ORCID as entered in ROS

Select Publications
2024, 'VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation Models', in ACM Asiaccs 2024 Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1261 - 1271, http://dx.doi.org/10.1145/3634737.3657019
,2024, 'Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions', in Proceedings of the Aaai Conference on Artificial Intelligence, pp. 14440 - 14448, http://dx.doi.org/10.1609/aaai.v38i13.29358
,2024, 'Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning', in Proceedings Annual Computer Security Applications Conference Acsac, pp. 794 - 809, http://dx.doi.org/10.1109/ACSAC63791.2024.00070
,2024, 'BRAIN 2024: Fifth Workshop on Blockchain theoRy and ApplicatIoNs - Welcome and Committees', in 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events Percom Workshops 2024, pp. 12 - 13, http://dx.doi.org/10.1109/PerComWorkshops59983.2024.10502510
,2024, 'Comparison of Multilingual and Bilingual Models for Satirical News Detection of Arabic and English', in Alta 2024 Proceedings of the 22nd Annual Workshop of the Australasian Language Technology Association, pp. 173 - 178
,2024, 'Comparison of Multilingual and Bilingual Models for Satirical News Detection of Arabic and English', in Proceedings of the Australasian Language Technology Workshop, pp. 173 - 178
,2024, 'Cost-aware Blockchain Mining Strategy: Dynamic Energy Pricing (DEP) Model', in 2024 6th Conference on Blockchain Research and Applications for Innovative Networks and Services Brains 2024, http://dx.doi.org/10.1109/BRAINS63024.2024.10732382
,2024, 'CredAct: Privacy-Preserving Activity Verification for Benefits Schemes in Self-Sovereign Identity', in 2024 IEEE International Conference on Blockchain and Cryptocurrency Icbc 2024, pp. 425 - 433, http://dx.doi.org/10.1109/ICBC59979.2024.10634429
,2024, 'CypherChain: A Privacy-Preserving Data Aggregation Framework for Blockchain-Based DR Programs', in 2024 IEEE International Conference on Blockchain and Cryptocurrency Icbc 2024, pp. 362 - 364, http://dx.doi.org/10.1109/ICBC59979.2024.10634420
,2024, 'Demo: P4 Based In-network ML with Federated Learning to Secure and Slice IoT Networks', in Proceedings 2024 IEEE 25th International Symposium on A World of Wireless Mobile and Multimedia Networks Wowmom 2024, pp. 304 - 306, http://dx.doi.org/10.1109/WoWMoM60985.2024.00056
,2024, 'Demystifying Trajectory Recovery from Ash: An Open-Source Evaluation and Enhancement', in 2024 17th International Conference on Security of Information and Networks Sin 2024, http://dx.doi.org/10.1109/SIN63213.2024.10871881
,2024, 'Discretization-Based Ensemble Model for Robust Learning in IoT', in Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering Lnicst, pp. 353 - 367, http://dx.doi.org/10.1007/978-3-031-63992-0_23
,2024, 'Domain Invariant Driving Behaviour Prediction Based on Autoencoder Anomaly Detection', in 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events Percom Workshops 2024, pp. 449 - 452, http://dx.doi.org/10.1109/PerComWorkshops59983.2024.10502834
,2024, 'Local Differential Privacy for Smart Meter Data Sharing with Energy Disaggregation', in Proceedings 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things Dcoss Iot 2024, pp. 1 - 10, http://dx.doi.org/10.1109/DCOSS-IoT61029.2024.00012
,2024, 'Multi-MedChain: Multi-Party Multi-Blockchain Medical Supply Chain Management System', in Proceedings 2024 IEEE Annual Congress on Artificial Intelligence of Things Aiot 2024, pp. 153 - 159, http://dx.doi.org/10.1109/AIoT63253.2024.00038
,2024, 'On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World', in Proceedings Annual Computer Security Applications Conference Acsac, pp. 940 - 956, http://dx.doi.org/10.1109/ACSAC63791.2024.00079
,2024, 'Passive Identification of WiFi Devices At-Scale: A Data-Driven Approach', in Proceedings Conference on Local Computer Networks LCN, http://dx.doi.org/10.1109/LCN60385.2024.10639764
,2024, 'Poster: Towards Privacy-Preserving Federated Recommendation via Synthetic Interactions', in Proceedings 45th IEEE Symposium on Security and Privacy Workshops Spw 2024, pp. 297, http://dx.doi.org/10.1109/SPW63631.2024.00037
,2024, 'ProfitMax: Optimizing Blockchain Mining for Energy Efficiency and Profitability', in Proceedings 2024 IEEE International Conference on Decentralized Applications and Infrastructures Dapps 2024, pp. 25 - 30, http://dx.doi.org/10.1109/DAPPS61106.2024.00011
,2024, 'SAfER: Simplified Auto-encoder for (Anomalous) Event Recognition', in Proceedings 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things Dcoss Iot 2024, pp. 229 - 233, http://dx.doi.org/10.1109/DCOSS-IoT61029.2024.00041
,2024, 'Synthetic Trajectory Generation Through Convolutional Neural Networks', in 2024 21st Annual International Conference on Privacy Security and Trust Pst 2024, http://dx.doi.org/10.1109/PST62714.2024.10788061
,2024, 'Towards Weaknesses and Attack Patterns Prediction for IoT Devices', in 2024 17th International Conference on Security of Information and Networks Sin 2024, http://dx.doi.org/10.1109/SIN63213.2024.10871298
,2024, 'WiSense 2024: 1st International Workshop on Pervasive Wireless Sensing and Edge Computing - Welcome and Committees', in 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events Percom Workshops 2024, pp. 61 - 62, http://dx.doi.org/10.1109/PerComWorkshops59983.2024.10503163
,2023, 'Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness', in Proceedings of the 37th Aaai Conference on Artificial Intelligence Aaai 2023, pp. 14783 - 14791, http://dx.doi.org/10.1609/aaai.v37i12.26727
,2023, 'A Blockchain-Based Interoperable Architecture for IoT with Selective Disclosure of Information', in Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing Prdc, pp. 53 - 63, http://dx.doi.org/10.1109/PRDC59308.2023.00016
,2023, 'BAILIF: A Blockchain Agnostic Interoperability Framework', in 2023 IEEE International Conference on Blockchain and Cryptocurrency Icbc 2023, http://dx.doi.org/10.1109/ICBC56567.2023.10174967
,2023, 'Deciphering DDoS Attacks Through a Global Lens', in 2023 19th International Conference on Network and Service Management Cnsm 2023, http://dx.doi.org/10.23919/CNSM59352.2023.10327886
,2023, 'Message from Program Chairs and the Steering Committee Chair', in Proceedings 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things Dcoss Iot 2023, pp. xxi - xxii, http://dx.doi.org/10.1109/DCOSS-IoT58021.2023.00005
,2023, 'Privacy-preserving Trust Management for Blockchain-based Resource Sharing in 6G-IoT', in 2023 IEEE International Conference on Blockchain and Cryptocurrency Icbc 2023, http://dx.doi.org/10.1109/ICBC56567.2023.10174987
,2023, 'PublicCheck: Public Integrity Verification for Services of Run-time Deep Models', in Proceedings IEEE Symposium on Security and Privacy, pp. 1348 - 1365, http://dx.doi.org/10.1109/SP46215.2023.10179380
,2023, 'Towards Automatic Annotation and Detection of Fake News', in Proceedings Conference on Local Computer Networks LCN, http://dx.doi.org/10.1109/LCN58197.2023.10223359
,2023, 'Trust and Reputation Management for Blockchain-enabled IoT', in 2023 15th International Conference on Communication Systems and Networks Comsnets 2023, pp. 529 - 536, http://dx.doi.org/10.1109/COMSNETS56262.2023.10041348
,2023, 'VCTP: A Verifiable Credential-Based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms', in Proceedings 2023 IEEE International Conference on Decentralized Applications and Infrastructures Dapps 2023, pp. 109 - 118, http://dx.doi.org/10.1109/DAPPS57946.2023.00023
,2022, 'Reconstruction Attack on Differential Private Trajectory Protection Mechanisms', in ACM International Conference Proceeding Series, pp. 279 - 292, http://dx.doi.org/10.1145/3564625.3564628
,2022, 'Message from Organizers', in Sensys 2022 Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, pp. xix
,2022, 'Transferable Graph Backdoor Attack', in ACM International Conference Proceeding Series, pp. 321 - 332, http://dx.doi.org/10.1145/3545948.3545976
,2022, 'A Novel Emergency Light Based Smart Building Solution: Design, Implementation, and Use Cases', in Proceedings - 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2022, pp. 577 - 585, http://dx.doi.org/10.1109/MASS56207.2022.00086
,2022, 'Blockchain-Based Decentralized Federated Learning', in 2022 4th International Conference on Blockchain Computing and Applications Bcca 2022, pp. 99 - 106, http://dx.doi.org/10.1109/BCCA55292.2022.9921963
,2022, 'CredTrust: Credential Based Issuer Management for Trust in Self-Sovereign Identity', in Proceedings 2022 IEEE International Conference on Blockchain Blockchain 2022, pp. 334 - 339, http://dx.doi.org/10.1109/Blockchain55522.2022.00053
,2022, 'Deep Reinforcement Learning for Dynamic Things of Interest Recommendation in Intelligent Ambient Environment', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 393 - 404, http://dx.doi.org/10.1007/978-3-030-97546-3_32
,2022, 'DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains', in IEEE International Conference on Blockchain and Cryptocurrency Icbc 2022, http://dx.doi.org/10.1109/ICBC54727.2022.9805565
,2022, 'IoT Traffic Obfuscation: Will it Guarantee the Privacy of Your Smart Home?', in IEEE International Conference on Communications, pp. 2954 - 2959, http://dx.doi.org/10.1109/ICC45855.2022.9839269
,2022, 'Is This IoT Device Likely to Be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines', in Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering Lnicst, pp. 115 - 127, http://dx.doi.org/10.1007/978-3-030-94822-1_7
,2022, 'PrivChain: Provenance and Privacy Preservation in Blockchain enabled Supply Chains', in Proceedings 2022 IEEE International Conference on Blockchain Blockchain 2022, pp. 157 - 166, http://dx.doi.org/10.1109/Blockchain55522.2022.00030
,2022, 'TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing', in Proceedings of the Annual Hawaii International Conference on System Sciences, pp. 2237 - 2246
,2021, 'How disease spread dynamics evolve over time', in Proceedings of the 2021 IEEE ACM International Conference on Advances in Social Networks Analysis and Mining Asonam 2021, pp. 121 - 128, http://dx.doi.org/10.1145/3487351.3488352
,2021, 'Diverse Multimedia Layout Generation with Multi Choice Learning', in Mm 2021 Proceedings of the 29th ACM International Conference on Multimedia, pp. 218 - 226, http://dx.doi.org/10.1145/3474085.3475525
,2021, 'A Novel Model-Based Security Scheme for LoRa Key Generation', in IPSN'21: PROCEEDINGS OF THE 20TH ACM/IEEE CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, ASSOC COMPUTING MACHINERY, TN, Nashville, pp. 47 - 61, presented at 20th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), TN, Nashville, 18 May 2021 - 21 May 2021, http://dx.doi.org/10.1145/3412382.3458256
,2021, 'BlockTorrent: A privacy-preserving data availability protocol for multiple stakeholder scenarios', in IEEE International Conference on Blockchain and Cryptocurrency Icbc 2021, http://dx.doi.org/10.1109/ICBC51069.2021.9461105
,2021, 'Cost-effective blockchain-based IoT data marketplaces with a credit invariant', in IEEE International Conference on Blockchain and Cryptocurrency Icbc 2021, http://dx.doi.org/10.1109/ICBC51069.2021.9461127
,