Login / Signup
TrustCom/BigDataSE/ICESS
2017
2017
2017
Keyphrases
Publications
2017
Monika Santra
,
Sateesh K. Peddoju
,
A. K. Bhattacharjee
,
Arindam Khan
Design and Analysis of a Modified Remote Attestation Protocol.
TrustCom/BigDataSE/ICESS
(2017)
Takuro Yamamoto
,
Takuma Hara
,
Takuya Ishikawa
,
Hiroshi Oyama
,
Hiroaki Takada
,
Takuya Azumi
TINET+TECS: Component-Based TCP/IP Protocol Stack for Embedded Systems.
TrustCom/BigDataSE/ICESS
(2017)
Ayong Ye
,
Yacheng Li
,
Li Xu
,
Qing Li
,
Hui Lin
A Trajectory Privacy-Preserving Algorithm Based on Road Networks in Continuous Location-Based Services.
TrustCom/BigDataSE/ICESS
(2017)
Weizhong Qiang
,
Gongping Xu
,
Guozhong Sun
,
Tianqing Zhu
,
Hai Jin
CloudController: A Writable and Heterogeneous-Adaptive Virtual Machine Introspection for Cloud Management.
TrustCom/BigDataSE/ICESS
(2017)
Sana Hamdi
,
Alda Lopes Gançarski
,
Amel Bouzeghoub
,
Sadok Ben Yahia
A New Fuzzy Clustering Approach for Reputation Management in OSNs.
TrustCom/BigDataSE/ICESS
(2017)
Junwei Tang
,
Ruixuan Li
,
Hongmu Han
,
Heng Zhang
,
Xiwu Gu
Detecting Permission Over-claim of Android Applications with Static and Semantic Analysis Approach.
TrustCom/BigDataSE/ICESS
(2017)
Wei Zhang
,
Dongdai Lin
,
Hailong Zhang
,
Cong Chen
,
Xiaojun Zhou
A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECC.
TrustCom/BigDataSE/ICESS
(2017)
Mark A. Will
,
Ryan K. L. Ko
,
Silvino J. Schlickmann
Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography.
TrustCom/BigDataSE/ICESS
(2017)
Shan Ding
,
Jinhui Wu
,
Guoqi Xie
,
Gang Zeng
A Hybrid Heuristic-Genetic Algorithm with Adaptive Parameters for Static Task Scheduling in Heterogeneous Computing System.
TrustCom/BigDataSE/ICESS
(2017)
Youcef Imine
,
Ahmed Lounis
,
Abdelmadjid Bouabdallah
Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control.
TrustCom/BigDataSE/ICESS
(2017)
Qian Lu
,
Haipeng Qu
,
Yuan Zhuang
,
Xi Jun Lin
,
Yanyong Zhu
,
Yunzheng Liu
A Passive Client-based Approach to Detect Evil Twin Attacks.
TrustCom/BigDataSE/ICESS
(2017)
Ansar Rafique
,
Dimitri Van Landuyt
,
Vincent Reniers
,
Wouter Joosen
Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant SaaS.
TrustCom/BigDataSE/ICESS
(2017)
Yunan Zhang
,
Chenghao Rong
,
Qingjia Huang
,
Yang Wu
,
Zeming Yang
,
Jianguo Jiang
Based on Multi-features and Clustering Ensemble Method for Automatic Malware Categorization.
TrustCom/BigDataSE/ICESS
(2017)
Thomas Given-Wilson
,
Nisrine Jafri
,
Jean-Louis Lanet
,
Axel Legay
An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT.
TrustCom/BigDataSE/ICESS
(2017)
Isaac Triguero
,
Grazziela P. Figueredo
,
Mohammad Mesgarpour
,
Jonathan M. Garibaldi
,
Robert I. John
Vehicle Incident Hot Spots Identification: An Approach for Big Data.
TrustCom/BigDataSE/ICESS
(2017)
Mohamed-Lamine Messai
,
Hamida Seba
A Self-healing Key Pre-distribution Scheme for Multi-phase Wireless Sensor Networks.
TrustCom/BigDataSE/ICESS
(2017)
Entao Luo
,
Guojun Wang
,
Qin Liu
Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks.
TrustCom/BigDataSE/ICESS
(2017)
Wybren van der Meer
,
Kim-Kwang Raymond Choo
,
M. Tahar Kechadi
,
Nhien-An Le-Khac
Investigation and Automating Extraction of Thumbnails Produced by Image Viewers.
TrustCom/BigDataSE/ICESS
(2017)
Yantong Zhan
,
Guoying Zhang
,
Yu Guo
,
Hang Meng
,
Xuejun Zhao
Particle Size Measurement Based on Image Multivariate Multiscale Entropy.
TrustCom/BigDataSE/ICESS
(2017)
Nadeem Ahmed
,
Adeel Sadiq
,
Anum Farooq
,
Rabia Akram
Securing the Neighbour Discovery Protocol in IPv6 State-ful Address Auto-Configuration.
TrustCom/BigDataSE/ICESS
(2017)
Haiying Xia
,
Wenxian Zhao
,
Zheng Zhou
,
Frank Jiang
,
Hai-Sheng Li
,
Xiangjian He
Deformable Template Matching Using Proposal-Based Best-Buddies Similarity.
TrustCom/BigDataSE/ICESS
(2017)
Ibrahim Tariq Javed
,
Khalifa Toumi
,
Noël Crespi
ProtectCall: Call Protection Based on User Reputation.
TrustCom/BigDataSE/ICESS
(2017)
Ghada Arfaoui
,
José Manuel Sánchez-Vílchez
,
Jean-Philippe Wary
Security and Resilience in 5G: Current Challenges and Future Directions.
TrustCom/BigDataSE/ICESS
(2017)
Jinnan Ding
,
Shuguo Li
A Reconfigurable High-Speed ECC Processor Over NIST Primes.
TrustCom/BigDataSE/ICESS
(2017)
Peng Zhang
,
Xiafei Zhang
,
Xiaoqiang Sun
,
Joseph K. Liu
,
Jianping Yu
,
Zoe Lin Jiang
Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics.
TrustCom/BigDataSE/ICESS
(2017)
Lihua Leng
,
Jeffery Zheng
Mapping ECG Signal Sequences on Variant Maps.
TrustCom/BigDataSE/ICESS
(2017)
Cong Zuo
,
Jun Shao
,
Zhe Liu
,
Yun Ling
,
Guiyi Wei
Hidden-Token Searchable Public-Key Encryption.
TrustCom/BigDataSE/ICESS
(2017)
Nathanael R. Weidler
,
Dane Brown
,
Samuel A. Mitchell
,
Joel Anderson
,
Jonathan R. Williams
,
Austin Costley
,
Chase Kunz
,
Christopher Wilkinson
,
Remy Wehbe
,
Ryan M. Gerdes
Return-Oriented Programming on a Cortex-M Processor.
TrustCom/BigDataSE/ICESS
(2017)
Yifeng Mo
,
Shuguo Li
Base Extent Optimization for RNS Montgomery Algorithm.
TrustCom/BigDataSE/ICESS
(2017)
Mosarrat Jahan
,
Partha Sarathi Roy
,
Kouichi Sakurai
,
Aruna Seneviratne
,
Sanjay Jha
Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data.
TrustCom/BigDataSE/ICESS
(2017)
Lingjuan Lyu
,
Yee Wei Law
,
Jiong Jin
,
Marimuthu Palaniswami
Privacy-Preserving Aggregation of Smart Metering via Transformation and Encryption.
TrustCom/BigDataSE/ICESS
(2017)
Karl E. Dierckens
,
Adrian B. Harrison
,
Carson K. Leung
,
Adrienne V. Pind
A Data Science and Engineering Solution for Fast K-Means Clustering of Big Data.
TrustCom/BigDataSE/ICESS
(2017)
Meng Liu
,
Xuyun Zhang
,
Chi Yang
,
Shaoning Pang
,
Deepak Puthal
,
Kaijun Ren
Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control.
TrustCom/BigDataSE/ICESS
(2017)
Zhiyao Gong
,
Keni Qiu
,
Weiwen Chen
,
Yuanhui Ni
,
Yuanchao Xu
,
Jianlei Yang
Pipeline Optimizations of Architecting STT-RAM as Registers in Rad-Hard Environment.
TrustCom/BigDataSE/ICESS
(2017)
Ashish Nanda
,
Priyadarsi Nanda
,
Xiangjian He
,
Aruna Jamdagni
,
Deepak Puthal
Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks.
TrustCom/BigDataSE/ICESS
(2017)
Chen Hu
,
Jiaxin Miao
,
Zhuo Su
,
Xiaohong Shi
,
Qiang Chen
,
Xiaonan Luo
Precision-Enhanced Image Attribute Prediction Model.
TrustCom/BigDataSE/ICESS
(2017)
Manel Mrabet
,
Yosra Ben Saied
,
Leïla Azouz Saïdane
Feedback Entropy: A New Metric to Detect Unfair Rating Attacks for Trust Computing in Cloud Environments.
TrustCom/BigDataSE/ICESS
(2017)
Ye Li
,
Zoe Lin Jiang
,
Xuan Wang
,
Siu-Ming Yiu
,
Peng Zhang
Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties.
TrustCom/BigDataSE/ICESS
(2017)
Shweta Bhandari
,
Frédéric Herbreteau
,
Vijay Laxmi
,
Akka Zemmari
,
Partha S. Roop
,
Manoj Singh Gaur
SneakLeak: Detecting Multipartite Leakage Paths in Android Apps.
TrustCom/BigDataSE/ICESS
(2017)
Shaofeng Zhang
,
Xi Xiao
CSCdroid: Accurately Detect Android Malware via Contribution-Level-Based System Call Categorization.
TrustCom/BigDataSE/ICESS
(2017)
Jiangshan Yu
,
Mark Ryan
,
Liqun Chen
Authenticating Compromisable Storage Systems.
TrustCom/BigDataSE/ICESS
(2017)
Yao Liu
,
Qingkai Zeng
,
Pinghai Yuan
NodeLeaper: Lower Overhead Oblivious AVL Tree.
TrustCom/BigDataSE/ICESS
(2017)
Yan Zhang
,
Lejian Liao
,
Chang Xu
,
Licheng Shi
Situation Semantics Aggregator for Realtime Simulation on Organizational Behaviors.
TrustCom/BigDataSE/ICESS
(2017)
Patricia Miquilini
,
Rafael Geraldeli Rossi
,
Marcos G. Quiles
,
Vinícius Veloso de Melo
,
Márcio P. Basgalupp
Automatically Design Distance Functions for Graph-Based Semi-Supervised Learning.
TrustCom/BigDataSE/ICESS
(2017)
Di Wu
,
Yu Zhang
,
Yinlong Liu
Dummy Location Selection Scheme for K-Anonymity in Location Based Services.
TrustCom/BigDataSE/ICESS
(2017)
Jeffery Garae
,
Ryan K. L. Ko
,
Janice Kho
,
Saidah Suwadi
,
Mark A. Will
,
Mark Apperley
Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors.
TrustCom/BigDataSE/ICESS
(2017)
Amber Umair
,
Priyadarsi Nanda
,
Xiangjian He
Online Social Network Information Forensics: A Survey on Use of Various Tools and Determining How Cautious Facebook Users are?
TrustCom/BigDataSE/ICESS
(2017)
Arua De M. Sousa
,
Ana Carolina Lorena
,
Márcio P. Basgalupp
GEEK: Grammatical Evolution for Automatically Evolving Kernel Functions.
TrustCom/BigDataSE/ICESS
(2017)
Martin Henze
,
Benedikt Wolters
,
Roman Matzutt
,
Torsten Zimmermann
,
Klaus Wehrle
Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things.
TrustCom/BigDataSE/ICESS
(2017)
Liying Jiang
,
Jiafeng Li
,
Li Zhuo
,
Ziqi Zhu
Robust Vehicle Classification Based on the Combination of Deep Features and Handcrafted Features.
TrustCom/BigDataSE/ICESS
(2017)