ORCID as entered in ROS

Select Publications
2025, 'Vulnerability Aspects Extraction and Discrepancies Detection across Heterogeneous Threat Intelligence', in Proceedings of the Workshop on Privacy in Large Language Models (LLM) and Natural Language Processing (NLP) 2025, ACM, pp. 13 - 24, presented at LM-SHIELD '25: Workshop on Privacy in Large Language Models (LLM) and Natural Language Processing (NLP) 2025, http://dx.doi.org/10.1145/3709018.3736330
,2025, 'TOSense: We Read, You Click', in 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S), IEEE, pp. 263 - 264, presented at 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S), 23 June 2025 - 26 June 2025, http://dx.doi.org/10.1109/dsn-s65789.2025.00020
,2025, 'Less is More: Simplifying Network Traffic Classification Leveraging RFCs', in Www Companion 2025 Companion Proceedings of the ACM Web Conference 2025, pp. 1398 - 1401, http://dx.doi.org/10.1145/3701716.3715492
,2025, 'SoK: Decoding the Enigma of Encrypted Network Traffic Classifiers', in Proceedings IEEE Symposium on Security and Privacy, pp. 1825 - 1843, http://dx.doi.org/10.1109/SP61157.2025.00165
,2024, 'AuditNet: A Conversational AI-based Security Assistant', in Mobilehci 2024 Adjunct Proceedings Publication of the 26th International Conference on Mobile Human Computer Interaction, http://dx.doi.org/10.1145/3640471.3680444
,2024, 'Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning', in Proceedings Annual Computer Security Applications Conference Acsac, pp. 794 - 809, http://dx.doi.org/10.1109/ACSAC63791.2024.00070
,2024, 'An Investigation into the Non-Uniformity of Channel State Information in WiFi Sensing Systems', in IEEE INFOCOM 2024 IEEE Conference on Computer Communications Workshops INFOCOM Wkshps 2024, http://dx.doi.org/10.1109/INFOCOMWKSHPS61880.2024.10620749
,2024, 'GLOBE: A High-quality English Corpus with Global Accents for Zero-shot Speaker Adaptive Text-to-Speech', in Proceedings of the Annual Conference of the International Speech Communication Association Interspeech, pp. 1365 - 1369, http://dx.doi.org/10.21437/Interspeech.2024-70
,2024, 'Lack of Systematic Approach to Security of IoT Context Sharing Platforms', in 2024 21st Annual International Conference on Privacy Security and Trust Pst 2024, http://dx.doi.org/10.1109/PST62714.2024.10788050
,2024, 'MFVIEW: Multi-modal Fake News Detection with View-Specific Information Extraction', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 345 - 353, http://dx.doi.org/10.1007/978-3-031-56063-7_26
,2024, 'SAfER: Simplified Auto-encoder for (Anomalous) Event Recognition', in Proceedings 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things Dcoss Iot 2024, pp. 229 - 233, http://dx.doi.org/10.1109/DCOSS-IoT61029.2024.00041
,2024, 'Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification', in Proceedings Conference on Local Computer Networks LCN, http://dx.doi.org/10.1109/LCN60385.2024.10639633
,2024, 'Towards Threat Modelling of IoT Context-Sharing Platforms', in Proceedings 2024 22nd International Symposium on Network Computing and Applications NCA 2024, pp. 87 - 96, http://dx.doi.org/10.1109/NCA61908.2024.00025
,2023, 'Development of a Collaborative Hybrid Cyber-Physical Testbed for Analysing Cybersecurity Issues of DER Systems', in 2023 IEEE International Conference on Communications Control and Computing Technologies for Smart Grids Smartgridcomm 2023 Proceedings, http://dx.doi.org/10.1109/SmartGridComm57358.2023.10333908
,2023, 'Generalizable Zero-Shot Speaker Adaptive Speech Synthesis with Disentangled Representations', in Proceedings of the Annual Conference of the International Speech Communication Association Interspeech, pp. 4454 - 4458, http://dx.doi.org/10.21437/Interspeech.2023-368
,2022, 'BloomXNOR-Net: Privacy-Preserving Machine Learning in IoT', in S3 2022 Proceedings of the 13th ACM Workshop on Wireless of the Students by the Students and for the Students Workshop Part of Mobicom 2022, pp. 1 - 3, http://dx.doi.org/10.1145/3556563.3558534
,2022, 'A Novel Emergency Light Based Smart Building Solution: Design, Implementation, and Use Cases', in Proceedings 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems Mass 2022, pp. 577 - 585, http://dx.doi.org/10.1109/MASS56207.2022.00086
,2022, 'AUTOLV: AUTOMATIC LECTURE VIDEO GENERATOR', in Proceedings International Conference on Image Processing Icip, pp. 1086 - 1090, http://dx.doi.org/10.1109/ICIP46576.2022.9897436
,2022, 'IoT Traffic Obfuscation: Will it Guarantee the Privacy of Your Smart Home?', in IEEE International Conference on Communications, pp. 2954 - 2959, http://dx.doi.org/10.1109/ICC45855.2022.9839269
,2022, 'Optimised CNN for Human Counting Using Spectrograms of Probabilistic WiFi CSI', in Proceedings IEEE Global Communications Conference Globecom, pp. 2806 - 2811, http://dx.doi.org/10.1109/GLOBECOM48099.2022.10001169
,2021, 'A Novel Model-Based Security Scheme for LoRa Key Generation', in IPSN'21: PROCEEDINGS OF THE 20TH ACM/IEEE CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, ASSOC COMPUTING MACHINERY, TN, Nashville, pp. 47 - 61, presented at 20th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), TN, Nashville, 18 May 2021 - 21 May 2021, http://dx.doi.org/10.1145/3412382.3458256
,2021, 'Towards privacy-preserving digital contact tracing', in IEEE International Conference on Blockchain and Cryptocurrency Icbc 2021, http://dx.doi.org/10.1109/ICBC51069.2021.9461052
,2021, 'Health access broker: Secure, patient-controlled management of personal health records in the cloud', in Advances in Intelligent Systems and Computing, Springer Nature, pp. 111 - 121, http://dx.doi.org/10.1007/978-3-030-57805-3_11
,2021, 'Seirios: Leveraging multiple channels for LoRaWAN indoor and outdoor localization', in Proceedings of the Annual International Conference on Mobile Computing and Networking MOBICOM, pp. 656 - 669, http://dx.doi.org/10.1145/3447993.3483256
,2020, 'EMIoT: A LoRa-enabled Smart Building Solution Based on Emergency Lights', in Buildsys 2020 Proceedings of the 7th ACM International Conference on Systems for Energy Efficient Buildings Cities and Transportation, pp. 330 - 331, http://dx.doi.org/10.1145/3408308.3431129
,2020, 'Work-in-Progress-Designing a Virtual Reality Simulation to Teach Elements of Network Routing', in Economou D; Klippel A; Dodds H; PenaRios A; Lee MJW; Beck D; Pirker J; Dengel A; Peres TM; Richter J (eds.), PROCEEDINGS OF 2020 6TH INTERNATIONAL CONFERENCE OF THE IMMERSIVE LEARNING RESEARCH NETWORK (ILRN 2020), IEEE, ELECTR NETWORK, pp. 279 - 282, presented at 6th International Conference of the Immersive-Learning-Research-Network (iLRN), ELECTR NETWORK, 21 June 2020 - 25 June 2020
,2020, 'PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites', in 2020 IEEE Conference on Communications and Network Security CNS 2020, http://dx.doi.org/10.1109/CNS48642.2020.9162211
,2020, 'Leveraging lightweight blockchain to establish data integrity for surveillance cameras', in 2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (IEEE ICBC), IEEE, ELECTR NETWORK, presented at IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC), ELECTR NETWORK, 02 May 2020 - 06 May 2020, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000848725400035&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2020, 'An Efficient Privacy-preserving IoT System for Face Recognition', in Proceedings 2020 Workshop on Emerging Technologies for Security in Iot Etseciot 2020, Institute of Electrical and Electronics Engineers (IEEE), pp. 7 - 11, presented at 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT), 21 April 2020 - 21 April 2020, http://dx.doi.org/10.1109/ETSecIoT50046.2020.00006
,2020, 'Massage from the chairs', in Proceedings 2020 Workshop on Emerging Technologies for Security in Iot Etseciot 2020, pp. VI, http://dx.doi.org/10.1109/ETSecIoT50046.2020.00011
,2020, 'Poster abstract: A novel modeling involved security approach for lora key generation', in Proceedings 2020 19th ACM IEEE International Conference on Information Processing in Sensor Networks IPSN 2020, pp. 327 - 328, http://dx.doi.org/10.1109/IPSN48710.2020.00-23
,2020, 'Nephalai: Towards LPWAN C-RAN with physical layer compression', in Proceedings of the Annual International Conference on Mobile Computing and Networking MOBICOM, Association for Computing Machinery (ACM), pp. 476 - 487, presented at Proceedings of the 26th Annual International Conference on Mobile Computing and Networking, http://dx.doi.org/10.1145/3372224.3419193
,2020, 'ProxiCar: Proximity-Based Secure Digital Key Solution for Cars', in 2020 International Conference on Communication Systems and Networks Comsnets 2020, pp. 282 - 289, http://dx.doi.org/10.1109/COMSNETS48256.2020.9027327
,2019, 'An empirical study of SMS one-time password authentication in android apps', in ACM International Conference Proceeding Series, pp. 339 - 354, http://dx.doi.org/10.1145/3359789.3359828
,2019, 'PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices', in Iot S and P 2019 Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet of Things, Association for Computing Machinery (ACM), ENGLAND, London, pp. 50 - 56, presented at Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, ENGLAND, London, 15 November 2019, http://dx.doi.org/10.1145/3338507.3358619
,2019, 'Finding Flaws from Password Authentication Code in Android Apps', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Luxembourg, pp. 619 - 637, presented at European Symposium on Research in Computer Security, ESORICS 2019, Luxembourg, 23 September 2019, http://dx.doi.org/10.1007/978-3-030-29959-0_30
,2018, 'Gwardar: Towards protecting a software-defined network from malicious network operating systems', in NCA 2018 - 2018 IEEE 17th International Symposium on Network Computing and Applications, IEEE, Cambridge, MA, USA, presented at The 17th IEEE International Symposium on Network Computing and Applications (NCA 2018), Cambridge, MA, USA, 01 November 2018 - 03 November 2018, http://dx.doi.org/10.1109/NCA.2018.8548074
,2018, 'Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN', in Proceedings 17th IEEE International Conference on Trust Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering Trustcom Bigdatase 2018, pp. 231 - 236, http://dx.doi.org/10.1109/TrustCom/BigDataSE.2018.00044
,2018, 'Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations', in Proceedings Conference on Local Computer Networks LCN, pp. 553 - 561, http://dx.doi.org/10.1109/LCN.2018.8638245
,2018, 'B-FICA: BlockChain based Framework for Auto-Insurance Claim and Adjudication', in Proceedings IEEE 2018 International Congress on Cybermatics 2018 IEEE Conferences on Internet of Things Green Computing and Communications Cyber Physical and Social Computing Smart Data Blockchain Computer and Information Technology Ithings Greencom Cpscom Smartdata Blockchain CIT 2018, pp. 1171 - 1180, http://dx.doi.org/10.1109/Cybermatics_2018.2018.00210
,2018, 'Exploiting multiple side channels for secret key agreement in wireless networks', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3154273.3154337
,2017, 'Privacy preserving data access scheme for IoT devices', in 2017 IEEE 16th International Symposium on Network Computing and Applications NCA 2017, pp. 1 - 10, http://dx.doi.org/10.1109/NCA.2017.8171357
,2017, 'Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers', in 2017 IEEE 16th International Symposium on Network Computing and Applications NCA 2017, pp. 1 - 10, http://dx.doi.org/10.1109/NCA.2017.8171381
,2017, 'Automated analysis of secure internet of things protocols', in ACM International Conference Proceeding Series, Orlando, FL, USA, pp. 238 - 249, presented at ACSAC 2017 Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, 04 December 2017 - 08 December 2017, http://dx.doi.org/10.1145/3134600.3134624
,2017, 'Privacy Preserving Data Access Scheme for IoT Devices', in Gkoulalasdivanis A; Correia MP; Avresky DR (eds.), 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), IEEE, Cambridge, MA, pp. 217 - 226, presented at IEEE 16th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, 30 October 2017 - 01 November 2017, http://dx.doi.org/10.1109/NCA.2017.8171357
,2017, 'Quantifying the Impact of Adversarial Evasion Attacks on Machine Learning Based Android Malware Classifiers', in Gkoulalasdivanis A; Correia MP; Avresky DR (eds.), 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), IEEE, MA, Cambridge, pp. 375 - 384, presented at IEEE 16th International Symposium on Network Computing and Applications (NCA), MA, Cambridge, 30 October 2017 - 01 November 2017, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000426971900057&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2017, 'MTRA: Multiple-tier remote attestation in IoT networks', in 2017 IEEE Conference on Communications and Network Security, CNS 2017, Las Vegas, NV, USA, pp. 1 - 9, presented at 2017 IEEE Conference, Las Vegas, NV, USA, 09 October 2017 - 11 October 2017, http://dx.doi.org/10.1109/CNS.2017.8228638
,2017, 'Access Mechanism for Outsourced Data by Preserving Data Owner's Preference', in Proceedings - Conference on Local Computer Networks, LCN, Institute of Electrical and Electronics Engineers (IEEE), Singapore, Singapore, pp. 611 - 614, presented at 2017 IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, Singapore, 09 October 2017 - 12 October 2017, http://dx.doi.org/10.1109/LCN.2017.55
,2017, 'Secure and light weight fine-grained access mechanism for outsourced data', in Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, Institute of Electrical and Electronics Engineers (IEEE), Sydney, NSW, Australia, pp. 201 - 209, presented at 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW, Australia, 01 August 2017 - 04 August 2017, http://dx.doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.238
,2017, 'ESIoT: Enabling secure management of the internet of things', in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, Massachusetts, pp. 219 - 229, presented at 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Boston, Massachusetts, 18 July 2017 - 20 July 2017, http://dx.doi.org/10.1145/3098243.3098252
,