Publications

(2025). Demo: TOSense – What Did You Just Agree to?. 2025 IEEE 50th Conference on Local Computer Networks (LCN).

DOI URL

(2025). TOSense: We Read, You Click. 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S).

DOI URL

(2025). Label Shift Estimation With Incremental Prior Update. Proceedings of the 2025 SIAM International Conference on Data Mining (SDM).

DOI URL

(2025). Instance-Wise Monotonic Calibration by Constrained Transformation. Proceedings of the Forty-first Conference on Uncertainty in Artificial Intelligence.

URL

(2025). Evaluating Dialect Robustness of Language Models via Conversation Understanding. Coling 2025 Sumeval 2025 2nd Workshop on Scaling Up Multilingual and Multi Cultural Evaluation Proceedings of the Workshop.

(2025). A Graded Modal Approach to Relaxed Semantic Declassification. 38th IEEE Computer Security Foundations Symposium, CSF 2025, Santa Cruz, CA, USA, June 16-20, 2025.

DOI URL

(2024). \"Is Hate Lost in Translation?\": Evaluation of Multilingual LGBTQIA+ Hate Speech Detection. Alta 2024 Proceedings of the 22nd Annual Workshop of the Australasian Language Technology Association.

(2024). AuditNet: A Conversational AI-based Security Assistant. Mobilehci 2024 Adjunct Proceedings Publication of the 26th International Conference on Mobile Human Computer Interaction.

DOI URL

(2024). Synthetic Trajectory Generation Through Convolutional Neural Networks. 21st Annual International Conference on Privacy, Security & Trust (PST 2024).

DOI arXiv URL

(2024). SoK: Trusting Self-Sovereign Identity. Proceedings on Privacy Enhancing Technologies.

DOI URL

(2024). BAMBINO-LM: (Bilingual-)Human-Inspired Continual Pretraining of BabyLM. Cmcl 2024 13th Edition of the Workshop on Cognitive Modeling and Computational Linguistics Proceedings of the Workshop.

(2024). The 19th Workshop on Programming Languages and Analysis for Security (PLAS 2024). Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024.

DOI URL

(2024). Medical Document Classification using NLP Techniques. 2024 1st International Conference on Software Systems and Information Technology Ssitcon 2024.

DOI URL

(2024). (Security) Assertions by Large Language Models. IEEE Transactions on Information Forensics and Security.

DOI URL

(2023). Trust and Reputation Management for Blockchain-enabled IoT. 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS).

DOI URL

(2023). Netlist Whisperer: AI and NLP Fight Circuit Leakage!. ASHES 2023 - Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security.

DOI URL

(2023). Invited Paper: Towards the Imagenets of ML4EDA. IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD.

DOI URL

(2023). High-Level Approaches to Hardware Security: A Tutorial. ACM Transactions on Embedded Computing Systems.

DOI URL

(2023). Decoding ChatGPT's 'impact' on the future of healthcare. Cancer Research, Statistics, and Treatment.

DOI URL

(2023). Counterfactual Explanations and Model Multiplicity: a Relational Verification View. Proceedings of the 20th International Conference on Principles of Knowledge Representation and Reasoning, KR 2023, Rhodes, Greece, September 2-8, 2023.

DOI URL

(2023). Chip-Chat: Challenges and Opportunities in Conversational Hardware Design. 2023 ACM/IEEE 5th Workshop on Machine Learning for CAD, MLCAD 2023.

DOI URL

(2023). An Integrated Testbed for Trojans in Printed Circuit Boards with Fuzzing Capabilities. Proceedings - 2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design, IOLTS 2023.

DOI URL

(2022). Reconstruction Attack on Differential Private Trajectory Protection Mechanisms. Proceedings of the 38th Annual Computer Security Applications Conference (ACSAC ‘22).

DOI arXiv URL

(2022). Network Growth From Global and Local Influential Nodes. IEEE Transactions on Network Science and Engineering.

DOI URL

(2022). Formal Methods for the Security of Medical Devices. Applied Smart Health Care Informatics.

DOI URL

(2022). Striking a Balance: Alleviating Inconsistency in Pre-trained Models for Symmetric Classification Tasks. Proceedings of the Annual Meeting of the Association for Computational Linguistics.

DOI URL

(2022). Runtime Interchange of Enforcers for Adaptive Attacks: A Security Analysis Framework for Drones. 2022 20th ACM-IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2022.

DOI URL

(2022). MetaGanFi: Cross-Domain Unseen Individual Identification Using WiFi Signals. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies.

DOI URL

(2022). IISERB Brains at SemEval-2022 Task 6: A Deep-learning Framework to Identify Intended Sarcasm in English. Semeval 2022 16th International Workshop on Semantic Evaluation Proceedings of the Workshop.

DOI URL

(2022). Blockchain-Based Decentralized Federated Learning. Fourth International Conference on Blockchain Computing and Applications (bcca).

DOI URL

(2021). Traceable, trustworthy and privacy preserving agri-food supply chains. Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).

DOI URL

(2021). Towards Automated Data Sharing in Personal Data Stores. IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events (PerCom Workshops).

DOI URL

(2021). Towards a blockchain powered IoT data marketplace. 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS).

DOI URL

(2021). Preface. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

URL

(2021). MEChain: A Multi-layer Blockchain Structure with Hierarchical Consensus for Secure EHR System. TRUSTCOM INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11.

DOI URL

(2021). MB-EHR: A Multilayer Blockchain-based EHR. IEEE International Conference on Blockchain and Cryptocurrency.

DOI URL

(2021). Deep Multi-view Spatio-Temporal Network for Urban Crime Prediction. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2021). Deception for Cyber Defence: Challenges and Opportunities. Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).

DOI URL

(2021). Can pre-trained Transformers be used in detecting complex sensitive sentences? - A Monsanto case study. Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).

DOI URL

(2021). A Novel Model-Based Security Scheme for LoRa Key Generation. Ipsn: Proceedings of the Acm/ieee Conference on Information Processing in Sensor Networks.

DOI URL

(2021). “When numbers matter!”: Detecting sarcasm in numerical portions of text. Wassa@naacl Hlt 2019 10th Workshop on Computational Approaches to Subjectivity Sentiment and Social Media Analysis Proceedings.

(2020). Vulnerability Database as a Service for IoT. Communications in Computer and Information Science.

DOI URL

(2020). Recommendation chart of domains for cross-domain sentiment analysis: Findings of A 20 domain study. Lrec 2020 12th International Conference on Language Resources and Evaluation Conference Proceedings.

(2020). Identifying highly influential travellers for spreading disease on a public transport system. Ieee International Symposium on a World of Wireless, Mobile and Multimedia Networks (ieee Wowmom).

DOI URL

(2020). Figurative usage detection of symptom words to improve personal health mention detection. Acl 2019 57th Annual Meeting of the Association for Computational Linguistics Proceedings of the Conference.

(2020). Evaluating Emergency Evacuation Events Using Building WiFi Data. ACM/IEEE FIFTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION (IOTDI).

DOI URL

(2020). EMIoT: A LoRa-enabled Smart Building Solution Based on Emergency Lights. BuildSys 2020 - Proceedings of the 7th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation.

DOI URL

(2020). Design Patterns for Blockchain-based Self-Sovereign Identity. ACM International Conference Proceeding Series.

DOI URL

(2020). Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2020). Blockchain-based Verifiable Credential Sharing with Selective Disclosure. TRUSTCOM INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11.

DOI URL

(2020). An approach to monitoring time between events when events are frequent. 13th International Workshop on Intelligent Statistical Quality Control 2019 Iwisqc 2019 Proceedings.

(2020). Adversarial Multi-view Networks for Activity Recognition. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies.

DOI URL

(2020). Adaptive Two-Dimensional Embedded Image Clustering. Proceedings of the AAAI Conference on Artificial Intelligence.

DOI URL

(2020). A Novel Modeling Involved Security Approach for LoRa Key Generation. ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

DOI URL

(2020). A compositional approach using Keras for neural networks in real-time systems. Proceedings of the 2020 Design, Automation and Test in Europe Conference and Exhibition, DATE 2020.

DOI URL

(2020). 'Watch the flu': A tweet monitoring tool for epidemic intelligence of influenza in australia. Proceedings of the … AAAI Conference on Artificial Intelligence. AAAI Conference on Artificial Intelligence.

DOI URL

(2019). A Comparison of Word-based and Context-based Representations for Classification Problems in Health Informatics. Bionlp 2019 Sigbiomed Workshop on Biomedical Natural Language Processing Proceedings of the 18th Bionlp Workshop and Shared Task.

DOI arXiv URL

(2019). The secure link prediction problem. Advances in Mathematics of Communications.

DOI URL

(2019). Synthesizing IEC 61499 function blocks to hardware. ICEIC 2019 - International Conference on Electronics, Information, and Communication.

DOI URL

(2019). Securing implantable medical devices with runtime enforcement hardware. MEMOCODE 2019 - 17th ACM-IEEE International Conference on Formal Methods and Models for System Design.

DOI URL

(2019). Red-faced ROUGE: Examining the Suitability of ROUGE for Opinion Summary Evaluation. Proceedings of the Australasian Language Technology Workshop.

(2019). Recharging of Flying Base Stations using Airborne RF Energy Sources. IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

DOI URL

(2019). Proactive Eavesdropping via Jamming for Trajectory Tracking of UAVs. International Wireless Communications and Mobile Computing Conference.

DOI URL

(2019). Overview of the 2019 ALTA Shared Task: Sarcasm Target Identification. Proceedings of the Australasian Language Technology Workshop.

(2019). Optimising architectures for performance, cost, and security. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2019). LowSHeP: Low-overhead forwarding and update Solution in ndn with Hexadecimal Patricia trie. International Symposium on Advanced Networks and Telecommunication Systems, ANTS.

DOI URL

(2019). Impact of consensus on appendable-block blockchain for IoT. PROCEEDINGS OF THE EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS).

DOI URL

(2019). HydraDoctor: Real-time Liquids Intake Monitoring by Collaborative Sensing. ICDCN: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING.

DOI URL

(2019). FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2019). AETD: An application-aware, energy-efficient trajectory design for flying base stations. 2019 14th IEEE Malaysia International Conference on Communication: Emerging Technologies in IoE and 5G, MICC 2019.

DOI URL

(2019). A Case Based Deep Neural Network Interpretability Framework and Its User Study. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2018). Wi-Sign: Device-free Second Factor User Authentication. PROCEEDINGS OF THE EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS).

DOI URL

(2018). Wi-Access: Second Factor User Authentication leveraging WiFi Signals. IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

DOI URL

(2018). Types for Information Flow Control: Labeling Granularity and Semantic Models. 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9-12, 2018.

DOI URL

(2018). Toward Mitigation-as-a-Service in Cooperative Network Defenses. IEEE International Conference on Dependable, Autonomic and Secure Computing - International Conference on Pervasive Intelligence and Computing - International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech).

DOI URL

(2018). TEXUS: Table extraction system for PDF documents. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2018). Synchronous neural networks for cyber-physical systems. 2018 16th ACM/IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2018.

DOI URL

(2018). SpeedyChain: A framework for decoupling data from blockchain for smart cities. PROCEEDINGS OF THE EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS).

DOI URL

(2018). SmartVM: A multi-layer microservice-based platform for deploying SaaS. Proceedings - 15th IEEE International Symposium on Parallel and Distributed Processing with Applications and 16th IEEE International Conference on Ubiquitous Computing and Communications, ISPA/IUCC 2017.

DOI URL

(2018). Shadow Testing for Business Process Improvement. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2018). Secure Wireless Automotive Software Updates Using Blockchains: A Proof of Concept. ADVANCED MICROSYSTEMS FOR AUTOMOTIVE APPLICATIONS 2017: SMART SYSTEMS TRANSFORMING THE AUTOMOBILE.

DOI URL

(2018). Secure computation of inner product of vectors with distributed entries and its applications to SVM. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2018). Sarcasm target identification: Dataset and an introductory approach. Lrec 2018 11th International Conference on Language Resources and Evaluation.

(2018). Sarcasm generation. Cognitive Systems Monographs.

DOI

(2018). ProductChain: Scalable Blockchain Framework to Support Provenance in Supply Chains. IEEE International Symposium on Network Computing and Applications (NCA).

DOI URL

(2018). Preferential attachment and the spreading influence of users in online social networks. 2017 IEEE/CIC International Conference on Communications in China, ICCC 2017.

DOI URL

(2018). Mining accurate message formats for service APIs. 25th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2018 - Proceedings.

DOI URL

(2018). Keyword-based delegable proofs of storage. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2018). Introduction. Cognitive Systems Monographs.

DOI

(2018). Incognito: A method for obfuscating web data. Proceedings of the 2018 world wide web conference.

DOI URL

(2018). Faster function blocks for precision timed industrial automation. Proceedings - 2018 IEEE 21st International Symposium on Real-Time Computing, ISORC 2018.

DOI URL

(2018). Data forwarding and update propagation in grid network for NDN: A low-overhead approach. International Symposium on Advanced Networks and Telecommunication Systems, ANTS.

DOI URL

(2018). Converting Your Thoughts to Texts: Enabling Brain Typing via Deep Feature Learning of EEG Signals. Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops.

DOI URL

(2018). Conclusion and future work. Cognitive Systems Monographs.

DOI

(2018). BRRA: A Bid-Revisable Reverse Auction based Framework for Incentive Mechanisms in Mobile Crowdsensing Systems. Mswim: Proceedings of the Acm International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems.

DOI URL

(2018). BlockStore: A secure decentralized storage framework on blockchain. Proceedings - International Conference on Advanced Information Networking and Applications, AINA.

DOI URL

(2018). B-FICA: BlockChain based Framework for Auto-insurance Claim and Adjudication. IEEE INTERNATIONAL CONGRESS ON CYBERMATICS / IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY.

DOI URL

(2018). Applying transmission-coverage algorithms for secure geocasting in VANETs. International Journal of Computational Science and Engineering.

DOI URL

(2018). AB testing for process versions with contextual multi-armed bandit algorithms. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2017). WiCare: Towards In-Situ Breath Monitoring. PROCEEDINGS OF THE EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS).

DOI URL

(2017). Wi-Auth: WiFi based Second Factor User Authentication. PROCEEDINGS OF THE EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS).

DOI URL

(2017). WebPol: Fine-Grained Information Flow Policies for Web Browsers. Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I.

DOI URL

(2017). VeinDeep: Smartphone Unlock using Vein Patterns. IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

DOI URL

(2017). Towards an optimized blockchain for IoT. Proceedings - 2017 IEEE/ACM 2nd International Conference on Internet-of-Things Design and Implementation, IoTDI 2017 (part of CPS Week).

DOI URL

(2017). Studying the global spreading influence and local connections of users in online social networks. Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016.

DOI URL

(2017). Social-PPM: Personal experience sharing and recommendation. Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016.

DOI URL

(2017). Simulation of cyber-physical systems using IEC61499. MEMOCODE 2017 - 15th ACM-IEEE International Conference on Formal Methods and Models for System Design.

DOI URL

(2017). POSTER: TouchTrack: How Unique are your Touch Gestures?. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.

DOI URL

(2017). Multi-Level Privacy-Preserving Access Control as a Service for Personal Healthcare Monitoring. Proceedings - 2017 IEEE 24th International Conference on Web Services, ICWS 2017.

DOI URL

(2017). EGAIM: Enhanced Genetic Algorithm based Incentive Mechanism for Mobile Crowdsensing. PROCEEDINGS OF THE EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS).

DOI URL

(2017). Detecting sarcasm using different forms of incongruity. Emnlp 2017 8th Workshop on Computational Approaches to Subjectivity Sentiment and Social Media Analysis Wassa 2017 Proceedings of the Workshop.

DOI URL

(2017). Blockchain for IoT Security and Privacy: The Case Study of a Smart Home. IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

DOI URL

(2017). Bitcoin Block Withholding Attack: Analysis and Mitigation. IEEE Transactions on Information Forensics and Security.

DOI URL

(2017). AB-BPM: Performance-driven instance routing for business process improvement. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2017). A model driven approach for cardiac pacemaker design using a PRET processor. Proceedings - 2017 IEEE 20th International Symposium on Real-Time Distributed Computing, ISORC 2017.

DOI URL

(2016). WiFi-ID: Human Identification using WiFi signal. IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (IEEE DCOSS).

DOI URL

(2016). Towards Policy Enforcement Point as a Service (PEPS). IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).

DOI URL

(2016). Towards a common understanding of business process instance data. MODELSWARD 2016 - Proceedings of the 4th International Conference on Model-Driven Engineering and Software Development.

URL

(2016). The relation between local and global influence of individuals in scale-free networks. Proceedings - 2015 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2015.

DOI URL

(2016). That'll do Fine!: A coarse lexical resource for English-Hindi MT, using polylingual topic models. Proceedings of the 10th International Conference on Language Resources and Evaluation Lrec 2016.

(2016). Smart Cities: Intelligent Environments and Dumb People?. IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

URL

(2016). RunSync: A predictable runtime for precision timed automation systems. Proceedings - 2016 IEEE 19th International Symposium on Real-Time Distributed Computing, ISORC 2016.

DOI URL

(2016). QuickFind: Fast and Contact-free Object Detection Using a Depth Sensor. IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

DOI URL

(2016). Preferential attachment model with degree bound and its application to key predistribution in WSN. Proceedings - International Conference on Advanced Information Networking and Applications, AINA.

DOI URL

(2016). Political issue extraction model: A novel hierarchical topic model that uses tweets by political and non-political authors. Proceedings of the 7th Workshop on Computational Approaches to Subjectivity Sentiment and Social Media Analysis Wassa 2016 at the 2016 Conference of the North American Chapter of the Association for Computational Linguistics Human Language Technologies Naacl Hlt 2016.

(2016). On the application of clique problem for proof-of-work in cryptocurrencies. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2016). On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks. IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016.

DOI URL

(2016). Message dissemination in vehicular networks. Delay Tolerant Networks: Protocols and Applications.

DOI URL

(2016). K-Source: Multiple source selection for traffic offloading in mobile social networks. 2016 8th International Conference on Wireless Communications and Signal Processing, WCSP 2016.

DOI URL

(2016). Human Identification Using WiFi Signal. IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

DOI URL

(2016). Harnessing sequence labeling for sarcasm detection in dialogue from TV series ‘Friends’. Conll 2016 20th Signll Conference on Computational Natural Language Learning Proceedings.

DOI URL

(2016). Failure tolerant rational secret sharing. Proceedings - International Conference on Advanced Information Networking and Applications, AINA.

DOI URL

(2016). Expressive rating scheme by signatures with predications on ratees. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2016). Distributed intrusion detection system using mobile agents in cloud computing environment. Proceedings - 2015 Conference on Information Assurance and Cyber Security, CIACS 2015.

DOI URL

(2016). Constructing A Shortest Path Overhearing Tree With Maximum Lifetime In WSNs. PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS).

DOI URL

(2016). Carrots and Sticks - Incentives that Make Mobile Crowdsensing Work (CASPer 2016 Keynote Paper). IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

URL

(2016). Building a process description repository with knowledge acquisition. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2016). Automated table understanding using stub patterns. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2016). Analysis of the spreading influence variations for online social users under attacks. 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings.

DOI URL

(2016). Aggregated search over personal process description graph. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2016). A popularity-based cache consistency mechanism for information-centric networking. 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings.

DOI URL

(2016). A PDF wrapper for table processing. DocEng 2016 - Proceedings of the 2016 ACM Symposium on Document Engineering.

DOI URL

(2016). A Context-based Privacy Preserving Framework for Wearable Visual Lifeloggers. IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

DOI URL

(2015). Your sentiment precedes you: Using an author's historical tweets to predict sarcasm. 6th Workshop on Computational Approaches to Subjectivity Sentiment and Social Media Analysis Wassa 2015 at the 2015 Conference on Empirical Methods in Natural Language Processing Emnlp 2015 Proceedings.

(2015). TEXUS: A task-based approach for table extraction and understanding. DocEng 2015 - Proceedings of the 2015 ACM Symposium on Document Engineering.

DOI URL

(2015). Social-network-based personal processes. Lecture Notes in Business Information Processing.

DOI URL

(2015). Similarity search over personal process description graph. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2015). SenseFlow: An experimental study of people tracking. RealWSN 2015 - Proceedings of the 6th ACM Workshop on Real World Wireless Sensor Networks, co-located with SenSys 2015.

DOI URL

(2015). RFT: Identifying Suitable Neighbors for Concurrent Transmissions in Point-to-Point Communications. Mswim: Proceedings of the Acm International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems.

DOI URL

(2015). Realization of FGAC model using XACML policy specification. 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

DOI URL

(2015). Predicting the Region of Interest for Dynamic Foveated Streaming. International Telecommunication Networks and Applications Conference.

DOI URL

(2015). Personal process description graph for describing and querying personal processes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2015). Message from the Chairs. ICSE Workshop on Principles of Engineering Service Oriented Systems.

DOI URL

(2015). MagicNET: Mobile agents data protection system. Transactions on Emerging Telecommunications Technologies.

DOI URL

(2015). Lightweight Clustering of Spatio-Temporal Data in Resource Constrained Mobile Sensing. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

DOI URL

(2015). Identifying diffusion sources in large networks: A community structure based approach. Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015.

DOI URL

(2015). Harnessing context incongruity for sarcasm detection. Acl Ijcnlp 2015 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing Proceedings of the Conference.

DOI URL

(2015). Empirical Evaluation of MDP-based DASH Player. International Telecommunication Networks and Applications Conference.

DOI URL

(2015). BPIM: A multi-view model for business process instances. Conferences in Research and Practice in Information Technology Series.

URL

(2015). Achieving data survivability and confidentiality in unattended wireless sensor networks. Proceedings - International Conference on Advanced Information Networking and Applications, AINA.

DOI URL

(2015). A Socially-Aware Incentive Scheme for Social Participatory Sensing. IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

DOI URL

(2015). A computational approach to automatic prediction of drunk-texting. Acl Ijcnlp 2015 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing Proceedings of the Conference.

DOI URL

(2014). TrustMeter: A Trust Assessment Scheme for Collaborative Privacy Mechanisms in Participatory Sensing Applications. IEEE NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (IEEE ISSNIP).

DOI URL

(2014). Trajectory Approximation for Resource Constrained Mobile Sensor Networks. IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (IEEE DCOSS).

DOI URL

(2014). Supporting complex work in crowdsourcing platforms: A view from service-oriented computing. Proceedings of the Australian Software Engineering Conference, ASWEC.

DOI URL

(2014). Should silence be heard? Fair rational secret sharing with silent and non-silent players. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2014). SEW-ing a Simple Endorsement Web to Incentivize Trustworthy Participatory Sensing. Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

DOI URL

(2014). Security services using crowdsourcing. Procedia Computer Science.

DOI URL

(2014). Security of sharded NoSQL databases: A comparative analysis. 2014 conference on information assurance and cyber security (CIACS).

DOI URL

(2014). Randomised Multipath Routing for Secure Data Collection. IEEE NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (IEEE ISSNIP).

DOI URL

(2014). ProfileGuard: Privacy preserving obfuscation for mobile user profiles. Proceedings of the ACM Conference on Computer and Communications Security.

DOI URL

(2014). Privacy-Aware Trust-Based Recruitment in Social Participatory Sensing. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.

DOI URL

(2014). Measuring Sentiment Annotation Complexity of text. 52nd Annual Meeting of the Association for Computational Linguistics Acl 2014 Proceedings of the Conference.

DOI URL

(2014). Information Flow Control in WebKit's JavaScript Bytecode. Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings.

DOI URL

(2014). Evaluation and establishment of trust in cloud federation. Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication.

DOI URL

(2014). Characterising User Targeting For In-App Mobile Ads. IEEE INFOCOM - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

DOI URL

(2014). Can smart plugs predict electric power consumption? A case study. MobiQuitous 2014 - 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services.

DOI URL

(2014). Analyzing cascading failures in smart grids under random and targeted attacks. Proceedings - International Conference on Advanced Information Networking and Applications, AINA.

DOI URL

(2014). A Distributed Mechanism for Dynamic Resource Trading in Cooperative Mobile Video Streaming. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

DOI URL

(2014). A cognitive study of subjectivity extraction in sentiment annotation. Proceedings of the Annual Meeting of the Association for Computational Linguistics.

(2013). Trust Assessment in Social Participatory Networks. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE).

DOI URL

(2013). Security aspects of virtualization in cloud computing. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2013). Securing the virtual machine images in Cloud computing. SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks.

DOI URL

(2013). Psi-CAL: Foundations of a Programming Language for Services Computing. 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28 - July 3, 2013.

DOI URL

(2013). Priority-based coverage path planning for Aerial Wireless Sensor Networks. IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

DOI URL

(2013). Platform Zero: A Context-based Computing Platform for Collaboration. TRUSTCOM INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11.

DOI URL

(2013). Participatory sensing: Crowdsourcing data from mobile smartphones in urban spaces. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2013). Making Headlines in Hindi: Automatic English to Hindi News Headline Translation. 6th International Joint Conference on Natural Language Processing Ijcnlp 2013 Companion Volume of the Proceedings System Demonstrations.

(2013). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

URL

(2013). Jamming resistant schemes for wireless communication: A combinatorial approach. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2013). Introduction to the Proceedings of the Workshop on User-Focused Service Engineering, Consumption and Aggregation (USECA) 2011. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2013). Interactive product browsing and configuration using remote augmented reality sales services. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2013). Foreword. ICSE Workshop on Principles of Engineering Service Oriented Systems.

DOI URL

(2013). Enhanced privacy and reliability for secure geocasting in VANET. IEEE International Conference on Communications.

DOI URL

(2013). ConferenceSense: Monitoring of public events using phone sensors. UbiComp 2013 Adjunct - Adjunct Publication of the 2013 ACM Conference on Ubiquitous Computing.

DOI URL

(2013). Automatic affiliation extraction from calls-for-papers. AKBC 2013 - Proceedings of the 2013 Workshop on Automated Knowledge Base Construction, Co-located with CIKM 2013.

DOI URL

(2013). Assessment criteria for trust models in cloud computing. 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

DOI URL

(2013). Assessment criteria for cloud identity management systems. 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing.

DOI URL

(2013). A trust framework for social participatory sensing systems. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST.

DOI URL

(2012). Usage control model specification in XACML policy language XACML policy engine of UCON. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2012). KAAS: Kernel as a Service. Eighth IEEE World Congress on Services, SERVICES 2012, Honolulu, HI, USA, June 24-29, 2012.

DOI URL

(2012). Cost and benefit of using wordnet senses for sentiment analysis. Proceedings of the 8th International Conference on Language Resources and Evaluation Lrec 2012.

(2012). Comparative analysis of access control systems on cloud. 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing.

DOI URL

(2012). Automating form-based processes through annotation. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2011). C-Feel-It: A sentiment analyzer for micro-blogs. Acl Hlt 2011 49th Annual Meeting of the Association for Computational Linguistics Human Language Technologies Proceedings of Student Session.

(2011). Harnessing WordNet senses for supervised sentiment classification. Emnlp 2011 Conference on Empirical Methods in Natural Language Processing Proceedings of the Conference.

(2011). SWAM: Stuxnet worm analysis in Metasploit. Proceedings - 2011 9th International Conference on Frontiers of Information Technology, FIT 2011.

DOI URL

(2011). Similarity function recommender service using incremental user knowledge acquisition. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2011). Robust Sense-Based Sentiment Classification. Proceedings of the Annual Meeting of the Association for Computational Linguistics.

(2011). MashSheet: Mashups in your spreadsheet. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2011). Link Characterization for Aerial Wireless Sensor Networks. IEEE GLOBECOM - Workshop on Low Power Wide Area Networking Technologies for Emerging Internet of Things (LPWA4IoT).

DOI URL

(2011). Key pre-distribution using partially balanced designs in wireless sensor networks. International Journal of High Performance Computing and Networking.

DOI URL

(2011). Improved access control mechanism in vehicular ad hoc networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2011). Forms-based service composition. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2011). Automatic Image Capturing and Processing for PetrolWatch. PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON NETWORKS.

DOI URL

(2010). Xi-Calculus: A Calculus for Service Interactions. 2010 IEEE International Conference on Services Computing, SCC 2010, Miami, Florida, USA, July 5-10, 2010.

DOI URL

(2010). Spreadsheet as a generic purpose mashup development environment. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2010). Quality Improvement of Mobile Video Using Geo-intelligent Rate Adaptation. IEEE Wireless Communications and Networking Conference (WCNC).

DOI URL

(2010). Poster Abstract: Experimental Evaluation of Multi-Hop Routing Protocols for Wireless Sensor Networks. Proceedings of the ACM/IEEE International Conference on Information Processing in Sensor Networks.

DOI URL

(2010). Managing long-tail processes using FormSys. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2010). FormSys: Form-processing web services. Proceedings of the 19th International Conference on World Wide Web, WWW ‘10.

DOI URL

(2010). Editorial message: Middleware for service oriented computing workshop 2010. Proceedings of the 5th Workshop on Middleware for Service Oriented Computing, MW4SOC 2010, Held at the ACM/IFIP/USENIX International Middleware Conference.

URL

(2010). Ear-Phone: An End-to-End Participatory Urban Noise Mapping System. Proceedings of the ACM/IEEE International Conference on Information Processing in Sensor Networks.

DOI URL

(2010). Are You Contributing Trustworthy Data? The Case for a Reputation System in Participatory Sensing. Mswim: Proceedings of the Acm International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems.

URL

(2010). An Analysis of Spreadsheet-Based Services Mashup. Conferences in Research and Practice in Information Technology Series.

URL

(2010). A Bayesian Routing Framework for Delay Tolerant Networks. IEEE Wireless Communications and Networking Conference (WCNC).

DOI URL

(2009). Using scrum in global software development: A systematic literature review. Proceedings - 2009 4th IEEE International Conference on Global Software Engineering, ICGSE 2009.

DOI URL

(2009). Towards Privacy-Sensitive Participatory Sensing. IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

DOI URL

(2009). Towards a spreadsheet-based service composition framework. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2009). Multi-faceted visualisation of worklists. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2009). Multi-Channel Interference in Wireless Sensor Networks. International Conference on Information Processing in Sensor Networks (ipsn).

URL

(2009). Key predistribution schemes using codes in wireless sensor networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2009). Introduction to the Proceedings of the EDOC 2009 Workshop Middleware for Web Services (MWS) 2009. Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOC.

DOI URL

(2009). HUBCODE: Message Forwarding using Hub-based Network Coding in Delay Tolerant Networks. MSWIM09; PROCEEDINGS OF THE ACM INTERNATIONAL CONFERENCE ON MODELING, ANALYSIS, AND SYSTEMS.

URL

(2009). Editorial Message: Middleware for Service Oriented Computing Workshop 2009. Proceedings of the 4th Workshop on Middleware for Service Oriented Computing, MW4SOC 2009 held at the ACM/IFIP/USENIX International Middleware Conference.

URL

(2008). Bill organiser portal: A case study on end-user composition. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2007). WS-advisor: A task memory for service composition frameworks. Proceedings - International Conference on Computer Communications and Networks, ICCCN.

DOI URL

(2007). Task memories and task forums: A foundation for sharing service-based personal processes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

URL

(2007). Privacy inspection and monitoring framework for automated business processes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

URL

(2007). On embedding task memory in services composition frameworks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

URL

(2007). Conceptual modeling of privacy-aware web service protocols. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

URL

(2006). Adaptive Position Update in Geographic Routing. Conference Record - International Conference on Communications.

DOI URL

(2005). Toward self-organizing service communities. IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans..

DOI URL

(2005). Service-oriented middleware for peer-to-peer computing. IEEE International Conference on Industrial Informatics.

DOI URL

(2005). Resource-centric worklist visualisation. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

URL

(2005). Probabilistic coverage in wireless sensor networks. IEEE Conference on Local Computer Networks.

DOI URL

(2005). On large scale deployment of parallelized file transfer protocol. 98 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE.

DOI URL

(2005). Aggregation policies over RSVP tunnels. IEEE Vehicular Technology Conference.

DOI URL

(2005). A novel tuneable low-intensity adversarial attack. IEEE Conference on Local Computer Networks.

DOI URL

(2004). WS-CatalogNet: Building peer-to-peer e-catalog. Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science).

URL

(2004). Peering and querying e-catalog communities. Proceedings - International Conference on Data Engineering.

DOI URL

(2002). Usage–centric adaptation of dynamic E–catalogs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

URL

(2002). Personalised organisation of dynamic e-catalogs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2002). On the latency bound of pre-order deficit round robin. IEEE Conference on Local Computer Networks.

DOI URL

(2002). On the latency bound of deficit round robin. 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN).

DOI URL

(2002). Fair and efficient packet scheduling using Elastic Round Robin. IEEE Transactions on Parallel and Distributed Systems.

DOI URL

(2001). Peer-to-peer traced execution of composite services. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI URL

(2001). Fair, efficient and scalable scheduling without per-flow state. 98 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE.

DOI URL

(2000). A Round-Robin scheduling strategy for reduced delays in wormhole switches with virtual lanes. cic’: Proceedings of the International Conference on Communications in Computing.

URL