


default search action
Elisa Bertino
Person information
- affiliation: Purdue University, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j398]Daren Fadolalkarim, Elisa Bertino:
DCAFixer: An Automatic Tool for Bug Detection and Repair for Database Java Client Applications. IEEE Trans. Dependable Secur. Comput. 22(1): 327-342 (2025) - 2024
- [j397]Sonam Bhardwaj
, Adrian Shuai Li, Mayank Dave
, Elisa Bertino:
Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation. Comput. Secur. 140: 103769 (2024) - [j396]Antonino Rullo
, Daniele Midi, Anand Mudgerikar
, Elisa Bertino
:
Kalis2.0 - A SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for IoT. IEEE Internet Things J. 11(7): 12579-12601 (2024) - [j395]Yiwei Zhang
, Siqi Ma
, Tiancheng Chen, Juanru Li
, Robert H. Deng
, Elisa Bertino
:
EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry. IEEE Trans. Dependable Secur. Comput. 21(4): 1544-1556 (2024) - [j394]Yong-Feng Ge
, Hua Wang
, Elisa Bertino
, Zhi-Hui Zhan
, Jinli Cao
, Yanchun Zhang
, Jun Zhang
:
Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility. IEEE Trans. Dependable Secur. Comput. 21(4): 2296-2311 (2024) - [j393]Jie Wang
, Zheng Yan
, Jiahe Lan
, Elisa Bertino
, Witold Pedrycz
:
TrustGuard: GNN-Based Robust and Explainable Trust Evaluation With Dynamicity Support. IEEE Trans. Dependable Secur. Comput. 21(5): 4433-4450 (2024) - [j392]Alian Yu
, Jian Kang
, Joshua Morris
, Elisa Bertino
, Dan Lin
:
Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware. IEEE Trans. Dependable Secur. Comput. 21(5): 4953-4966 (2024) - [j391]Ruidong Han
, Huihui Gong, Siqi Ma
, Juanru Li, Chang Xu
, Elisa Bertino
, Surya Nepal
, Zhuo Ma
, Jianfeng Ma
:
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. IEEE Trans. Inf. Forensics Secur. 19: 722-734 (2024) - [j390]Mengdie Huang
, Hyunwoo Lee
, Ashish Kundu
, Xiaofeng Chen
, Anand Mudgerikar
, Ninghui Li
, Elisa Bertino
:
ARIoTEDef: Adversarially Robust IoT Early Defense System Based on Self-Evolution against Multi-step Attacks. ACM Trans. Internet Things 5(3): 15:1-15:34 (2024) - [j389]Hasini Gunasinghe
, Mikhail J. Atallah
, Elisa Bertino
:
PEBASI: A Privacy preserving, Efficient Biometric Authentication Scheme based on Irises. ACM Trans. Priv. Secur. 27(3): 25:1-25:31 (2024) - [j388]Yong-Feng Ge
, Elisa Bertino
, Hua Wang
, Jinli Cao
, Yanchun Zhang
:
Distributed Cooperative Coevolution of Data Publishing Privacy and Transparency. ACM Trans. Knowl. Discov. Data 18(1): 20:1-20:23 (2024) - [j387]Huan Rong
, Gongchi Chen
, Tinghuai Ma
, Victor S. Sheng
, Elisa Bertino
:
FuFaction: Fuzzy Factual Inconsistency Correction on Crowdsourced Documents With Hybrid-Mask at the Hidden-State Level. IEEE Trans. Knowl. Data Eng. 36(1): 167-183 (2024) - [c671]Elisa Bertino, Carl K. Chang, Rong N. Chang, Peter Chen, Ernesto Damiani, Sumi Helal, Dennis Gannon, Frank Leymann, Hong Mei, Dejan S. Milojicic, Stephen S. Yau:
2024 IEEE World Congress on Services. CLOUD 2024: xii - [c670]Elisa Bertino, Carl K. Chang, Rong N. Chang, Peter Chen, Ernesto Damiani, Sumi Helal, Dennis Gannon, Frank Leymann, Hong Mei, Dejan S. Milojicic, Stephen S. Yau:
Message from Rong N. Chang, Steering Committee Chair. SSE 2024: xi - [c669]Zilin Shen
, Imtiaz Karim
, Elisa Bertino
:
Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode. AsiaCCS 2024 - [c668]Charalampos Katsis, Xin Jin, Fan Sang, Jiahao Sun, Elisa Bertino, Ramana Rao Kompella, Ashish Kundu:
Graphene: Towards Data-driven Holistic Security Posture Analysis using AI-generated Attack Graphs. CIC 2024: 9-18 - [c667]Mirza Masfiqur Rahman, Ashish Kundu, Elisa Bertino:
Poster: Benchmarking of Code Generative LLMs. ICDCS 2024: 1448-1449 - [c666]Mir Imtiaz Mostafiz, Eunseob Kim, Adrian Shuai Li, Elisa Bertino, Martin Byung-Guk Jun, Ali Shakouri:
Adversarial Domain Adaptation for Metal Cutting Sound Detection: Leveraging Abundant Lab Data for Scarce Industry Data. INDIN 2024: 1-8 - [c665]Beomjin Jin, Eunsoo Kim, Hyunwoo Lee, Elisa Bertino, Doowon Kim, Hyoungshick Kim:
Sharing cyber threat intelligence: Does it really help? NDSS 2024 - [c664]Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino:
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge. SP 2024: 1646-1664 - [c663]Mirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino:
CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications. USENIX Security Symposium 2024 - [i49]Kazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino:
FBSDetector: Fake Base Station and Multi Step Attack Detection in Cellular Networks using Machine Learning. CoRR abs/2401.04958 (2024) - [i48]Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino:
Transfer Learning for Security: Challenges and Future Directions. CoRR abs/2403.00935 (2024) - [i47]Pradip Kunwar, Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Elisa Bertino:
SoK: Leveraging Transformers for Malware Analysis. CoRR abs/2405.17190 (2024) - [i46]Mirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino:
CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications. CoRR abs/2407.13742 (2024) - [i45]Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino:
Improving Malware Detection with Adversarial Domain Adaptation and Control Flow Graphs. CoRR abs/2407.13918 (2024) - [i44]Yiwei Zhang, Rouzbeh Behnia, Attila A. Yavuz, Reza Ebrahimi, Elisa Bertino:
Uncovering Attacks and Defenses in Secure Aggregation for Federated Deep Learning. CoRR abs/2410.09676 (2024) - [i43]Mir Imtiaz Mostafiz, Eunseob Kim, Adrian Shuai Li, Elisa Bertino, Martin Byung-Guk Jun, Ali Shakouri:
Adversarial Domain Adaptation for Metal Cutting Sound Detection: Leveraging Abundant Lab Data for Scarce Industry Data. CoRR abs/2410.17574 (2024) - [i42]Charalampos Katsis, Elisa Bertino:
ZT-SDN: An ML-powered Zero-Trust Architecture for Software-Defined Networks. CoRR abs/2411.15020 (2024) - [i41]Joshua Groen, Simone Di Valerio, Imtiaz Karim, Davide Villa, Yiewi Zhang, Leonardo Bonati, Michele Polese, Salvatore D'Oro, Tommaso Melodia, Elisa Bertino, Francesca Cuomo, Kaushik R. Chowdhury:
TIMESAFE: Timing Interruption Monitoring and Security Assessment for Fronthaul Environments. CoRR abs/2412.13049 (2024) - [i40]Panpan Han, Zheng Yan, Laurence T. Yang, Elisa Bertino:
P2C2T: Preserving the Privacy of Cross-Chain Transfer. IACR Cryptol. ePrint Arch. 2024: 1467 (2024) - 2023
- [j386]Mostafa Mirzaie, Behshid Behkamal
, Mohammad Allahbakhsh
, Samad Paydar, Elisa Bertino:
State of the art on quality control for data streams: A systematic literature review. Comput. Sci. Rev. 48: 100554 (2023) - [j385]Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. ACM Comput. Surv. 55(2): 3:1-3:36 (2023) - [j384]Omar Hasan
, Lionel Brunie, Elisa Bertino:
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey. ACM Comput. Surv. 55(2): 32:1-32:37 (2023) - [j383]Elisa Bertino
:
Privacy in the Era of 5G, IoT, Big Data, and Machine Learning. IEEE Secur. Priv. 21(1): 91-92 (2023) - [j382]Elisa Bertino
, Suparna Bhattacharya
, Elena Ferrari
, Dejan S. Milojicic
:
Trustworthy AI and Data Lineage. IEEE Internet Comput. 27(6): 5-6 (2023) - [j381]Antonino Rullo
, Elisa Bertino
, Kui Ren
:
Guest Editorial Special Issue on Intrusion Detection for the Internet of Things. IEEE Internet Things J. 10(10): 8327-8330 (2023) - [j380]Mingshan You, Jiao Yin
, Hua Wang
, Jinli Cao, Kate N. Wang, Yuan Miao
, Elisa Bertino:
A knowledge graph empowered online learning framework for access control decision-making. World Wide Web (WWW) 26(2): 827-848 (2023) - [c662]Amani Abu Jabal
, Elisa Bertino
, Jorge Lobo
, Dinesh C. Verma
, Seraphin B. Calo
, Alessandra Russo
:
FLAP - A Federated Learning Framework for Attribute-based Access Control Policies. CODASPY 2023: 263-272 - [c661]Elisa Bertino, Hyunwoo Lee, Mengdie Huang, Charalampos Katsis, Zilin Shen, Bruno Ribeiro, Daniel De Mello, Ashish Kundu:
A Pro-Active Defense Framework for IoT Systems. CIC 2023: 125-132 - [c660]Weicheng Wang, Hyunwoo Lee, Yan Huang, Elisa Bertino, Ninghui Li:
Towards Efficient Privacy-Preserving Deep Packet Inspection. ESORICS (2) 2023: 166-192 - [c659]Anand Mudgerikar, Elisa Bertino:
Intelligent Security Aware Routing: Using Model-Free Reinforcement Learning. ICCCN 2023: 1-10 - [c658]Elisa Bertino, Baochun Li, Ophir Frieder, Xiaohua Jia:
Welcome Message. ICDCS 2023: xxii-xxiii - [c657]Adrian Shuai Li, Elisa Bertino, Rih-Teng Wu
, Ting-Yan Wu:
Building Manufacturing Deep Learning Models with Minimal and Imbalanced Training Data Using Domain Adaptation and Data Augmentation. ICIT 2023: 1-8 - [c656]Imtiaz Karim, Kazi Samin Mubasshir, Mirza Masfiqur Rahman, Elisa Bertino:
SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis. IJCNLP (Findings) 2023: 20-38 - [c655]Abubakar Sadiq Sani, Elisa Bertino, Dong Yuan, Zhao Yang Dong:
A Universally Composable Key Exchange Framework for Operational Technology Communication Protocols. SmartGridComm 2023: 1-6 - [c654]Imtiaz Karim, Abdullah Al Ishtiaq, Syed Rafiul Hussain, Elisa Bertino:
BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations. SP 2023: 3209-3227 - [c653]Xing Han, Yuheng Zhang, Xue Zhang, Zeyuan Chen, Mingzhe Wang, Yiwei Zhang, Siqi Ma, Yu Yu, Elisa Bertino, Juanru Li:
Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning. USENIX Security Symposium 2023: 4607-4624 - [c652]Sanghak Oh
, Minwook Lee
, Hyunwoo Lee
, Elisa Bertino
, Hyoungshick Kim
:
AppSniffer: Towards Robust Mobile App Fingerprinting Against VPN. WWW 2023: 2318-2328 - [i39]Imtiaz Karim, Kazi Samin Mubasshir, Mirza Masfiqur Rahman, Elisa Bertino:
SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis. CoRR abs/2301.09201 (2023) - [i38]Adrian Shuai Li, Elisa Bertino, Rih-Teng Wu, Ting-Yan Wu:
Building Manufacturing Deep Learning Models with Minimal and Imbalanced Training Data Using Domain Adaptation and Data Augmentation. CoRR abs/2306.00202 (2023) - [i37]Adrian Shuai Li, Elisa Bertino, Xuan-Hong Dang, Ankush Singla, Yuhai Tu, Mark N. Wegman:
Maximal Domain Independent Representations Improve Transfer Learning. CoRR abs/2306.00262 (2023) - [i36]Jie Wang, Zheng Yan, Jiahe Lan, Elisa Bertino, Witold Pedrycz:
TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support. CoRR abs/2306.13339 (2023) - [i35]Diane Jackson, Sorin Adam Matei, Elisa Bertino:
Artificial Intelligence Ethics Education in Cybersecurity: Challenges and Opportunities: a focus group report. CoRR abs/2311.00903 (2023) - [i34]Sorin Adam Matei, Elisa Bertino:
Educating for AI Cybersecurity Work and Research: Ethics, Systems Thinking, and Communication Requirements. CoRR abs/2311.04326 (2023) - [i33]Zilin Shen, Imtiaz Karim, Elisa Bertino:
Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode. CoRR abs/2312.07877 (2023) - [i32]Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino:
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge. CoRR abs/2312.09665 (2023) - [i31]Xin Jin, Charalampos Katsis, Fan Sang, Jiahao Sun, Elisa Bertino, Ramana Rao Kompella, Ashish Kundu:
Prometheus: Infrastructure Security Posture Analysis with AI-generated Attack Graphs. CoRR abs/2312.13119 (2023) - 2022
- [j379]Abubakar Sadiq Sani, Elisa Bertino, Dong Yuan, Ke Meng, Zhao Yang Dong:
SPrivAD: A secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Comput. Secur. 115: 102610 (2022) - [j378]Adnan Ahmad
, Brian Whitworth, Elisa Bertino:
A framework for the application of socio-technical design methodology. Ethics Inf. Technol. 24(4): 46 (2022) - [j377]Srinibas Swain
, Deepak Puthal
, Elisa Bertino
:
CryptoCliqIn: Graph-Theoretic Cryptography Using Clique Injection. IEEE Intell. Syst. 37(5): 59-65 (2022) - [j376]Elisa Bertino:
The Persistent Problem of Software Insecurity. IEEE Secur. Priv. 20(3): 107-108 (2022) - [j375]Xu Yang
, Xun Yi
, Ibrahim Khalil
, Junwei Luo, Elisa Bertino
, Surya Nepal
, Xinyi Huang
:
Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs. IEEE Internet Things J. 9(14): 12563-12572 (2022) - [j374]Elisa Bertino, Haya Schulmann, Michael Waidner
:
Special issue ESORICS 2021. J. Comput. Secur. 30(6): 753-755 (2022) - [j373]Mahmoud Barhamgi, Elisa Bertino:
Editorial: Special Issue on Data Transparency - Data Quality, Annotation, and Provenance. ACM J. Data Inf. Qual. 14(1): 1:1-1:3 (2022) - [j372]Mahmoud Barhamgi, Elisa Bertino:
Editorial: Special Issue on Data Transparency - Uses Cases and Applications. ACM J. Data Inf. Qual. 14(2): 6:1-6:3 (2022) - [j371]Huawei Huang
, Salil S. Kanhere
, Jiawen Kang
, Zehui Xiong
, Lei Zhang
, Bhaskar Krishnamachari
, Elisa Bertino
, Sichao Yang:
Guest Editorial Special Issue on Intelligent Blockchain for Future Communications and Networking: Technologies, Trends, and Applications. IEEE J. Sel. Areas Commun. 40(12): 3299-3304 (2022) - [j370]Fabrizio Cicala
, Elisa Bertino
:
Analysis of Encryption Key Generation in Modern Crypto Ransomware. IEEE Trans. Dependable Secur. Comput. 19(2): 1239-1253 (2022) - [j369]Siqi Ma
, Juanru Li, Surya Nepal
, Diethelm Ostry, David Lo
, Sanjay K. Jha
, Robert H. Deng
, Elisa Bertino
:
Orchestration or Automation: Authentication Flaw Detection in Android Apps. IEEE Trans. Dependable Secur. Comput. 19(4): 2165-2178 (2022) - [j368]Qinbao Xu
, Elisa Bertino
, Changda Wang
:
Compact Provenance Scheme Through Packet Path Index Differences in WSNs. IEEE Trans. Inf. Forensics Secur. 17: 3511-3524 (2022) - [j367]Mohammad Saidur Rahman, Ibrahim Khalil
, Xun Yi, Mohammed Atiquzzaman, Elisa Bertino:
A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living. ACM Trans. Internet Techn. 22(3): 57:1-57:25 (2022) - [j366]Changda Wang, Xiaowei Li, Elisa Bertino:
Network Temperature: A Novel Statistical Index for Networks Measurement and Management. ACM Trans. Internet Techn. 22(3): 66:1-66:20 (2022) - [j365]Andrzej Goscinski
, Elisa Bertino, Shangguang Wang
:
Guest Editor's Introduction: Special Section on EdgeAI as a Service. IEEE Trans. Serv. Comput. 15(2): 588-590 (2022) - [j364]Mohammad Allahbakhsh
, Haleh Amintoosi
, Aleksandar Ignjatovic, Elisa Bertino
:
A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations. IEEE Trans. Serv. Comput. 15(2): 698-709 (2022) - [j363]Mohammad Allahbakhsh
, Haleh Amintoosi
, Behshid Behkamal
, Salil S. Kanhere
, Elisa Bertino
:
AQA: An Adaptive Quality Assessment Framework for Online Review Systems. IEEE Trans. Serv. Comput. 15(3): 1486-1497 (2022) - [c651]Hyunwoo Lee, Imtiaz Karim, Ninghui Li, Elisa Bertino:
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol. AsiaCCS 2022: 182-195 - [c650]Laurent d'Orazio, Jalil Boukhobza
, Omer F. Rana
, Juba Agoun, Le Gruenwald, Hervé Rannou, Elisa Bertino, Mohand-Saïd Hacid, Taofik Saïdi, Georges Bossert, Van Long Nguyen Huu, Dimitri Tombroff, Makoto Onizuka
:
The Lannion report on Big Data and Security Monitoring Research. IEEE Big Data 2022: 2960-2969 - [c649]Charalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo
, Elisa Bertino:
NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures. CODASPY 2022: 167-178 - [c648]Elisa Bertino, Ravi S. Sandhu, Bhavani Thuraisingham, Indrakshi Ray, Wenjia Li, Maanak Gupta, Sudip Mittal:
Security and Privacy for Emerging IoT and CPS Domains. CODASPY 2022: 336-337 - [c647]Sen Lin, Ming Shi, Anish Arora, Raef Bassily, Elisa Bertino, Constantine Caramanis, Kaushik R. Chowdhury
, Eylem Ekici, Atilla Eryilmaz, Stratis Ioannidis
, Nan Jiang, Gauri Joshi, Jim Kurose, Yingbin Liang, Zhiqiang Lin, Jia Liu, Mingyan Liu, Tommaso Melodia
, Aryan Mokhtari, Rob Nowak, Sewoong Oh, Srini Parthasarathy, Chunyi Peng, Hulya Seferoglu, Ness B. Shroff, Sanjay Shakkottai, Kannan Srinivasan, Ameet Talwalkar, Aylin Yener, Lei Ying
:
Leveraging Synergies Between AI and Networking to Build Next Generation Edge Networks. CIC 2022: 16-25 - [c646]Ankush Singla, Elisa Bertino:
DP-ADA: Differentially Private Adversarial Domain Adaptation for Training Deep Learning based Network Intrusion Detection Systems. CIC 2022: 89-98 - [c645]Yiwei Zhang, Siqi Ma, Juanru Li, Dawu Gu, Elisa Bertino:
KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications. DSN 2022: 488-500 - [c644]Hyunwoo Lee, Anand Mudgerikar, Ashish Kundu, Ninghui Li, Elisa Bertino:
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks. ESORICS (2) 2022: 549-568 - [c643]Yi Xie, Wen Li, Yuqing Sun
, Elisa Bertino, Bin Gong:
Subspace Embedding Based New Paper Recommendation. ICDE 2022: 1767-1780 - [c642]Ruidong Han
, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. ICSE 2022: 462-473 - [c641]Yunlong Lyu
, Yi Fang, Yiwei Zhang, Qibin Sun, Siqi Ma, Elisa Bertino, Kangjie Lu, Juanru Li:
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis. SP 2022: 2096-2113 - [c640]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. USENIX Security Symposium 2022: 4579-4596 - [e76]Xingming Sun, Xiaorui Zhang
, Zhihua Xia
, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13338, Springer 2022, ISBN 978-3-031-06793-8 [contents] - [e75]Xingming Sun, Xiaorui Zhang
, Zhihua Xia
, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13339, Springer 2022, ISBN 978-3-031-06787-7 [contents] - [e74]Xingming Sun, Xiaorui Zhang
, Zhihua Xia
, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13340, Springer 2022, ISBN 978-3-031-06790-7 [contents] - [i30]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. CoRR abs/2201.09370 (2022) - [i29]Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng
, Elisa Bertino:
EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry. CoRR abs/2210.03014 (2022) - 2021
- [j362]Elisa Bertino:
An excellent venue for multidisciplinary research in civil and infrastructure engineering. Comput. Aided Civ. Infrastructure Eng. 36(6): 677 (2021) - [j361]Elisa Bertino, Mohammad R. Jahanshahi, Ankush Singla, Rih-Teng Wu:
Intelligent IoT systems for civil infrastructure health monitoring: a research roadmap. Discov. Internet Things 1(1) (2021) - [j360]Elisa Bertino
:
Attacks on Artificial Intelligence [Last Word]. IEEE Secur. Priv. 19(1): 103-104 (2021) - [j359]Elisa Bertino
:
Zero Trust Architecture: Does It Help? IEEE Secur. Priv. 19(5): 95-96 (2021) - [j358]Mohammad Allahbakhsh, Haleh Amintoosi
, Behshid Behkamal, Amin Beheshti
, Elisa Bertino:
SCiMet: Stable, sCalable and reliable Metric-based framework for quality assessment in collaborative content generation systems. J. Informetrics 15(2): 101127 (2021) - [j357]Yinghui Zhang
, Robert H. Deng
, Elisa Bertino
, Dong Zheng
:
Robust and Universal Seamless Handover Authentication in 5G HetNets. IEEE Trans. Dependable Secur. Comput. 18(2): 858-874 (2021) - [j356]Shagufta Mehnaz
, Elisa Bertino
:
A Fine-Grained Approach for Anomaly Detection in File System Accesses With Enhanced Temporal User Profiles. IEEE Trans. Dependable Secur. Comput. 18(6): 2535-2550 (2021) - [j355]Shahriar Badsha
, Xun Yi
, Ibrahim Khalil
, Dongxi Liu, Surya Nepal
, Elisa Bertino
, Kwok-Yan Lam
:
Privacy Preserving Location-Aware Personalized Web Service Recommendations. IEEE Trans. Serv. Comput. 14(3): 791-804 (2021) - [j354]Amani Abu Jabal
, Maryam Davari
, Elisa Bertino
, Christian Makaya, Seraphin B. Calo
, Dinesh C. Verma
, Christopher Williams:
ProFact: A Provenance-Based Analytics Framework for Access Control Policies. IEEE Trans. Serv. Comput. 14(6): 1914-1928 (2021) - [c639]Abubakar Sadiq Sani, Dong Yuan, Elisa Bertino, Zhao Yang Dong:
Crypto-Chain: A Relay Resilience Framework for Smart Vehicles. ACSAC 2021: 439-454 - [c638]Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila A. Yavuz
, Elisa Bertino:
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations. AsiaCCS 2021: 501-515 - [c637]Syed Rafiul Hussain, Imtiaz Karim, Abdullah Al Ishtiaq
, Omar Chowdhury, Elisa Bertino:
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices. CCS 2021: 1082-1099 - [c636]Elisa Bertino, Murat Kantarcioglu, Cuneyt Gurcan Akcora
, Sagar Samtani
, Sudip Mittal, Maanak Gupta:
AI for Security and Security for AI. CODASPY 2021: 333-334 - [c635]Anand Mudgerikar, Elisa Bertino, Jorge Lobo, Dinesh C. Verma:
A Security-Constrained Reinforcement Learning Framework for Software Defined Networks. ICC 2021: 1-6 - [c634]Imtiaz Karim, Syed Rafiul Hussain, Elisa Bertino:
ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations. ICDCS 2021: 773-785 - [c633]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal