Title |
Author/s |
Anonymizing k-NN Classification on MapReduce | Bazai, Sibghat Ullah (INMS, Massey University, NZ); Jang-Jaccard, Julian (INMS, Massey University, NZ); Wang, Ruili (INMS, Massey University, NZ) |
Homomorphic Evaluation of Database Queries | Usefi, Hamid (Memorial University of Newfoundland); Palamakumbura, Sudharaka (Memorial University of Newfoundland) |
A Variant of BLS Signature With Tight Reduction | Ng, Tiong-Sik (Multimedia University); Tan, Syh-Yuan (Multimedia University); Chin, Ji-Jian (Multimedia University) |
Persistent vs Service IDs in Android: Session Fingerprinting from Apps | Alepis, Efthimios (Department of Informatics, University of Piraeus); Patsakis, Constantinos (Department of Informatics, University of Piraeus) |
Cryptanalysis of Salsa and ChaCha: Revisited | Deepu, Kkc (National Institute of Technology); Singh, Kunwar (National Institute of Technology, India) |
Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Discovery of New Hydrocarbon Reservoirs at A Higher Speed | Tari, Zahir; Goscinski, Andrze (Deakin University); Izzatdin, Aziz (Universiti Teknologi Petronas) |
Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning | haider, waqas (UNSW ADFA); Hu, Jiankun (UNSW ADFA); Moustafa, Nour (UNSW ADFA) |
AN APPROACH FOR HOST-BASED INTRUSION DETECTION SYSTEM DESIGN USING CONVOLUTIONAL NEURAL NETWORK | Tran, Nam (University of New South Wales Canberra at the Australian Defence Force Academy); Sarker, Ruhul (University of New South Wales Canberra at the Australian Defence Force Academy); Hu, Jiankun (University of New South Wales Canberra at the Australian Defence Force Academy) |
Cooperative Information Security / Cybersecurity Curriculum Development | Bouras, Abdelaziz; Gasmi, Houssem (Qatar University and Université Lumière Lyon 2); Ghemri, Fadi (Qatar University) |
A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources | Yeun, Chan Yeob (Khalifa University); Shemaili, Mouza Ahmed Bani (HCT); Zemerly, Mohamed Jamal (Khalifa University); Mubarak, Khalid (HCT); Yeun, Hyun Ku (HCT); Chang, Yoon Seok (Korea Aerospace University); Zafar, Basim (Umm Al-Qura University); Salih, Yasir (Umm Al-Qura University); Simsim, Mohammed (Ministry of Hajj); Lee, Gaemyoung (Jeju National University) |
A Robust Contactless Fingerprint Enhancement Algorithm | Yin, Xuefei (UNSW); Zhu, Yanming (UNSW); Hu, Jiankun (UNSW) |
Robust Fingerprint Matching Based on Convolutional Neural Networks | Zhu, Yanming (UNSW); Yin, Xuefei (UNSW); Hu, Jiankun (UNSW) |
A Cache-aware Congestion Control for Reliable Transport in Wireless Sensor Networks | Alipio, Melchizedek (University of the Philippines Diliman); Tiglao, Nestor Michael (University of the Philippines Diliman) |
Performance Assessment of Cloud Migrations from Network and Application Point of View | Iffländer, Lukas (Chair of Software Engineering, University of Wuerzburg); Wamser, Florian (Chair of Communication Networks, University of Wuerzburg); Metter, Christopher (Chair of Communication Networks, University of Wuerzburg); Tran-Gia, Phuoc (Chair of Communication Networks, University of Wuerzburg); Kounev, Samuel (Chair of Software Engineering, University of Wuerzburg) |
Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework | c p, Sona (Rajagiri School of Engineering and Technology); Mulerikkal, JaisonPaul (Rajagiri School of Engineering and Technology) |
Estimating public opinion in social media content using aspect-based opinion mining | TRAN, YenHong (People's Security Academy); Tran, QuangNhat (University of New South Wales at ADFA, Canberra) |
Offloading of Fog Data Networks with Network Coded Cooperative D2D Communications | Quinton, Benjamin (UNSW); Aboutorab, Neda (UNSW) |
The Public Verifiability of Public Key Encryption with Keyword Search | Zhu, Binrui (Shandong University); Sun, Jiameng (Shandong University); Qin, Jing (Shandong University); Ma, Jixin (University of Greenwich) |
A Cancellable Ranking based Hashing Method for Fingerprint Template Protection | Jin, zhe (Monash University Malaysia); Lai, Yen-Lung (Monash University Malaysia); Hwang, Jung Yeon (Electronics and Telecommunications Research Institute); Kim, Soohyung (Electronics and Telecommunications Research Institute); Cho, Sangrae (Electronics and Telecommunications Research Institute); Teoh, Andrew Beng Jin (Yonsei University) |
An Energy Saving Mechanism based on Vacation Queuing Theory in Data Center Networks | Baccour, Emna (College of Engineering, Qatar University, Qatar); Gouissem, Ala (College of Engineering, Qatar University, Qatar); Foufou, Sebtin(LE2i Lab ,University of Burgundy, Dijon, France, Computer Science, New York University, Abu Dhabi, UAE); Hamila, Ridha (College of Engineering, Qatar University, Qatar); Tari, Zahir (School of Science, RMIT University, Melbourne, Australia); Y. Zomaya, Albert (School of Information Technologies, University of Sydney, Sydney, Australia) |
CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains | Li, Yandong (Beijing Institute of Technology, Beijing, China); Zhu, Liehuang (Beijing Institute of Technology, Beijing, China); Shen, Meng (Beijing Institute of Technology, Beijing, China); Gao, Feng (Beijing Institute of Technology, Beijing, China); Zheng, Baokun (Beijing Institute of Technology, Beijing, China); Du, Xiaojiang (Temple University, Philadelphia, USA) |
A novel key agreement protocol based on RET gadget | fusheng, wu; Zhang, Huanguo |
Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques | Koroniotis, Nickolaos (University of New South Wales - Canberra); Moustafa, Nour (University of New South Wales - Canberra); Sitnikova, Elena (University of New South Wales - Canberra); Slay, Jill (University of New South Wales - Canberra) |
Malicious Bitcoin Transaction Tracing Using Incidence Relation Clustering | Zheng, Baokun (Beijing Institute of Technology); Zhu, Liehuang (Beijing Institute of Technology); Shen, Meng (Beijing Institute of Technology); Du, Xiaojiang (Temple University); Yang, Jing (Beijing Institute of Technology); Gao, Feng (Beijing Institute of Technology); Li, Yandong (Beijing Institute of Technology); Zhang, Chuan (Beijing Institute of Technology) |
Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling | Zhou, Zhaohua (PetroChina Research Institute of Petroleum Exploration & Development); Shi, Shi (PetroChina Research Institute of Petroleum Exploration & Development); Ma, Shunan (Institute of Information Engineering, Chinese Academy of Science); Fu, Jing (PetroChina Research Institute of Petroleum Exploration & Development) |
Probability Risk Identification Based Intrusion Detection System for SCADA Systems | Marsden, Thomas (School of Engineering and Information Technology, UNSW Canberra); Moustafa, Nour (School of Engineering and Information Technology, UNSW Canberra); Sitnikova, Elena (Australian Centre for Cyber Security, UNSW Canberra); Creech, Gideon (Adjunct Researcher to Australian Centre for Cyber Security, UNSW Canberra) |
Application of 3D Delaunay Triangulation in Fingerprint Authentication System | Yang, Wencheng (Security Research Institute, School of Science, Edith Cowan University Perth); Zheng, Guanglou (Security Research Institute, School of Science, Edith Cowan University Perth); Ibrahim, Ahmed (Security Research Institute, School of Science, Edith Cowan University Perth); Chaudhry, Junaid (Security Research Institute, School of Science, Edith Cowan University Perth); Wang, Song (School of Engineering and Mathematical Sciences, La Trobe University); Hu, Jiankun (Security Research Institute, School of Science, Edith School of Engineering and Information Technology, University of New South Wales at Canberra); Valli, Craig (Security Research Institute, School of Science, Edith Cowan University Perth) |
A Cloud Service Enhanced Method Supporting Context-aware Applications | Liu, Zifan (Nanjing University); Cai, Qing (Nanjing University of Information Science and Technology); Xu, Xiaolong (Nanjing University of Information Science and Technology); Dou, Wanchun (Nanjing University); Yu, Shui (Deakin University, Melbourne) |
Quantum authentication scheme based on fingerprint-encoded graph states | Guo, Ying (Central South University, China); Li, Fei (Central South University, China) |
A Personalized Multi-Keyword Ranked Search Method over Encrypted Cloud Data | Tian, Xue (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, China); Shen, Peisong (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, China); Yang, Tengfei (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, China); Chen, Ch (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, China); Hu, Jiankun (UNSW, Canberra, Australia) |