperley:
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach. 639-650 - Eric Klieme, Christian Tietz, Christoph Meinel:

Beware of SMOMBIES: Verification of Users Based on Activities While Walking. 651-660 - Samir G. Sayed, Mohmed Shawkey:

Data Mining Based Strategy for Detecting Malicious PDF Files. 661-667 - Glaidson Menegazzo Verzeletti, Emerson Ribeiro de Mello, Michelle Silva Wangham

:
A National Mobile Identity Management Strategy for Electronic Government Services. 668-673
Track 2: Security Track 16
- Nisha Malik, Priyadarsi Nanda, Arushi Arora, Xiangjian He

, Deepak Puthal:
Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks. 674-679 - Xiehua Li, Jie Jiang, Yichen Chen:

Fully Decentralized Authentication and Revocation Scheme in Data Sharing Systems. 680-686 - Menghao Zhang

, Jun Bi, Jiasong Bai, Guanyu Li:
FloodShield: Securing the SDN Infrastructure Against Denial-of-Service Attacks. 687-698 - Wei Zhang, Dongdai Lin, Hailong Zhang, Xiaojun Zhou, Yiwen Gao

:
A Lightweight FourQ Primitive on ARM Cortex-M0. 699-704
Track 2: Security Track 17
- Danjun Liu, Jingyuan Wang, Zelin Rong, Xianya Mi, Fangyu Gai, Yong Tang, Baosheng Wang:

Pangr: A Behavior-Based Automatic Vulnerability Detection and Exploitation Framework. 705-712 - Xiang Liu

, Jie Huang, Guowen Zong:
Public Auditing for Network Coding Based Secure Cloud Storage. 713-720 - Syed Rizvi, Joseph Gualdoni, Abdul Razaque

:
Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol. 721-726 - Qiwen Wang, Jianguo Jiang, Zhixin Shi, Wen Wang, Bin Lv, Biao Qi, Qilei Yin:

A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios. 727-736
Track 2: Security Track 18
- Guolin Tan, Peng Zhang, Qingyun Liu, Xinran Liu, Chunge Zhu, Fenghu Dou:

Adaptive Malicious URL Detection: Learning in the Presence of Concept Drifts. 737-743 - Liya Su, Yepeng Yao, Ning Li, Junrong Liu, Zhigang Lu, Baoxu Liu:

Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection. 744-753 - Biao Qi, Jianguo Jiang, Zhixin Shi, Rui Mao, Qiwen Wang:

BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection. 754-762 - Guang Yang, Lijun Cai, Aimin Yu, Dan Meng:

A General and Expandable Insider Threat Detection System Using Baseline Anomaly Detection and Scenario-Driven Alarm Filters. 763-773
Track 2: Security Track 19
- Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura

:
Provably Secure Password Reset Protocol: Model, Definition, and Construction. 774-782 - Xiang Tian, Yujia Zhu, Zhao Li, Chao Zheng, Yong Sun, Qingyun Liu:

VegaStar: An Illegal Domain Detection System on Large-Scale Video Traffic. 783-789 - Rudrapatna K. Shyamasundar, N. V. Narendra Kumar, Abhijit Taware, Parjanya Vyas:

An Experimental Flow Secure File System. 790-799 - Danjun Liu, Yao Li, Yong Tang, Baosheng Wang, Wei Xie:

VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS. 800-807
Track 2: Security Track 20
- Anshul Arora, Sateesh Kumar Peddoju:

NTPDroid: A Hybrid Android Malware Detector Using Network Traffic and System Permissions. 808-813 - Mohannad Mostafa, Tanushree Banerjee, M. Anwar Hasan:

Energy Exhaustion Attack on Barrett's Reduction. 814-818 - Trusit Shah, Subbarayan Venkatesan:

Authentication of IoT Device and IoT Server Using Secure Vaults. 819-824 - Errin W. Fulp, H. Donald Gage:

Using Feature Selection to Identify Chains of Insecure Software Configuration Parameters. 825-830 - Nouha Oualha

:
Reinforcing IoT-Enforced Security Policies. 831-836
Track 2: Security Track 21
- Ruichun Gu, Xiaolong Zhang, Yu Lei, Junxing Zhang:

Enhancing Security and Scalability in Software Defined LTE Core Networks. 837-842 - Jagannadh Vempati, Ram Dantu, Mark A. Thompson:

Uninterrupted Video Surveillance in the Face of an Attack. 843-848 - Wuxu Peng, Linda Huang, Julia Jia, Emma Ingram:

Enhancing the Naive Bayes Spam Filter Through Intelligent Text Modification Detection. 849-854 - Junjie Hou, Yongxin Zhu, Linghe Kong

, Zhe Wang, Sen Du, Shijin Song, Tian Huang
:
A Case Study of Accelerating Apache Spark with FPGA. 855-860 - Hongbo Chen, Hongjun Dai, Meikang Qiu:

A Multiple Layer Sercurity Architecture for Internet of Things into MVC Design. 861-866
Track 2: Security Track 22
- Kinza Sarwar, Sira Yongchareon, Jian Yu

:
Lightweight ECC with Fragile Zero-Watermarking for Internet of Things Security. 867-872 - Kevin Atighehchi, Morgan Barbier

:
Signature Renewal for Low Entropy Data. 873-884
Track 2: Security Track 23
- Manmeet Singh Gill, Dale Lindskog, Pavol Zavarsky:

Profiling Network Traffic Behavior for the Purpose of Anomaly-Based Intrusion Detection. 885-890 - Bernd Troegeler, Paul A. Watters

:
Steganographic Transports: A Vector for Hidden Secret Internets? 891-896 - Xin Tang, Linna Zhou, Yongfeng Huang

, Chin-Chen Chang:
Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption. 897-904 - Gökhan Kul

, Shambhu J. Upadhyaya, Varun Chandola:
Detecting Data Leakage from Databases on Android Apps with Concept Drift. 905-913
Track 3: Privacy Track 1
- Wanli Xue, Yiran Shen, Chengwen Luo, Wen Hu

, Aruna Seneviratne:
Acies: A Privacy-Preserving System for Edge-Based Classification. 914-919 - Shuo Wang, Richard O. Sinnott, Surya Nepal

:
PAIRS: Privacy-Aware Identification and Recommendation of Spatio-Friends. 920-931 - Boyang Wang, Xinxin Fan:

Lightweight Verification for Searchable Encryption. 932-937 - Peter Aaby

, Juanjo Mata De Acuna, Richard Macfarlane, William J. Buchanan
:
Privacy Parameter Variation Using RAPPOR on a Malware Dataset. 938-945
Track 3: Privacy Track 2
- Martin Schanzenbach

, Georg Bramm
, Julian Schütte:
reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption. 946-957 - Ximeng Liu, Kim-Kwang Raymond Choo

, Robert H. Deng
, Yang Yang, Yinghui Zhang:
PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains. 958-963 - Vaibhav Kulkarni, Arielle Moro, Bertil Chapuis, Benoît Garbinato:

Capstone: Mobility Modeling on Smartphones to Achieve Privacy by Design. 964-971 - Shuo Wang, Richard O. Sinnott, Surya Nepal:

P-GENT: Privacy-Preserving Geocoding of Non-Geotagged Tweets. 972-983
Track 3: Privacy Track 3
- Yuxiang Ma, Yulei Wu, Jingguo Ge, Jun Li:

A Flow-Level Architecture for Balancing Accountability and Privacy. 984-989 - Meng Liu

, Priyadarsi Nanda, Xuyun Zhang
, Chi Yang, Shui Yu
, Jianxin Li
:
Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem. 990-995 - Clemens Zeidler, Muhammad Rizwan Asghar:

AuthStore: Password-Based Authentication and Encrypted Data Storage in Untrusted Environments. 996-1001 - Rocco Salvia, Pietro Ferrara

, Fausto Spoto
, Agostino Cortesi
:
SDLI: Static Detection of Leaks Across Intents. 1002-1007
Track 3: Privacy Track 4
- Zijun Yu, Chun Shan, Limin Mao, Changzhen Hu, Wenjie Xiong:

Software System Representation Methods Based on Algebraic Component. 1008-1013 - Wei Zhang, Dongdai Lin, Hailong Zhang, Xiaojun Zhou, Yiwen Gao

, Cong Chen:
A Lightweight Multi-precision Squaring on Embedded Processors for ECC. 1014-1019
Track 3: Privacy Track 5
- Yun Feng, Baoxu Liu, Xiang Cui, Chaoge Liu, Xuebin Kang, Junwei Su:

A Systematic Method on PDF Privacy Leakage Issues. 1020-1029 - Yi Qin, Chuan Yue:

Website Fingerprinting by Power Estimation Based Side-Channel Attacks on Android 7. 1030-1039 - Felix Beierle:

Do You Like What I Like? Similarity Estimation in Proximity-Based Mobile Social Networks. 1040-1047 - Fadi Mohsen, Hamed Abdelhaq

, Halil Bisgin, Andrew Jolly, Michael Szczepanski:
Countering Intrusiveness Using New Security-Centric Ranking Algorithm Built on Top of Elasticsearch. 1048-1057
Track 3: Privacy Track 6
- Oksana Kulyk, Peter Mayer

, Melanie Volkamer, Oliver Kafer:
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface. 1058-1063 - Haibat Khan

, Benjamin Dowling
, Keith M. Martin:
Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks. 1064-1069 - Yang Wang, Stephen C. Adams, Peter A. Beling, Steven Greenspan, Sridhar Rajagopalan, Maria C. Velez-Rojas, Serge Mankovski, Steven M. Boker, Donald E. Brown:

Privacy Preserving Distributed Deep Learning and Its Application in Credit Card Fraud Detection. 1070-1078 - Yang Lu

, Richard O. Sinnott, Karin Verspoor
, Udaya Parampalli:
Privacy-Preserving Access Control in Electronic Health Record Linkage. 1079-1090
Track 3: Privacy Track 7
- Muhammad Arif, Guojun Wang, Tao Peng:

Track me if you can? Query Based Dual Location Privacy in VANETs for V2V and V2I. 1091-1096 - Runhua Xu, Balaji Palanisamy, James Joshi:

QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for Edge Computing. 1097-1106 - Zheng He, Shiran Pan, Dongdai Lin:

PMDA: Privacy-Preserving Multi-functional Data Aggregation Without TTP in Smart Grid. 1107-1114 - Zheng Wang

:
Understanding the Performance and Challenges of DNS Query Name Minimization. 1115-1120
Track 3: Privacy Track 8
- Fuwen Liu, Jin Peng, Min Zuo:

Toward a Secure Access to 5G Network. 1121-1128 - Chunkai Zhang, Ao Yin, Yulin Wu, Yingyang Chen, Xuan Wang:

Fast Time Series Discords Detection with Privacy Preserving. 1129-1139 - Toru Nakanishi, Takeshi Kanatani:

An Efficient Blacklistable Anonymous Credential System with Reputation Using Pairing-Based Accumulator. 1140-1148 - Keke Gai

, Yulu Wu, Liehuang Zhu, Meikang Qiu:
Privacy-Preserving Data Synchronization Using Tensor-Based Fully Homomorphic Encryption. 1149-1156
Track 3: Privacy Track 9
- Thomas Lenz, Vesna Krnjic:

Towards Domain-Specific and Privacy-Preserving Qualified eID in a User-Centric Identity Model. 1157-1163 - Bin Li, Yijie Wang:

RZKPB: A Privacy-Preserving Blockchain-Based Fair Transaction Method for Sharing Economy. 1164-1169 - Jinpei Yan, Yong Qi, Qifan Rao, Saiyu Qi:

Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones. 1170-1179 - Zhenyu Chen

, Yanyan Fu, Min Zhang, Zhenfeng Zhang, Hao Li:
A Flexible Mix-Zone Selection Scheme Towards Trajectory Privacy Protection. 1180-1186 - Wesam Fadheel, Raed M. Salih, Leszek Lilien

:
PHeDHA: Protecting Healthcare Data in Health Information Exchanges with Active Data Bundles. 1187-1195
Track 4: Forensics and Analytics Track 1
- Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:

Monero Ring Attack: Recreating Zero Mixin Transaction Effect. 1196-1201 - Manoranjan Mohanty, Ming Zhang, Muhammad Rizwan Asghar

, Giovanni Russello:
PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution. 1202-1207 - Wenjuan Li

, Weizhi Meng
, Yu Wang, Lam For Kwok
, Rongxing Lu:
Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks. 1208-1213 - Tilo Fischer:

Testing Cryptographically Secure Pseudo Random Number Generators with Artificial Neural Networks. 1214-1223
Track 4: Forensics and Analytics Track 2
- Xulyu Zhu, Zheng Yan

, Jianfei Ruan, Qinghua Zheng, Bo Dong:
IRTED-TL: An Inter-Region Tax Evasion Detection Method Based on Transfer Learning. 1224-1235 - Liangfu Lu, Xinhe Zhu, Xuyun Zhang

, Junhan Liu, Md. Zakirul Alam Bhuiyan, Guangtai Cui:
One Intrusion Detection Method Based On Uniformed Conditional Dynamic Mutual Information. 1236-1241 - Mary C. Michel, Marco Carvalho, Heather Crawford, Albert C. Esterline:

Cyber Identity: Salient Trait Ontology and Computational Framework to Aid in Solving Cybercrime. 1242-1249
Track 4: Forensics and Analytics Track 3
- K. Aditya, Slawomir Grzonkowski, Nhien An LeKhac

:
Enabling Trust in Deep Learning Models: A Digital Forensics Case Study. 1250-1255 - Tina Wu, Andrew Martin:

Bluetooth Low Energy Used for Memory Acquisition from Smart Health Care Devices. 1256-1261
Track 4: Forensics and Analytics Track 4
- Hongbin Liu, Ming Xu, Yiming Wu, Ning Zheng, Yuangfang Chen, Md. Zakirul Alam Bhuiyan:

Resilient Bipartite Consensus for Multi-agent Networks with Antagonistic Interactions. 1262-1269 - Cheng Guo, Xinyu Tang, Yuanfang Chen, Pengxu Tian, Md. Zakirul Alam Bhuiyan:

An Efficient Distributed Approach on High Dimensional Data Similarity Searchable Encryption. 1270-1275 - Aaron Koehl:

Autoblog Forensics and Attribution. 1276-1286
Track 5: Emerging Tech Track 1
- Peter Mell:

Managed Blockchain Based Cryptocurrencies with Consensus Enforced Rules and Transparency. 1287-1296 - Yuyin Qian, Peng Zeng, Zuming Shen, Kim-Kwang Raymond Choo

:
A Lightweight Path Authentication Protocol for RFID-Based Supply Chains. 1297-1302 - Saqib Ali

, Guojun Wang, Bebo White, Roger Leslie Cottrell:
A Blockchain-Based Decentralized Data Storage and Access Framework for PingER. 1303-1308 - Huangjie Zheng, Yuchen Wang, Chen Han, Fangjie Le, Ruan He, Jialiang Lu:

Learning and Applying Ontology for Machine Learning in Cyber Attack Detection. 1309-1315
Track 5: Emerging Tech Track 2
- Changli Zhou, Tian Wang, Wenxian Jiang, Hui Tian

:
Practical K Nearest Neighbor Query Scheme with Two-Party Guarantees in Road Networks. 1316-1321 - Marcos Antonio Simplicio Junior, Eduardo Lopes Cominetti, Harsh Kupwade Patil

, Jefferson E. Ricardini
, Leonardo T. D. Ferraz, Marcos Vinicius Maciel da Silva
:
Privacy-Preserving Method for Temporarily Linking/Revoking Pseudonym Certificates in VANETs. 1322-1329 - Mohammad Jabed Morshed Chowdhury

, Alan Colman
, Muhammad Ashad Kabir
, Jun Han, Paul Sarda:
Blockchain as a Notarization Service for Data Sharing with Personal Data Store. 1330-1335 - Peter T. Breuer

, Jonathan P. Bowen
, Esther Palomar
, Zhiming Liu:
Superscalar Encrypted RISC: The Measure of a Secret Computer. 1336-1341
Track 5: Emerging Tech Track 3
- Freya Sheer Hardwick, Raja Naeem Akram

, Konstantinos Markantonakis
:
Fair and Transparent Blockchain Based Tendering Framework - A Step Towards Open Governance. 1342-1347 - Mohammad Jabed Morshed Chowdhury

, Alan Colman
, Muhammad Ashad Kabir
, Jun Han, Paul Sarda:
Blockchain Versus Database: A Critical Analysis. 1348-1353 - Xinbo Liu, Yaping Lin, Qin Liu, Xin Yao:

A Privacy-Preserving Principal Component Analysis Outsourcing Framework. 1354-1359 - Ji Huang, Pei Wang, Tianning Zang, Qian Qiang, Yipeng Wang, Miao Yu:

Detecting Domain Generation Algorithms with Convolutional Neural Language Models. 1360-1367
Track 5: Emerging Tech Track 4
- Bin Li, Yijie Wang, Peichang Shi, Huan Chen, Li Cheng:

FPPB: A Fast and Privacy-Preserving Method Based on the Permissioned Blockchain for Fair Transactions in Sharing Economy. 1368-1373 - Anastasia Theodouli, Stelios Arakliotis, Konstantinos Moschou, Konstantinos Votis, Dimitrios Tzovaras:

On the Design of a Blockchain-Based System to Facilitate Healthcare Data Sharing. 1374-1379 - James Tapsell, Raja Naeem Akram

, Konstantinos Markantonakis
:
Consumer Centric Data Control, Tracking and Transparency - A Position Paper. 1380-1385 - Qin Liu, Shuyu Pei, Kang Xie, Jie Wu, Tao Peng, Guojun Wang:

Achieving Secure and Effective Search Services in Cloud Computing. 1386-1391
Track 5: Emerging Tech Track 5
- Yizhi Ren, Mengjin Jiang, Ye Yao, Ting Wu, Zhen Wang, Mengkun Li

, Kim-Kwang Raymond Choo
:
Node Immunization in Networks with Uncertainty. 1392-1397 - Zhiju Yang, Rui Zhao, Chuan Yue:

Effective Mobile Web User Fingerprinting via Motion Sensors. 1398-1405 - Andreas Abraham, Kevin Theuermann, Emanuel Kirchengast:

Qualified eID Derivation Into a Distributed Ledger Based IdM System. 1406-1412 - Chao Yang, Xinghe Chen, Tingting Song, Bin Jiang, Qin Liu:

A Hybrid Recommendation Algorithm Based on Heuristic Similarity and Trust Measure. 1413-1418 - Jiaqi Chen, Fan Zhang, Lei Zou:

SPARQL Multi-Query Optimization. 1419-1425
Track 5: Emerging Tech Track 6
- Feipeng Yan, Ming Xu, Tong Qiao, Ting Wu, Xue Yang, Ning Zheng, Kim-Kwang Raymond Choo

:
Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic. 1426-1432 - Nicholas Mata, Nicole Beebe, Kim-Kwang Raymond Choo

:
Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis. 1433-1439 - Taylor Cloyd, Trey Osborn, Brian Ellingboe, William Bradley Glisson

, Kim-Kwang Raymond Choo
:
Browser Analysis of Residual Facebook Data. 1440-1445 - Arnoud Goudbeek, Kim-Kwang Raymond Choo

, Nhien-An Le-Khac
:
A Forensic Investigation Framework for Smart Home Environment. 1446-1451
Track 6: Hardware Security Track 1
- Mingfu Xue, Rongzhen Bian, Jian Wang, Weiqiang Liu:

A Co-training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models. 1452-1457 - Rongzhen Bian, Mingfu Xue, Jian Wang:

Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique. 1458-1463 - Minyi Lu, Ao Fan, Jiaming Xu, Weiwei Shan:

A Compact, Lightweight and Low-Cost 8-Bit Datapath AES Circuit for IoT Applications in 28nm CMOS. 1464-1469 - Jiaming Xu, Ao Fan, Minyi Lu, Weiwei Shan:

Differential Power Analysis of 8-Bit Datapath AES for IoT Applications. 1470-1473
Track 6: Hardware Security Track 2
- Shenghua Chen, Wei Ge, Jinjiang Yang, Bo Liu, Jun Yang:

A Power Analysis Attack Countermeasure Based on Random Execution. 1474-1479 - Yi Yao, Jun Zhou, Bo Yan, Yuqian Li:

RNS-Based Embedding Scheme for Data Hiding in Digital Images. 1480-1483 - Xi Chen, Zhaojun Lu, Gang Qu, Aijiao Cui:

Partial Scan Design Against Scan-Based Side Channel Attacks. 1484-1489
IEEE TrustCom Short Papers
- James Obert, Adrian R. Chavez, Jay Johnson

:
Behavioral Based Trust Metrics and the Smart Grid. 1490-1493 - Guoqiang Bai, Hailiang Fu, Wei Li, Xingjun Wu:

Differential Power Attack on SM4 Block Cipher. 1494-1497 - Salih Ergun

:
Cryptanalysis of a Chaotic Ring Oscillator Based Random Number Generator. 1498-1501 - Markus Jäger

, Stefan Nadschläger, Josef Küng:
Concepts for Trust Propagation in Knowledge Processing Systems - A Brief Introduction and Overview. 1502-1505 - Ameneh Deljoo, Tom M. van Engers, Ralph Koning, Leon Gommans, Cees de Laat:

Towards Trustworthy Information Sharing by Creating Cyber Security Alliances. 1506-1510
Track 2: Security Track 1
- Zhijun Wu, Qingbo Pan, Meng Yue, Shaopu Ma:

An Approach of Security Protection for VSAT Network. 1511-1516 - Amira Zrelli

, Tahar Ezzedine:
Monitoring of Temperature and Pressure Through Brillouin Optical Sensors for Disasters Systems. 1517-1520 - Sarvjot kaur Kang, Dale Lindskog, Hamman Samuel:

An Implementation of Hierarchical Intrusion Detection Systems Using Snort and Federated Databases. 1521-1525 - Chaoqun Yang, Xiangyu Li, Shujuan Yin:

Low-Cost Energy-Efficient Side-Channel Attacks Resistant AES S-Box with Power-Aware Hiding Inverter in GF(2^4). 1526-1530 - Yin Huang, Wei Liang

, Jing Long, Jianbo Xu, Kuan-Ching Li
:
A Novel Identity Authentication for FPGA Based IP Designs. 1531-1536
Track 2: Security Track 2
- Sarika Choudhary, Nishtha Kesswani:

Detection and Prevention of Routing Attacks in Internet of Things. 1537-1540 - Rongxuan Ma, Wei Hu, Yonghao Wang

:
Low Delay and Low Cost Audio Surveillance System via a New Optimum FIR Digtal Filter. 1541-1546 - Syed Muhammad Sajjad

, Muhammad Yousaf
:
UCAM: Usage, Communication and Access Monitoring Based Detection System for IoT Botnets. 1547-1550 - KiHwan Kim

, HoonJae Lee:
Proposal of Multi-channel Operation Technique Using PingPong256. 1551-1554 - Gyan Singh Yadav, Aparajita Ojha:

A Reversible Data Hiding Scheme with High Security and Improved Embedding Capacity. 1555-1559
Track 2: Security Track 3
- Hajredin Daku, Pavol Zavarsky, Yasir Malik:

Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning. 1560-1564 - Jianguo Jiang, Qian Yu, Min Yu, Gang Li

, Jiuming Chen, Kunying Liu, Chao Liu, Weiqing Huang:
ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS. 1565-1569 - Mimouna Alkhonaini, Hoda El-Sayed:

Migrating Data Between Physical Server and Cloud: Improving Accuracy and Data Integrity. 1570-1574 - Md. Nazmul Hossain, Md. Alam Hossain, Md. Zobayer Hossain

, Md. Hasan Imam Sohag, Shawon S. M. Rahman
:
OAuth-SSO: A Framework to Secure the OAuth-Based SSO Service for Packaged Web Applications. 1575-1578 - Tanushree Banerjee, M. Anwar Hasan:

Energy Efficiency Analysis of Elliptic Curve Based Cryptosystems. 1579-1583
Track 2: Security Track 4
- Daniel Tse, Xuan Weng, Xin Wan, Lan Yao, Wensong Zhang:

Research on Information Security Perception of Sina Weibo Users Based on KISCAP Model. 1584-1588 - Henry Okonofua, Shawon Rahman

:
Evaluating the Risk Management Plan and Addressing Factors for Successes in Government Agencies. 1589-1592 - Ashwag Albakri

, Mahesh Maddumala
, Lein Harn:
Hierarchical Polynomial-Based Key Management Scheme in Fog Computing. 1593-1597 - Nestori Syynimaa:

Who Would you Like to be Today?: Impersonation by Fake Azure Active Directory Identity Federation. 1598-1604 - Kevin Atighehchi:

On the Incremental Digital Signatures. 1605-1609
Track 3: Privacy Track
- Kai-Cheng Liu, Chuan-Wei Kuo, Wen-Chiuan Liao, Pang-Chieh Wang:

Optimized Data de-Identification Using Multidimensional k-Anonymity. 1610-1614 - Erica Shuford, Tara Kavanaugh, Brian Ralph, Ebrima N. Ceesay, Paul A. Watters

:
Measuring Personal Privacy Breaches Using Third-Party Trackers. 1615-1618 - Peter Mell, Assane Gueye, Christopher Schanzle:

Quantifying Information Exposure in Internet Routing. 1619-1623 - Shujie Cui, Sana Belguith

, Pramodya De Alwis, Muhammad Rizwan Asghar, Giovanni Russello:
Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe Systems. 1624-1627 - Haotian Zhou, Xiao-Yang Liu, Cai Fu, Chen Shang, Xinyi Chang:

Differentially Private Matrix Completion via Distributed Matrix Factorization. 1628-1631
Track 1&3: Trust & Privacy Track
- Daniel Tse, Chung-kin Chow, Ting-pong Ly, Chung-yan Tong, Kwok-wah Tam:

The Challenges of Big Data Governance in Healthcare. 1632-1636 - Jerzy Konorski

:
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions. 1637-1641 - Soham Kelkar, Timothy Kraus, Daria Morgan, Junjie Zhang, Rui Dai:

Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications. 1642-1645 - Cai Chen

, Manyuan Zhang, Huanzhi Zhang, Zhenyun Huang, Yong Li:
Privacy-Preserving Sensory Data Recovery. 1646-1650 - Sebastian Burkhart

, Andreas Unterweger, Günther Eibl
, Dominik Engel:
Detecting Swimming Pools in 15-Minute Load Data. 1651-1655
Track 4: Forensics and Analytics Track
- Yang Wei

, Xiu-Li Bi, Bin Xiao:
C2R Net: The Coarse to Refined Network for Image Forgery Detection. 1656-1659 - Anping Xiong, Yi Huang, Yunsong Wu, Jun Zhang, Linbo Long:

An Adaptive Sliding Window Algorithm for Mining Frequent Itemsets in Computer Forensics. 1660-1663 - Xiaoning Liu

, Xingliang Yuan
, Joseph K. Liu:
Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data. 1664-1668 - Yazeed Albabtain, Baijian Yang

:
The Process of Reverse Engineering GPU Malware and Provide Protection to GPUS. 1669-1673 - Xiaoyu Du, Paul Ledwith, Mark Scanlon

:
Deduplicated Disk Image Evidence Acquisition and Forensically-Sound Reconstruction. 1674-1679
Track 5: Emerging Tech Track
- Robert A. Bridges, Jarilyn Hernández Jiménez, Jeffrey Nichols, Katerina Goseva-Popstojanova

, Stacy J. Prowell
:
Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics. 1680-1684 - Hossein Sayadi, Hosein Mohammadi Makrani, Onkar Randive, Sai Manoj Pudukotai Dinakarrao

, Setareh Rafatirad, Houman Homayoun:
Customized Machine Learning-Based Hardware-Assisted Malware Detection in Embedded Devices. 1685-1688 - HyunKyung Yoo, Jongchoul Yim, Sunme Kim:

The Blockchain for Domain Based Static Sharding. 1689-1692 - Hongyang Yang, Xiao-Yang Liu, Qingwei Wu:

A Practical Machine Learning Approach for Dynamic Stock Recommendation. 1693-1697 - Yangxin Wu, Peijia Zheng, Jianting Guo, Wei Zhang, Jiwu Huang:

A Controllable Efficient Content Distribution Framework Based on Blockchain and ISODATA. 1698-1701
Track 4 & 5: Forensics and Analytics & Emerging Tech Track
- Na Huang, Jingsha He, Nafei Zhu:

A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network. 1702-1705 - Ashar Neyaz, Narasimha K. Shashidhar, Umit Karabiyik:

Forensic Analysis of Wear Leveling on Solid-State Media. 1706-1710 - Everton de Matos

, Ramão Tiago Tiburski, Leonardo Albernaz Amaral, Fabiano Hessel:
Providing Context-Aware Security for IoT Environments Through Context Sharing Feature. 1711-1715 - Usman Ahmad, Hong Song, Awais Bilal, Shahzad Saleem

, Asad Ullah:
Securing Insulin Pump System Using Deep Learning and Gesture Recognition. 1716-1719
IEEE TrustCom Poster Papers
- Jitto Joseph, Ron Ruhl, Hamman Samuel:

Reducing Traffic Congestion for Machine to Machine Type Communication Over 4G-LTE Network by Decreasing Total Bytes Transmitted. 1720-1721 - Lanlan Pan

, Xuebiao Yuchi, Jian Wang, Anlei Hu:
A Public Key Based EDNS Privacy Tunnel for DNS. 1722-1724 - Behrooz Sezari, Dietmar P. F. Möller, Andreas Deutschmann:

Anomaly-Based Network Intrusion Detection Model Using Deep Learning in Airports. 1725-1729
IEEE BigDataSE 2018
IEEE BigDataSE 1
- Kyriakos Kritikos

:
Towards Dynamic and Optimal Big Data Placement. 1730-1737 - Saptashwa Mitra, Yu Qiu, Haley Moss, Kaigang Li, Sangmi Lee Pallickara:

Effective Integration of Geotagged, Ancilliary Longitudinal Survey Datasets to Improve Adulthood Obesity Predictive Models. 1738-1746 - Meng Wang, Chase Q. Wu, Huiyan Cao, Yang Liu, Yongqiang Wang, Aiqin Hou:

On MapReduce Scheduling in Hadoop Yarn on Heterogeneous Clusters. 1747-1754 - Mohamed Adel Serhani, Hadeel T. El Kassabi, Nabeel A. Y. Al-Qirim, Alramzana Nujum Navaz

:
Towards a Multi-model Cloud Workflow Resource Monitoring, Adaptation, and Prediction. 1755-1762
IEEE BigDataSE 2
- Anasse Bari, Goktug Saatcioglu:

Emotion Artificial Intelligence Derived from Ensemble Learning. 1763-1770 - Rashid Mohammad:

AMI Smart Meter Big Data Analytics for Time Series of Electricity Consumption. 1771-1776 - Huihui Xie, Kun Lv, Changzhen Hu:

An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets. 1777-1784 - Hengyi Ren

, Jian Guo, Lijuan Sun, Chong Han:
Prediction Algorithm Based on Weather Forecast for Energy-Harvesting Wireless Sensor Networks. 1785-1790 - Yibing Yang, M. Omair Shafiq:

Large Scale and Parallel Sentiment Analysis Based on Label Propagation in Twitter Data. 1791-1798
IEEE BigDataSE Short Papers
- Yu Zheng, Yongxin Zhu, Shijin Song, Peng Xiong, Zihao Cao, Junjie Hou:

Improved Weighted Label Propagation Algorithm in Social Network Computing. 1799-1803 - Jinfeng Yang, David J. Lilja:

Reducing Relational Database Performance Bottlenecks Using 3D XPoint Storage Technology. 1804-1808 - Alaa Alsaig, Vangular Alagar, Olga Ormandjieva:

A Critical Analysis of the V-Model of Big Data. 1809-1813
IEEE SPTIoT 2018
IEEE SPTIoT 1
- Shahrooz Pouryousef, Mariam Rezaiee, Ata Chizari

:
Let me Join Two Worlds! Analyzing the Integration of Web and Native Technologies in Hybrid Mobile Apps. 1814-1819 - Jakub Klemsa, Lukas Kencl

, Tomas Vanek:
VeraGreg: A Framework for Verifiable Privacy-Preserving Data Aggregation. 1820-1825 - William W. Lidster, Shawon S. M. Rahman

:
Obstacles to Implementation of Information Security Governance. 1826-1831
IEEE SPTIoT 2
- Qingqing Tan, Chong Han, Lijuan Sun, Jian Guo, Hai Zhu:

A CSI Frequency Domain Fingerprint-Based Method for Passive Indoor Human Detection. 1832-1837 - Stephen C. Adams, Peter A. Beling, Steven Greenspan, Maria C. Velez-Rojas, Serge Mankovski:

Model-Based Trust Assessment for Internet of Things Networks. 1838-1843
IEEE SPTIoT 3
- Gianpiero Costantino, Antonio La Marra, Fabio Martinelli, Paolo Mori

, Andrea Saracino
:
Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things. 1844-1851 - Abdur Rahman Bin Shahid, Niki Pissinou, S. S. Iyengar

, Kia Makki:
Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks. 1852-1857
IEEE PSTCI 2018
IEEE PSTCI 1
- Paul Sarda, Mohammad Jabed Morshed Chowdhury

, Alan Colman
, Muhammad Ashad Kabir
, Jun Han:
Blockchain for Fraud Prevention: A Work-History Fraud Prevention System. 1858-1863
IEEE PSTCI 2
- Sudarshan S. Chawathe:

Improving Email Security with Fuzzy Rules. 1864-1869 - Sudarshan S. Chawathe:

Monitoring Blockchains with Self-Organizing Maps. 1870-1875 - Doyeon Kim, Dongil Shin, Dongkyoo Shin:

Unauthorized Access Point Detection Using Machine Learning Algorithms for Information Protection. 1876-1878 - Çiçek Güven, Mike Holenderski, Tanir Özçelebi, Johan Lukkien:

Using Artificial Neurons in Evidence Based Trust Computation. 1879-1884
IEEE PSTCI 3
- Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan, Kurt Rohloff

, Yuriy Polyakov
:
Intrusion-Resilient Classifier Approximation: From Wildcard Matching to Range Membership. 1885-1890
IEEE HSAT 2018
IEEE HSAT 1
- Kento Hasegawa, Youhua Shi

, Nozomu Togawa
:
Hardware Trojan Detection Utilizing Machine Learning Approaches. 1891-1896 - Aiguo Bu, Wentao Dai, Minyi Lu, Hao Cai, Weiwei Shan:

Correlation-Based Electromagnetic Analysis Attack Using Haar Wavelet Reconstruction with Low-Pass Filtering on an FPGA Implementaion of AES. 1897-1900
IEEE HSAT 2
- Jun Shi, Bo Lv, Yangyang Li, Yue Jia, Rui Wang, Yong Liao:

A New Wavelet Thresholding Method Based on Cyclostationarity for Enhancing the Interception of Computer Video Leakage Signals. 1901-1906
IWCPSA18
- Casimer M. DeCusatis, Kulvinder Lotay:

Secure, Decentralized Energy Resource Management Using the Ethereum Blockchain. 1907-1913 - Xiaolin Zhao, Yiman Zhang, Xuhui Li, Quanbao Chen:

Research on Malicious Code Homology Analysis Method Based on Texture Fingerprint Clustering. 1914-1921 - Mouslim Tolba, Salem Benferhat

, Karim Tabia, Abdelkader Belkhir
:
Handling Capabilities in Security Policies. 1922-1927 - Vladimir Marbukh:

On Mitigation Inefficiency of Selfish Investment in Network Recovery from High Loss SIS Infection. 1928-1933
WCSF 2018
- Maximilian Uphoff, Matthäus Wander, Torben Weis

, Marian Waltereit
:
SecureCloud: An Encrypted, Scalable Storage for Cloud Forensics. 1934-1941 - John Sheppard

:
Cloud Investigations of Illegal IPTV Networks. 1942-1947 - Hina Tufail, Kashif Zafar, Abdul Rauf Baig:

Digital Watermarking for Relational Database Security Using mRMR Based Binary Bat Algorithm. 1948-1954 - Henry Okonofua, Shawon S. M. Rahman

:
Cybersecurity: An Analysis of the Protection Mechanisms in a Cloud-centered Environment. 1955-1962

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














