


default search action
Surya Nepal
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
 [j168]Fatemeh Jalalvand [j168]Fatemeh Jalalvand , Mohan Baruwal Chhetri , Mohan Baruwal Chhetri , Surya Nepal , Surya Nepal , Cécile Paris: , Cécile Paris:
 Alert Prioritisation in Security Operations Centres: A Systematic Survey on Criteria and Methods. ACM Comput. Surv. 57(2): 42:1-42:36 (2025)
 [j167]Shahroz Tariq [j167]Shahroz Tariq , Mohan Baruwal Chhetri , Mohan Baruwal Chhetri , Surya Nepal , Surya Nepal , Cécile Paris: , Cécile Paris:
 Alert Fatigue in Security Operations Centres: Research Challenges and Opportunities. ACM Comput. Surv. 57(9): 224:1-224:38 (2025)
 [j166]Shahroz Tariq [j166]Shahroz Tariq , Mohan Baruwal Chhetri , Mohan Baruwal Chhetri , Surya Nepal , Surya Nepal , Cécile Paris: , Cécile Paris:
 A2C: A modular multi-stage collaborative decision framework for human-AI teams. Expert Syst. Appl. 282: 127318 (2025)
 [j165]Shiva Raj Pokhrel [j165]Shiva Raj Pokhrel , Gang Li , Gang Li , Robin Doss , Robin Doss , Surya Nepal , Surya Nepal : :
 Toward Decentralized Operationalization of Zero Trust Architecture for Next Generation Networks. IEEE J. Sel. Areas Commun. 43(6): 1998-2010 (2025)
 [j164]Wei He [j164]Wei He , Zhi Zhang , Zhi Zhang , Yueqiang Cheng , Yueqiang Cheng , Wenhao Wang , Wenhao Wang , Wei Song , Wei Song , Yansong Gao , Yansong Gao , Qifei Zhang , Qifei Zhang , Kang Li , Kang Li , Dongxi Liu , Dongxi Liu , Surya Nepal , Surya Nepal : :
 WhistleBlower: A System-Level Empirical Study on RowHammer. IEEE Trans. Computers 74(3): 805-819 (2025)
 [j163]Zehang Deng [j163]Zehang Deng , Ruoxi Sun , Ruoxi Sun , Minhui Xue , Minhui Xue , Sheng Wen , Sheng Wen , Seyit Camtepe , Seyit Camtepe , Surya Nepal , Surya Nepal , Yang Xiang , Yang Xiang : :
 Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-Enabled Critical Infrastructure. IEEE Trans. Dependable Secur. Comput. 22(4): 3661-3675 (2025)
 [j162]Zehang Deng [j162]Zehang Deng , Ruoxi Sun , Ruoxi Sun , Jason Xue , Jason Xue , Wanlun Ma , Wanlun Ma , Sheng Wen , Sheng Wen , Surya Nepal , Surya Nepal , Yang Xiang , Yang Xiang : :
 Hardening LLM Fine-Tuning: From Differentially Private Data Selection to Trustworthy Model Quantization. IEEE Trans. Inf. Forensics Secur. 20: 7211-7226 (2025)
 [c275]Van Nguyen [c275]Van Nguyen , Surya Nepal , Surya Nepal , Xingliang Yuan , Xingliang Yuan , Tingmin Wu , Tingmin Wu , Carsten Rudolph , Carsten Rudolph : :
 SAFE: A Novel Approach For Software Vulnerability Detection from Enhancing The Capability of Large Language Models. AsiaCCS 2025: 392-406
 [c274]Hua Ma [c274]Hua Ma , Alsharif Abuadbba , Alsharif Abuadbba , Yansong Gao , Yansong Gao , Hyoungshick Kim , Hyoungshick Kim , Surya Nepal , Surya Nepal : :
 Comprehensive Evaluation of Cloaking Backdoor Attacks on Object Detector in Real-World. AsiaCCS 2025: 605-620
 [c273]Viet Vo [c273]Viet Vo , Shangqi Lai, Xingliang Yuan , Shangqi Lai, Xingliang Yuan , Surya Nepal , Surya Nepal , Qi Li: , Qi Li:
 OblivCDN: A Practical Privacy-preserving CDN with Oblivious Content Access. AsiaCCS 2025: 1394-1410
 [c272]Van Nguyen, Tingmin Wu, Xingliang Yuan, Marthie Grobler, Surya Nepal, Carsten Rudolph: [c272]Van Nguyen, Tingmin Wu, Xingliang Yuan, Marthie Grobler, Surya Nepal, Carsten Rudolph:
 AI2TALE: An Innovative Information Theory-based Approach for Learning to Localize Phishing Attacks. ICLR 2025
 [c271]Viet Vo, Mengyao Ma, Guangdong Bai, Ryan K. L. Ko [c271]Viet Vo, Mengyao Ma, Guangdong Bai, Ryan K. L. Ko , Surya Nepal , Surya Nepal : :
 Practical Poisoning Attacks with Limited Byzantine Clients in Clustered Federated Learning. SP 2025: 1751-1769
 [i124]Viet Vo, Shangqi Lai, Xingliang Yuan, Surya Nepal, Qi Li: [i124]Viet Vo, Shangqi Lai, Xingliang Yuan, Surya Nepal, Qi Li:
 OblivCDN: A Practical Privacy-preserving CDN with Oblivious Content Access. CoRR abs/2501.07262 (2025)
 [i123]Hua Ma, Alsharif Abuadbba, Yansong Gao, Hyoungshick Kim, Surya Nepal: [i123]Hua Ma, Alsharif Abuadbba, Yansong Gao, Hyoungshick Kim, Surya Nepal:
 Comprehensive Evaluation of Cloaking Backdoor Attacks on Object Detector in Real-World. CoRR abs/2501.15101 (2025)
 [i122]Nazatul H. Sultan, Chandan Kumar, Saurab Dulal, Vijay Varadharajan, Seyit Camtepe, Surya Nepal: [i122]Nazatul H. Sultan, Chandan Kumar, Saurab Dulal, Vijay Varadharajan, Seyit Camtepe, Surya Nepal:
 Provisioning Time-Based Subscription in NDN: A Secure and Efficient Access Control Scheme. CoRR abs/2501.15975 (2025)
 [i121]Alsharif Abuadbba, Sean Lamont, M. Ejaz Ahmed, Cody James Christopher, Muhammad Ikram, Udaya Kiran Tupakula, Daniel Coscia, Mohamed Ali Kâafar, Surya Nepal: [i121]Alsharif Abuadbba, Sean Lamont, M. Ejaz Ahmed, Cody James Christopher, Muhammad Ikram, Udaya Kiran Tupakula, Daniel Coscia, Mohamed Ali Kâafar, Surya Nepal:
 Enhancing Malware Fingerprinting through Analysis of Evasive Techniques. CoRR abs/2503.06495 (2025)
 [i120]Kevin Saric, Gowri Sankar Ramachandran [i120]Kevin Saric, Gowri Sankar Ramachandran , Raja Jurdak , Raja Jurdak , Surya Nepal: , Surya Nepal:
 Saving Storage Space Using Files on the Web. CoRR abs/2503.22089 (2025)
 [i119]Shahroz Tariq, Ronal Singh, Mohan Baruwal Chhetri, Surya Nepal, Cécile Paris: [i119]Shahroz Tariq, Ronal Singh, Mohan Baruwal Chhetri, Surya Nepal, Cécile Paris:
 Bridging Expertise Gaps: The Role of LLMs in Human-AI Collaboration for Cybersecurity. CoRR abs/2505.03179 (2025)
 [i118]Erik Buchholz [i118]Erik Buchholz , Natasha Fernandes, David D. Nguyen, Alsharif Abuadbba, Surya Nepal, Salil S. Kanhere: , Natasha Fernandes, David D. Nguyen, Alsharif Abuadbba, Surya Nepal, Salil S. Kanhere:
 What is the Cost of Differential Privacy for Deep Learning-Based Trajectory Generation? CoRR abs/2506.09312 (2025)
 [i117]Ronal Singh, Mohan Baruwal Chhetri, Surya Nepal, Cécile Paris: [i117]Ronal Singh, Mohan Baruwal Chhetri, Surya Nepal, Cécile Paris:
 ContextBuddy: AI-Enhanced Contextual Insights for Security Alert Investigation (Applied to Intrusion Detection). CoRR abs/2506.09365 (2025)
 [i116]Fatemeh Jalalvand, Mohan Baruwal Chhetri, Surya Nepal, Cécile Paris: [i116]Fatemeh Jalalvand, Mohan Baruwal Chhetri, Surya Nepal, Cécile Paris:
 Adaptive alert prioritisation in security operations centres via learning to defer with human feedback. CoRR abs/2506.18462 (2025)
 [i115]Fanzhen Liu, Xiaoxiao Ma, Jian Yang, Alsharif Abuadbba, Kristen Moore, Surya Nepal, Cécile Paris, Quan Z. Sheng, Jia Wu: [i115]Fanzhen Liu, Xiaoxiao Ma, Jian Yang, Alsharif Abuadbba, Kristen Moore, Surya Nepal, Cécile Paris, Quan Z. Sheng, Jia Wu:
 Towards Faithful Class-level Self-explainability in Graph Neural Networks by Subgraph Dependencies. CoRR abs/2508.11513 (2025)
 [i114]Ronal Singh, Shahroz Tariq, Fatemeh Jalalvand, Mohan Baruwal Chhetri, Surya Nepal, Cécile Paris, Martin Lochner: [i114]Ronal Singh, Shahroz Tariq, Fatemeh Jalalvand, Mohan Baruwal Chhetri, Surya Nepal, Cécile Paris, Martin Lochner:
 LLMs in the SOC: An Empirical Study of Human-AI Collaboration in Security Operations Centres. CoRR abs/2508.18947 (2025)
 [i113]Muhammad Ejaz Ahmed, Cody James Christopher, Muhammad Ikram, Sean Lamont, Alsharif Abuadbba, Seyit Camtepe, Surya Nepal, Mohamed Ali Kâafar: [i113]Muhammad Ejaz Ahmed, Cody James Christopher, Muhammad Ikram, Sean Lamont, Alsharif Abuadbba, Seyit Camtepe, Surya Nepal, Mohamed Ali Kâafar:
 RINSER: Accurate API Prediction Using Masked Language Models. CoRR abs/2509.04887 (2025)
 [i112]Fanzhen Liu, Alsharif Abuadbba, Kristen Moore, Surya Nepal, Cécile Paris, Jia Wu, Jian Yang, Quan Z. Sheng: [i112]Fanzhen Liu, Alsharif Abuadbba, Kristen Moore, Surya Nepal, Cécile Paris, Jia Wu, Jian Yang, Quan Z. Sheng:
 Adversarial Attacks Against Automated Fact-Checking: A Survey. CoRR abs/2509.08463 (2025)
- 2024
 [j161]Nazatul Haque Sultan [j161]Nazatul Haque Sultan , Shabnam Kasra Kermanshahi, Hong-Yen Tran, Shangqi Lai, Vijay Varadharajan, Surya Nepal , Shabnam Kasra Kermanshahi, Hong-Yen Tran, Shangqi Lai, Vijay Varadharajan, Surya Nepal , Xun Yi: , Xun Yi:
 Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme. Ad Hoc Networks 158: 103478 (2024)
 [j160]Tom Roth, Yansong Gao, Alsharif Abuadbba, Surya Nepal, Wei Liu: [j160]Tom Roth, Yansong Gao, Alsharif Abuadbba, Surya Nepal, Wei Liu:
 Token-modification adversarial attacks for natural language processing: A survey. AI Commun. 37(4): 655-676 (2024)
 [j159]Nazatul Haque Sultan [j159]Nazatul Haque Sultan , Vijay Varadharajan , Vijay Varadharajan , Saurab Dulal , Saurab Dulal , Seyit Camtepe , Seyit Camtepe , Surya Nepal , Surya Nepal : :
 NDN-RBE: An Accountable Privacy Aware Access Control Framework For NDN. Comput. J. 67(4): 1572-1589 (2024)
 [j158]Shabnam Kasra Kermanshahi [j158]Shabnam Kasra Kermanshahi , Ron Steinfeld, Xun Yi, Joseph K. Liu, Surya Nepal , Ron Steinfeld, Xun Yi, Joseph K. Liu, Surya Nepal , Junwei Lou: , Junwei Lou:
 Fast and private multi-dimensional range search over encrypted data. Inf. Sci. 652: 119773 (2024)
 [j157]Erik Buchholz [j157]Erik Buchholz , Alsharif Abuadbba , Alsharif Abuadbba , Shuo Wang, Surya Nepal , Shuo Wang, Surya Nepal , Salil S. Kanhere: , Salil S. Kanhere:
 SoK: Can Trajectory Generation Combine Privacy and Utility? Proc. Priv. Enhancing Technol. 2024(3): 75-93 (2024)
 [j156]Kane Walter [j156]Kane Walter , Meisam Mohammady , Meisam Mohammady , Surya Nepal , Surya Nepal , Salil S. Kanhere , Salil S. Kanhere : :
 Optimally Mitigating Backdoor Attacks in Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 2949-2963 (2024)
 [j155]Ruidong Han [j155]Ruidong Han , Huihui Gong, Siqi Ma , Huihui Gong, Siqi Ma , Juanru Li, Chang Xu , Juanru Li, Chang Xu , Elisa Bertino , Elisa Bertino , Surya Nepal , Surya Nepal , Zhuo Ma , Zhuo Ma , Jianfeng Ma , Jianfeng Ma : :
 A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. IEEE Trans. Inf. Forensics Secur. 19: 722-734 (2024)
 [j154]Huihui Gong [j154]Huihui Gong , Minjing Dong , Minjing Dong , Siqi Ma , Siqi Ma , Seyit Camtepe , Seyit Camtepe , Surya Nepal , Surya Nepal , Chang Xu , Chang Xu : :
 Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization. IEEE Trans. Multim. 26: 5014-5025 (2024)
 [j153]Jiajun Huang [j153]Jiajun Huang , Chengbin Du , Chengbin Du , Xinqi Zhu , Xinqi Zhu , Siqi Ma , Siqi Ma , Surya Nepal , Surya Nepal , Chang Xu , Chang Xu : :
 Anti-Compression Contrastive Facial Forgery Detection. IEEE Trans. Multim. 26: 6166-6177 (2024)
 [j152]Xing Su [j152]Xing Su , Shan Xue , Shan Xue , Fanzhen Liu , Fanzhen Liu , Jia Wu , Jia Wu , Jian Yang , Jian Yang , Chuan Zhou , Chuan Zhou , Wenbin Hu , Wenbin Hu , Cécile Paris, Surya Nepal , Cécile Paris, Surya Nepal , Di Jin , Di Jin , Quan Z. Sheng , Quan Z. Sheng , Philip S. Yu , Philip S. Yu : :
 A Comprehensive Survey on Community Detection With Deep Learning. IEEE Trans. Neural Networks Learn. Syst. 35(4): 4682-4702 (2024)
 [j151]Shuo Wang [j151]Shuo Wang , Shangyu Chen, Tianle Chen, Surya Nepal , Shangyu Chen, Tianle Chen, Surya Nepal , Carsten Rudolph , Carsten Rudolph , Marthie Grobler , Marthie Grobler : :
 Generating Semantic Adversarial Examples via Feature Manipulation in Latent Space. IEEE Trans. Neural Networks Learn. Syst. 35(12): 17070-17084 (2024)
 [j150]Mohan Baruwal Chhetri [j150]Mohan Baruwal Chhetri , Shahroz Tariq , Shahroz Tariq , Ronal Singh , Ronal Singh , Fatemeh Jalalvand , Fatemeh Jalalvand , Cécile Paris, Surya Nepal , Cécile Paris, Surya Nepal : :
 Towards Human-AI Teaming to Mitigate Alert Fatigue in Security Operations Centres. ACM Trans. Internet Techn. 24(3): 1-22 (2024)
 [j149]Chadni Islam [j149]Chadni Islam , Muhammad Ali Babar , Muhammad Ali Babar , Surya Nepal , Surya Nepal : :
 Design and Generation of a Set of Declarative APIs for Security Orchestration. IEEE Trans. Serv. Comput. 17(1): 127-141 (2024)
 [j148]Ruidong Han [j148]Ruidong Han , Siqi Ma , Siqi Ma , Juanru Li , Juanru Li , Surya Nepal , Surya Nepal , David Lo , David Lo , Zhuo Ma , Zhuo Ma , Jianfeng Ma , Jianfeng Ma : :
 Range Specification Bug Detection in Flight Control System Through Fuzzing. IEEE Trans. Software Eng. 50(3): 461-473 (2024)
 [j147]Jihyeon Ryu [j147]Jihyeon Ryu , Yifeng Zheng , Yifeng Zheng , Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang: , Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
 Can differential privacy practically protect collaborative deep learning inference for IoT? Wirel. Networks 30(6): 4713-4733 (2024)
 [c270]David D. Nguyen, David Liebowitz, Salil S. Kanhere, Surya Nepal: [c270]David D. Nguyen, David Liebowitz, Salil S. Kanhere, Surya Nepal:
 Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions. AAAI 2024: 14440-14448
 [c269]Hassan Ali [c269]Hassan Ali , Surya Nepal , Surya Nepal , Salil S. Kanhere, Sanjay K. Jha: , Salil S. Kanhere, Sanjay K. Jha:
 Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning. ACSAC 2024: 794-809
 [c268]Zhi Zhang [c268]Zhi Zhang , Decheng Chen , Decheng Chen , Jiahao Qi , Jiahao Qi , Yueqiang Cheng , Yueqiang Cheng , Shijie Jiang , Shijie Jiang , Yiyang Lin , Yiyang Lin , Yansong Gao , Yansong Gao , Surya Nepal , Surya Nepal , Yi Zou , Yi Zou , Jiliang Zhang , Jiliang Zhang , Yang Xiang , Yang Xiang : :
 SoK: Rowhammer on Commodity Operating Systems. AsiaCCS 2024
 [c267]Kane Walter [c267]Kane Walter , Meisam Mohammady , Meisam Mohammady , Surya Nepal , Surya Nepal , Salil S. Kanhere , Salil S. Kanhere : :
 Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity. AsiaCCS 2024
 [c266]Hua Ma [c266]Hua Ma , Shang Wang , Shang Wang , Yansong Gao , Yansong Gao , Zhi Zhang , Zhi Zhang , Huming Qiu , Huming Qiu , Minhui Xue , Minhui Xue , Alsharif Abuadbba , Alsharif Abuadbba , Anmin Fu , Anmin Fu , Surya Nepal , Surya Nepal , Derek Abbott , Derek Abbott : :
 Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense. CCS 2024: 4465-4479
 [c265]Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu: [c265]Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu:
 Random Entangled Tokens for Adversarially Robust Vision Transformer. CVPR 2024: 24554-24563
 [c264]Kane Walter [c264]Kane Walter , Surya Nepal , Surya Nepal , Salil S. Kanhere , Salil S. Kanhere : :
 Exploiting Layerwise Feature Representation Similarity For Backdoor Defence in Federated Learning. ESORICS (4) 2024: 354-374
 [c263]Kevin Saric, Gowri Sankar Ramachandran [c263]Kevin Saric, Gowri Sankar Ramachandran , Raja Jurdak , Raja Jurdak , Surya Nepal , Surya Nepal : :
 Efficient Data Security Using Predictions of File Availability on the Web. PST 2024: 1-12
 [c262]Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal: [c262]Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal:
 DeepTheft: Stealing DNN Model Architectures through Power Side Channel. SP 2024: 3311-3326
 [c261]Michael Chesser, Surya Nepal, Damith C. Ranasinghe: [c261]Michael Chesser, Surya Nepal, Damith C. Ranasinghe:
 MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware. USENIX Security Symposium 2024
 [c260]Roelien C. Timmer [c260]Roelien C. Timmer , David Liebowitz , David Liebowitz , Surya Nepal , Surya Nepal , Salil S. Kanhere , Salil S. Kanhere : :
 Honeyfile Camouflage: Hiding Fake Files in Plain Sight. WDC@AsiaCCS 2024
 [c259]Kevin Saric [c259]Kevin Saric , Felix Savins , Felix Savins , Gowri Sankar Ramachandran , Gowri Sankar Ramachandran , Raja Jurdak , Raja Jurdak , Surya Nepal , Surya Nepal : :
 Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains. WWW 2024: 1724-1733
 [c258]Yanjun Zhang [c258]Yanjun Zhang , Ruoxi Sun , Ruoxi Sun , Liyue Shen , Liyue Shen , Guangdong Bai , Guangdong Bai , Minhui Xue , Minhui Xue , Mark Huasong Meng , Mark Huasong Meng , Xue Li , Xue Li , Ryan K. L. Ko , Ryan K. L. Ko , Surya Nepal , Surya Nepal : :
 Privacy-Preserving and Fairness-Aware Federated Learning for Critical Infrastructure Protection and Resilience. WWW 2024: 2986-2997
 [i111]Shahroz Tariq, Mohan Baruwal Chhetri, Surya Nepal, Cécile Paris: [i111]Shahroz Tariq, Mohan Baruwal Chhetri, Surya Nepal, Cécile Paris:
 A2C: A Modular Multi-stage Collaborative Decision Framework for Human-AI Teams. CoRR abs/2401.14432 (2024)
 [i110]Van Nguyen, Tingmin Wu, Xingliang Yuan, Marthie Grobler, Surya Nepal, Carsten Rudolph: [i110]Van Nguyen, Tingmin Wu, Xingliang Yuan, Marthie Grobler, Surya Nepal, Carsten Rudolph:
 A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection. CoRR abs/2402.17092 (2024)
 [i109]Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere: [i109]Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere:
 SoK: Can Trajectory Generation Combine Privacy and Utility? CoRR abs/2403.07218 (2024)
 [i108]David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba: [i108]David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba:
 Contextual Chart Generation for Cyber Deception. CoRR abs/2404.04854 (2024)
 [i107]Van Nguyen, Xingliang Yuan, Tingmin Wu, Surya Nepal, Marthie Grobler, Carsten Rudolph: [i107]Van Nguyen, Xingliang Yuan, Tingmin Wu, Surya Nepal, Marthie Grobler, Carsten Rudolph:
 Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone? CoRR abs/2404.05964 (2024)
 [i106]Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere: [i106]Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere:
 Honeyfile Camouflage: Hiding Fake Files in Plain Sight. CoRR abs/2405.04758 (2024)
 [i105]Zehang Deng, Ruoxi Sun, Minhui Xue, Sheng Wen, Seyit Camtepe, Surya Nepal, Yang Xiang: [i105]Zehang Deng, Ruoxi Sun, Minhui Xue, Sheng Wen, Seyit Camtepe, Surya Nepal, Yang Xiang:
 Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure. CoRR abs/2405.15258 (2024)
 [i104]Bushra Sabir, Shuiqiao Yang, David Nguyen, Nan Wu, Alsharif Abuadbba, Hajime Suzuki, Shangqi Lai [i104]Bushra Sabir, Shuiqiao Yang, David Nguyen, Nan Wu, Alsharif Abuadbba, Hajime Suzuki, Shangqi Lai , Wei Ni, Ding Ming, Surya Nepal: , Wei Ni, Ding Ming, Surya Nepal:
 Systematic Literature Review of AI-enabled Spectrum Management in 6G and Future Networks. CoRR abs/2407.10981 (2024)
 [i103]Van Nguyen, Surya Nepal, Tingmin Wu, Xingliang Yuan, Carsten Rudolph: [i103]Van Nguyen, Surya Nepal, Tingmin Wu, Xingliang Yuan, Carsten Rudolph:
 SAFE: Advancing Large Language Models in Leveraging Semantic and Syntactic Relationships for Software Vulnerability Detection. CoRR abs/2409.00882 (2024)
 [i102]Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay K. Jha: [i102]Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay K. Jha:
 Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning. CoRR abs/2410.11205 (2024)
 [i101]Shigang Liu, Bushra Sabir, Seung Ick Jang, Yuval Kansal, Yansong Gao, Kristen Moore, Alsharif Abuadbba, Surya Nepal: [i101]Shigang Liu, Bushra Sabir, Seung Ick Jang, Yuval Kansal, Yansong Gao, Kristen Moore, Alsharif Abuadbba, Surya Nepal:
 From Solitary Directives to Interactive Encouragement! LLM Secure Code Generation by Natural Language Prompting. CoRR abs/2410.14321 (2024)
 [i100]Ruoxi Sun, Jiamin Chang, Hammond Pearce, Chaowei Xiao, Bo Li, Qi Wu, Surya Nepal, Minhui Xue: [i100]Ruoxi Sun, Jiamin Chang, Hammond Pearce, Chaowei Xiao, Bo Li, Qi Wu, Surya Nepal, Minhui Xue:
 SoK: Unifying Cybersecurity and Cybersafety of Multimodal Foundation Models with an Information Theory Approach. CoRR abs/2411.11195 (2024)
- 2023
 [j146]Chandra Thapa [j146]Chandra Thapa , Jun Wen Tang , Jun Wen Tang , Alsharif Abuadbba , Alsharif Abuadbba , Yansong Gao, Seyit Camtepe , Yansong Gao, Seyit Camtepe , Surya Nepal , Surya Nepal , Mahathir Almashor , Mahathir Almashor , Yifeng Zheng: , Yifeng Zheng:
 Evaluation of Federated Learning in Phishing Email Detection. Sensors 23(9): 4346 (2023)
 [j145]Tarique Anwar [j145]Tarique Anwar , Surya Nepal , Surya Nepal , Cécile Paris, Jian Yang , Cécile Paris, Jian Yang , Jia Wu , Jia Wu , Quan Z. Sheng , Quan Z. Sheng : :
 Tracking the Evolution of Clusters in Social Media Streams. IEEE Trans. Big Data 9(2): 701-715 (2023)
 [j144]Junyang Qiu [j144]Junyang Qiu , Qing-Long Han , Qing-Long Han , Wei Luo , Wei Luo , Lei Pan , Lei Pan , Surya Nepal , Surya Nepal , Jun Zhang , Jun Zhang , Yang Xiang , Yang Xiang : :
 Cyber Code Intelligence for Android Malware Detection. IEEE Trans. Cybern. 53(1): 617-627 (2023)
 [j143]Yifeng Zheng [j143]Yifeng Zheng , Cong Wang , Cong Wang , Ruochen Wang, Huayi Duan , Ruochen Wang, Huayi Duan , Surya Nepal , Surya Nepal : :
 Optimizing Secure Decision Tree Inference Outsourcing. IEEE Trans. Dependable Secur. Comput. 20(4): 3079-3092 (2023)
 [j142]Yanjun Zhang [j142]Yanjun Zhang , Guangdong Bai , Guangdong Bai , Xue Li , Xue Li , Surya Nepal , Surya Nepal , Marthie Grobler , Marthie Grobler , Chen Chen , Chen Chen , Ryan K. L. Ko , Ryan K. L. Ko : :
 Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks. IEEE Trans. Dependable Secur. Comput. 20(4): 3341-3357 (2023)
 [j141]Zhi Zhang [j141]Zhi Zhang , Wei He , Wei He , Yueqiang Cheng, Wenhao Wang , Yueqiang Cheng, Wenhao Wang , Yansong Gao , Yansong Gao , Dongxi Liu, Kang Li , Dongxi Liu, Kang Li , Surya Nepal , Surya Nepal , Anmin Fu , Anmin Fu , Yi Zou , Yi Zou : :
 Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses. IEEE Trans. Dependable Secur. Comput. 20(5): 3716-3733 (2023)
 [j140]Yansong Gao [j140]Yansong Gao , Yang Su , Yang Su , Surya Nepal , Surya Nepal , Damith C. Ranasinghe , Damith C. Ranasinghe : :
 NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions. IEEE Trans. Dependable Secur. Comput. 20(6): 4455-4473 (2023)
 [j139]Viet Vo [j139]Viet Vo , Xingliang Yuan , Xingliang Yuan , Shi-Feng Sun , Shi-Feng Sun , Joseph K. Liu , Joseph K. Liu , Surya Nepal , Surya Nepal , Cong Wang , Cong Wang : :
 ShieldDB: An Encrypted Document Database With Padding Countermeasures. IEEE Trans. Knowl. Data Eng. 35(4): 4236-4252 (2023)
 [j138]Rongjunchen Zhang [j138]Rongjunchen Zhang , Tingmin Wu , Tingmin Wu , Sheng Wen , Sheng Wen , Surya Nepal , Surya Nepal , Cécile Paris, Yang Xiang , Cécile Paris, Yang Xiang : :
 SAM: Multi-turn Response Selection Based on Semantic Awareness Matching. ACM Trans. Internet Techn. 23(1): 3:1-3:18 (2023)
 [j137]Shancang Li, Surya Nepal, Theo Tryfonas, Hongwei Li: [j137]Shancang Li, Surya Nepal, Theo Tryfonas, Hongwei Li:
 Blockchain-based Zero Trust Cybersecurity in the Internet of Things. ACM Trans. Internet Techn. 23(3): 36:1-36:3 (2023)
 [j136]Mohan Baruwal Chhetri [j136]Mohan Baruwal Chhetri , Abdur Rahim Mohammad Forkan , Abdur Rahim Mohammad Forkan , Quoc Bao Vo , Quoc Bao Vo , Surya Nepal , Surya Nepal , Ryszard Kowalczyk , Ryszard Kowalczyk : :
 Towards Proactive Risk-Aware Cloud Cost Optimization Leveraging Transient Resources. IEEE Trans. Serv. Comput. 16(4): 3014-3026 (2023)
 [j135]Fei Zhu [j135]Fei Zhu , Xun Yi , Xun Yi , Alsharif Abuadbba, Ibrahim Khalil , Alsharif Abuadbba, Ibrahim Khalil , Surya Nepal , Surya Nepal , Xinyi Huang , Xinyi Huang : :
 Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT. IEEE Trans. Sustain. Comput. 8(1): 32-42 (2023)
 [c257]Seonhye Park [c257]Seonhye Park , Alsharif Abuadbba , Alsharif Abuadbba , Shuo Wang , Shuo Wang , Kristen Moore , Kristen Moore , Yansong Gao , Yansong Gao , Hyoungshick Kim , Hyoungshick Kim , Surya Nepal , Surya Nepal : :
 DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks. ACSAC 2023: 535-549
 [c256]Mahathir Almashor [c256]Mahathir Almashor , M. Ejaz Ahmed , M. Ejaz Ahmed , Benjamin Pick , Benjamin Pick , Jason Xue, Sharif Abuadbba , Jason Xue, Sharif Abuadbba , Raj Gaire , Raj Gaire , Shuo Wang , Shuo Wang , Seyit Camtepe , Seyit Camtepe , Surya Nepal , Surya Nepal : :
 Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. AINTEC 2023: 78-86
 [c255]Chen Chen, Daochang Liu [c255]Chen Chen, Daochang Liu , Siqi Ma, Surya Nepal , Siqi Ma, Surya Nepal , Chang Xu: , Chang Xu:
 Private Image Generation with Dual-Purpose Auxiliary Classifier. CVPR 2023: 20361-20370
 [c254]Selasi Kwashie [c254]Selasi Kwashie , Wei Kang , Wei Kang , Sandeep Santhosh Kumar , Sandeep Santhosh Kumar , Geoff Jarrad , Geoff Jarrad , Seyit Camtepe , Seyit Camtepe , Surya Nepal , Surya Nepal : :
 Acumen: Analysing the Impact of Organisational Change on Users' Access Entitlements. ESORICS (4) 2023: 410-430
 [c253]Michael Chesser, Surya Nepal, Damith C. Ranasinghe: [c253]Michael Chesser, Surya Nepal, Damith C. Ranasinghe:
 Icicle: A Re-designed Emulator for Grey-Box Firmware Fuzzing. ISSTA 2023: 76-88
 [c252]Shuo Wang, Mahathir Almashor, Alsharif Abuadbba, Ruoxi Sun, Minhui Xue, Calvin Wang, Raj Gaire, Surya Nepal, Seyit Camtepe: [c252]Shuo Wang, Mahathir Almashor, Alsharif Abuadbba, Ruoxi Sun, Minhui Xue, Calvin Wang, Raj Gaire, Surya Nepal, Seyit Camtepe:
 DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning. NDSS 2023
 [c251]Ruoxi Sun [c251]Ruoxi Sun , Minhui Xue , Minhui Xue , Gareth Tyson , Gareth Tyson , Tian Dong , Tian Dong , Shaofeng Li , Shaofeng Li , Shuo Wang , Shuo Wang , Haojin Zhu , Haojin Zhu , Seyit Camtepe , Seyit Camtepe , Surya Nepal , Surya Nepal : :
 Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors. ESEC/SIGSOFT FSE 2023: 1573-1585
 [c250]Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore [c250]Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore , Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil S. Kanhere: , Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil S. Kanhere:
 PublicCheck: Public Integrity Verification for Services of Run-time Deep Models. SP 2023: 1348-1365
 [c249]Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang [c249]Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang , Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Surya Nepal, Derek Abbott: , Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Surya Nepal, Derek Abbott:
 TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World. SRDS 2023: 82-92
 [c248]Minhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer: [c248]Minhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer:
 RAI4IoE: Responsible AI for Enabling the Internet of Energy. TPS-ISA 2023: 13-22
 [c247]Ahmad Mohsin [c247]Ahmad Mohsin , Helge Janicke, Surya Nepal , Helge Janicke, Surya Nepal , David Holmes , David Holmes : :
 Digital Twins and the Future of Their Use Enabling Shift Left and Shift Right Cybersecurity Operations. TPS-ISA 2023: 277-286
 [c246]Surya Nepal, Jaideep Vaidya, Elena Ferrari, Balaji Palanisamy: [c246]Surya Nepal, Jaideep Vaidya, Elena Ferrari, Balaji Palanisamy:
 Message from the General Chairs and PC Chairs TPS-ISA 2023. TPS-ISA 2023: xi
 [c245]Rongjunchen Zhang [c245]Rongjunchen Zhang , Tingmin Wu , Tingmin Wu , Xiao Chen , Xiao Chen , Sheng Wen , Sheng Wen , Surya Nepal , Surya Nepal , Cécile Paris, Yang Xiang , Cécile Paris, Yang Xiang : :
 Dynalogue: A Transformer-Based Dialogue System with Dynamic Attention. WWW 2023: 1604-1615
 [c244]Ruoxi Sun [c244]Ruoxi Sun , Minhui Xue, Gareth Tyson , Minhui Xue, Gareth Tyson , Shuo Wang , Shuo Wang , Seyit Camtepe , Seyit Camtepe , Surya Nepal , Surya Nepal : :
 Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps. WWW 2023: 2166-2177
 [c243]Yanjun Zhang [c243]Yanjun Zhang , Guangdong Bai , Guangdong Bai , Mahawaga Arachchige Pathum Chamikara , Mahawaga Arachchige Pathum Chamikara , Mengyao Ma , Mengyao Ma , Liyue Shen , Liyue Shen , Jingwei Wang , Jingwei Wang , Surya Nepal , Surya Nepal , Minhui Xue, Long Wang , Minhui Xue, Long Wang , Joseph K. Liu , Joseph K. Liu : :
 AgrEvader: Poisoning Membership Inference against Byzantine-robust Federated Learning. WWW 2023: 2371-2382
 [e9]Joseph K. Liu, Yang Xiang, Surya Nepal, Gene Tsudik: [e9]Joseph K. Liu, Yang Xiang, Surya Nepal, Gene Tsudik:
 Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023. ACM 2023 [contents]
 [d3]Ruoxi Sun [d3]Ruoxi Sun , Minhui Xue , Minhui Xue , Gareth Tyson , Gareth Tyson , Tian Dong, Shaofeng Li , Tian Dong, Shaofeng Li , Shuo Wang , Shuo Wang , Haojin Zhu , Haojin Zhu , Seyit Camtepe , Seyit Camtepe , Surya Nepal , Surya Nepal : :
 An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 1. Zenodo, 2023 [all versions] 
 [d2]Ruoxi Sun [d2]Ruoxi Sun , Minhui Xue , Minhui Xue , Gareth Tyson , Gareth Tyson , Tian Dong, Shaofeng Li , Tian Dong, Shaofeng Li , Shuo Wang , Shuo Wang , Haojin Zhu , Haojin Zhu , Seyit Camtepe , Seyit Camtepe , Surya Nepal , Surya Nepal : :
 An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 2. Zenodo, 2023 [all versions] 
 [i99]David D. Nguyen, Surya Nepal, Salil S. Kanhere: [i99]David D. Nguyen, Surya Nepal, Salil S. Kanhere:
 Diverse Multimedia Layout Generation with Multi Choice Learning. CoRR abs/2301.06629 (2023)
 [i98]Michael Chesser, Surya Nepal, Damith C. Ranasinghe: [i98]Michael Chesser, Surya Nepal, Damith C. Ranasinghe:
 ICICLE: A Re-Designed Emulator for Grey-Box Firmware Fuzzing. CoRR abs/2301.13346 (2023)
 [i97]Jiajun Huang, Xinqi Zhu, Chengbin Du, Siqi Ma [i97]Jiajun Huang, Xinqi Zhu, Chengbin Du, Siqi Ma , Surya Nepal, Chang Xu: , Surya Nepal, Chang Xu:
 Anti-Compression Contrastive Facial Forgery Detection. CoRR abs/2302.06183 (2023)
 [i96]Chuyang Zhou, Jiajun Huang, Daochang Liu [i96]Chuyang Zhou, Jiajun Huang, Daochang Liu , Chengbin Du, Siqi Ma , Chengbin Du, Siqi Ma , Surya Nepal, Chang Xu: , Surya Nepal, Chang Xu:
 Two-in-one Knowledge Distillation for Efficient Facial Forgery Detection. CoRR abs/2302.10437 (2023)
 [i95]Ruoxi Sun, Minhui Xue, Gareth Tyson, Shuo Wang, Seyit Camtepe, Surya Nepal: [i95]Ruoxi Sun, Minhui Xue, Gareth Tyson, Shuo Wang, Seyit Camtepe, Surya Nepal:
 Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps. CoRR abs/2303.09008 (2023)
 [i94]Nazatul Haque Sultan, Shabnam Kasra Kermanshahi [i94]Nazatul Haque Sultan, Shabnam Kasra Kermanshahi , Hong-Yen Tran, Shangqi Lai, Vijay Varadharajan, Surya Nepal, Xun Yi: , Hong-Yen Tran, Shangqi Lai, Vijay Varadharajan, Surya Nepal, Xun Yi:
 A Multi-Client Searchable Encryption Scheme for IoT Environment. CoRR abs/2305.09221 (2023)
 [i93]Huihui Gong, Minjing Dong, Siqi Ma [i93]Huihui Gong, Minjing Dong, Siqi Ma , Seyit Camtepe, Surya Nepal, Chang Xu: , Seyit Camtepe, Surya Nepal, Chang Xu:
 Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization. CoRR abs/2309.09480 (2023)
 [i92]Minhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer: [i92]Minhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer:
 RAI4IoE: Responsible AI for Enabling the Internet of Energy. CoRR abs/2309.11691 (2023)
 [i91]Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal: [i91]Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal:
 DeepTheft: Stealing DNN Model Architectures through Power Side Channel. CoRR abs/2309.11894 (2023)
 [i90]Ahmad Mohsin, Helge Janicke, Surya Nepal, David Holmes [i90]Ahmad Mohsin, Helge Janicke, Surya Nepal, David Holmes : :
 Digital Twins and the Future of their Use Enabling Shift Left and Shift Right Cybersecurity Operations. CoRR abs/2309.13612 (2023)
 [i89]Huihui Gong, Minjing Dong [i89]Huihui Gong, Minjing Dong , Siqi Ma , Siqi Ma , Seyit Camtepe, Surya Nepal, Chang Xu: , Seyit Camtepe, Surya Nepal, Chang Xu:
 Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks. CoRR abs/2309.16207 (2023)
 [i88]Iqbal H. Sarker, Helge Janicke, Nazeeruddin Mohammad, Paul A. Watters, Surya Nepal: [i88]Iqbal H. Sarker, Helge Janicke, Nazeeruddin Mohammad, Paul A. Watters, Surya Nepal:
 AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity. CoRR abs/2310.12162 (2023)
 [i87]David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere: [i87]David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere:
 Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions. CoRR abs/2312.11735 (2023)
- 2022
 [j134]Fei Zhu [j134]Fei Zhu , Xun Yi, Alsharif Abuadbba, Ibrahim Khalil , Xun Yi, Alsharif Abuadbba, Ibrahim Khalil , Surya Nepal, Xinyi Huang: , Surya Nepal, Xinyi Huang:
 Forward-Secure Edge Authentication for Graphs. Comput. J. 65(7): 1653-1665 (2022)
 [j133]Yueqiang Cheng, Zhi Zhang [j133]Yueqiang Cheng, Zhi Zhang , Yansong Gao, Zhaofeng Chen, Shengjian Guo, Qifei Zhang, Rui Mei , Yansong Gao, Zhaofeng Chen, Shengjian Guo, Qifei Zhang, Rui Mei , Surya Nepal , Surya Nepal , Yang Xiang , Yang Xiang : :
 Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation. Comput. Secur. 113: 102556 (2022)
 [j132]Surya Nepal [j132]Surya Nepal , Ryan K. L. Ko , Ryan K. L. Ko , Marthie Grobler , Marthie Grobler , L. Jean Camp: , L. Jean Camp:
 Editorial: Human-Centric Security and Privacy. Frontiers Big Data 5: 848058 (2022)
 [j131]Feixue Yan [j131]Feixue Yan , Sheng Wen, Surya Nepal , Sheng Wen, Surya Nepal , Cécile Paris, Yang Xiang: , Cécile Paris, Yang Xiang:
 Explainable machine learning in cybersecurity: A survey. Int. J. Intell. Syst. 37(12): 12305-12334 (2022)
 [j130]Seyit Camtepe [j130]Seyit Camtepe , Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal , Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal , Marcin Pawlowski, Josef Pieprzyk , Marcin Pawlowski, Josef Pieprzyk : :
 ANS-based compression and encryption with 128-bit security. Int. J. Inf. Sec. 21(5): 1051-1067 (2022)
 [j129]Xu Yang [j129]Xu Yang , Xuechao Yang , Xuechao Yang , Xun Yi , Xun Yi , Ibrahim Khalil , Ibrahim Khalil , Xiaotong Zhou, Debiao He , Xiaotong Zhou, Debiao He , Xinyi Huang, Surya Nepal , Xinyi Huang, Surya Nepal : :
 Blockchain-Based Secure and Lightweight Authentication for Internet of Things. IEEE Internet Things J. 9(5): 3321-3332 (2022)
 [j128]Fei Zhu [j128]Fei Zhu , Xun Yi , Xun Yi , Alsharif Abuadbba, Ibrahim Khalil , Alsharif Abuadbba, Ibrahim Khalil , Surya Nepal , Surya Nepal , Xinyi Huang , Xinyi Huang , Xingfu Yan , Xingfu Yan : :
 Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks. IEEE Internet Things J. 9(14): 12209-12218 (2022)
 [j127]Xu Yang [j127]Xu Yang , Xun Yi , Xun Yi , Ibrahim Khalil , Ibrahim Khalil , Junwei Luo, Elisa Bertino , Junwei Luo, Elisa Bertino , Surya Nepal , Surya Nepal , Xinyi Huang , Xinyi Huang : :
 Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs. IEEE Internet Things J. 9(14): 12563-12572 (2022)
 [j126]Shabnam Kasra Kermanshahi [j126]Shabnam Kasra Kermanshahi , Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal , Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal , Xun Yi, Shangqi Lai: , Xun Yi, Shangqi Lai:
 Range search on encrypted spatial data with dynamic updates. J. Comput. Secur. 30(6): 829-849 (2022)
 [j125]Yansong Gao [j125]Yansong Gao , Minki Kim, Chandra Thapa , Minki Kim, Chandra Thapa , Alsharif Abuadbba , Alsharif Abuadbba , Zhi Zhang , Zhi Zhang , Seyit Camtepe , Seyit Camtepe , Hyoungshick Kim , Hyoungshick Kim , Surya Nepal , Surya Nepal : :
 Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things. IEEE Trans. Computers 71(10): 2538-2552 (2022)
 [j124]Derui Wang [j124]Derui Wang , Chaoran Li , Chaoran Li , Sheng Wen , Sheng Wen , Qing-Long Han , Qing-Long Han , Surya Nepal , Surya Nepal , Xiangyu Zhang, Yang Xiang , Xiangyu Zhang, Yang Xiang : :
 Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples. IEEE Trans. Cybern. 52(8): 7427-7440 (2022)
 [j123]Yansong Gao [j123]Yansong Gao , Marten van Dijk, Lei Xu , Marten van Dijk, Lei Xu , Wei Yang , Wei Yang , Surya Nepal , Surya Nepal , Damith C. Ranasinghe , Damith C. Ranasinghe : :
 TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs. IEEE Trans. Dependable Secur. Comput. 19(1): 419-437 (2022)
 [j122]Shabnam Kasra Kermanshahi [j122]Shabnam Kasra Kermanshahi , Shifeng Sun , Shifeng Sun , Joseph K. Liu , Joseph K. Liu , Ron Steinfeld, Surya Nepal , Ron Steinfeld, Surya Nepal , Wang Fat Lau, Man Ho Allen Au , Wang Fat Lau, Man Ho Allen Au : :
 Geometric Range Search on Encrypted Data With Forward/Backward Security. IEEE Trans. Dependable Secur. Comput. 19(1): 698-716 (2022)
 [j121]Derui Wang [j121]Derui Wang , Chaoran Li , Chaoran Li , Sheng Wen , Sheng Wen , Surya Nepal , Surya Nepal , Yang Xiang , Yang Xiang : :
 Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training. IEEE Trans. Dependable Secur. Comput. 19(2): 953-965 (2022)
 [j120]Xiaoning Liu [j120]Xiaoning Liu , Yifeng Zheng , Yifeng Zheng , Xun Yi , Xun Yi , Surya Nepal , Surya Nepal : :
 Privacy-Preserving Collaborative Analytics on Medical Time Series Data. IEEE Trans. Dependable Secur. Comput. 19(3): 1687-1702 (2022)
 [j119]Yifeng Zheng [j119]Yifeng Zheng , Huayi Duan , Huayi Duan , Cong Wang , Cong Wang , Ruochen Wang, Surya Nepal , Ruochen Wang, Surya Nepal : :
 Securely and Efficiently Outsourcing Decision Tree Inference. IEEE Trans. Dependable Secur. Comput. 19(3): 1841-1855 (2022)
 [j118]Siqi Ma [j118]Siqi Ma , Juanru Li, Surya Nepal , Juanru Li, Surya Nepal , Diethelm Ostry, David Lo , Diethelm Ostry, David Lo , Sanjay K. Jha , Sanjay K. Jha , Robert H. Deng , Robert H. Deng , Elisa Bertino , Elisa Bertino : :
 Orchestration or Automation: Authentication Flaw Detection in Android Apps. IEEE Trans. Dependable Secur. Comput. 19(4): 2165-2178 (2022)
 [j117]Yansong Gao [j117]Yansong Gao , Yeonjae Kim, Bao Gia Doan , Yeonjae Kim, Bao Gia Doan , Zhi Zhang , Zhi Zhang , Gongxuan Zhang, Surya Nepal , Gongxuan Zhang, Surya Nepal , Damith C. Ranasinghe , Damith C. Ranasinghe , Hyoungshick Kim , Hyoungshick Kim : :
 Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks. IEEE Trans. Dependable Secur. Comput. 19(4): 2349-2364 (2022)
 [j116]Shuo Wang [j116]Shuo Wang , Surya Nepal , Surya Nepal , Alsharif Abuadbba, Carsten Rudolph , Alsharif Abuadbba, Carsten Rudolph , Marthie Grobler , Marthie Grobler : :
 Adversarial Detection by Latent Style Transformations. IEEE Trans. Inf. Forensics Secur. 17: 1099-1114 (2022)
 [j115]Xiaoxiao Ma [j115]Xiaoxiao Ma , Shan Xue , Shan Xue , Jia Wu , Jia Wu , Jian Yang , Jian Yang , Cécile Paris, Surya Nepal , Cécile Paris, Surya Nepal , Quan Z. Sheng , Quan Z. Sheng : :
 Deep Multi-Attributed-View Graph Representation Learning. IEEE Trans. Netw. Sci. Eng. 9(5): 3762-3774 (2022)
 [j114]Derui Wang, Sheng Wen, Alireza Jolfaei [j114]Derui Wang, Sheng Wen, Alireza Jolfaei , Mohammad Sayad Haghighi , Mohammad Sayad Haghighi , Surya Nepal , Surya Nepal , Yang Xiang , Yang Xiang : :
 On the Neural Backdoor of Federated Generative Models in Edge Computing. ACM Trans. Internet Techn. 22(2): 43:1-43:21 (2022)
 [j113]Tingmin Wu [j113]Tingmin Wu , Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal , Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal , Yang Xiang , Yang Xiang : :
 Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity. ACM Trans. Internet Techn. 22(2): 52:1-52:27 (2022)
 [j112]Shuo Wang [j112]Shuo Wang , Surya Nepal , Surya Nepal , Kristen Moore , Kristen Moore , Marthie Grobler , Marthie Grobler , Carsten Rudolph , Carsten Rudolph , Alsharif Abuadbba: , Alsharif Abuadbba:
 OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning. IEEE Trans. Parallel Distributed Syst. 33(12): 3460-3477 (2022)
 [j111]Mei-Ling Shyu [j111]Mei-Ling Shyu , Surya Nepal , Surya Nepal , Valérie Issarny , Valérie Issarny , James Joshi , James Joshi : :
 Guest Editorial: Special Issue on Services Computing for COVID-19 and Future Pandemics. IEEE Trans. Serv. Comput. 15(3): 1175-1177 (2022)
 [j110]Shuo Wang [j110]Shuo Wang , Surya Nepal , Surya Nepal , Carsten Rudolph , Carsten Rudolph , Marthie Grobler , Marthie Grobler , Shangyu Chen, Tianle Chen: , Shangyu Chen, Tianle Chen:
 Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models. IEEE Trans. Serv. Comput. 15(3): 1526-1539 (2022)
 [j109]Xu Yang [j109]Xu Yang , Xun Yi , Xun Yi , Surya Nepal , Surya Nepal , Ibrahim Khalil , Ibrahim Khalil , Xinyi Huang, Jian Shen , Xinyi Huang, Jian Shen : :
 Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs. IEEE Trans. Serv. Comput. 15(5): 2728-2741 (2022)
 [j108]Shuo Wang [j108]Shuo Wang , Surya Nepal , Surya Nepal , Carsten Rudolph , Carsten Rudolph , Marthie Grobler , Marthie Grobler , Shangyu Chen, Tianle Chen, Zike An: , Shangyu Chen, Tianle Chen, Zike An:
 Defending Adversarial Attacks via Semantic Feature Manipulation. IEEE Trans. Serv. Comput. 15(6): 3184-3197 (2022)
 [j107]Fanzhen Liu [j107]Fanzhen Liu , Zhao Li , Zhao Li , Baokun Wang, Jia Wu , Baokun Wang, Jia Wu , Jian Yang , Jian Yang , Jiaming Huang, Yiqing Zhang , Jiaming Huang, Yiqing Zhang , Weiqiang Wang, Shan Xue , Weiqiang Wang, Shan Xue , Surya Nepal , Surya Nepal , Quan Z. Sheng , Quan Z. Sheng : :
 eRiskCom: an e-commerce risky community detection platform. VLDB J. 31(5): 1085-1101 (2022)
 [c242]Erik Buchholz [c242]Erik Buchholz , Alsharif Abuadbba , Alsharif Abuadbba , Shuo Wang , Shuo Wang , Surya Nepal , Surya Nepal , Salil Subhash Kanhere , Salil Subhash Kanhere : :
 Reconstruction Attack on Differential Private Trajectory Protection Mechanisms. ACSAC 2022: 279-292
 [c241]Chandra Thapa [c241]Chandra Thapa , Seung Ick Jang , Seung Ick Jang , Muhammad Ejaz Ahmed , Muhammad Ejaz Ahmed , Seyit Camtepe , Seyit Camtepe , Josef Pieprzyk , Josef Pieprzyk , Surya Nepal , Surya Nepal : :
 Transformer-Based Language Models for Software Vulnerability Detection. ACSAC 2022: 481-496
 [c240]Chandra Thapa [c240]Chandra Thapa , Seyit Camtepe , Seyit Camtepe , Raj Gaire, Surya Nepal , Raj Gaire, Surya Nepal , Seung Ick Jang , Seung Ick Jang : :
 Demo - MaLFraDA: A Machine Learning Framework with Data Airlock. CCS 2022: 3523-3525
 [c239]Xueyu Wang, Jiajun Huang, Siqi Ma [c239]Xueyu Wang, Jiajun Huang, Siqi Ma , Surya Nepal , Surya Nepal , Chang Xu: , Chang Xu:
 DeepFake Disrupter: The Detector of DeepFake Is My Friend. CVPR 2022: 14900-14909
 [c238]Mahawaga Arachchige Pathum Chamikara [c238]Mahawaga Arachchige Pathum Chamikara , Dongxi Liu, Seyit Camtepe , Dongxi Liu, Seyit Camtepe , Surya Nepal , Surya Nepal , Marthie Grobler , Marthie Grobler , Peter Bertók, Ibrahim Khalil: , Peter Bertók, Ibrahim Khalil:
 Local Differential Privacy for Federated Learning. ESORICS (1) 2022: 195-216
 [c237]Fei Zhu [c237]Fei Zhu , Xun Yi, Alsharif Abuadbba, Junwei Luo, Surya Nepal, Xinyi Huang: , Xun Yi, Alsharif Abuadbba, Junwei Luo, Surya Nepal, Xinyi Huang:
 Efficient Hash-Based Redactable Signature for Smart Grid Applications. ESORICS (3) 2022: 554-573
 [c236]Kristen Moore [c236]Kristen Moore , Cody James Christopher, David Liebowitz, Surya Nepal, Renee Selvey: , Cody James Christopher, David Liebowitz, Surya Nepal, Renee Selvey:
 Modelling direct messaging networks with multiple recipients for cyber deception. EuroS&P 2022: 1-19
 [c235]Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere: [c235]Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere:
 TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing. HICSS 2022: 1-10
 [c234]Mariya Shmalko, Alsharif Abuadbba [c234]Mariya Shmalko, Alsharif Abuadbba , Raj Gaire, Tingmin Wu , Raj Gaire, Tingmin Wu , Hye-Young Paik, Surya Nepal , Hye-Young Paik, Surya Nepal : :
 Profiler: Distributed Model to Detect Phishing. ICDCS 2022: 1336-1337
 [c233]Shuo Wang, Jinyuan Qin, Carsten Rudolph, Surya Nepal, Marthie Grobler: [c233]Shuo Wang, Jinyuan Qin, Carsten Rudolph, Surya Nepal, Marthie Grobler:
 R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy. IJCNN 2022: 1-9
 [c232]Soolin Kim, Jusop Choi, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim: [c232]Soolin Kim, Jusop Choi, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:
 VulDeBERT: A Vulnerability Detection System Using BERT. ISSRE Workshops 2022: 69-74
 [c231]Yanjun Shen, Bin Yu, Shangqi Lai [c231]Yanjun Shen, Bin Yu, Shangqi Lai , Xingliang Yuan , Xingliang Yuan , Shifeng Sun , Shifeng Sun , Joseph K. Liu , Joseph K. Liu , Surya Nepal , Surya Nepal : :
 OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control. ISC 2022: 269-289
 [c230]Huihui Gong [c230]Huihui Gong , Siqi Ma , Siqi Ma , Seyit Camtepe , Seyit Camtepe , Surya Nepal , Surya Nepal , Chang Xu , Chang Xu : :
 Vulnerability Detection Using Deep Learning Based Function Classification. NSS 2022: 3-22
 [c229]Keelan Evans, Alsharif Abuadbba [c229]Keelan Evans, Alsharif Abuadbba , Tingmin Wu , Tingmin Wu , Kristen Moore , Kristen Moore , Mohiuddin Ahmed , Mohiuddin Ahmed , Ganna Pogrebna , Ganna Pogrebna , Surya Nepal , Surya Nepal , Mike Johnstone , Mike Johnstone : :
 RAIDER: Reinforcement-Aided Spear Phishing Detector. NSS 2022: 23-50
 [c228]Kevin Saric, Gowri Sankar Ramachandran [c228]Kevin Saric, Gowri Sankar Ramachandran , Shantanu Pal, Raja Jurdak , Shantanu Pal, Raja Jurdak , Surya Nepal , Surya Nepal : :
 A Universal Deduplication Architecture for Secure and Efficient Cloud Storage. TPS-ISA 2022: 10-19
 [c227]Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu: [c227]Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu:
 SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh. USENIX ATC 2022: 399-414
 [e8]Venkata Ramana Badarla, Surya Nepal, Rudrapatna K. Shyamasundar [e8]Venkata Ramana Badarla, Surya Nepal, Rudrapatna K. Shyamasundar : :
 Information Systems Security - 18th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, Proceedings. Lecture Notes in Computer Science 13784, Springer 2022, ISBN 978-3-031-23689-1 [contents]
 [d1]Yang Su [d1]Yang Su , Yansong Gao , Yansong Gao , Surya Nepal, Damith C. Ranasinghe , Surya Nepal, Damith C. Ranasinghe : :
 NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions. IEEE DataPort, 2022 
 [i86]Zhi Zhang, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou: [i86]Zhi Zhang, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou:
 A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM. CoRR abs/2201.02986 (2022)
 [i85]Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Surya Nepal, Derek Abbott: [i85]Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Surya Nepal, Derek Abbott:
 Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World. CoRR abs/2201.08619 (2022)
 [i84]M. A. P. Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertók, Ibrahim Khalil: [i84]M. A. P. Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertók, Ibrahim Khalil:
 Local Differential Privacy for Federated Learning in Industrial Settings. CoRR abs/2202.06053 (2022)
 [i83]Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere: [i83]Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere:
 Can pre-trained Transformers be used in detecting complex sensitive sentences? - A Monsanto case study. CoRR abs/2203.06793 (2022)
 [i82]Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere: [i82]Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere:
 TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing. CoRR abs/2203.07580 (2022)
 [i81]Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Surya Nepal, Salil S. Kanhere: [i81]Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Surya Nepal, Salil S. Kanhere:
 Integrity Fingerprinting of DNN with Double Black-box Design and Verification. CoRR abs/2203.10902 (2022)
 [i80]Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammad Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal: [i80]Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammad Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal:
 Towards Web Phishing Detection Limitations and Mitigation. CoRR abs/2204.00985 (2022)
 [i79]Chandra Thapa, Seung Ick Jang [i79]Chandra Thapa, Seung Ick Jang , Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk , Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk , Surya Nepal: , Surya Nepal:
 Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms. CoRR abs/2204.03214 (2022)
 [i78]David Liebowitz, Surya Nepal, Kristen Moore, Cody James Christopher, Salil S. Kanhere, David D. Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar: [i78]David Liebowitz, Surya Nepal, Kristen Moore, Cody James Christopher, Salil S. Kanhere, David D. Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar:
 Deception for Cyber Defence: Challenges and Opportunities. CoRR abs/2208.07127 (2022)
 [i77]Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-Young Paik, Surya Nepal: [i77]Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-Young Paik, Surya Nepal:
 Profiler: Profile-Based Model to Detect Phishing Emails. CoRR abs/2208.08745 (2022)
 [i76]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal: [i76]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal:
 Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. CoRR abs/2208.12449 (2022)
 [i75]Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu [i75]Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu , Said F. Al-Sarawi, Surya Nepal, Derek Abbott: , Said F. Al-Sarawi, Surya Nepal, Derek Abbott:
 MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World. CoRR abs/2209.02339 (2022)
 [i74]Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere: [i74]Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere:
 Reconstruction Attack on Differential Private Trajectory Protection Mechanisms. CoRR abs/2210.09375 (2022)
 [i73]Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal: [i73]Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal:
 Tracking Dataset IP Use in Deep Neural Networks. CoRR abs/2211.13535 (2022)
- 2021
 [j106]Annie Gilda Roselin [j106]Annie Gilda Roselin , Priyadarsi Nanda , Priyadarsi Nanda , Surya Nepal , Surya Nepal , Xiangjian He , Xiangjian He : :
 Intelligent Anomaly Detection for Large Network Traffic With Optimized Deep Clustering (ODC) Algorithm. IEEE Access 9: 47243-47251 (2021)
 [j105]Athman Bouguettaya, Quan Z. Sheng [j105]Athman Bouguettaya, Quan Z. Sheng , Boualem Benatallah , Boualem Benatallah , Azadeh Ghari Neiat , Azadeh Ghari Neiat , Sajib Mistry , Sajib Mistry , Aditya Ghose, Surya Nepal , Aditya Ghose, Surya Nepal , Lina Yao: , Lina Yao:
 An internet of things service roadmap. Commun. ACM 64(9): 86-95 (2021)
 [j104]Hui Cui, Russell Paulet, Surya Nepal [j104]Hui Cui, Russell Paulet, Surya Nepal , Xun Yi, Butrus Mbimbi: , Xun Yi, Butrus Mbimbi:
 Two-Factor Decryption: A Better Way to Protect Data Security and Privacy. Comput. J. 64(4): 550-563 (2021)
 [j103]Peng Zhou [j103]Peng Zhou , Xiaojing Gu, Surya Nepal , Xiaojing Gu, Surya Nepal , Jianying Zhou , Jianying Zhou : :
 Modeling social worm propagation for advanced persistent threats. Comput. Secur. 108: 102321 (2021)
 [j102]Junyang Qiu, Jun Zhang [j102]Junyang Qiu, Jun Zhang , Wei Luo , Wei Luo , Lei Pan , Lei Pan , Surya Nepal , Surya Nepal , Yang Xiang , Yang Xiang : :
 A Survey of Android Malware Detection with Deep Neural Models. ACM Comput. Surv. 53(6): 126:1-126:36 (2021)
 [j101]Marthie Grobler [j101]Marthie Grobler , Raj Gaire, Surya Nepal , Raj Gaire, Surya Nepal : :
 User, Usage and Usability: Redefining Human Centric Cyber Security. Frontiers Big Data 4: 583723 (2021)
 [j100]Kallol Krishna Karmakar [j100]Kallol Krishna Karmakar , Vijay Varadharajan, Surya Nepal , Vijay Varadharajan, Surya Nepal , Udaya Kiran Tupakula , Udaya Kiran Tupakula : :
 SDN-Enabled Secure IoT Architecture. IEEE Internet Things J. 8(8): 6549-6564 (2021)
 [j99]Fei Zhu [j99]Fei Zhu , Xun Yi , Xun Yi , Alsharif Abuadbba, Ibrahim Khalil , Alsharif Abuadbba, Ibrahim Khalil , Surya Nepal , Surya Nepal , Xinyi Huang , Xinyi Huang : :
 Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT. IEEE Internet Things J. 8(14): 11678-11689 (2021)
 [j98]Marthie Grobler [j98]Marthie Grobler , M. A. P. Chamikara , M. A. P. Chamikara , Jacob Abbott , Jacob Abbott , Jongkil Jay Jeong , Jongkil Jay Jeong , Surya Nepal , Surya Nepal , Cécile Paris: , Cécile Paris:
 The importance of social identity on password formulations. Pers. Ubiquitous Comput. 25(5): 813-827 (2021)
 [j97]Wenmin Lin, Xuyun Zhang [j97]Wenmin Lin, Xuyun Zhang , Lianyong Qi , Lianyong Qi , Weimin Li , Weimin Li , Shancang Li , Shancang Li , Victor S. Sheng , Victor S. Sheng , Surya Nepal , Surya Nepal : :
 Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things. IEEE Trans. Comput. Soc. Syst. 8(1): 227-235 (2021)
 [j96]Yuan Hong [j96]Yuan Hong , Valérie Issarny , Valérie Issarny , Surya Nepal , Surya Nepal , Mudhakar Srivatsa: , Mudhakar Srivatsa:
 Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems. IEEE Trans. Dependable Secur. Comput. 18(4): 1511-1512 (2021)
 [j95]Yueqiang Cheng [j95]Yueqiang Cheng , Zhi Zhang , Zhi Zhang , Surya Nepal , Surya Nepal , Zhi Wang: , Zhi Wang:
 CATTmew: Defeating Software-Only Physical Kernel Isolation. IEEE Trans. Dependable Secur. Comput. 18(4): 1989-2004 (2021)
 [j94]Derui Wang [j94]Derui Wang , Chaoran Li , Chaoran Li , Sheng Wen , Sheng Wen , Surya Nepal , Surya Nepal , Yang Xiang , Yang Xiang : :
 Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models. IEEE Trans. Dependable Secur. Comput. 18(5): 2074-2087 (2021)
 [j93]Shabnam Kasra Kermanshahi [j93]Shabnam Kasra Kermanshahi , Joseph K. Liu , Joseph K. Liu , Ron Steinfeld, Surya Nepal , Ron Steinfeld, Surya Nepal , Shangqi Lai , Shangqi Lai , Randolph Loh, Cong Zuo , Randolph Loh, Cong Zuo : :
 Multi-Client Cloud-Based Symmetric Searchable Encryption. IEEE Trans. Dependable Secur. Comput. 18(5): 2419-2437 (2021)
 [j92]Yuan Hong [j92]Yuan Hong , Valérie Issarny , Valérie Issarny , Surya Nepal , Surya Nepal , Mudhakar Srivatsa: , Mudhakar Srivatsa:
 Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems. IEEE Trans. Emerg. Top. Comput. 9(3): 1328-1329 (2021)
 [j91]Zhi Zhang [j91]Zhi Zhang , Yueqiang Cheng, Yansong Gao , Yueqiang Cheng, Yansong Gao , Surya Nepal , Surya Nepal , Dongxi Liu, Yi Zou: , Dongxi Liu, Yi Zou:
 Detecting Hardware-Assisted Virtualization With Inconspicuous Features. IEEE Trans. Inf. Forensics Secur. 16: 16-27 (2021)
 [j90]Seyit Camtepe [j90]Seyit Camtepe , Jarek Duda , Jarek Duda , Arash Mahboubi , Arash Mahboubi , Pawel Morawiecki , Pawel Morawiecki , Surya Nepal , Surya Nepal , Marcin Pawlowski , Marcin Pawlowski , Josef Pieprzyk , Josef Pieprzyk : :
 Compcrypt-Lightweight ANS-Based Compression and Encryption. IEEE Trans. Inf. Forensics Secur. 16: 3859-3873 (2021)
 [j89]Zhi Zhang [j89]Zhi Zhang , Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao , Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao , Minghua Wang , Minghua Wang , Kang Li, Surya Nepal , Kang Li, Surya Nepal , Yang Xiang , Yang Xiang : :
 BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability. IEEE Trans. Inf. Forensics Secur. 16: 5167-5181 (2021)
 [j88]Shiva Raj Pokhrel [j88]Shiva Raj Pokhrel , Youyang Qu , Youyang Qu , Surya Nepal , Surya Nepal , Surjit Singh , Surjit Singh : :
 Privacy-Aware Autonomous Valet Parking: Towards Experience Driven Approach. IEEE Trans. Intell. Transp. Syst. 22(8): 5352-5363 (2021)
 [j87]Shahriar Badsha [j87]Shahriar Badsha , Xun Yi , Xun Yi , Ibrahim Khalil , Ibrahim Khalil , Dongxi Liu, Surya Nepal , Dongxi Liu, Surya Nepal , Elisa Bertino , Elisa Bertino , Kwok-Yan Lam , Kwok-Yan Lam : :
 Privacy Preserving Location-Aware Personalized Web Service Recommendations. IEEE Trans. Serv. Comput. 14(3): 791-804 (2021)
 [j86]Mohan Baruwal Chhetri [j86]Mohan Baruwal Chhetri , Abdur Rahim Mohammad Forkan , Abdur Rahim Mohammad Forkan , Quoc Bao Vo , Quoc Bao Vo , Surya Nepal , Surya Nepal , Ryszard Kowalczyk , Ryszard Kowalczyk : :
 Exploiting Heterogeneity for Opportunistic Resource Scaling in Cloud-Hosted Applications. IEEE Trans. Serv. Comput. 14(6): 1739-1750 (2021)
 [j85]Anil Singh [j85]Anil Singh , Nitin Auluck , Nitin Auluck , Omer F. Rana , Omer F. Rana , Andrew C. Jones , Andrew C. Jones , Surya Nepal , Surya Nepal : :
 Scheduling Real-Time Security Aware Tasks in Fog Networks. IEEE Trans. Serv. Comput. 14(6): 1981-1994 (2021)
 [c226]Viet Vo, Shangqi Lai [c226]Viet Vo, Shangqi Lai , Xingliang Yuan, Surya Nepal , Xingliang Yuan, Surya Nepal , Joseph K. Liu: , Joseph K. Liu:
 Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves. ACNS (1) 2021: 50-75
 [c225]Jongkil Kim, Seyit Camtepe, Joonsang Baek [c225]Jongkil Kim, Seyit Camtepe, Joonsang Baek , Willy Susilo , Willy Susilo , Josef Pieprzyk , Josef Pieprzyk , Surya Nepal: , Surya Nepal:
 P2DPI: Practical and Privacy-Preserving Deep Packet Inspection. AsiaCCS 2021: 135-146
 [c224]Xiaotao Feng, Ruoxi Sun [c224]Xiaotao Feng, Ruoxi Sun , Xiaogang Zhu , Xiaogang Zhu , Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang , Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang : :
 Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. CCS 2021: 337-350
 [c223]Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim: [c223]Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:
 Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN. DSN 2021: 63-74
 [c222]Shabnam Kasra Kermanshahi [c222]Shabnam Kasra Kermanshahi , Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal , Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal , Xun Yi: , Xun Yi:
 Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy. ESORICS (2) 2021: 24-43
 [c221]Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe [c221]Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe , Surya Nepal: , Surya Nepal:
 Peeler: Profiling Kernel-Level Events to Detect Ransomware. ESORICS (1) 2021: 240-260
 [c220]David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere: [c220]David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere:
 HoneyCode: Automating Deceptive Software Repositories with Deep Generative Models. HICSS 2021: 1-10
 [c219]Siqi Ma [c219]Siqi Ma , Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal , Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal , Diethelm Ostry, Cong Sun: , Diethelm Ostry, Cong Sun:
 Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. ICSE 2021: 1671-1682
 [c218]Yanjun Shen, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal [c218]Yanjun Shen, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal : :
 OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control. ISPEC 2021: 126-146
 [c217]David D. Nguyen, Surya Nepal [c217]David D. Nguyen, Surya Nepal , Salil S. Kanhere: , Salil S. Kanhere:
 Diverse Multimedia Layout Generation with Multi Choice Learning. ACM Multimedia 2021: 218-226
 [c216]Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Surya Nepal: [c216]Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Surya Nepal:
 OblivSketch: Oblivious Network Measurement as a Cloud Service. NDSS 2021
 [c215]Shifeng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, Dawu Gu: [c215]Shifeng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, Dawu Gu:
 Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. NDSS 2021
 [c214]Chandra Thapa [c214]Chandra Thapa , Kallol Krishna Karmakar, Alberto Huertas Celdrán , Kallol Krishna Karmakar, Alberto Huertas Celdrán , Seyit Camtepe , Seyit Camtepe , Vijay Varadharajan, Surya Nepal: , Vijay Varadharajan, Surya Nepal:
 FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation. QSHINE 2021: 3-24
 [c213]Alsharif Abuadbba [c213]Alsharif Abuadbba , Hyoungshick Kim, Surya Nepal , Hyoungshick Kim, Surya Nepal : :
 DeepiSign: invisible fragile watermark to protect the integrity and authenticity of CNN. SAC 2021: 952-959
 [c212]David Holmes [c212]David Holmes , Maria Papathanasaki , Maria Papathanasaki , Leandros Maglaras , Leandros Maglaras , Mohamed Amine Ferrag , Mohamed Amine Ferrag , Surya Nepal , Surya Nepal , Helge Janicke: , Helge Janicke:
 Digital Twins and Cyber Security - solution or challenge? SEEDA-CECNSM 2021: 1-8
 [c211]Anil Singh, Nitin Auluck, Omer F. Rana [c211]Anil Singh, Nitin Auluck, Omer F. Rana , Surya Nepal , Surya Nepal : :
 Scheduling Real Tim Security Aware Tasks in Fog Networks. SERVICES 2021: 6
 [c210]Xu Yang, Xun Yi, Surya Nepal [c210]Xu Yang, Xun Yi, Surya Nepal , Ibrahim Khalil , Ibrahim Khalil , Xinyi Huang, Jian Shen , Xinyi Huang, Jian Shen : :
 Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs. SERVICES 2021: 11
 [c209]Nazatul Haque Sultan, Vijay Varadharajan, Chandan Kumar Chaudhary [c209]Nazatul Haque Sultan, Vijay Varadharajan, Chandan Kumar Chaudhary , Seyit Camtepe , Seyit Camtepe , Surya Nepal , Surya Nepal : :
 A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks. SRDS 2021: 164-175
 [c208]Roelien C. Timmer, David Liebowitz, Surya Nepal [c208]Roelien C. Timmer, David Liebowitz, Surya Nepal , Salil S. Kanhere , Salil S. Kanhere : :
 Can pre-trained Transformers be used in detecting complex sensitive sentences? - A Monsanto case study. TPS-ISA 2021: 90-97
 [c207]David Liebowitz, Surya Nepal [c207]David Liebowitz, Surya Nepal , Kristen Moore , Kristen Moore , Cody James Christopher, Salil S. Kanhere , Cody James Christopher, Salil S. Kanhere , David D. Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar: , David D. Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar:
 Deception for Cyber Defence: Challenges and Opportunities. TPS-ISA 2021: 173-182
 [i72]Alsharif Abuadbba, Hyoungshick Kim, Surya Nepal: [i72]Alsharif Abuadbba, Hyoungshick Kim, Surya Nepal:
 DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN. CoRR abs/2101.04319 (2021)
 [i71]Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal: [i71]Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal:
 Peeler: Profiling Kernel-Level Events to Detect Ransomware. CoRR abs/2101.12434 (2021)
 [i70]Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu: [i70]Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu:
 SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh. CoRR abs/2102.10269 (2021)
 [i69]Tom Roth, Yansong Gao, Alsharif Abuadbba, Surya Nepal, Wei Liu: [i69]Tom Roth, Yansong Gao, Alsharif Abuadbba, Surya Nepal, Wei Liu:
 Token-Modification Adversarial Attacks for Natural Language Processing: A Survey. CoRR abs/2103.00676 (2021)
 [i68]Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal: [i68]Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal:
 Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things. CoRR abs/2103.02762 (2021)
 [i67]Athman Bouguettaya, Quan Z. Sheng, Boualem Benatallah, Azadeh Ghari Neiat, Sajib Mistry, Aditya Ghose, Surya Nepal, Lina Yao: [i67]Athman Bouguettaya, Quan Z. Sheng, Boualem Benatallah, Azadeh Ghari Neiat, Sajib Mistry, Aditya Ghose, Surya Nepal, Lina Yao:
 An Internet of Things Service Roadmap. CoRR abs/2103.03043 (2021)
 [i66]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun: [i66]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
 Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. CoRR abs/2103.05758 (2021)
 [i65]Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Sharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang: [i65]Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Sharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
 Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things? CoRR abs/2104.03813 (2021)
 [i64]Yanjun Zhang, Guangdong Bai, Xue Li, Surya Nepal, Ryan K. L. Ko: [i64]Yanjun Zhang, Guangdong Bai, Xue Li, Surya Nepal, Ryan K. L. Ko:
 Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning. CoRR abs/2104.13050 (2021)
 [i63]Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba: [i63]Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba:
 OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning. CoRR abs/2105.00602 (2021)
 [i62]Shuo Wang, Lingjuan Lyu, Surya Nepal, Carsten Rudolph, Marthie Grobler, Kristen Moore: [i62]Shuo Wang, Lingjuan Lyu, Surya Nepal, Carsten Rudolph, Marthie Grobler, Kristen Moore:
 Robust Training Using Natural Transformation. CoRR abs/2105.04070 (2021)
 [i61]Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang: [i61]Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang:
 Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. CoRR abs/2105.05445 (2021)
 [i60]Keelan Evans, Alsharif Abuadbba, Mohiuddin Ahmed, Tingmin Wu, Mike Johnstone, Surya Nepal: [i60]Keelan Evans, Alsharif Abuadbba, Mohiuddin Ahmed, Tingmin Wu, Mike Johnstone, Surya Nepal:
 RAIDER: Reinforcement-aided Spear Phishing Detector. CoRR abs/2105.07582 (2021)
 [i59]Xing Su [i59]Xing Su , Shan Xue, Fanzhen Liu , Shan Xue, Fanzhen Liu , Jia Wu, Jian Yang, Chuan Zhou, Wenbin Hu, Cécile Paris, Surya Nepal, Di Jin, Quan Z. Sheng, Philip S. Yu: , Jia Wu, Jian Yang, Chuan Zhou, Wenbin Hu, Cécile Paris, Surya Nepal, Di Jin, Quan Z. Sheng, Philip S. Yu:
 A Comprehensive Survey on Community Detection with Deep Learning. CoRR abs/2105.12584 (2021)
 [i58]Chandra Thapa, Kallol Krishna Karmakar, Alberto Huertas Celdrán, Seyit Camtepe, Vijay Varadharajan, Surya Nepal: [i58]Chandra Thapa, Kallol Krishna Karmakar, Alberto Huertas Celdrán, Seyit Camtepe, Vijay Varadharajan, Surya Nepal:
 FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation. CoRR abs/2106.05434 (2021)
 [i57]Mahathir Almashor [i57]Mahathir Almashor , M. Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal: , M. Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal:
 Characterizing Malicious URL Campaigns. CoRR abs/2108.12726 (2021)
 [i56]Yansong Gao, Yang Su, Surya Nepal, Damith C. Ranasinghe: [i56]Yansong Gao, Yang Su, Surya Nepal, Damith C. Ranasinghe:
 NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions. CoRR abs/2109.02942 (2021)
 [i55]Yifeng Zheng, Cong Wang, Ruochen Wang, Huayi Duan, Surya Nepal: [i55]Yifeng Zheng, Cong Wang, Ruochen Wang, Huayi Duan, Surya Nepal:
 Optimizing Secure Decision Tree Inference Outsourcing. CoRR abs/2111.00397 (2021)
 [i54]Kristen Moore, Cody James Christopher, David Liebowitz, Surya Nepal, Renee Selvey: [i54]Kristen Moore, Cody James Christopher, David Liebowitz, Surya Nepal, Renee Selvey:
 Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception. CoRR abs/2111.11932 (2021)
 [i53]Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk: [i53]Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk:
 Compcrypt - Lightweight ANS-based Compression and Encryption. IACR Cryptol. ePrint Arch. 2021: 10 (2021)
 [i52]Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal: [i52]Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal:
 P2DPI: Practical and Privacy-Preserving Deep Packet Inspection. IACR Cryptol. ePrint Arch. 2021: 789 (2021)
 [i51]Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk: [i51]Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk:
 ANS-based Compression and Encryption with 128-bit Security. IACR Cryptol. ePrint Arch. 2021: 900 (2021)
- 2020
 [j84]Salma Abdalla Hamad [j84]Salma Abdalla Hamad , Quan Z. Sheng , Quan Z. Sheng , Wei Emma Zhang , Wei Emma Zhang , Surya Nepal , Surya Nepal : :
 Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies. IEEE Commun. Surv. Tutorials 22(2): 1372-1391 (2020)
 [j83]Xuechao Yang [j83]Xuechao Yang , Xun Yi, Surya Nepal , Xun Yi, Surya Nepal , Andrei Kelarev, Fengling Han , Andrei Kelarev, Fengling Han : :
 Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities. Future Gener. Comput. Syst. 112: 859-874 (2020)
 [j82]Robertus Nugroho [j82]Robertus Nugroho , Cécile Paris, Surya Nepal , Cécile Paris, Surya Nepal , Jian Yang , Jian Yang , Weiliang Zhao , Weiliang Zhao : :
 A survey of recent methods on deriving topics from Twitter: algorithm to evaluation. Knowl. Inf. Syst. 62(7): 2485-2519 (2020)
 [j81]Hui Cui [j81]Hui Cui , Baodong Qin, Willy Susilo , Baodong Qin, Willy Susilo , Surya Nepal , Surya Nepal : :
 Robust digital signature revisited. Theor. Comput. Sci. 844: 87-96 (2020)
 [j80]Xiao Chen [j80]Xiao Chen , Chaoran Li , Chaoran Li , Derui Wang , Derui Wang , Sheng Wen, Jun Zhang , Sheng Wen, Jun Zhang , Surya Nepal , Surya Nepal , Yang Xiang , Yang Xiang , Kui Ren: , Kui Ren:
 Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. IEEE Trans. Inf. Forensics Secur. 15: 987-1001 (2020)
 [j79]Hui Cui [j79]Hui Cui , Zhiguo Wan , Zhiguo Wan , Xinlei Wei, Surya Nepal , Xinlei Wei, Surya Nepal , Xun Yi , Xun Yi : :
 Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain. IEEE Trans. Inf. Forensics Secur. 15: 3227-3238 (2020)
 [j78]Xun Yi [j78]Xun Yi , Elisa Bertino , Elisa Bertino , Fang-Yu Rao , Fang-Yu Rao , Kwok-Yan Lam , Kwok-Yan Lam , Surya Nepal , Surya Nepal , Athman Bouguettaya , Athman Bouguettaya : :
 Privacy-Preserving User Profile Matching in Social Networks. IEEE Trans. Knowl. Data Eng. 32(8): 1572-1585 (2020)
 [j77]Robertus Nugroho [j77]Robertus Nugroho , Jian Yang , Jian Yang , Weiliang Zhao , Weiliang Zhao , Cécile Paris, Surya Nepal , Cécile Paris, Surya Nepal : :
 What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text. IEEE Trans. Serv. Comput. 13(3): 584-596 (2020)
 [j76]Siqi Ma [j76]Siqi Ma , Yang Liu, Surya Nepal , Yang Liu, Surya Nepal : :
 Are Android Apps Being Protected Well Against Attacks? IEEE Wirel. Commun. 27(3): 66-71 (2020)
 [c206]Viet Vo, Shangqi Lai [c206]Viet Vo, Shangqi Lai , Xingliang Yuan, Shifeng Sun, Surya Nepal , Xingliang Yuan, Shifeng Sun, Surya Nepal , Joseph K. Liu: , Joseph K. Liu:
 Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution. ACNS (2) 2020: 83-103
 [c205]Siqi Ma [c205]Siqi Ma , Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal , Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal , Elisa Bertino: , Elisa Bertino:
 Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services. ACSAC 2020: 320-331
 [c204]Mark Nerwich, Praveen Gauravaram [c204]Mark Nerwich, Praveen Gauravaram , Hye-young Paik , Hye-young Paik , Surya Nepal , Surya Nepal : :
 Vulnerability Database as a Service for IoT. ATIS 2020: 95-107
 [c203]Tingmin Wu [c203]Tingmin Wu , Rongjunchen Zhang, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal , Rongjunchen Zhang, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal , Yang Xiang: , Yang Xiang:
 What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts. AsiaCCS 2020: 248-262
 [c202]Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa [c202]Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa , Seyit Ahmet Çamtepe , Seyit Ahmet Çamtepe , Yansong Gao, Hyoungshick Kim, Surya Nepal: , Yansong Gao, Hyoungshick Kim, Surya Nepal:
 Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? AsiaCCS 2020: 305-318
 [c201]Chang Xu, Cécile Paris, Ross Sparks, Surya Nepal [c201]Chang Xu, Cécile Paris, Ross Sparks, Surya Nepal , Keith Vander Linden: , Keith Vander Linden:
 Assessing Social License to Operate from the Public Discourse on Social Media. COLING (Industry) 2020: 146-159
 [c200]Minghua Wang [c200]Minghua Wang , Zhi Zhang, Yueqiang Cheng, Surya Nepal: , Zhi Zhang, Yueqiang Cheng, Surya Nepal:
 DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping. DAC 2020: 1-6
 [c199]Chang Xu, Cécile Paris, Surya Nepal [c199]Chang Xu, Cécile Paris, Surya Nepal , Ross Sparks, Chong Long, Yafang Wang: , Ross Sparks, Chong Long, Yafang Wang:
 DAN: Dual-View Representation Learning for Adapting Stance Classifiers to New Domains. ECAI 2020: 2260-2267
 [c198]Chadni Islam, Muhammad Ali Babar, Surya Nepal [c198]Chadni Islam, Muhammad Ali Babar, Surya Nepal : :
 Architecture-Centric Support for Integrating Security Tools in a Security Orchestration Platform. ECSA 2020: 165-181
 [c197]Nazatul Haque Sultan, Vijay Varadharajan, Seyit Camtepe [c197]Nazatul Haque Sultan, Vijay Varadharajan, Seyit Camtepe , Surya Nepal , Surya Nepal : :
 An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation. ESORICS (1) 2020: 569-590
 [c196]Shuo Wang, Carsten Rudolph, Surya Nepal, Marthie Grobler, Shangyu Chen: [c196]Shuo Wang, Carsten Rudolph, Surya Nepal, Marthie Grobler, Shangyu Chen:
 PART-GAN: Privacy-Preserving Time-Series Sharing. ICANN (1) 2020: 578-593
 [c195]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma [c195]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma , Surya Nepal , Surya Nepal , Robert H. Deng , Robert H. Deng , Kui Ren: , Kui Ren:
 Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing. ICDCS 2020: 1-11
 [c194]Jing Yao [c194]Jing Yao , Yifeng Zheng, Cong Wang, Surya Nepal , Yifeng Zheng, Cong Wang, Surya Nepal : :
 Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness. ICETE (2) 2020: 295-301
 [c193]Yansong Gao [c193]Yansong Gao , Surya Nepal , Surya Nepal : :
 A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks. ICISS 2020: 69-80
 [c192]Sunil Singh Samant [c192]Sunil Singh Samant , Mohan Baruwal Chhetri , Mohan Baruwal Chhetri , Quoc Bao Vo, Ryszard Kowalczyk , Quoc Bao Vo, Ryszard Kowalczyk , Surya Nepal , Surya Nepal : :
 AuraEN: Autonomous Resource Allocation for Cloud-Hosted Data Processing Pipelines. ICSOC Workshops 2020: 77-80
 [c191]Fanzhen Liu [c191]Fanzhen Liu , Shan Xue , Shan Xue , Jia Wu , Jia Wu , Chuan Zhou, Wenbin Hu, Cécile Paris, Surya Nepal, Jian Yang , Chuan Zhou, Wenbin Hu, Cécile Paris, Surya Nepal, Jian Yang , Philip S. Yu: , Philip S. Yu:
 Deep Learning for Community Detection: Progress, Challenges and Opportunities. IJCAI 2020: 4981-4987
 [c190]Shuo Wang, Tianle Chen, Shangyu Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler: [c190]Shuo Wang, Tianle Chen, Shangyu Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
 OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning. IJCNN 2020: 1-8
 [c189]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom: [c189]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom:
 PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses. MICRO 2020: 28-41
 [c188]Kallol Krishna Karmakar [c188]Kallol Krishna Karmakar , Vijay Varadharajan, Uday Kiran Tupakula , Vijay Varadharajan, Uday Kiran Tupakula , Surya Nepal, Chandra Thapa , Surya Nepal, Chandra Thapa : :
 Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT). NetSoft 2020: 257-261
 [c187]Salma Abdalla Hamad, Quan Z. Sheng [c187]Salma Abdalla Hamad, Quan Z. Sheng , Dai Hoang Tran , Dai Hoang Tran , Wei Emma Zhang , Wei Emma Zhang , Surya Nepal: , Surya Nepal:
 A Behavioural Network Traffic Novelty Detection for the Internet of Things Infrastructures. PAAP 2020: 174-186
 [c186]Fei Zhu [c186]Fei Zhu , Xun Yi, Sharif Abuadbba, Ibrahim Khalil, Xu Yang, Surya Nepal, Xinyi Huang: , Xun Yi, Sharif Abuadbba, Ibrahim Khalil, Xu Yang, Surya Nepal, Xinyi Huang:
 Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments. ProvSec 2020: 145-165
 [c185]Yansong Gao [c185]Yansong Gao , Minki Kim, Sharif Abuadbba , Minki Kim, Sharif Abuadbba , Yeonjae Kim, Chandra Thapa , Yeonjae Kim, Chandra Thapa , Kyuyeon Kim, Seyit Ahmet Çamtepe , Kyuyeon Kim, Seyit Ahmet Çamtepe , Hyoungshick Kim, Surya Nepal , Hyoungshick Kim, Surya Nepal : :
 End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things. SRDS 2020: 91-100
 [c184]Helge Janicke, Sharif Abuadbba, Surya Nepal: [c184]Helge Janicke, Sharif Abuadbba, Surya Nepal:
 Security and Privacy for a Sustainable Internet of Things. TPS-ISA 2020: 12-19
 [c183]Nan Li [c183]Nan Li , Dongxi Liu, Surya Nepal, Guangyu Pei: , Dongxi Liu, Surya Nepal, Guangyu Pei:
 A Needle in a Haystack: Finding a Suitable Lightweight IoT Authentication Protocol and Improving Its Usability. TPS-ISA 2020: 46-54
 [c182]Yifeng Zheng, Arindam Pal [c182]Yifeng Zheng, Arindam Pal , Sharif Abuadbba , Sharif Abuadbba , Shiva Raj Pokhrel, Surya Nepal , Shiva Raj Pokhrel, Surya Nepal , Helge Janicke: , Helge Janicke:
 Towards IoT Security Automation and Orchestration. TPS-ISA 2020: 55-63
 [c181]Yuyao Zhang, Siqi Ma [c181]Yuyao Zhang, Siqi Ma , Juanru Li, Kailai Li, Surya Nepal , Juanru Li, Kailai Li, Surya Nepal , Dawu Gu: , Dawu Gu:
 SMARTSHIELD: Automatic Smart Contract Protection Made Easy. SANER 2020: 23-34
 [c180]Shuo Wang, Lingjuan Lyu, Tianle Chen, Shangyu Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler: [c180]Shuo Wang, Lingjuan Lyu, Tianle Chen, Shangyu Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
 Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer. WISE (2) 2020: 185-200
 [e7]Surya Nepal, Wenqi Cao, Aziz Nasridinov, Md. Zakirul Alam Bhuiyan [e7]Surya Nepal, Wenqi Cao, Aziz Nasridinov, Md. Zakirul Alam Bhuiyan , Xuan Guo , Xuan Guo , Liang-Jie Zhang , Liang-Jie Zhang : :
 Big Data - BigData 2020 - 9th International Conference, Held as Part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings. Lecture Notes in Computer Science 12402, Springer 2020, ISBN 978-3-030-59611-8 [contents]
 [i50]Shuo Wang, Shangyu Chen, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler: [i50]Shuo Wang, Shangyu Chen, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
 Generating Semantic Adversarial Examples via Feature Manipulation. CoRR abs/2001.02297 (2020)
 [i49]Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen: [i49]Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen:
 Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models. CoRR abs/2001.03274 (2020)
 [i48]Viet Vo, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Surya Nepal, Joseph K. Liu: [i48]Viet Vo, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Surya Nepal, Joseph K. Liu:
 Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution. CoRR abs/2001.03743 (2020)
 [i47]Shuo Wang, Tianle Chen, Shangyu Chen, Carsten Rudolph, Surya Nepal, Marthie Grobler: [i47]Shuo Wang, Tianle Chen, Shangyu Chen, Carsten Rudolph, Surya Nepal, Marthie Grobler:
 OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning. CoRR abs/2001.06640 (2020)
 [i46]Zhi Zhang, Yueqiang Cheng, Yinqian Zhang, Surya Nepal: [i46]Zhi Zhang, Yueqiang Cheng, Yinqian Zhang, Surya Nepal:
 GhostKnight: Breaching Data Integrity via Speculative Execution. CoRR abs/2002.00524 (2020)
 [i45]Shuo Wang, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen: [i45]Shuo Wang, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen:
 Defending Adversarial Attacks via Semantic Feature Manipulation. CoRR abs/2002.02007 (2020)
 [i44]Chadni Islam, Muhammad Ali Babar, Surya Nepal: [i44]Chadni Islam, Muhammad Ali Babar, Surya Nepal:
 A Multi-Vocal Review of Security Orchestration. CoRR abs/2002.09190 (2020)
 [i43]Viet Vo, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal, Cong Wang: [i43]Viet Vo, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal, Cong Wang:
 ShieldDB: An Encrypted Document Database with Padding Countermeasures. CoRR abs/2003.06103 (2020)
 [i42]Chang Xu, Cécile Paris, Surya Nepal, Ross Sparks, Chong Long, Yafang Wang: [i42]Chang Xu, Cécile Paris, Surya Nepal, Ross Sparks, Chong Long, Yafang Wang:
 DAN: Dual-View Representation Learning for Adapting Stance Classifiers to New Domains. CoRR abs/2003.06514 (2020)
 [i41]Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa [i41]Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa , Seyit Ahmet Çamtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal: , Seyit Ahmet Çamtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal:
 Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? CoRR abs/2003.12365 (2020)
 [i40]Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa [i40]Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa , Kyuyeon Kim, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal: , Kyuyeon Kim, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal:
 End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things. CoRR abs/2003.13376 (2020)
 [i39]Minghua Wang, Zhi Zhang, Yueqiang Cheng, Surya Nepal: [i39]Minghua Wang, Zhi Zhang, Yueqiang Cheng, Surya Nepal:
 DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping. CoRR abs/2004.02354 (2020)
 [i38]Fanzhen Liu, Shan Xue, Jia Wu, Chuan Zhou, Wenbin Hu, Cécile Paris, Surya Nepal, Jian Yang, Philip S. Yu: [i38]Fanzhen Liu, Shan Xue, Jia Wu, Chuan Zhou, Wenbin Hu, Cécile Paris, Surya Nepal, Jian Yang, Philip S. Yu:
 Deep Learning for Community Detection: Progress, Challenges and Opportunities. CoRR abs/2005.08225 (2020)
 [i37]Sharif Abuadbba, Ayman Ibaida, Ibrahim Khalil, Naveen K. Chilamkurti, Surya Nepal, Xinghuo Yu: [i37]Sharif Abuadbba, Ayman Ibaida, Ibrahim Khalil, Naveen K. Chilamkurti, Surya Nepal, Xinghuo Yu:
 Can the Multi-Incoming Smart Meter Compressed Streams be Re-Compressed? CoRR abs/2006.03208 (2020)
 [i36]Shuo Wang, Surya Nepal, Marthie Grobler, Carsten Rudolph, Tianle Chen, Shangyu Chen: [i36]Shuo Wang, Surya Nepal, Marthie Grobler, Carsten Rudolph, Tianle Chen, Shangyu Chen:
 Adversarial Defense by Latent Style Transformations. CoRR abs/2006.09701 (2020)
 [i35]Tingmin Wu, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal, Yang Xiang: [i35]Tingmin Wu, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal, Yang Xiang:
 Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity. CoRR abs/2006.14765 (2020)
 [i34]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom: [i34]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom:
 PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses. CoRR abs/2007.08707 (2020)
 [i33]Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim: [i33]Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim:
 Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review. CoRR abs/2007.10760 (2020)
 [i32]Chandra Thapa, Jun Wen Tang, Sharif Abuadbba, Yansong Gao, Yifeng Zheng, Seyit Ahmet Çamtepe, Surya Nepal, Mahathir Almashor: [i32]Chandra Thapa, Jun Wen Tang, Sharif Abuadbba, Yansong Gao, Yifeng Zheng, Seyit Ahmet Çamtepe, Surya Nepal, Mahathir Almashor:
 FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning. CoRR abs/2007.13300 (2020)
 [i31]Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Hyoungshick Kim, Surya Nepal: [i31]Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Hyoungshick Kim, Surya Nepal:
 Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks. CoRR abs/2010.03735 (2020)
 [i30]Mohan Baruwal Chhetri, Abdur Rahim Mohammad Forkan [i30]Mohan Baruwal Chhetri, Abdur Rahim Mohammad Forkan , Anton V. Uzunov, Surya Nepal: , Anton V. Uzunov, Surya Nepal:
 Towards Self-Improving Hybrid Elasticity Control of Cloud-based Software Systems. CoRR abs/2010.07584 (2020)
 [i29]Hassan Ali [i29]Hassan Ali , Surya Nepal, Salil S. Kanhere, Sanjay Jha: , Surya Nepal, Salil S. Kanhere, Sanjay Jha:
 HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios. CoRR abs/2012.07474 (2020)
 [i28]Dongxi Liu, Surya Nepal: [i28]Dongxi Liu, Surya Nepal:
 Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions. IACR Cryptol. ePrint Arch. 2020: 974 (2020)
2010 – 2019
- 2019
 [j75]Junyang Qiu [j75]Junyang Qiu , Jun Zhang, Wei Luo , Jun Zhang, Wei Luo , Lei Pan , Lei Pan , Surya Nepal , Surya Nepal , Yu Wang , Yu Wang , Yang Xiang , Yang Xiang : :
 A3CM: Automatic Capability Annotation for Android Malware. IEEE Access 7: 147156-147168 (2019)
 [j74]Bin Yu, Joseph K. Liu, Surya Nepal [j74]Bin Yu, Joseph K. Liu, Surya Nepal , Jiangshan Yu , Jiangshan Yu , Paul Rimba: , Paul Rimba:
 Proof-of-QoS: QoS based blockchain consensus protocol. Comput. Secur. 87 (2019)
 [j73]Xu Yang [j73]Xu Yang , Xun Yi, Ibrahim Khalil , Xun Yi, Ibrahim Khalil , Hui Cui , Hui Cui , Xuechao Yang , Xuechao Yang , Surya Nepal , Surya Nepal , Xinyi Huang, Yali Zeng: , Xinyi Huang, Yali Zeng:
 A new privacy-preserving authentication protocol for anonymous web browsing. Concurr. Comput. Pract. Exp. 31(21) (2019)
 [j72]Annie Gilda Roselin Arockia Baskaran [j72]Annie Gilda Roselin Arockia Baskaran , Priyadarsi Nanda, Surya Nepal , Priyadarsi Nanda, Surya Nepal , Sean He , Sean He : :
 Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks. Concurr. Comput. Pract. Exp. 31(23) (2019)
 [j71]Chadni Islam, Muhammad Ali Babar, Surya Nepal [j71]Chadni Islam, Muhammad Ali Babar, Surya Nepal : :
 A Multi-Vocal Review of Security Orchestration. ACM Comput. Surv. 52(2): 37:1-37:45 (2019)
 [j70]Annie Gilda Roselin [j70]Annie Gilda Roselin , Priyadarsi Nanda , Priyadarsi Nanda , Surya Nepal , Surya Nepal , Xiangjian He , Xiangjian He , Jarod Wright: , Jarod Wright:
 Exploiting the Remote Server Access Support of CoAP Protocol. IEEE Internet Things J. 6(6): 9338-9349 (2019)
 [j69]Surya Nepal [j69]Surya Nepal , Mohan Baruwal Chhetri , Mohan Baruwal Chhetri , Rajiv Ranjan, Ryszard Kowalczyk , Rajiv Ranjan, Ryszard Kowalczyk : :
 A Note on Quality of Service Issues in Smart Cities. J. Parallel Distributed Comput. 127: 116-117 (2019)
 [j68]Deepak Puthal [j68]Deepak Puthal , Xindong Wu , Xindong Wu , Surya Nepal , Surya Nepal , Rajiv Ranjan , Rajiv Ranjan , Jinjun Chen , Jinjun Chen : :
 SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams. IEEE Trans. Big Data 5(3): 379-392 (2019)
 [j67]Tingmin Wu [j67]Tingmin Wu , Lihong Tang, Rongjunchen Zhang, Sheng Wen, Cécile Paris, Surya Nepal , Lihong Tang, Rongjunchen Zhang, Sheng Wen, Cécile Paris, Surya Nepal , Marthie Grobler , Marthie Grobler , Yang Xiang: , Yang Xiang:
 Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps. ACM Trans. Cyber Phys. Syst. 3(4): 36:1-36:21 (2019)
 [j66]Schahram Dustdar, Surya Nepal [j66]Schahram Dustdar, Surya Nepal , James Joshi: , James Joshi:
 Introduction to the Special Section on Advances in Internet-based Collaborative Technologies. ACM Trans. Internet Techn. 19(3) (2019)
 [j65]Xu Yang, Xun Yi, Ibrahim Khalil [j65]Xu Yang, Xun Yi, Ibrahim Khalil , Yali Zeng, Xinyi Huang, Surya Nepal , Yali Zeng, Xinyi Huang, Surya Nepal , Xuechao Yang , Xuechao Yang , Hui Cui , Hui Cui : :
 A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Veh. Commun. 15: 16-27 (2019)
 [c179]Mohan Baruwal Chhetri, Abdur Rahim Mohammad Forkan [c179]Mohan Baruwal Chhetri, Abdur Rahim Mohammad Forkan , Quoc Bao Vo, Surya Nepal , Quoc Bao Vo, Surya Nepal , Ryszard Kowalczyk , Ryszard Kowalczyk : :
 Towards Risk-Aware Cost-Optimal Resource Allocation for Cloud Applications. SCC 2019: 210-214
 [c178]Jongkil Kim [c178]Jongkil Kim , Willy Susilo , Willy Susilo , Joonsang Baek , Joonsang Baek , Surya Nepal, Dongxi Liu: , Surya Nepal, Dongxi Liu:
 Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach. ACISP 2019: 3-20
 [c177]Chang Xu, Cécile Paris, Surya Nepal [c177]Chang Xu, Cécile Paris, Surya Nepal , Ross Sparks: , Ross Sparks:
 Recognising Agreement and Disagreement between Stances with Reason Comparing Networks. ACL (1) 2019: 4665-4671
 [c176]Yansong Gao, Chang Xu, Derui Wang [c176]Yansong Gao, Chang Xu, Derui Wang , Shiping Chen , Shiping Chen , Damith Chinthana Ranasinghe, Surya Nepal: , Damith Chinthana Ranasinghe, Surya Nepal:
 STRIP: a defence against trojan attacks on deep neural networks. ACSAC 2019: 113-125
 [c175]Siqi Ma [c175]Siqi Ma , Runhan Feng, Juanru Li, Yang Liu, Surya Nepal , Runhan Feng, Juanru Li, Yang Liu, Surya Nepal , Diethelm Ostry, Elisa Bertino, Robert H. Deng , Diethelm Ostry, Elisa Bertino, Robert H. Deng , Zhuo Ma, Sanjay Jha , Zhuo Ma, Sanjay Jha : :
 An empirical study of SMS one-time password authentication in Android apps. ACSAC 2019: 339-354
 [c174]Chadni Islam, Muhammad Ali Babar, Surya Nepal [c174]Chadni Islam, Muhammad Ali Babar, Surya Nepal : :
 Automated Interpretation and Integration of Security Tools Using Semantic Knowledge. CAiSE 2019: 513-528
 [c173]Hagen Lauer, Amin Sakzad, Carsten Rudolph, Surya Nepal [c173]Hagen Lauer, Amin Sakzad, Carsten Rudolph, Surya Nepal : :
 Bootstrapping Trust in a "Trusted" Virtualized Platform. CYSARM@CCS 2019: 11-22
 [c172]Jongkil Kim [c172]Jongkil Kim , Seyit Camtepe , Seyit Camtepe , Willy Susilo , Willy Susilo , Surya Nepal , Surya Nepal , Joonsang Baek , Joonsang Baek : :
 Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing. AsiaCCS 2019: 55-66
 [c171]Surya Nepal [c171]Surya Nepal : :
 Security is the Weakest Link: Prevalent Culture of Victim Blaming in Cyberattacks. AsiaCCS 2019: 255-256
 [c170]Sunil Singh Samant [c170]Sunil Singh Samant , Mohan Baruwal Chhetri , Mohan Baruwal Chhetri , Quoc Bao Vo, Surya Nepal , Quoc Bao Vo, Surya Nepal , Ryszard Kowalczyk , Ryszard Kowalczyk : :
 Benchmarking for End-to-End QoS Sustainability in Cloud-Hosted Data Processing Pipelines. CIC 2019: 39-48
 [c169]Anton V. Uzunov, Surya Nepal, Mohan Baruwal Chhetri: [c169]Anton V. Uzunov, Surya Nepal, Mohan Baruwal Chhetri:
 Proactive Antifragility: A New Paradigm for Next-Generation Cyber Defence at the Edge. CIC 2019: 246-255
 [c168]Shabnam Kasra Kermanshahi [c168]Shabnam Kasra Kermanshahi , Joseph K. Liu, Ron Steinfeld, Surya Nepal , Joseph K. Liu, Ron Steinfeld, Surya Nepal : :
 Generic Multi-keyword Ranked Search on Encrypted Cloud Data. ESORICS (2) 2019: 322-343
 [c167]Siqi Ma [c167]Siqi Ma , Elisa Bertino, Surya Nepal , Elisa Bertino, Surya Nepal , Juanru Li, Diethelm Ostry, Robert H. Deng , Juanru Li, Diethelm Ostry, Robert H. Deng , Sanjay Jha , Sanjay Jha : :
 Finding Flaws from Password Authentication Code in Android Apps. ESORICS (1) 2019: 619-637
 [c166]Mohan Baruwal Chhetri, Anton V. Uzunov, Bao Quoc Vo, Surya Nepal [c166]Mohan Baruwal Chhetri, Anton V. Uzunov, Bao Quoc Vo, Surya Nepal , Ryszard Kowalczyk , Ryszard Kowalczyk : :
 Self-Improving Autonomic Systems for Antifragile Cyber Defence: Challenges and Opportunities. ICAC 2019: 18-23
 [c165]Nan Li [c165]Nan Li , Vijay Varadharajan, Surya Nepal , Vijay Varadharajan, Surya Nepal : :
 Context-Aware Trust Management System for IoT Applications with Multiple Domains. ICDCS 2019: 1138-1148
 [c164]Shuo Wang, Surya Nepal [c164]Shuo Wang, Surya Nepal , Richard O. Sinnott, Carsten Rudolph , Richard O. Sinnott, Carsten Rudolph : :
 P-STM: Privacy-Protected Social Tie Mining of Individual Trajectories. ICWS 2019: 1-10
 [c163]Kallol Krishna Karmakar, Vijay Varadharajan, Surya Nepal, Udaya Kiran Tupakula: [c163]Kallol Krishna Karmakar, Vijay Varadharajan, Surya Nepal, Udaya Kiran Tupakula:
 SDN Enabled Secure IoT Architecture. IM 2019: 581-585
 [c162]Chadni Islam, Muhammad Ali Babar, Surya Nepal [c162]Chadni Islam, Muhammad Ali Babar, Surya Nepal : :
 An ontology-driven approach to automating the process of integrating security software systems. ICSSP 2019: 54-63
 [c161]Junyang Qiu, Surya Nepal, Wei Luo [c161]Junyang Qiu, Surya Nepal, Wei Luo , Lei Pan , Lei Pan , Yonghang Tai, Jun Zhang, Yang Xiang: , Yonghang Tai, Jun Zhang, Yang Xiang:
 Data-Driven Android Malware Intelligence: A Survey. ML4CS 2019: 183-202
 [c160]Yansong Gao, Yang Su, Wei Yang, Shiping Chen [c160]Yansong Gao, Yang Su, Wei Yang, Shiping Chen , Surya Nepal, Damith Chinthana Ranasinghe: , Surya Nepal, Damith Chinthana Ranasinghe:
 Building Secure SRAM PUF Key Generators on Resource Constrained Devices. PerCom Workshops 2019: 912-917
 [c159]Bin Yu, Shabnam Kasra Kermanshahi [c159]Bin Yu, Shabnam Kasra Kermanshahi , Amin Sakzad , Amin Sakzad , Surya Nepal , Surya Nepal : :
 Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks. ProvSec 2019: 303-318
 [c158]Salma Abdalla Hamad, Wei Emma Zhang [c158]Salma Abdalla Hamad, Wei Emma Zhang , Quan Z. Sheng , Quan Z. Sheng , Surya Nepal , Surya Nepal : :
 IoT Device Identification via Network-Flow Based Fingerprinting and Learning. TrustCom/BigDataSE 2019: 103-111
 [c157]Hagen Lauer, Amin Sakzad [c157]Hagen Lauer, Amin Sakzad , Carsten Rudolph , Carsten Rudolph , Surya Nepal , Surya Nepal : :
 A Logic for Secure Stratified Systems and its Application to Containerized Systems. TrustCom/BigDataSE 2019: 562-569
 [c156]Zizhu Zhang, Weiliang Zhao [c156]Zizhu Zhang, Weiliang Zhao , Jian Yang , Jian Yang , Cécile Paris, Surya Nepal , Cécile Paris, Surya Nepal : :
 Learning Influence Probabilities and Modelling Influence Diffusion in Twitter. WWW (Companion Volume) 2019: 1087-1094
 [e6]James Joshi, Surya Nepal, Qi Zhang, Liang-Jie Zhang: [e6]James Joshi, Surya Nepal, Qi Zhang, Liang-Jie Zhang:
 Blockchain - ICBC 2019 - Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings. Lecture Notes in Computer Science 11521, Springer 2019, ISBN 978-3-030-23403-4 [contents]
 [i27]Derui Wang [i27]Derui Wang , Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang: , Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
 Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples. CoRR abs/1902.02067 (2019)
 [i26]Yansong Gao, Yang Su, Wei Yang, Shiping Chen, Surya Nepal, Damith Chinthana Ranasinghe: [i26]Yansong Gao, Yang Su, Wei Yang, Shiping Chen, Surya Nepal, Damith Chinthana Ranasinghe:
 Building Secure SRAM PUF Key Generators on Resource Constrained Devices. CoRR abs/1902.03031 (2019)
 [i25]Yansong Gao, Chang Xu, Derui Wang, Shiping Chen, Damith Chinthana Ranasinghe, Surya Nepal: [i25]Yansong Gao, Chang Xu, Derui Wang, Shiping Chen, Damith Chinthana Ranasinghe, Surya Nepal:
 STRIP: A Defence Against Trojan Attacks on Deep Neural Networks. CoRR abs/1902.06531 (2019)
 [i24]Chang Xu, Cécile Paris, Surya Nepal, Ross Sparks: [i24]Chang Xu, Cécile Paris, Surya Nepal, Ross Sparks:
 Recognising Agreement and Disagreement between Stances with Reason Comparing Networks. CoRR abs/1906.01392 (2019)
 [i23]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng: [i23]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng:
 Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing. CoRR abs/1907.10218 (2019)
 [i22]Derui Wang [i22]Derui Wang , Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang: , Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
 Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models. CoRR abs/1910.06838 (2019)
 [i21]Yansong Gao, Yeonjae Kim, Bao Gia Doan, Zhi Zhang, Gongxuan Zhang, Surya Nepal, Damith Chinthana Ranasinghe, Hyoungshick Kim: [i21]Yansong Gao, Yeonjae Kim, Bao Gia Doan, Zhi Zhang, Gongxuan Zhang, Surya Nepal, Damith Chinthana Ranasinghe, Hyoungshick Kim:
 Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks. CoRR abs/1911.10312 (2019)
 [i20]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang: [i20]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang:
 TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique. CoRR abs/1912.03076 (2019)
- 2018
 [j64]Xuechao Yang [j64]Xuechao Yang , Xun Yi, Surya Nepal , Xun Yi, Surya Nepal , Andrei Kelarev, Fengling Han , Andrei Kelarev, Fengling Han : :
 A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption. IEEE Access 6: 20506-20519 (2018)
 [j63]Hui Cui [j63]Hui Cui , Xun Yi, Surya Nepal , Xun Yi, Surya Nepal : :
 Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks. IEEE Access 6: 30049-30059 (2018)
 [j62]Shahriar Badsha [j62]Shahriar Badsha , Xun Yi, Ibrahim Khalil , Xun Yi, Ibrahim Khalil , Dongxi Liu, Surya Nepal , Dongxi Liu, Surya Nepal , Kwok-Yan Lam , Kwok-Yan Lam : :
 Privacy Preserving User Based Web Service Recommendations. IEEE Access 6: 56647-56657 (2018)
 [j61]Rajiv Ranjan [j61]Rajiv Ranjan , Omer F. Rana , Omer F. Rana , Surya Nepal , Surya Nepal , Mazin Yousif, Philip James , Mazin Yousif, Philip James , Zhenya Wen, Stuart L. Barr , Zhenya Wen, Stuart L. Barr , Paul Watson , Paul Watson , Prem Prakash Jayaraman , Prem Prakash Jayaraman , Dimitrios Georgakopoulos , Dimitrios Georgakopoulos , Massimo Villari, Maria Fazio, Saurabh Kumar Garg , Massimo Villari, Maria Fazio, Saurabh Kumar Garg , Rajkumar Buyya , Rajkumar Buyya , Lizhe Wang, Albert Y. Zomaya , Lizhe Wang, Albert Y. Zomaya , Schahram Dustdar , Schahram Dustdar : :
 The Next Grand Challenges: Integrating the Internet of Things and Data Science. IEEE Cloud Comput. 5(3): 12-26 (2018)
 [j60]Bin Yu, Jarod Wright, Surya Nepal [j60]Bin Yu, Jarod Wright, Surya Nepal , Liming Zhu , Liming Zhu , Joseph K. Liu, Rajiv Ranjan , Joseph K. Liu, Rajiv Ranjan : :
 IoTChain: Establishing Trust in the Internet of Things Ecosystem Using Blockchain. IEEE Cloud Comput. 5(4): 12-23 (2018)
 [j59]Hui Cui [j59]Hui Cui , Robert H. Deng , Robert H. Deng , Junzuo Lai, Xun Yi, Surya Nepal , Junzuo Lai, Xun Yi, Surya Nepal : :
 An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited. Comput. Networks 133: 157-165 (2018)
 [j58]Shuo Wang, Richard O. Sinnott, Surya Nepal [j58]Shuo Wang, Richard O. Sinnott, Surya Nepal : :
 Privacy-protected statistics publication over social media user trajectory streams. Future Gener. Comput. Syst. 87: 792-802 (2018)
 [j57]Cécile Paris, Surya Nepal [j57]Cécile Paris, Surya Nepal , Amanda Dennett: , Amanda Dennett:
 A Government-Run Online Community to Support Recipients of Welfare Payments. Int. J. Cooperative Inf. Syst. 27(2): 1850001:1-1850001:37 (2018)
 [j56]Victor Bahl, Barbara Carminati, James Caverlee, Ing-Ray Chen, Wynne Hsu, Toru Ishida, Valérie Issarny, Surya Nepal, Indrakshi Ray, Kui Ren, Shamik Sural, Mei-Ling Shyu: [j56]Victor Bahl, Barbara Carminati, James Caverlee, Ing-Ray Chen, Wynne Hsu, Toru Ishida, Valérie Issarny, Surya Nepal, Indrakshi Ray, Kui Ren, Shamik Sural, Mei-Ling Shyu:
 Editorial. IEEE Trans. Serv. Comput. 11(1): 1-4 (2018)
 [c155]Sunil Singh Samant [c155]Sunil Singh Samant , Mohan Baruwal Chhetri , Mohan Baruwal Chhetri , Quoc Bao Vo, Ryszard Kowalczyk , Quoc Bao Vo, Ryszard Kowalczyk , Surya Nepal , Surya Nepal : :
 Towards End-to-End QoS and Cost-Aware Resource Scaling in Cloud-Based IoT Data Processing Pipelines. SCC 2018: 287-290
 [c154]Chang Xu, Cécile Paris, Surya Nepal, Ross Sparks: [c154]Chang Xu, Cécile Paris, Surya Nepal, Ross Sparks:
 Cross-Target Stance Classification with Self-Attention Networks. ACL (2) 2018: 778-783
 [c153]Junyang Qiu, Wei Luo [c153]Junyang Qiu, Wei Luo , Surya Nepal , Surya Nepal , Jun Zhang, Yang Xiang , Jun Zhang, Yang Xiang , Lei Pan , Lei Pan : :
 Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware. ADMA 2018: 238-254
 [c152]Mohan Baruwal Chhetri [c152]Mohan Baruwal Chhetri , Hien P. Luong, Anton V. Uzunov, Quoc Bao Vo, Ryszard Kowalczyk , Hien P. Luong, Anton V. Uzunov, Quoc Bao Vo, Ryszard Kowalczyk , Surya Nepal , Surya Nepal , Isuru Rajapakse: , Isuru Rajapakse:
 ADSL: An Embedded Domain-Specific Language for Constraint-Based Distributed Self-Management. ASWEC 2018: 101-110
 [c151]Mohan Baruwal Chhetri [c151]Mohan Baruwal Chhetri , Quoc Bao Vo, Ryszard Kowalczyk , Quoc Bao Vo, Ryszard Kowalczyk , Surya Nepal , Surya Nepal : :
 Towards Resource and Contract Heterogeneity Aware Rescaling for Cloud-Hosted Applications. CCGrid 2018: 153-162
 [c150]Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad [c150]Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad , Viet Vo, Surya Nepal , Viet Vo, Surya Nepal : :
 Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption. CCS 2018: 763-780
 [c149]Muhammad Ejaz Ahmed, Surya Nepal [c149]Muhammad Ejaz Ahmed, Surya Nepal , Hyoungshick Kim: , Hyoungshick Kim:
 MEDUSA: Malware Detection Using Statistical Analysis of System's Behavior. CIC 2018: 272-278
 [c148]Mohan Baruwal Chhetri [c148]Mohan Baruwal Chhetri , Anton V. Uzunov, Quoc Bao Vo, Ryszard Kowalczyk , Anton V. Uzunov, Quoc Bao Vo, Ryszard Kowalczyk , Michael Docking, Hien P. Luong, Isuru Rajapakse, Surya Nepal , Michael Docking, Hien P. Luong, Isuru Rajapakse, Surya Nepal : :
 AWaRE - Towards Distributed Self-Management for Resilient Cyber Systems. ICECCS 2018: 185-188
 [c147]Shuo Wang, Richard O. Sinnott, Surya Nepal: [c147]Shuo Wang, Richard O. Sinnott, Surya Nepal:
 A Privacy-Preserving Semantic Annotation Framework Using Online Social Media. ICWS 2018: 353-372
 [c146]Bin Yu, Joseph K. Liu, Amin Sakzad [c146]Bin Yu, Joseph K. Liu, Amin Sakzad , Surya Nepal, Ron Steinfeld, Paul Rimba, Man Ho Au: , Surya Nepal, Ron Steinfeld, Paul Rimba, Man Ho Au:
 Platform-Independent Secure Blockchain-Based Voting System. ISC 2018: 369-386
 [c145]Zhi Zhang [c145]Zhi Zhang , Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi: , Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi:
 KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels. RAID 2018: 691-710
 [c144]Shuo Wang, Richard O. Sinnott, Surya Nepal [c144]Shuo Wang, Richard O. Sinnott, Surya Nepal : :
 PAIRS: Privacy-Aware Identification and Recommendation of Spatio-Friends. TrustCom/BigDataSE 2018: 920-931
 [c143]Shuo Wang, Richard O. Sinnott, Surya Nepal: [c143]Shuo Wang, Richard O. Sinnott, Surya Nepal:
 P-GENT: Privacy-Preserving Geocoding of Non-Geotagged Tweets. TrustCom/BigDataSE 2018: 972-983
 [c142]Xuechao Yang [c142]Xuechao Yang , Xun Yi, Surya Nepal , Xun Yi, Surya Nepal , Fengling Han , Fengling Han : :
 Decentralized Voting: A Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain. WISE (1) 2018: 18-35
 [c141]Xu Yang, Xun Yi, Yali Zeng, Ibrahim Khalil, Xinyi Huang, Surya Nepal [c141]Xu Yang, Xun Yi, Yali Zeng, Ibrahim Khalil, Xinyi Huang, Surya Nepal : :
 An Improved Lightweight RFID Authentication Protocol for Internet of Things. WISE (1) 2018: 111-126
 [e5]Wil M. P. van der Aalst, Fabio Casati, Raffaele Conforti, Massimiliano de Leoni, Marlon Dumas, Akhil Kumar, Jan Mendling, Surya Nepal, Brian T. Pentland, Barbara Weber: [e5]Wil M. P. van der Aalst, Fabio Casati, Raffaele Conforti, Massimiliano de Leoni, Marlon Dumas, Akhil Kumar, Jan Mendling, Surya Nepal, Brian T. Pentland, Barbara Weber:
 Proceedings of the Dissertation Award, Demonstration, and Industrial Track at BPM 2018 co-located with 16th International Conference on Business Process Management (BPM 2018), Sydney, Australia, September 9-14, 2018. CEUR Workshop Proceedings 2196, CEUR-WS.org 2018 [contents]
 [i19]Yueqiang Cheng, Zhi Zhang, Surya Nepal: [i19]Yueqiang Cheng, Zhi Zhang, Surya Nepal:
 Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation. CoRR abs/1802.07060 (2018)
 [i18]Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi: [i18]Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi:
 A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS. CoRR abs/1802.07062 (2018)
 [i17]Derek Wang, Chaoran Li, Sheng Wen, Yang Xiang, Wanlei Zhou, Surya Nepal: [i17]Derek Wang, Chaoran Li, Sheng Wen, Yang Xiang, Wanlei Zhou, Surya Nepal:
 Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks. CoRR abs/1803.05123 (2018)
 [i16]Rongjunchen Zhang, Xiao Chen, Jianchao Lu, Sheng Wen, Surya Nepal, Yang Xiang: [i16]Rongjunchen Zhang, Xiao Chen, Jianchao Lu, Sheng Wen, Surya Nepal, Yang Xiang:
 Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones. CoRR abs/1805.06187 (2018)
 [i15]Chang Xu, Cécile Paris, Surya Nepal, Ross Sparks: [i15]Chang Xu, Cécile Paris, Surya Nepal, Ross Sparks:
 Cross-Target Stance Classification with Self-Attention Networks. CoRR abs/1805.06593 (2018)
 [i14]Tingmin Wu, Lihong Tang, Zhiyu Xu, Sheng Wen, Cécile Paris, Surya Nepal, Marthie Grobler, Yang Xiang: [i14]Tingmin Wu, Lihong Tang, Zhiyu Xu, Sheng Wen, Cécile Paris, Surya Nepal, Marthie Grobler, Yang Xiang:
 Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps. CoRR abs/1805.07070 (2018)
 [i13]Raj Gaire, Chigulapalli Sriharsha, Deepak Puthal, Hendra Wijaya, Jongkil Kim, Prateeksha Keshari, Rajiv Ranjan, Rajkumar Buyya, Ratan K. Ghosh, R. K. Shyamasundar, Surya Nepal: [i13]Raj Gaire, Chigulapalli Sriharsha, Deepak Puthal, Hendra Wijaya, Jongkil Kim, Prateeksha Keshari, Rajiv Ranjan, Rajkumar Buyya, Ratan K. Ghosh, R. K. Shyamasundar, Surya Nepal:
 Internet of Things (IoT) and Cloud Computing Enabled Disaster Management. CoRR abs/1806.07530 (2018)
 [i12]Raj Gaire, Ratan K. Ghosh, Jongkil Kim, Alexander Krumpholz, Rajiv Ranjan, R. K. Shyamasundar, Surya Nepal: [i12]Raj Gaire, Ratan K. Ghosh, Jongkil Kim, Alexander Krumpholz, Rajiv Ranjan, R. K. Shyamasundar, Surya Nepal:
 Crowdsensing and privacy in smart city applications. CoRR abs/1806.07534 (2018)
 [i11]Yansong Gao, Marten van Dijk, Lei Xu, Surya Nepal, Damith Chinthana Ranasinghe: [i11]Yansong Gao, Marten van Dijk, Lei Xu, Surya Nepal, Damith Chinthana Ranasinghe:
 TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs. CoRR abs/1807.11046 (2018)
 [i10]Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren: [i10]Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren:
 Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. CoRR abs/1808.04218 (2018)
 [i9]Jongkil Kim, Jonathon M. Smereka, Calvin Cheung [i9]Jongkil Kim, Jonathon M. Smereka, Calvin Cheung , Surya Nepal, Marthie Grobler: , Surya Nepal, Marthie Grobler:
 Security and Performance Considerations in ROS 2: A Balancing Act. CoRR abs/1809.09566 (2018)
 [i8]Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld, Man Ho Au: [i8]Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld, Man Ho Au:
 Platform-independent Secure Blockchain-Based Voting System. IACR Cryptol. ePrint Arch. 2018: 657 (2018)
- 2017
 [j55]Guanjun Lin [j55]Guanjun Lin , Nan Sun , Nan Sun , Surya Nepal , Surya Nepal , Jun Zhang , Jun Zhang , Yang Xiang, Houcine Hassan: , Yang Xiang, Houcine Hassan:
 Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability. IEEE Access 5: 11142-11154 (2017)
 [j54]Athman Bouguettaya [j54]Athman Bouguettaya , Munindar P. Singh , Munindar P. Singh , Michael N. Huhns, Quan Z. Sheng , Michael N. Huhns, Quan Z. Sheng , Hai Dong , Hai Dong , Qi Yu , Qi Yu , Azadeh Ghari Neiat , Azadeh Ghari Neiat , Sajib Mistry , Sajib Mistry , Boualem Benatallah , Boualem Benatallah , Brahim Medjahed, Mourad Ouzzani, Fabio Casati, Xumin Liu, Hongbing Wang, Dimitrios Georgakopoulos , Brahim Medjahed, Mourad Ouzzani, Fabio Casati, Xumin Liu, Hongbing Wang, Dimitrios Georgakopoulos , Liang Chen, Surya Nepal , Liang Chen, Surya Nepal , Zaki Malik , Zaki Malik , Abdelkarim Erradi, Yan Wang , Abdelkarim Erradi, Yan Wang , M. Brian Blake, Schahram Dustdar , M. Brian Blake, Schahram Dustdar , Frank Leymann, Michael P. Papazoglou , Frank Leymann, Michael P. Papazoglou : :
 A service computing manifesto: the next 10 years. Commun. ACM 60(4): 64-72 (2017)
 [j53]Anne Hee Hiong Ngu [j53]Anne Hee Hiong Ngu , Mario A. Gutierrez, Vangelis Metsis, Surya Nepal , Mario A. Gutierrez, Vangelis Metsis, Surya Nepal , Quan Z. Sheng , Quan Z. Sheng : :
 IoT Middleware: A Survey on Issues and Enabling Technologies. IEEE Internet Things J. 4(1): 1-20 (2017)
 [j52]Deepak Puthal, Surya Nepal [j52]Deepak Puthal, Surya Nepal , Rajiv Ranjan , Rajiv Ranjan , Jinjun Chen: , Jinjun Chen:
 A dynamic prime number based efficient security mechanism for big sensing data streams. J. Comput. Syst. Sci. 83(1): 22-42 (2017)
 [j51]Miranda Zhang, Rajiv Ranjan [j51]Miranda Zhang, Rajiv Ranjan , Michael Menzel, Surya Nepal, Peter Strazdins, Wei Jie, Lizhe Wang: , Michael Menzel, Surya Nepal, Peter Strazdins, Wei Jie, Lizhe Wang:
 An Infrastructure Service Recommendation System for Cloud Applications with Real-time QoS Requirement Constraints. IEEE Syst. J. 11(4): 2960-2970 (2017)
 [j50]Surya Nepal [j50]Surya Nepal , Richard O. Sinnott , Richard O. Sinnott , Carsten Friedrich, Catherine Wise, Shiping Chen , Carsten Friedrich, Catherine Wise, Shiping Chen , Sehrish Kanwal , Sehrish Kanwal , Jinhui Yao, Andrew Lonie: , Jinhui Yao, Andrew Lonie:
 TruXy: Trusted Storage Cloud for Scientific Workflows. IEEE Trans. Cloud Comput. 5(3): 428-442 (2017)
 [j49]Deepak Puthal, Surya Nepal [j49]Deepak Puthal, Surya Nepal , Rajiv Ranjan , Rajiv Ranjan , Jinjun Chen: , Jinjun Chen:
 DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream. ACM Trans. Embed. Comput. Syst. 16(2): 51:1-51:24 (2017)
 [j48]Shaghayegh Sharif, Paul Watson [j48]Shaghayegh Sharif, Paul Watson , Javid Taheri, Surya Nepal , Javid Taheri, Surya Nepal , Albert Y. Zomaya , Albert Y. Zomaya : :
 Privacy-Aware Scheduling SaaS in High Performance Computing Environments. IEEE Trans. Parallel Distributed Syst. 28(4): 1176-1188 (2017)
 [j47]Nan Li [j47]Nan Li , Dongxi Liu, Surya Nepal , Dongxi Liu, Surya Nepal : :
 Lightweight Mutual Authentication for IoT and Its Applications. IEEE Trans. Sustain. Comput. 2(4): 359-370 (2017)
 [j46]Robertus Nugroho [j46]Robertus Nugroho , Weiliang Zhao , Weiliang Zhao , Jian Yang , Jian Yang , Cécile Paris, Surya Nepal , Cécile Paris, Surya Nepal : :
 Using time-sensitive interactions to improve topic derivation in twitter. World Wide Web 20(1): 61-87 (2017)
 [c140]Shuo Wang, Richard O. Sinnott, Surya Nepal [c140]Shuo Wang, Richard O. Sinnott, Surya Nepal : :
 Privacy-protected place of activity mining on big location data. IEEE BigData 2017: 1101-1108
 [c139]Shuo Wang, Richard O. Sinnott, Surya Nepal [c139]Shuo Wang, Richard O. Sinnott, Surya Nepal : :
 Sensitive gazetteer discovery and protection for mobile social media users. IEEE BigData 2017: 1109-1116
 [c138]Jongkil Kim [c138]Jongkil Kim , Willy Susilo , Willy Susilo , Fuchun Guo , Fuchun Guo , Man Ho Au , Man Ho Au , Surya Nepal , Surya Nepal : :
 An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption. AsiaCCS 2017: 823-834
 [c137]Sunil Singh Samant [c137]Sunil Singh Samant , Mohan Baruwal Chhetri , Mohan Baruwal Chhetri , Quoc Bao Vo, Ryszard Kowalczyk , Quoc Bao Vo, Ryszard Kowalczyk , Surya Nepal , Surya Nepal : :
 Towards Quality-Assured Data Delivery in Cloud-Based IoT Platforms for Smart Cities. CIC 2017: 291-298
 [c136]Ioan Petri [c136]Ioan Petri , Omer F. Rana , Omer F. Rana , Joseph Bignell, Surya Nepal , Joseph Bignell, Surya Nepal , Nitin Auluck: , Nitin Auluck:
 Incentivising Resource Sharing in Edge Computing Applications. GECON 2017: 204-215
 [c135]Deepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen: [c135]Deepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen:
 A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams. HICSS 2017: 1-10
 [c134]Ali Yavari, Prem Prakash Jayaraman, Dimitrios Georgakopoulos, Surya Nepal: [c134]Ali Yavari, Prem Prakash Jayaraman, Dimitrios Georgakopoulos, Surya Nepal:
 ConTaaS: An Approach to Internet-Scale Contextualisation for Developing Efficient Internet of Things Applications. HICSS 2017: 1-9
 [c133]Nan Li [c133]Nan Li , Fuchun Guo , Fuchun Guo , Yi Mu, Willy Susilo , Yi Mu, Willy Susilo , Surya Nepal , Surya Nepal : :
 Fuzzy Extractors for Biometric Identification. ICDCS 2017: 667-677
 [c132]Robertus Nugroho [c132]Robertus Nugroho , Weiliang Zhao , Weiliang Zhao , Jian Yang , Jian Yang , Cécile Paris, Surya Nepal , Cécile Paris, Surya Nepal : :
 The Joint Effects of Tweet Content Similarity and Tweet Interactions for Topic Derivation. ICDCS 2017: 2338-2343
 [c131]Derek Wang [c131]Derek Wang , Sheng Wen , Sheng Wen , Yang Xiang, Wanlei Zhou , Yang Xiang, Wanlei Zhou , Jun Zhang, Surya Nepal: , Jun Zhang, Surya Nepal:
 Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks. ICDCS 2017: 2417-2422
 [c130]Min Fu, Shiping Chen [c130]Min Fu, Shiping Chen , Jian Yang , Jian Yang , Surya Nepal, Liming Zhu , Surya Nepal, Liming Zhu : :
 ARA-Assessor: Application-Aware Runtime Risk Assessment for Cloud-Based Business Continuity. ICSOC 2017: 511-527
 [c129]Deepak Puthal, Rajiv Ranjan [c129]Deepak Puthal, Rajiv Ranjan , Surya Nepal, Jinjun Chen: , Surya Nepal, Jinjun Chen:
 IoT and Big Data: An Architecture with Data Flow and Security Issues. IISSC/CN4IoT 2017: 243-252
 [c128]Xu Yang, Xun Yi, Hui Cui [c128]Xu Yang, Xun Yi, Hui Cui , Xuechao Yang , Xuechao Yang , Surya Nepal , Surya Nepal , Xinyi Huang, YaLi Zeng: , Xinyi Huang, YaLi Zeng:
 A Practical Authentication Protocol for Anonymous Web Browsing. ISPEC 2017: 468-482
 [c127]Annie Gilda Roselin, Priyadarsi Nanda, Surya Nepal [c127]Annie Gilda Roselin, Priyadarsi Nanda, Surya Nepal : :
 Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks. TrustCom/BigDataSE/ICESS 2017: 371-378
 [c126]Anil Singh [c126]Anil Singh , Nitin Auluck, Omer F. Rana , Nitin Auluck, Omer F. Rana , Andrew Jones, Surya Nepal , Andrew Jones, Surya Nepal : :
 RT-SANE: Real Time Security Aware Scheduling on the Network Edge. UCC 2017: 131-140
 [c125]Zizhu Zhang [c125]Zizhu Zhang , Weiliang Zhao , Weiliang Zhao , Jian Yang , Jian Yang , Surya Nepal, Cécile Paris, Bing Li: , Surya Nepal, Cécile Paris, Bing Li:
 Exploiting Users' Rating Behaviour to Enhance the Robustness of Social Recommendation. WISE (2) 2017: 467-475
 [c124]Xuechao Yang [c124]Xuechao Yang , Xun Yi , Xun Yi , Caspar Ryan , Caspar Ryan , Ron G. van Schyndel, Fengling Han , Ron G. van Schyndel, Fengling Han , Surya Nepal , Surya Nepal , Andy Song , Andy Song : :
 A Verifiable Ranked Choice Internet Voting System. WISE (2) 2017: 490-501
 [c123]Shahriar Badsha, Xun Yi [c123]Shahriar Badsha, Xun Yi , Ibrahim Khalil , Ibrahim Khalil , Dongxi Liu, Surya Nepal , Dongxi Liu, Surya Nepal , Elisa Bertino: , Elisa Bertino:
 Privacy Preserving Location Recommendations. WISE (2) 2017: 502-516
 [c122]Sunghwan Mac Kim, Kyo Kageura, James McHugh, Surya Nepal, Cécile Paris, Bella Robinson, Ross Sparks, Stephen Wan: [c122]Sunghwan Mac Kim, Kyo Kageura, James McHugh, Surya Nepal, Cécile Paris, Bella Robinson, Ross Sparks, Stephen Wan:
 Twitter Content Eliciting User Engagement: A Case Study on Australian Organisations. WWW (Companion Volume) 2017: 807-808
 [i7]Dongxi Liu, Nan Li, Jongkil Kim, Surya Nepal: [i7]Dongxi Liu, Nan Li, Jongkil Kim, Surya Nepal:
 Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication. IACR Cryptol. ePrint Arch. 2017: 685 (2017)
- 2016
 [j45]Surya Nepal [j45]Surya Nepal , Suraj Pandey: , Suraj Pandey:
 Guest Editorial: Cloud Computing and Scientific Applications (CCSA) - Big Data Analysis in the Cloud. Comput. J. 59(3): 285-286 (2016)
 [j44]Deepak Puthal, Surya Nepal [j44]Deepak Puthal, Surya Nepal , Rajiv Ranjan , Rajiv Ranjan , Jinjun Chen: , Jinjun Chen:
 Threats to Networking Cloud and Edge Datacenters in the Internet of Things. IEEE Cloud Comput. 3(3): 64-71 (2016)
 [j43]Julian Jang-Jaccard [j43]Julian Jang-Jaccard , Surya Nepal , Surya Nepal , Branko G. Celler , Branko G. Celler , Bo Yan: , Bo Yan:
 WebRTC-based video conferencing service for telehealth. Computing 98(1-2): 169-193 (2016)
 [j42]Jongkil Kim [j42]Jongkil Kim , Surya Nepal , Surya Nepal : :
 A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage. Data Sci. Eng. 1(3): 149-160 (2016)
 [j41]Ingo Weber [j41]Ingo Weber , Surya Nepal , Surya Nepal , Liming Zhu , Liming Zhu : :
 Developing Dependable and Secure Cloud Applications. IEEE Internet Comput. 20(3): 74-79 (2016)
 [j40]Danan Thilakanathan [j40]Danan Thilakanathan , Shiping Chen , Shiping Chen , Surya Nepal , Surya Nepal , Rafael A. Calvo: , Rafael A. Calvo:
 SafeProtect: Controlled Data Sharing With User-Defined Policies in Cloud-Based Collaborative Environment. IEEE Trans. Emerg. Top. Comput. 4(2): 301-315 (2016)
 [j39]Elisa Bertino, Kim-Kwang Raymond Choo [j39]Elisa Bertino, Kim-Kwang Raymond Choo , Dimitrios Georgakopoulos, Surya Nepal , Dimitrios Georgakopoulos, Surya Nepal : :
 Internet of Things (IoT): Smart and Secure Service Delivery. ACM Trans. Internet Techn. 16(4): 22:1-22:7 (2016)
 [c121]Shuo Wang, Richard O. Sinnott [c121]Shuo Wang, Richard O. Sinnott , Surya Nepal , Surya Nepal : :
 Protecting the location privacy of mobile social media users. IEEE BigData 2016: 1143-1150
 [c120]Ruoyu Wang, Daniel Sun, Guoqiang Li, Muhammad Atif, Surya Nepal: [c120]Ruoyu Wang, Daniel Sun, Guoqiang Li, Muhammad Atif, Surya Nepal:
 LogProv: Logging events as provenance of big data analytics pipelines with trustworthiness. IEEE BigData 2016: 1402-1411
 [c119]Surya Nepal [c119]Surya Nepal , Cécile Paris: , Cécile Paris:
 Why Is It Difficult for Welfare Recipients to Return to Work? A Case Study through a Collaborative Online Community. CIC 2016: 19-28
 [c118]Amanda Dennett, Surya Nepal [c118]Amanda Dennett, Surya Nepal , Cécile Paris, Bella Robinson , Cécile Paris, Bella Robinson : :
 TweetRipple: Understanding Your Twitter Audience and the Impact of Your Tweets. CIC 2016: 256-265
 [c117]Cécile Paris, Surya Nepal [c117]Cécile Paris, Surya Nepal : :
 Can a Government Use Social Media to Support Disadvantaged Citizens? CIC 2016: 398-407
 [c116]Shuo Wang, Richard O. Sinnott [c116]Shuo Wang, Richard O. Sinnott , Surya Nepal , Surya Nepal : :
 Privacy-protected social media user trajectories calibration. eScience 2016: 293-302
 [c115]Deepak Puthal, Surya Nepal [c115]Deepak Puthal, Surya Nepal , Rajiv Ranjan , Rajiv Ranjan , Jinjun Chen: , Jinjun Chen:
 A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud. HPCC/SmartCity/DSS 2016: 1218-1225
 [c114]Shiping Chen [c114]Shiping Chen , Tsz Lam Chim, Zhijie Li, Bo Yan, Hendra Wijaya, Surya Nepal , Tsz Lam Chim, Zhijie Li, Bo Yan, Hendra Wijaya, Surya Nepal : :
 PBCP: A Process-based Bussiness Collaboration Platform. ICEIS (2) 2016: 575-582
 [c113]Sojen Pradhan, Valérie Gay, Surya Nepal: [c113]Sojen Pradhan, Valérie Gay, Surya Nepal:
 Impact of Subjective Aspects in the Matching of Dentists and Patients in Dental Care Recommendation Systems. ICIS 2016
 [c112]Sojen Pradhan, Valérie Gay, Surya Nepal: [c112]Sojen Pradhan, Valérie Gay, Surya Nepal:
 An Innovative Approach to Derive Trust from Social Networks and to Improve the Matching in Dental Care Recommendation Systems. PACIS 2016: 328
- 2015
 [j38]Surya Nepal [j38]Surya Nepal , Sanat Kumar Bista, Cécile Paris: , Sanat Kumar Bista, Cécile Paris:
 Behavior-Based Propagation of Trust in Social Networks with Restricted and Anonymous Participation. Comput. Intell. 31(4): 642-668 (2015)
 [j37]Surya Nepal [j37]Surya Nepal , Rajiv Ranjan , Rajiv Ranjan , Kim-Kwang Raymond Choo , Kim-Kwang Raymond Choo : :
 Trustworthy Processing of Healthcare Big Data in Hybrid Clouds. IEEE Cloud Comput. 2(2): 78-84 (2015)
 [j36]Elisa Bertino, Surya Nepal, Rajiv Ranjan [j36]Elisa Bertino, Surya Nepal, Rajiv Ranjan : :
 Building Sensor-Based Big Data Cyberinfrastructures. IEEE Cloud Comput. 2(5): 64-69 (2015)
 [j35]Jinjun Chen, Surya Nepal [j35]Jinjun Chen, Surya Nepal : :
 Guest editorial: Special issue on data intensive cloud computing. Computing 97(4): 333-335 (2015)
 [j34]Rajiv Ranjan [j34]Rajiv Ranjan , Rajkumar Buyya, Surya Nepal , Rajkumar Buyya, Surya Nepal , Dimitrios Georgakopoulos: , Dimitrios Georgakopoulos:
 A note on resource orchestration for cloud computing. Concurr. Comput. Pract. Exp. 27(9): 2370-2372 (2015)
 [j33]Yushun Fan, Keman Huang, Wei Tan, Yang Zhong, Jinhui Yao, Surya Nepal [j33]Yushun Fan, Keman Huang, Wei Tan, Yang Zhong, Jinhui Yao, Surya Nepal , Shiping Chen , Shiping Chen : :
 Domain-aware reputable service recommendation in heterogeneous manufacturing service ecosystem. Int. J. Comput. Integr. Manuf. 28(11): 1178-1195 (2015)
 [j32]Xuyun Zhang [j32]Xuyun Zhang , Wan-Chun Dou, Jian Pei , Wan-Chun Dou, Jian Pei , Surya Nepal , Surya Nepal , Chi Yang, Chang Liu, Jinjun Chen: , Chi Yang, Chang Liu, Jinjun Chen:
 Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud. IEEE Trans. Computers 64(8): 2293-2307 (2015)
 [j31]Surya Nepal [j31]Surya Nepal , Cécile Paris, Payam Aghaei Pour, Jill Freyne, Sanat Kumar Bista: , Cécile Paris, Payam Aghaei Pour, Jill Freyne, Sanat Kumar Bista:
 Interaction-Based Recommendations for Online Communities. ACM Trans. Internet Techn. 15(2): 6:1-6:21 (2015)
 [j30]Chi Yang, Chang Liu, Xuyun Zhang [j30]Chi Yang, Chang Liu, Xuyun Zhang , Surya Nepal , Surya Nepal , Jinjun Chen: , Jinjun Chen:
 A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud. IEEE Trans. Parallel Distributed Syst. 26(2): 329-339 (2015)
 [j29]Jinhui Yao, Wei Tan, Surya Nepal [j29]Jinhui Yao, Wei Tan, Surya Nepal , Shiping Chen , Shiping Chen , Jia Zhang, David De Roure , Jia Zhang, David De Roure , Carole A. Goble: , Carole A. Goble:
 ReputationNet: Reputation-Based Service Recommendation for e-Science. IEEE Trans. Serv. Comput. 8(3): 439-452 (2015)
 [j28]Surya Nepal [j28]Surya Nepal , Cécile Paris, Athman Bouguettaya , Cécile Paris, Athman Bouguettaya : :
 Trusting the Social Web: issues and challenges. World Wide Web 18(1): 1-7 (2015)
 [c111]Catherine Wise, Carsten Friedrich, Surya Nepal [c111]Catherine Wise, Carsten Friedrich, Surya Nepal , Shiping Chen , Shiping Chen , Richard O. Sinnott , Richard O. Sinnott : :
 Cloud Docs: Secure Scalable Document Sharing on Public Clouds. CLOUD 2015: 532-539
 [c110]Robertus Nugroho [c110]Robertus Nugroho , Youliang Zhong, Jian Yang , Youliang Zhong, Jian Yang , Cécile Paris, Surya Nepal , Cécile Paris, Surya Nepal : :
 Matrix Inter-joint Factorization - A New Approach for Topic Derivation in Twitter. BigData Congress 2015: 79-86
 [c109]Robertus Nugroho [c109]Robertus Nugroho , Jian Yang , Jian Yang , Youliang Zhong, Cécile Paris, Surya Nepal , Youliang Zhong, Cécile Paris, Surya Nepal : :
 Deriving Topics in Twitter by Exploiting Tweet Interactions. BigData Congress 2015: 87-94
 [c108]Deepak Puthal, Surya Nepal [c108]Deepak Puthal, Surya Nepal , Cécile Paris, Rajiv Ranjan , Cécile Paris, Rajiv Ranjan , Jinjun Chen: , Jinjun Chen:
 Efficient Algorithms for Social Network Coverage and Reach. BigData Congress 2015: 467-474
 [c107]Shiping Chen [c107]Shiping Chen , Danan Thilakanathan, Donna Xu, Surya Nepal , Danan Thilakanathan, Donna Xu, Surya Nepal , Rafael A. Calvo: , Rafael A. Calvo:
 Self Protecting Data Sharing Using Generic Policies. CCGRID 2015: 1197-1200
 [c106]Sojen Pradhan, Valérie Gay, Surya Nepal: [c106]Sojen Pradhan, Valérie Gay, Surya Nepal:
 Analysing and Using Subjective Criteria to Improve Dental Care Recommendation Systems. PACIS 2015: 99
 [c105]Robertus Nugroho [c105]Robertus Nugroho , Diego Mollá Aliod , Diego Mollá Aliod , Jian Yang , Jian Yang , Youliang Zhong, Cécile Paris, Surya Nepal: , Youliang Zhong, Cécile Paris, Surya Nepal:
 Incorporating Tweet Relationships into Topic Derivation. PACLING 2015: 177-190
 [c104]Deepak Puthal, Surya Nepal, Rajiv Ranjan [c104]Deepak Puthal, Surya Nepal, Rajiv Ranjan , Jinjun Chen: , Jinjun Chen:
 DPBSV - An Efficient and Secure Scheme for Big Sensing Data Stream. TrustCom/BigDataSE/ISPA (1) 2015: 246-253
 [c103]Deepak Puthal, Surya Nepal [c103]Deepak Puthal, Surya Nepal , Rajiv Ranjan , Rajiv Ranjan , Jinjun Chen: , Jinjun Chen:
 A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream. WISE (2) 2015: 93-108
 [c102]Robertus Nugroho [c102]Robertus Nugroho , Weiliang Zhao , Weiliang Zhao , Jian Yang , Jian Yang , Cécile Paris, Surya Nepal, Yan Mei: , Cécile Paris, Surya Nepal, Yan Mei:
 Time-Sensitive Topic Derivation in Twitter. WISE (1) 2015: 138-152
 [p4]Surya Nepal [p4]Surya Nepal , Cécile Paris, Dimitrios Georgakopoulos: , Cécile Paris, Dimitrios Georgakopoulos:
 Social Media for Government Services: An Introduction. Social Media for Government Services 2015: 3-24
 [p3]Cécile Paris, Surya Nepal [p3]Cécile Paris, Surya Nepal : :
 Next Step: An Online Community for Delivering Human Services. Social Media for Government Services 2015: 169-196
 [p2]Surya Nepal [p2]Surya Nepal , Cécile Paris, Sanat Kumar Bista: , Cécile Paris, Sanat Kumar Bista:
 Gamification on the Social Web. Social Media for Government Services 2015: 197-220
 [e4]Surya Nepal [e4]Surya Nepal , Cécile Paris, Dimitrios Georgakopoulos , Cécile Paris, Dimitrios Georgakopoulos : :
 Social Media for Government Services. Springer 2015, ISBN 978-3-319-27235-1 [contents]
 [i6]Miranda Zhang, Rajiv Ranjan, Michael Menzel, Surya Nepal, Peter Strazdins, Lizhe Wang: [i6]Miranda Zhang, Rajiv Ranjan, Michael Menzel, Surya Nepal, Peter Strazdins, Lizhe Wang:
 A Cloud Infrastructure Service Recommendation System for Optimizing Real-time QoS Provisioning Constraints. CoRR abs/1504.01828 (2015)
- 2014
 [j27]Elisa Bertino, Dimitrios Georgakopoulos, Surya Nepal, Mudhakar Srivatsa, Alessandro Vinciarelli: [j27]Elisa Bertino, Dimitrios Georgakopoulos, Surya Nepal, Mudhakar Srivatsa, Alessandro Vinciarelli:
 Guest Editorial: Selected Papers from IEEE IEEE/EAI CollaborateCom 2013. EAI Endorsed Trans. Collab. Comput. 1(1): e2 (2014)
 [j26]Danan Thilakanathan, Shiping Chen [j26]Danan Thilakanathan, Shiping Chen , Surya Nepal , Surya Nepal , Rafael A. Calvo, Leila Alem: , Rafael A. Calvo, Leila Alem:
 A platform for secure monitoring and sharing of generic health data in the Cloud. Future Gener. Comput. Syst. 35: 102-113 (2014)
 [j25]Sanat Kumar Bista, Surya Nepal [j25]Sanat Kumar Bista, Surya Nepal , Cécile Paris, Nathalie Colineau: , Cécile Paris, Nathalie Colineau:
 Gamification for Online Communities: A Case Study for Delivering Government Services. Int. J. Cooperative Inf. Syst. 23(2) (2014)
 [j24]Julian Jang-Jaccard [j24]Julian Jang-Jaccard , Surya Nepal , Surya Nepal : :
 A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5): 973-993 (2014)
 [j23]Xuyun Zhang [j23]Xuyun Zhang , Chang Liu, Surya Nepal , Chang Liu, Surya Nepal , Chi Yang, Wanchun Dou, Jinjun Chen: , Chi Yang, Wanchun Dou, Jinjun Chen:
 A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud. J. Comput. Syst. Sci. 80(5): 1008-1020 (2014)
 [j22]Surya Nepal [j22]Surya Nepal , Athman Bouguettaya , Athman Bouguettaya , Cécile Paris: , Cécile Paris:
 Guest Editorial: Special Issue on Clouds for Social Computing. IEEE Trans. Serv. Comput. 7(3): 329-332 (2014)
 [c101]Danan Thilakanathan, Shiping Chen [c101]Danan Thilakanathan, Shiping Chen , Surya Nepal , Surya Nepal , Rafael A. Calvo, Dongxi Liu, John Zic , Rafael A. Calvo, Dongxi Liu, John Zic : :
 Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices. IEEE CLOUD 2014: 224-231
 [c100]Sanat Kumar Bista, Surya Nepal [c100]Sanat Kumar Bista, Surya Nepal , Cécile Paris: , Cécile Paris:
 Multifaceted Visualisation of Annotated Social Media Data. BigData Congress 2014: 699-706
 [c99]Danan Thilakanathan, Yu Zhao, Shiping Chen [c99]Danan Thilakanathan, Yu Zhao, Shiping Chen , Surya Nepal, Rafael A. Calvo, Abelardo Pardo , Surya Nepal, Rafael A. Calvo, Abelardo Pardo : :
 Protecting and Analysing Health Care Data on Cloud. CBD 2014: 143-149
 [c98]Shaghayegh Sharif, Javid Taheri, Albert Y. Zomaya [c98]Shaghayegh Sharif, Javid Taheri, Albert Y. Zomaya , Surya Nepal , Surya Nepal : :
 Online Multiple Workflow Scheduling under Privacy and Deadline in Hybrid Cloud Environment. CloudCom 2014: 455-462
 [c97]Sojen Pradhan, Valérie Gay [c97]Sojen Pradhan, Valérie Gay , Surya Nepal , Surya Nepal : :
 Improving dental care recommendation systems using trust and social networks. ICC 2014: 4264-4269
 [c96]Keman Huang, Yi Liu, Surya Nepal, Yushun Fan, Shiping Chen [c96]Keman Huang, Yi Liu, Surya Nepal, Yushun Fan, Shiping Chen , Wei Tan: , Wei Tan:
 A Novel Equitable Trustworthy Mechanism for Service Recommendation in the Evolving Service Ecosystem. ICSOC 2014: 510-517
 [c95]Sojen Pradhan, Valérie Gay, Surya Nepal: [c95]Sojen Pradhan, Valérie Gay, Surya Nepal:
 Improving the Matching Process of Dental Care Recommendation Systems by using Subjective criteria for both patients and Dentists. PACIS 2014: 296
 [p1]Surya Nepal [p1]Surya Nepal , Wanita Sherchan, Athman Bouguettaya , Wanita Sherchan, Athman Bouguettaya : :
 Service Trust Management for E-Government Applications. Advanced Web Services 2014: 339-362
 [e3]Alessio Lomuscio, Surya Nepal [e3]Alessio Lomuscio, Surya Nepal , Fabio Patrizi, Boualem Benatallah, Ivona Brandic: , Fabio Patrizi, Boualem Benatallah, Ivona Brandic:
 Service-Oriented Computing - ICSOC 2013 Workshops - CCSA, CSB, PASCEB, SWESE, WESOA, and PhD Symposium, Berlin, Germany, December 2-5, 2013. Revised Selected Papers. Lecture Notes in Computer Science 8377, Springer 2014, ISBN 978-3-319-06858-9 [contents]
- 2013
 [j21]Xuyun Zhang [j21]Xuyun Zhang , Chang Liu, Surya Nepal , Chang Liu, Surya Nepal , Chi Yang, Wanchun Dou, Jinjun Chen: , Chi Yang, Wanchun Dou, Jinjun Chen:
 SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud. Concurr. Comput. Pract. Exp. 25(18): 2561-2576 (2013)
 [j20]Wanita Sherchan, Surya Nepal [j20]Wanita Sherchan, Surya Nepal , Cécile Paris: , Cécile Paris:
 A survey of trust in social networks. ACM Comput. Surv. 45(4): 47:1-47:33 (2013)
 [j19]Rajiv Ranjan [j19]Rajiv Ranjan , Rajkumar Buyya, Surya Nepal , Rajkumar Buyya, Surya Nepal : :
 Model-driven provisioning of application services in hybrid computing environments. Future Gener. Comput. Syst. 29(5): 1211-1215 (2013)
 [j18]Suraj Pandey, Surya Nepal [j18]Suraj Pandey, Surya Nepal : :
 Cloud Computing and Scientific Applications - Big Data, Scalable Analytics, and Beyond. Future Gener. Comput. Syst. 29(7): 1774-1776 (2013)
 [j17]Surya Nepal [j17]Surya Nepal , Cécile Paris, Sanat Kumar Bista, Wanita Sherchan: , Cécile Paris, Sanat Kumar Bista, Wanita Sherchan:
 A trust model-based analysis of social networks. Int. J. Trust. Manag. Comput. Commun. 1(1): 3-22 (2013)
 [j16]Xuyun Zhang [j16]Xuyun Zhang , Chang Liu, Surya Nepal , Chang Liu, Surya Nepal , Jinjun Chen: , Jinjun Chen:
 An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J. Comput. Syst. Sci. 79(5): 542-555 (2013)
 [j15]Xuyun Zhang [j15]Xuyun Zhang , Chang Liu, Surya Nepal , Chang Liu, Surya Nepal , Suraj Pandey, Jinjun Chen: , Suraj Pandey, Jinjun Chen:
 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud. IEEE Trans. Parallel Distributed Syst. 24(6): 1192-1202 (2013)
 [c94]Sanat Kumar Bista, Surya Nepal [c94]Sanat Kumar Bista, Surya Nepal , Cécile Paris: , Cécile Paris:
 Data Abstraction and Visualisation in Next Step: Experiences from a Government Services Delivery Trial. BigData Congress 2013: 263-270
 [c93]Sojen Pradhan, Valérie Gay, Surya Nepal: [c93]Sojen Pradhan, Valérie Gay, Surya Nepal:
 Social Networking and Dental Care: State of the Art and Analysis of the Impact on Dentists, Dental Practices and their Patients. Bled eConference 2013: 22
 [c92]Xuyun Zhang [c92]Xuyun Zhang , Chi Yang, Surya Nepal , Chi Yang, Surya Nepal , Chang Liu, Wanchun Dou, Jinjun Chen: , Chang Liu, Wanchun Dou, Jinjun Chen:
 A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud. CGC 2013: 105-112
 [c91]Surya Nepal [c91]Surya Nepal , Cécile Paris, Payam Aghaei Pour, Sanat Kumar Bista, Jill Freyne: , Cécile Paris, Payam Aghaei Pour, Sanat Kumar Bista, Jill Freyne:
 A social trust based friend recommender for online communities "invited paper". CollaborateCom 2013: 419-428
 [c90]Surya Nepal [c90]Surya Nepal , Julian Jang-Jaccard , Julian Jang-Jaccard , Branko G. Celler , Branko G. Celler , Bo Yan, Leila Alem: , Bo Yan, Leila Alem:
 Data architecture for telehealth services research: A case study of home tele-monitoring. CollaborateCom 2013: 458-467
 [c89]Julian Jang-Jaccard [c89]Julian Jang-Jaccard , Jane Li, Surya Nepal , Jane Li, Surya Nepal , Leila Alem: , Leila Alem:
 Security analysis of mobile applications: A case study of a collaboration tool in healthcare. CollaborateCom 2013: 553-562
 [c88]Sanat Kumar Bista, Nathalie Colineau, Surya Nepal [c88]Sanat Kumar Bista, Nathalie Colineau, Surya Nepal , Cécile Paris: , Cécile Paris:
 Next step: an online community to support parents in their transition to work. CSCW Companion 2013: 5-10
 [c87]Nathalie Colineau, Cécile Paris, Surya Nepal [c87]Nathalie Colineau, Cécile Paris, Surya Nepal : :
 Designing for reflection and collaboration to support a transition from welfare to work. CSCW 2013: 471-476
 [c86]Danan Thilakanathan, Rafael A. Calvo, Shiping Chen [c86]Danan Thilakanathan, Rafael A. Calvo, Shiping Chen , Surya Nepal , Surya Nepal : :
 Secure and Controlled Sharing of Data in Distributed Computing. CSE 2013: 825-832
 [c85]Chi Yang, Chang Liu, Xuyun Zhang [c85]Chi Yang, Chang Liu, Xuyun Zhang , Surya Nepal , Surya Nepal , Jinjun Chen: , Jinjun Chen:
 Querying Streaming XML Big Data with Multiple Filters on Cloud. CSE 2013: 1121-1127
 [c84]Jinhui Yao, Alex Ng [c84]Jinhui Yao, Alex Ng , Shiping Chen , Shiping Chen , Dongxi Liu, Carsten Friedrich, Surya Nepal , Dongxi Liu, Carsten Friedrich, Surya Nepal : :
 A Performance Evaluation of Public Cloud Using TPC-C. ICSOC Workshops 2013: 3-13
 [c83]Sanat Kumar Bista, Payam Aghaei Pour, Nathalie Colineau, Surya Nepal [c83]Sanat Kumar Bista, Payam Aghaei Pour, Nathalie Colineau, Surya Nepal , Cécile Paris: , Cécile Paris:
 TrustVis: A Trust Visualisation Service for Online Communities. ICSOC Workshops 2013: 191-202
 [c82]Suraj Pandey, Surya Nepal [c82]Suraj Pandey, Surya Nepal : :
 Introduction to the 3rd International Workshop on Cloud Computing and Scientific Applications (CCSA'13). ICSOC Workshops 2013: 279-280
 [c81]Shiping Chen [c81]Shiping Chen , Tomasz Bednarz, Piotr Szul, Dadong Wang, Yulia Arzhaeva , Tomasz Bednarz, Piotr Szul, Dadong Wang, Yulia Arzhaeva , Neil Burdett, Alex Khassapov, John Zic, Surya Nepal, Tim Gurevey, John A. Taylor , Neil Burdett, Alex Khassapov, John Zic, Surya Nepal, Tim Gurevey, John A. Taylor : :
 Galaxy + Hadoop: Toward a Collaborative and Scalable Image Processing Toolbox in Cloud. ICSOC Workshops 2013: 339-351
 [c80]Keman Huang, Jinhui Yao, Yushun Fan, Wei Tan, Surya Nepal [c80]Keman Huang, Jinhui Yao, Yushun Fan, Wei Tan, Surya Nepal , Yayu Ni, Shiping Chen , Yayu Ni, Shiping Chen : :
 Mirror, Mirror, on the Web, Which Is the Most Reputable Service of Them All? - A Domain-Aware and Reputation-Aware Method for Service Recommendation. ICSOC 2013: 343-357
 [c79]Weidong Huang [c79]Weidong Huang , Leila Alem, Surya Nepal, Danan Thilakanathan: , Leila Alem, Surya Nepal, Danan Thilakanathan:
 Supporting tele-assistance and tele-monitoring in safety-critical environments. OZCHI 2013: 539-542
 [c78]Shaghayegh Sharif, Javid Taheri, Albert Y. Zomaya [c78]Shaghayegh Sharif, Javid Taheri, Albert Y. Zomaya , Surya Nepal , Surya Nepal : :
 MPHC: Preserving Privacy for Workflow Execution in Hybrid Clouds. PDCAT 2013: 272-280
 [c77]Xuyun Zhang [c77]Xuyun Zhang , Chang Liu, Surya Nepal , Chang Liu, Surya Nepal , Chi Yang, Wanchun Dou, Jinjun Chen: , Chi Yang, Wanchun Dou, Jinjun Chen:
 Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud. TrustCom/ISPA/IUCC 2013: 501-508
 [c76]Sanat Kumar Bista, Surya Nepal, Cécile Paris: [c76]Sanat Kumar Bista, Surya Nepal, Cécile Paris:
 The Human Touch of Government Services. UMAP Workshops 2013
 [c75]Sanat Kumar Bista, Surya Nepal, Cécile Paris: [c75]Sanat Kumar Bista, Surya Nepal, Cécile Paris:
 Know Your Members' Trust. UMAP Workshops 2013
 [c74]Surya Nepal [c74]Surya Nepal , Cécile Paris, Payam Aghaei Pour, Jill Freyne, Sanat Kumar Bista: , Cécile Paris, Payam Aghaei Pour, Jill Freyne, Sanat Kumar Bista:
 Interaction Based Content Recommendation in Online Communities. UMAP 2013: 14-24
 [e2]Elisa Bertino, Dimitrios Georgakopoulos, Mudhakar Srivatsa, Surya Nepal, Alessandro Vinciarelli: [e2]Elisa Bertino, Dimitrios Georgakopoulos, Mudhakar Srivatsa, Surya Nepal, Alessandro Vinciarelli:
 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013. ICST / IEEE 2013, ISBN 978-1-936968-92-3 [contents]
 [i5]Cécile Paris, Nathalie Colineau, Surya Nepal, Sanat Kumar Bista, Gina Beschorner: [i5]Cécile Paris, Nathalie Colineau, Surya Nepal, Sanat Kumar Bista, Gina Beschorner:
 Ethical considerations in an online community: the balancing act. CoRR abs/1311.4389 (2013)
 [i4]Surya Nepal, Cécile Paris, Sanat Kumar Bista, Wanita Sherchan: [i4]Surya Nepal, Cécile Paris, Sanat Kumar Bista, Wanita Sherchan:
 A Trust Model Based Analysis of Social Networks. CoRR abs/1311.4606 (2013)
- 2012
 [j14]Dongxi Liu, Jack Lee, Julian Jang [j14]Dongxi Liu, Jack Lee, Julian Jang , Surya Nepal , Surya Nepal , John Zic , John Zic : :
 A New Cloud Architecture of Virtual Trusted Platform Modules. IEICE Trans. Inf. Syst. 95-D(6): 1577-1589 (2012)
 [j13]Surya Nepal, Mukaddim Pathan: [j13]Surya Nepal, Mukaddim Pathan:
 Editorial. Int. J. Cloud Comput. 1(2/3): 101-118 (2012)
 [j12]Surya Nepal, Athman Bouguettaya: [j12]Surya Nepal, Athman Bouguettaya:
 Issues and Challenges in Web Service Management Systems. Int. J. Next Gener. Comput. 3(2) (2012)
 [j11]Wanita Sherchan, Surya Nepal [j11]Wanita Sherchan, Surya Nepal , Athman Bouguettaya , Athman Bouguettaya , Shiping Chen , Shiping Chen : :
 Context-sensitive user interfaces for semantic services. ACM Trans. Internet Techn. 11(3): 14:1-14:27 (2012)
 [c73]Haiyang Sun, Jian Yang [c73]Haiyang Sun, Jian Yang , Weiliang Zhao , Weiliang Zhao , Surya Nepal , Surya Nepal : :
 SOAC-Net: A Model to Manage Service-Based Business Process Authorization. IEEE SCC 2012: 376-383
 [c72]Jinhui Yao, Wei Tan, Surya Nepal [c72]Jinhui Yao, Wei Tan, Surya Nepal , Shiping Chen , Shiping Chen , Jia Zhang, David De Roure , Jia Zhang, David De Roure , Carole A. Goble , Carole A. Goble : :
 ReputationNet: A Reputation Engine to Enhance ServiceMap by Recommending Trusted Services. IEEE SCC 2012: 454-461
 [c71]Suraj Pandey, Surya Nepal [c71]Suraj Pandey, Surya Nepal , Shiping Chen , Shiping Chen : :
 Business Process Engine Simulator. CCGRID 2012: 711-713
 [c70]Xuyun Zhang [c70]Xuyun Zhang , Chang Liu, Surya Nepal , Chang Liu, Surya Nepal , Wanchun Dou, Jinjun Chen: , Wanchun Dou, Jinjun Chen:
 Privacy-Preserving Layer over MapReduce on Cloud. CGC 2012: 304-310
 [c69]Julian Jang-Jaccard, Avnish Manraj, Surya Nepal: [c69]Julian Jang-Jaccard, Avnish Manraj, Surya Nepal:
 Portable key management service for cloud storage. CollaborateCom 2012: 147-156
 [c68]Miranda Zhang, Rajiv Ranjan [c68]Miranda Zhang, Rajiv Ranjan , Armin Haller, Dimitrios Georgakopoulos, Michael Menzel, Surya Nepal: , Armin Haller, Dimitrios Georgakopoulos, Michael Menzel, Surya Nepal:
 An ontology-based system for Cloud infrastructure services' discovery. CollaborateCom 2012: 524-530
 [c67]Sanat Kumar Bista, Surya Nepal [c67]Sanat Kumar Bista, Surya Nepal , Nathalie Colineau, Cécile Paris: , Nathalie Colineau, Cécile Paris:
 Using gamification in an online community. CollaborateCom 2012: 611-618
 [c66]Miranda Zhang, Rajiv Ranjan [c66]Miranda Zhang, Rajiv Ranjan , Surya Nepal , Surya Nepal , Michael Menzel, Armin Haller , Michael Menzel, Armin Haller : :
 A Declarative Recommender System for Cloud Infrastructure Services Selection. GECON 2012: 102-113
 [c65]Haiyang Sun, Weiliang Zhao, Surya Nepal [c65]Haiyang Sun, Weiliang Zhao, Surya Nepal : :
 PASOAC-Net: A Petri-Net Model to Manage Authorization in Service-Based Business Process. ICSOC 2012: 566-573
 [c64]Suraj Pandey, Surya Nepal: [c64]Suraj Pandey, Surya Nepal:
 Modeling Availability in Clouds for Mobile Computing. IEEE MS 2012: 80-87
 [c63]Sanat Kumar Bista, Nathalie Colineau, Surya Nepal [c63]Sanat Kumar Bista, Nathalie Colineau, Surya Nepal , Cécile Paris: , Cécile Paris:
 The design of an online community for welfare recipients. OZCHI 2012: 38-41
 [c62]Sanat Kumar Bista, Surya Nepal [c62]Sanat Kumar Bista, Surya Nepal , Cécile Paris: , Cécile Paris:
 Engagement and Cooperation in Social Networks: Do Benefits and Rewards Help? TrustCom 2012: 1405-1410
 [c61]Surya Nepal, Sanat Kumar Bista, Cécile Paris: [c61]Surya Nepal, Sanat Kumar Bista, Cécile Paris:
 An association based approach to propagate social trust in social networks. UMAP Workshops 2012
 [c60]Surya Nepal, Cécile Paris, Sanat Kumar Bista: [c60]Surya Nepal, Cécile Paris, Sanat Kumar Bista:
 SRec: a social behaviour based recommender for online communities. UMAP Workshops 2012
 [c59]Surya Nepal, Athman Bouguettaya: [c59]Surya Nepal, Athman Bouguettaya:
 Big Data and Cloud. WISE Workshops 2012: 237
 [e1]Calton Pu, James Joshi, Surya Nepal: [e1]Calton Pu, James Joshi, Surya Nepal:
 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012. ICST / IEEE 2012, ISBN 978-1-4673-2740-4 [contents]
 [i3]Miranda Zhang, Rajiv Ranjan, Surya Nepal, Michael Menzel, Armin Haller: [i3]Miranda Zhang, Rajiv Ranjan, Surya Nepal, Michael Menzel, Armin Haller:
 A Declarative Recommender System for Cloud Infrastructure Services Selection. CoRR abs/1210.2047 (2012)
 [i2]Miranda Zhang, Rajiv Ranjan, Armin Haller, Dimitrios Georgakopoulos, Michael Menzel, Surya Nepal: [i2]Miranda Zhang, Rajiv Ranjan, Armin Haller, Dimitrios Georgakopoulos, Michael Menzel, Surya Nepal:
 An Ontology based System for Cloud Infrastructure Services Discovery. CoRR abs/1212.0156 (2012)
- 2011
 [j10]Surya Nepal [j10]Surya Nepal , John Zic , John Zic , Dongxi Liu, Julian Jang , Dongxi Liu, Julian Jang : :
 A mobile and portable trusted computing platform. EURASIP J. Wirel. Commun. Netw. 2011: 75 (2011)
 [j9]Shiping Chen [j9]Shiping Chen , Surya Nepal , Surya Nepal : :
 A Service-Oriented User Interface for the Next Generation Web. Int. J. Syst. Serv. Oriented Eng. 2(2): 60-76 (2011)
 [j8]Surya Nepal, Shiping Chen: [j8]Surya Nepal, Shiping Chen:
 Dynamic Business Collaborations Through Contract Services. Int. J. Syst. Serv. Oriented Eng. 2(4): 60-82 (2011)
 [j7]Surya Nepal, Zaki Malik [j7]Surya Nepal, Zaki Malik , Athman Bouguettaya , Athman Bouguettaya : :
 Reputation Management for Composite Services in Service-Oriented Systems. Int. J. Web Serv. Res. 8(2): 29-52 (2011)
 [c58]Surya Nepal [c58]Surya Nepal , Shiping Chen , Shiping Chen , Jinhui Yao, Danan Thilakanathan: , Jinhui Yao, Danan Thilakanathan:
 DIaaS: Data Integrity as a Service in the Cloud. IEEE CLOUD 2011: 308-315
 [c57]Suraj Pandey, Surya Nepal [c57]Suraj Pandey, Surya Nepal , Shiping Chen , Shiping Chen : :
 A test-bed for the evaluation of business process prediction techniques. CollaborateCom 2011: 382-391
 [c56]Shiping Chen [c56]Shiping Chen , Surya Nepal , Surya Nepal , Ren Ping Liu: , Ren Ping Liu:
 Secure Connectivity for Intra-cloud and Inter-cloud Communication. ICPP Workshops 2011: 154-159
 [c55]Wanita Sherchan, Surya Nepal [c55]Wanita Sherchan, Surya Nepal , Athman Bouguettaya , Athman Bouguettaya : :
 A Trust Prediction Model for Service Web. TrustCom 2011: 258-265
 [c54]Julian Jang [c54]Julian Jang , Hon Hwang , Hon Hwang , Surya Nepal , Surya Nepal : :
 Biometric Enabled Portable Trusted Computing Platform. TrustCom 2011: 436-442
 [c53]Surya Nepal [c53]Surya Nepal , Wanita Sherchan, Cécile Paris: , Wanita Sherchan, Cécile Paris:
 STrust: A Trust Model for Social Networks. TrustCom 2011: 841-846
 [c52]Surya Nepal [c52]Surya Nepal , Carsten Friedrich, Leakha Henry, Shiping Chen , Carsten Friedrich, Leakha Henry, Shiping Chen : :
 A Secure Storage Service in the Hybrid Cloud. UCC 2011: 334-335
 [c51]Surya Nepal, Wanita Sherchan, Cécile Paris: [c51]Surya Nepal, Wanita Sherchan, Cécile Paris:
 Building Trust Communities Using Social Trust. UMAP Workshops 2011: 243-255
- 2010
 [j6]David Moreland, Surya Nepal, Hon Hwang [j6]David Moreland, Surya Nepal, Hon Hwang , John Zic , John Zic : :
 A snapshot of trusted personal devices applicable to transaction processing. Pers. Ubiquitous Comput. 14(4): 347-361 (2010)
 [j5]Athman Bouguettaya [j5]Athman Bouguettaya , Surya Nepal, Wanita Sherchan, Xuan Zhou, Jemma Wu, Shiping Chen , Surya Nepal, Wanita Sherchan, Xuan Zhou, Jemma Wu, Shiping Chen , Dongxi Liu, Lily Li, Hongbing Wang, Xumin Liu: , Dongxi Liu, Lily Li, Hongbing Wang, Xumin Liu:
 End-to-End Service Support for Mashups. IEEE Trans. Serv. Comput. 3(3): 250-263 (2010)
 [c50]Wanita Sherchan, Surya Nepal [c50]Wanita Sherchan, Surya Nepal , Jonathon Hunklinger, Athman Bouguettaya , Jonathon Hunklinger, Athman Bouguettaya : :
 A Trust Ontology for Semantic Services. IEEE SCC 2010: 313-320
 [c49]Jinhui Yao, Shiping Chen [c49]Jinhui Yao, Shiping Chen , Surya Nepal, David Levy, John Zic , Surya Nepal, David Levy, John Zic : :
 TrustStore: Making Amazon S3 Trustworthy with Services Composition. CCGRID 2010: 600-605
 [c48]Dongxi Liu, Jack Lee, Julian Jang [c48]Dongxi Liu, Jack Lee, Julian Jang , Surya Nepal , Surya Nepal , John Zic , John Zic : :
 A Cloud Architecture of Virtual Trusted Platform Modules. EUC 2010: 804-811
 [c47]Surya Nepal, John Zic, Dongxi Liu, Julian Jang [c47]Surya Nepal, John Zic, Dongxi Liu, Julian Jang : :
 Trusted Computing Platform in Your Pocket. EUC 2010: 812-817
 [c46]Athman Bouguettaya [c46]Athman Bouguettaya , Shiping Chen , Shiping Chen , Lily Li, Dongxi Liu, Qing Liu, Surya Nepal, Wanita Sherchan, Jemma Wu, Xuan Zhou: , Lily Li, Dongxi Liu, Qing Liu, Surya Nepal, Wanita Sherchan, Jemma Wu, Xuan Zhou:
 Managing Web Services: An Application in Bioinformatics. ICSOC 2010: 704-705
 [c45]Surya Nepal, Wanita Sherchan, Jonathon Hunklinger, Athman Bouguettaya [c45]Surya Nepal, Wanita Sherchan, Jonathon Hunklinger, Athman Bouguettaya : :
 A Fuzzy Trust Management Framework for Service Web. ICWS 2010: 321-328
 [c44]Julian Jang [c44]Julian Jang , Dongxi Liu, Surya Nepal , Dongxi Liu, Surya Nepal , John Zic , John Zic : :
 User Authentication for Online Applications Using a USB-Based Trust Device. MobiSec 2010: 15-26
 [c43]Surya Nepal, Wanita Sherchan, Athman Bouguettaya [c43]Surya Nepal, Wanita Sherchan, Athman Bouguettaya : :
 A behaviour-based trust model for service web. SOCA 2010: 1-4
 [c42]Shiping Chen [c42]Shiping Chen , Surya Nepal, Athman Bouguettaya , Surya Nepal, Athman Bouguettaya : :
 A Smart User Interface for Service-Oriented Web. WISE Workshops 2010: 318-330
2000 – 2009
- 2009
 [j4]Shiping Chen [j4]Shiping Chen , Surya Nepal, Jonathan Chan, David Moreland, John Zic , Surya Nepal, Jonathan Chan, David Moreland, John Zic : :
 A Service-Oriented Architecture to enable virtual storage services: a dynamic collaboration context. Int. J. Ad Hoc Ubiquitous Comput. 4(2): 95-107 (2009)
 [j3]Surya Nepal, John Zic, Thi Chau: [j3]Surya Nepal, John Zic, Thi Chau:
 An Approach to Checking Compatibility of Service Contracts in Service-Oriented Applications. Int. J. Web Serv. Res. 6(2): 42-65 (2009)
 [c41]Surya Nepal, Zaki Malik [c41]Surya Nepal, Zaki Malik , Athman Bouguettaya , Athman Bouguettaya : :
 Reputation Propagation in Composite Services. ICWS 2009: 295-302
- 2008
 [c40]Julian Jang [c40]Julian Jang , Surya Nepal, John Zic: , Surya Nepal, John Zic:
 Trusted Email protocol: Dealing with privacy concerns from malicious email intermediaries. CIT 2008: 402-407
 [c39]Surya Nepal, John Zic: [c39]Surya Nepal, John Zic:
 A Conflict Neighbouring Negotiation Algorithm for Resource Services in Dynamic Collaborations. IEEE SCC (2) 2008: 283-290
 [c38]Surya Nepal, John Zic, Shiping Chen [c38]Surya Nepal, John Zic, Shiping Chen : :
 WSLA+: Web Service Level Agreement Language for Collaborations. IEEE SCC (2) 2008: 485-488
 [c37]Shiping Chen, David Moreland, Surya Nepal, John Zic: [c37]Shiping Chen, David Moreland, Surya Nepal, John Zic:
 Yet Another Performance Testing Framework. Australian Software Engineering Conference 2008: 170-179
 [c36]Dongxi Liu, Surya Nepal, David Moreland, Shiping Chen [c36]Dongxi Liu, Surya Nepal, David Moreland, Shiping Chen , Chen Wang , Chen Wang , John Zic: , John Zic:
 Secure and Conditional Resource Coordination for Successful Collaborations. CollaborateCom 2008: 287-303
 [c35]Surya Nepal, John Zic, Shiping Chen [c35]Surya Nepal, John Zic, Shiping Chen : :
 A Contract Language for Service-Oriented Dynamic Collaborations. CollaborateCom 2008: 545-562
 [c34]Shiping Chen [c34]Shiping Chen , Surya Nepal, Chen Wang , Surya Nepal, Chen Wang , John Zic: , John Zic:
 Facilitating Dynamic Collaborations with eContract Services. ICWS 2008: 521-528
 [c33]Surya Nepal, John Zic, Shiping Chen: [c33]Surya Nepal, John Zic, Shiping Chen:
 WS-CCDL: A Framework for Web Service Collaborative Context Definition Language for Dynamic Collaborations. ICWS 2008: 781-784
 [c32]Chen Wang [c32]Chen Wang , Surya Nepal, Shiping Chen , Surya Nepal, Shiping Chen , John Zic: , John Zic:
 Cooperative Data Management Services Based on Accountable Contract. OTM Conferences (1) 2008: 301-318
- 2007
 [j2]Surya Nepal, John Zic, Frederic Jaccard, Gregoire Kraehenbuehl: [j2]Surya Nepal, John Zic, Frederic Jaccard, Gregoire Kraehenbuehl:
 A Trusted System for Sharing Patient Electronic Medical Records in Autonomous Distributed Health Care Systems. Int. J. Heal. Inf. Syst. Informatics 2(1): 14-35 (2007)
 [c31]Surya Nepal, Jonathan Chan, Shiping Chen [c31]Surya Nepal, Jonathan Chan, Shiping Chen , David Moreland, John Zic: , David Moreland, John Zic:
 An Infrastructure Virtualisation SOA for VNO-based Business Models. IEEE SCC 2007: 44-51
 [c30]Paul Greenfield, Alan D. Fekete, Julian Jang, Dean Kuo, Surya Nepal: [c30]Paul Greenfield, Alan D. Fekete, Julian Jang, Dean Kuo, Surya Nepal:
 Isolation Support for Service-based Applications: A Position Paper. CIDR 2007: 314-323
 [c29]Surya Nepal, John Zic, Hon Hwang, David Moreland: [c29]Surya Nepal, John Zic, Hon Hwang, David Moreland:
 Trust Extension Device: Providing Mobility and Portability of Trust in Cooperative Information Systems. OTM Conferences (1) 2007: 253-271
 [c28]Surya Nepal, John Zic, Julian Jang [c28]Surya Nepal, John Zic, Julian Jang : :
 A Policy Based Approach to Managing Shared Data in Dynamic Collaborations. OTM Conferences (2) 2007: 1296-1303
 [c27]Surya Nepal, John Zic, Jonathan Chan: [c27]Surya Nepal, John Zic, Jonathan Chan:
 A Distributed Approach for Negotiating Resource Contributions in Dynamic Collaboration. PDCAT 2007: 82-86
 [c26]Surya Nepal, Julian Jang [c26]Surya Nepal, Julian Jang , John Zic: , John Zic:
 Anitya: An Ephemeral Data Management Service and Secure Data Access Protocols for Dynamic Collaborations. PDCAT 2007: 219-226
 [c25]Shiping Chen, Surya Nepal, Jonathan Chan, David Moreland, John Zic: [c25]Shiping Chen, Surya Nepal, Jonathan Chan, David Moreland, John Zic:
 Virtual Storage Services for Dynamic Collaborations. WETICE 2007: 186-191
 [c24]Jonathan Chan, Surya Nepal, David Moreland, Hon Hwang, Shiping Chen, John Zic: [c24]Jonathan Chan, Surya Nepal, David Moreland, Hon Hwang, Shiping Chen, John Zic:
 User-Controlled Collaborations in the Context of Trust Extended Environments. WETICE 2007: 389-394
- 2006
 [c23]Surya Nepal, John Zic, Thi Chau: [c23]Surya Nepal, John Zic, Thi Chau:
 Compatibility of Service Contracts in Service-Oriented Ap. IEEE SCC 2006: 28-35
 [c22]Jenny Bhuiyan, Surya Nepal, John J. Zic: [c22]Jenny Bhuiyan, Surya Nepal, John J. Zic:
 Checking Conformance between Business Processes and Web Service Contract in Service Oriented Applications. ASWEC 2006: 80-89
 [c21]Surya Nepal, John Zic, Gregoire Kraehenbuehl, Frederic Jaccard: [c21]Surya Nepal, John Zic, Gregoire Kraehenbuehl, Frederic Jaccard:
 Secure Sharing of Electronic Patient Records. ECEH 2006: 47-58
 [c20]Surya Nepal, John J. Zic, Frederic Jaccard, Gregoire Kraehenbuehl: [c20]Surya Nepal, John J. Zic, Frederic Jaccard, Gregoire Kraehenbuehl:
 A Tag-Based Data Model for Privacy-Preserving Medical Applications. EDBT Workshops 2006: 433-444
 [c19]Julian Jang [c19]Julian Jang , Alan D. Fekete, Paul Greenfield , Alan D. Fekete, Paul Greenfield , Surya Nepal: , Surya Nepal:
 An Event-Driven Workflow Engine for Service-based Business Systems. EDOC 2006: 233-242
 [c18]Dean Kuo, Alan D. Fekete, Paul Greenfield [c18]Dean Kuo, Alan D. Fekete, Paul Greenfield , Surya Nepal, John Zic, Savas Parastatidis, Jim Webber: , Surya Nepal, John Zic, Savas Parastatidis, Jim Webber:
 Expressing and Reasoning about Service Contracts in Service-Oriented Computing. ICWS 2006: 915-918
 [c17]Julian Jang [c17]Julian Jang , Surya Nepal, John Zic: , Surya Nepal, John Zic:
 Establishing a Trust Relationship in Cooperative Information Systems. OTM Conferences (1) 2006: 426-443
 [i1]Paul Greenfield, Alan D. Fekete, Julian Jang [i1]Paul Greenfield, Alan D. Fekete, Julian Jang , Dean Kuo, Surya Nepal: , Dean Kuo, Surya Nepal:
 Isolation Support for Service-based Applications: A Position Paper. CoRR abs/cs/0612113 (2006)
- 2005
 [j1]Uma Srinivasan, Silvia Pfeiffer, Surya Nepal, Michael H. Lee, Lifang Gu, Stephen Barrass [j1]Uma Srinivasan, Silvia Pfeiffer, Surya Nepal, Michael H. Lee, Lifang Gu, Stephen Barrass : :
 A Survey of MPEG-1 Audio, Video and Semantic Analysis Techniques. Multim. Tools Appl. 27(1): 105-141 (2005)
 [c16]Surya Nepal, Alan D. Fekete, Paul Greenfield [c16]Surya Nepal, Alan D. Fekete, Paul Greenfield , Julian Jang , Julian Jang , Dean Kuo, Tony Shi: , Dean Kuo, Tony Shi:
 A Service-Oriented Workflow Language for Robust Interacting Applications. OTM Conferences (1) 2005: 40-58
 [c15]Paul Greenfield, Dean Kuo, Surya Nepal, Alan D. Fekete: [c15]Paul Greenfield, Dean Kuo, Surya Nepal, Alan D. Fekete:
 Consistency for Web Services Applications. VLDB 2005: 1199-1203
- 2003
 [c14]Michael H. Lee, Surya Nepal, Uma Srinivasan: [c14]Michael H. Lee, Surya Nepal, Uma Srinivasan:
 Edge-based semantic classification of sports video sequences. ICME 2003: 157-160
 [c13]Surya Nepal, Uma Srinivasan: [c13]Surya Nepal, Uma Srinivasan:
 Adaptive video highlights for wired and wireless platforms. ICME 2003: 269-272
 [c12]Surya Nepal, Uma Srinivasan: [c12]Surya Nepal, Uma Srinivasan:
 DAVE: a system for quality driven adaptive video delivery. Multimedia Information Retrieval 2003: 223-230
 [c11]A. Viranga Ratnaike, Bala Srinivasan, Surya Nepal: [c11]A. Viranga Ratnaike, Bala Srinivasan, Surya Nepal:
 Making sense of video content. ACM Multimedia 2003: 650-651
- 2002
 [c10]M. V. Ramakrishna, Surya Nepal, P. K. Srivastava: [c10]M. V. Ramakrishna, Surya Nepal, P. K. Srivastava:
 A Heuristic Algorithm for Combining Fuzzy Results in Multimedia Databases. Australasian Database Conference 2002
 [c9]Surya Nepal, Uma Srinivasan: [c9]Surya Nepal, Uma Srinivasan:
 Spatio-temporal Modelling and Querying Video Databases Using High-level Concepts. VDB 2002: 187-201
 [c8]Michael H. Lee, Surya Nepal, Uma Srinivasan: [c8]Michael H. Lee, Surya Nepal, Uma Srinivasan:
 Role of Edge Detection in Video Semantics. VIP 2002: 59-68
- 2001
 [c7]Surya Nepal, Uma Srinivasan, Graham J. Reynolds: [c7]Surya Nepal, Uma Srinivasan, Graham J. Reynolds:
 Semantic Based Retrieval Model for Digital Audio and Video. ICME 2001
 [c6]Surya Nepal, Uma Srinivasan, Graham J. Reynolds: [c6]Surya Nepal, Uma Srinivasan, Graham J. Reynolds:
 Automatic detection of 'Goal' segments in basketball videos. ACM Multimedia 2001: 261-269
- 2000
 [c5]Surya Nepal, M. V. Ramakrishna: [c5]Surya Nepal, M. V. Ramakrishna:
 An evaluation measure for query processing in CBIR systems. IRMA Conference 2000: 41-45
1990 – 1999
- 1999
 [c4]Surya Nepal, M. V. Ramakrishna, James A. Thom: [c4]Surya Nepal, M. V. Ramakrishna, James A. Thom:
 A Fuzzy Object Query Language (FOQL) for Image Databases. DASFAA 1999: 117-124
 [c3]Surya Nepal, M. V. Ramakrishna: [c3]Surya Nepal, M. V. Ramakrishna:
 Query Processing Issues in Image (Multimedia) Databases. ICDE 1999: 22-29
- 1998
 [c2]Surya Nepal, M. V. Ramakrishna, James A. Thom: [c2]Surya Nepal, M. V. Ramakrishna, James A. Thom:
 Four Layer Schema for Image Modeling. Australasian Database Conference 1998: 189-200
 [c1]Surya Nepal, M. V. Ramakrishna, James A. Thom: [c1]Surya Nepal, M. V. Ramakrishna, James A. Thom:
 A Research Prototype Image Retrieval System. SIGIR 1998: 386
Coauthor Index
aka: Sharif Abuadbba
aka: Muhammad Ejaz Ahmed
aka: Seyit Camtepe
aka: Julian Jang-Jaccard
aka: Salil Subhash Kanhere
aka: Damith C. Ranasinghe
aka: Bao Quoc Vo
aka: John J. Zic

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-28 23:32 CET by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID






