default search action
Search dblp for Publications
export results for "stream:conf/bigdatase:"
more than 1000 matches, exporting first 1000 hits only!
@inproceedings{DBLP:conf/bigdatase/GuptaKKYMN22, author = {Ankit Gupta and Adriel Kim and Abhir Karande and Shuo Yan and Shiva Manandhar and Nhat Rich Nguyen}, title = {Validating Crowdsourced Flood Images using Machine Learning and Real-time Weather Data}, booktitle = {16th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2022, Wuhan, China, December 9-11, 2022}, pages = {7--12}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigDataSE56411.2022.00011}, doi = {10.1109/BIGDATASE56411.2022.00011}, timestamp = {Sat, 10 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/GuptaKKYMN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/KaurKKLNPS22, author = {Sukhmandeep Kaur and Nikola N. Kokilev and Michael R. Kuzie and Carson K. Leung and Ben Nguyen and Adam G. M. Pazdor and Mark J. D. Shinnie}, title = {A Big Data Science Solution for Transportation Analytics with Meteorological Data}, booktitle = {16th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2022, Wuhan, China, December 9-11, 2022}, pages = {21--28}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigDataSE56411.2022.00013}, doi = {10.1109/BIGDATASE56411.2022.00013}, timestamp = {Wed, 22 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/KaurKKLNPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/LauYCLCW22, author = {Chi Yat Lau and Man{-}Ching Yuen and Wing{-}Fat Cheng and Ming{-}Yeung Lau and Wing{-}Fu Chan and Hin{-}Ching Wong}, title = {Intellectual Social Scanning and Analytics platform}, booktitle = {16th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2022, Wuhan, China, December 9-11, 2022}, pages = {13--20}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigDataSE56411.2022.00012}, doi = {10.1109/BIGDATASE56411.2022.00012}, timestamp = {Wed, 22 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/LauYCLCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/ZhangYDLY22, author = {Sirui Zhang and Zhiwei Yan and Kejun Dong and Hongtao Li and Xuebiao Yuchi}, title = {Phishing Domain Name Detection Based on Hierarchical Fusion of Multimodal Features}, booktitle = {16th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2022, Wuhan, China, December 9-11, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigDataSE56411.2022.00010}, doi = {10.1109/BIGDATASE56411.2022.00010}, timestamp = {Wed, 22 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/ZhangYDLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bigdatase/2022, title = {16th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2022, Wuhan, China, December 9-11, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigDataSE56411.2022}, doi = {10.1109/BIGDATASE56411.2022}, isbn = {978-1-6654-6523-6}, timestamp = {Wed, 22 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/0005JSM21, author = {Yuanyuan Wei and Julian Jang{-}Jaccard and Fariza Sabrina and Timothy R. McIntosh}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {MSD-Kmeans: {A} Hybrid Algorithm for Efficient Detection of Global and Local Outliers}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {87--94}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00022}, doi = {10.1109/BIGDATASE53435.2021.00022}, timestamp = {Tue, 15 Mar 2022 13:00:54 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/0005JSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/ChenDSFBYCH21, author = {Ye Chen and Jingguo Dai and Xinduo Su and Yaorong Fan and Wendong Bian and Peng Ye and Guang Chen and Yuezhen Huang}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {Partnership-based Collaborative Learning Approach from Decentralized Data}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {103--110}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00024}, doi = {10.1109/BIGDATASE53435.2021.00024}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/ChenDSFBYCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/DengLZWZ21, author = {Deyu Deng and Carson K. Leung and Chenru Zhao and Yan Wen and Hao Zheng}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {Spatial-Temporal Data Science of {COVID-19} Data}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {7--14}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00011}, doi = {10.1109/BIGDATASE53435.2021.00011}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/DengLZWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/HuangZL21, author = {Wen Huang and Shijie Zhou and Yongjian Liao}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {Improving the Number of Queries Supported by Differentially Private Mechanisms}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {65--71}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00019}, doi = {10.1109/BIGDATASE53435.2021.00019}, timestamp = {Thu, 14 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/HuangZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/LuZCLT21, author = {Yuhai Lu and Chunyan Zhang and Cong Cao and Yanbing Liu and Jianlong Tan}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {{BV-CEI:} {A} Compact Implementation of Interval Query Indexing Algorithm}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {80--86}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00021}, doi = {10.1109/BIGDATASE53435.2021.00021}, timestamp = {Wed, 29 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/LuZCLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/NgLXGNL21, author = {Jer Shyuan Ng and Wei Yang Bryan Lim and Zehui Xiong and Sahil Garg and Dusit Niyato and Cyril Leung}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {An Incentive Mechanism for Resource Allocation in Coded Distributed Computing}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {15--22}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00012}, doi = {10.1109/BIGDATASE53435.2021.00012}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/NgLXGNL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/NieZOL21, author = {Wenyi Nie and Quanjiang Zhang and Zhiqiang Ouyang and Xingang Liu}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {Design of big data integration platform based on hybrid hierarchy architecture}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {135--140}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00028}, doi = {10.1109/BIGDATASE53435.2021.00028}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/NieZOL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/PengX021, author = {Junru Peng and Heng Xu and Jun Song}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {{HRSE:} {A} novel high-speed random sampling encryption scheme on big data}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {57--64}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00018}, doi = {10.1109/BIGDATASE53435.2021.00018}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/PengX021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/RahaliLMRM21, author = {Seryne Rahali and Maryline Laurent and Souha Masmoudi and Charles Roux and Brice Mazeau}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {A Validated Privacy-Utility Preserving Recommendation System with Local Differential Privacy}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {118--127}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00026}, doi = {10.1109/BIGDATASE53435.2021.00026}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/RahaliLMRM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/TangCDS21, author = {Xiao Tang and Zhenfu Cao and Xiaolei Dong and Jiachen Shen}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {PKMark: {A} Robust Zero-distortion Blind Reversible Scheme for Watermarking Relational Databases}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {72--79}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00020}, doi = {10.1109/BIGDATASE53435.2021.00020}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/TangCDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/TongMFJZ021, author = {Xinyu Tong and Haining Meng and Kai Feng and Wenjiang Ji and Yi Zheng and Xinhong Hei}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {A {STL-GALSTM} Model to Predict the Track Irregularity of High-Speed Railway}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {42--48}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00016}, doi = {10.1109/BIGDATASE53435.2021.00016}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/TongMFJZ021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/XuSQSHH21, author = {Jianxiong Xu and Xiaoyu Shi and Hezhe Qiao and Mingsheng Shang and Xianbo He and Qingyu He}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {{UEIN:} {A} User Evolving Interests Network for Click-Through Rate Prediction}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {34--41}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00015}, doi = {10.1109/BIGDATASE53435.2021.00015}, timestamp = {Wed, 13 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/XuSQSHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/XueSSZF21, author = {Hui Xue and Bo Sun and Chengxiang Si and Wei Zhang and Jing Fang}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {{KMUL:} {A} User Identity Linkage Method across Social Networks Based on Spatiotemporal Data}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {111--117}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00025}, doi = {10.1109/BIGDATASE53435.2021.00025}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/XueSSZF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/XueSSZF21a, author = {Hui Xue and Bo Sun and Chengxiang Si and Wei Zhang and Jing Fang}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {{SDCCD:} Spatiotemporal Data Cleaning based on Collision Detection}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {128--134}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00027}, doi = {10.1109/BIGDATASE53435.2021.00027}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/XueSSZF21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/YangMX21, author = {Fan Yang and Zhao Ma and Heng Xu}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {An Efficient Redundancy Control and Load Balancing Scheme for Cloud Storage}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {49--56}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00017}, doi = {10.1109/BIGDATASE53435.2021.00017}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/YangMX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/ZhangGDS21, author = {Deyuan Zhang and Hongwei Gao and Hailong Dai and Xiangbin Shi}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {Two-stream Graph Attention Convolutional for Video Action Recognition}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {23--27}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00013}, doi = {10.1109/BIGDATASE53435.2021.00013}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/ZhangGDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/ZhaoL0WLTWL21, author = {Meng Zhao and Lingang Liu and Yong Ding and Yujue Wang and Hai Liang and Shijie Tang and Baodong Wen and Weiyou Liang}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {Verifiable and Privacy-Preserving Ranked Multi-Keyword Search over Outsourced Data in Clouds}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {95--102}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00023}, doi = {10.1109/BIGDATASE53435.2021.00023}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/ZhaoL0WLTWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/Zhou0PLWG21, author = {Xuan Zhou and Xiaoming Wang and Guangyao Pang and Yaguang Lin and Pengfei Wan and Meiling Ge}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {Dual Attention-based Interest Network for Personalized Recommendation System}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00010}, doi = {10.1109/BIGDATASE53435.2021.00010}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/Zhou0PLWG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/ZhouGZCWH21, author = {Chengyang Zhou and Renchu Guan and Chuntao Zhao and Gonglei Chai and Leigang Wang and Xiaosong Han}, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {A Chinese Medical Question Answering System Based on Knowledge Graph}, booktitle = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, pages = {28--33}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021.00014}, doi = {10.1109/BIGDATASE53435.2021.00014}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/ZhouGZCWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bigdatase/2021, editor = {Jia Hu and Shahid Mumtaz and Xinzhou Cheng}, title = {15th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2021, Shenyang, China, October 20-22, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSE53435.2021}, doi = {10.1109/BIGDATASE53435.2021}, isbn = {978-1-6654-0038-1}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/AbbasZHSH20, author = {Syed Ghazanfar Abbas and Shahzaib Zahid and Faisal Bashir Hussain and Ghalib A. Shah and Muhammad Husnain}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {122--129}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00024}, doi = {10.1109/BIGDATASE50710.2020.00024}, timestamp = {Wed, 17 Feb 2021 12:27:49 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/AbbasZHSH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/AhmetA20, author = {Ahmed Ahmet and Tariq Abdullah}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {Real-Time Social Media Analytics with Deep Transformer Language Models: {A} Big Data Approach}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {41--48}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00014}, doi = {10.1109/BIGDATASE50710.2020.00014}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/AhmetA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/AliceaMTY20, author = {Michael Alicea and Arlen P. McDonald and Chunyang Tang and Jeong Yang}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {Exploring the Application of Machine Learning Algorithms to the City Public Bus Transport}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {22--27}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00011}, doi = {10.1109/BIGDATASE50710.2020.00011}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/AliceaMTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/CaiWLL20, author = {Hanbo Cai and Jinyan Wang and Xiaohong Liu and Xianxian Li}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {{DP-AP:} Differential Privacy-Preserving Affinity Propagation Clustering}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {73--79}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00018}, doi = {10.1109/BIGDATASE50710.2020.00018}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/CaiWLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/FanLZCZ20, author = {Yulin Fan and Yang Li and Mengqi Zhan and Huajun Cui and Yan Zhang}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {IoTDefender: {A} Federated Transfer Learning Intrusion Detection Framework for 5G IoT}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {88--95}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00020}, doi = {10.1109/BIGDATASE50710.2020.00020}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/FanLZCZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/HaddajiAF20, author = {Achref Haddaji and Samiha Ayed and Lamia Chaari Fourati}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {Blockchain-based Multi-Levels Trust Mechanism Against Sybil Attacks for Vehicular Networks}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {155--163}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00028}, doi = {10.1109/BIGDATASE50710.2020.00028}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/HaddajiAF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/HuWZL20, author = {Taifeng Hu and Liji Wu and Xiangmin Zhang and Zhaopo Liao}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {Hardware Trojan Detection Combines with Machine Learning: an Isolation Forest-based Detection Method}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {96--103}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00021}, doi = {10.1109/BIGDATASE50710.2020.00021}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/HuWZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/JiaYZ20, author = {Anni Jia and Wei Yang and Gongxuan Zhang}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {Side Channel Leakage Alignment Based on Longest Common Subsequence}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {130--137}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00025}, doi = {10.1109/BIGDATASE50710.2020.00025}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/JiaYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/Kapetanidou0SCT20, author = {Ioanna Angeliki Kapetanidou and Muhammad Hassan and Christos{-}Alexandros Sarros and Mauro Conti and Vassilis Tsaoussidis}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {Reputation-based Trust: {A} robust mechanism for Dynamic Adaptive Streaming over Named Data Networking}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {114--121}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00023}, doi = {10.1109/BIGDATASE50710.2020.00023}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/Kapetanidou0SCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/Leung0SD20, author = {Carson K. Leung and Yubo Chen and Siyuan Shang and Deyu Deng}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {Big Data Science on {COVID-19} Data}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {14--21}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00010}, doi = {10.1109/BIGDATASE50710.2020.00010}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/Leung0SD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/ManakkaduDT20, author = {Sheheeda Manakkadu and Sourav Dutta and Sam R. Thangiah}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {Profiling of Disease-Associated Proteins Neighborhood Networks}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {9--13}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00009}, doi = {10.1109/BIGDATASE50710.2020.00009}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/ManakkaduDT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/NingW20, author = {Lulu Ning and Jian Wang}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {A Novel Bilateral Oblivious Transfer Protocol Based on Cut-and-Choose Technique}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {49--56}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00015}, doi = {10.1109/BIGDATASE50710.2020.00015}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/NingW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/PurevdagvaZHM20, author = {Chinguun Purevdagva and Rui Zhao and Pei{-}Chi Huang and William Mahoney}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {A machine-learning based framework for detection of fake political speech}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {80--87}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00019}, doi = {10.1109/BIGDATASE50710.2020.00019}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/PurevdagvaZHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/TongZRX20, author = {Yan Tong and Huanguo Zhang and Zhengwei Ren and Shiwei Xu}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {Invariance of Algebraic Immunity of Vectorial Boolean Functions under Equivalence Relations}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {147--154}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00027}, doi = {10.1109/BIGDATASE50710.2020.00027}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/TongZRX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/VermaKD20, author = {Nisha Verma and Sangaralingam Kajanan and Anindya Datta}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {Goal-driven Look-alike Modelingfor Mobile Consumers}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {28--35}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00012}, doi = {10.1109/BIGDATASE50710.2020.00012}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/VermaKD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/WangGLJ20, author = {Ryan Yixiang Wang and Tim Qinsong Guo and Leo Guanhua Li and Julia Yutian Jiao}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {Using {GWAS} SNPs to Determine Association between {COVID-19} and Comorbid Diseases}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {36--40}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00013}, doi = {10.1109/BIGDATASE50710.2020.00013}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/WangGLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/YanTR20, author = {Jie Yan and Claude Turner and Dwight H. Richards}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {Animated Commentator Enhanced Network Monitoring and Visualization Application for Cyber Security Competition}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {57--64}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00016}, doi = {10.1109/BIGDATASE50710.2020.00016}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/YanTR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/ZengP20, author = {Kungan Zeng and Incheon Paik}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {Web Service Composition Sequence Learning Based on Neural Language Networks}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00008}, doi = {10.1109/BIGDATASE50710.2020.00008}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/ZengP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/ZhangCWCLL20, author = {Fangjiao Zhang and Xiang Cui and Zhi Wang and Shaomian Chen and Qixu Liu and Chaoge Liu}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {A Systematic Study of {AI} Applications in Cybersecurity Competitions}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {138--146}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00026}, doi = {10.1109/BIGDATASE50710.2020.00026}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/ZhangCWCLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/ZhouCKBGKEL20, author = {Xin Zhou and Reginald Cushing and Ralph Koning and Adam Belloum and Paola Grosso and Sander Klous and Tom M. van Engers and Cees de Laat}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {Policy Enforcement for Secure and Trustworthy Data Sharing in Multi-domain Infrastructures}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {104--113}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00022}, doi = {10.1109/BIGDATASE50710.2020.00022}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/ZhouCKBGKEL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatase/ZhuHXZW20, author = {Rong Zhu and Xiaoxi He and Jiahong Xie and Zongjie Zhang and Ping Wang}, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {An Improved RFID-based Authentication Protocol for Rail Transit}, booktitle = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, pages = {65--72}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020.00017}, doi = {10.1109/BIGDATASE50710.2020.00017}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatase/ZhuHXZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bigdatase/2020, editor = {Guojun Wang and Carlos Becker Westphall and Arcangelo Castiglione}, title = {14th {IEEE} International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSE50710.2020}, doi = {10.1109/BIGDATASE50710.2020}, isbn = {978-0-7381-1114-8}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdatase/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/00020ML19, author = {Ning Xi and Cong Sun and Jianfeng Ma and Jing Lv}, title = {Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {200--207}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00035}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00035}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/00020ML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Al-ShabotiCW19, author = {Mohammed Al{-}Shaboti and Aaron Chen and Ian Welch}, title = {Automatic Device Selection and Access Policy Generation Based on User Preference for IoT Activity Workflow}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {769--774}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00111}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00111}, timestamp = {Thu, 29 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Al-ShabotiCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AladwanACPAA19, author = {Mohammad Aladwan and Feras M. Awaysheh and Jos{\'{e}} Carlos Cabaleiro and Tom{\'{a}}s F. Pena and Hamzeh Alabool and Mamoun Alazab}, title = {Common Security Criteria for Vehicular Clouds and Internet of Vehicles Evaluation and Selection}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {814--820}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00118}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00118}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AladwanACPAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AleFCW019, author = {Laha Ale and Xiaojie Fang and Dajiang Chen and Ye Wang and Ning Zhang}, title = {Lightweight Deep Learning Model For Facial Expression Recognition}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {707--712}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00100}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00100}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AleFCW019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Alnabulsi019, author = {Hussein Alnabulsi and Md. Rafiqul Islam}, title = {Protecting Code Injection Attacks in Intelligent Transportation System}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {799--806}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00116}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00116}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Alnabulsi019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AnEPHNFKK19, author = {SeongMo An and Taehoon Eom and Jong Sou Park and Jin Bum Hong and Armstrong Nhlabatsi and Noora Fetais and Khaled M. Khan and Dong Seong Kim}, title = {CloudSafe: {A} Tool for an Automated Security Analysis for Cloud Computing}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {602--609}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00086}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00086}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AnEPHNFKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AwayshehCPA19, author = {Feras M. Awaysheh and Jos{\'{e}} Carlos Cabaleiro and Tom{\'{a}}s Fern{\'{a}}ndez Pena and Mamoun Alazab}, title = {Big Data Security Frameworks Meet the Intelligent Transportation Systems Trust Challenges}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {807--813}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00117}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00117}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AwayshehCPA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AzevedoMB19, author = {Rui Azevedo and Ib{\'{e}}ria Medeiros and Alysson Bessani}, title = {{PURE:} Generating Quality Threat Intelligence by Clustering and Correlating {OSINT}}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {483--490}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00071}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00071}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AzevedoMB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BlackG0L19, author = {Paul Black and Iqbal Gondal and Peter Vamplew and Arun Lakhotia}, title = {Evolved Similarity Techniques in Malware Analysis}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {404--410}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00061}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00061}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BlackG0L19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoXLXQ19, author = {Hao Cao and Xiaolong Xu and Qingxiang Liu and Yuan Xue and Lianyong Qi}, title = {Uncertainty-Aware Resource Provisioning for Workflow Scheduling in Edge Computing Environment}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {734--739}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00105}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00105}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaoXLXQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CastroSD19, author = {Raphael Labaca Castro and Corinna Schmitt and Gabi Dreo}, title = {{AIMED:} Evolving Malware with Genetic Programming to Evade Detection}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {240--247}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00040}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00040}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CastroSD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChaiYJ019, author = {Heyan Chai and Shuqiang Yang and Zoe Lin Jiang and Xuan Wang}, title = {A Robust and Reversible Watermarking Technique for Relational Dataset Based on Clustering}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {411--418}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00062}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00062}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChaiYJ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Chen0XLS19, author = {Shuai Chen and Wenjie Xiong and Yehan Xu and Bing Li and Jakub Szefer}, title = {Thermal Covert Channels Leveraging Package-on-Package {DRAM}}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {319--326}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00050}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00050}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Chen0XLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenH0W19, author = {Xin Chen and Xinyi Huang and Yi Mu and Ding Wang}, title = {A Typo-Tolerant Password Authentication Scheme with Targeted Error Correction}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {546--553}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00079}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00079}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenH0W19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenZZ19, author = {Wenhao Chen and Bohang Zeng and Peijia Zheng}, title = {A Robust Watermarking Scheme for Encrypted {JPEG} Bitstreams with Format-Compliant Encryption}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {397--403}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00060}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00060}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengC0L019, author = {Zhenyu Cheng and Xunxun Chen and Yongzheng Zhang and Shuhao Li and Jian Xu}, title = {MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {232--239}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00039}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00039}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChengC0L019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChiYKQ19, author = {Xiaoxiao Chi and Chao Yan and Huaizhen Kou and Lianyong Qi}, title = {Accuracy-Aware Service Recommendation with Privacy}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {740--745}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00106}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00106}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChiYKQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChowdhuryCK0S19, author = {Mohammad Jabed Morshed Chowdhury and Alan Colman and Muhammad Ashad Kabir and Jun Han and Paul Sarda}, title = {Continuous Authorization in Subject-Driven Data Sharing Using Wearable Devices}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {327--333}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00051}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00051}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChowdhuryCK0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChowdhuryKK19, author = {Abdullahi Chowdhury and Gour C. Karmakar and Joarder Kamruzzaman}, title = {Trusted Autonomous Vehicle: Measuring Trust using On-Board Unit Data}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {787--792}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00114}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00114}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChowdhuryKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CuiLZLZ19, author = {Wenjing Cui and Yang Li and Yan Zhang and Chang Liu and Mengqi Zhan}, title = {An Ant Colony Algorithm Based Content Poisoning Mitigation in Named Data Networking}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {176--183}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00032}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00032}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CuiLZLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DengZCZJ0019, author = {Kunyuan Deng and Xiaoyong Zhang and Yijun Cheng and Zhiyong Zheng and Fu Jiang and Weirong Liu and Jun Peng}, title = {A Remaining Useful Life Prediction Method with Automatic Feature Extraction for Aircraft Engines}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {686--692}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00097}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00097}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DengZCZJ0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DishingtonSKCMN19, author = {Cole Dishington and Dilli P. Sharma and Dong Seong Kim and Jin{-}Hee Cho and Terrence J. Moore and Frederica Free{-}Nelson}, title = {Security and Performance Assessment of {IP} Multiplexing Moving Target Defence in Software Defined Networks}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {288--295}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00046}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00046}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DishingtonSKCMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/EomHAPK19, author = {Taehoon Eom and Jin Bum Hong and SeongMo An and Jong Sou Park and Dong Seong Kim}, title = {Security and Performance Modeling and Optimization for Software Defined Networking}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {610--617}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00087}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00087}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/EomHAPK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/EzabadiJKK19, author = {Soheila Ghane Ezabadi and Alireza Jolfaei and Lars Kulik and Ramamohanarao Kotagiri}, title = {Differentially Private Streaming to Untrusted Edge Servers in Intelligent Transportation System}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {781--786}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00113}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00113}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/EzabadiJKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FloresJ19, author = {Denys A. Flores and Arshad Jhumka}, title = {Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {224--231}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00038}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00038}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FloresJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FrancisSNBV19, author = {Xavier Francis and Hamid R. Sharifzadeh and Angus Newton and Nilufar Baghaei and Soheil Varastehpour}, title = {Learning Wear Patterns on Footwear Outsoles Using Convolutional Neural Networks}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {450--457}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00067}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00067}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FrancisSNBV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GomiYOTH19, author = {Hidehito Gomi and Shuji Yamaguchi and Wataru Ogami and Teruhiko Teraoka and Tatsuru Higurashi}, title = {Context-Aware Authentication Using Co-Located Devices}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {304--311}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00048}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00048}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GomiYOTH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GondalKZ19, author = {Iqbal Gondal and Joarder Kamruzzaman and Leo Zhang}, title = {One-Shot Malware Outbreak Detection using Spatio-Temporal Isomorphic Dynamic Features}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {751--756}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00108}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00108}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GondalKZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GongAX19, author = {Borui Gong and Man Ho Au and Haiyang Xue}, title = {Constructing Strong Designated Verifier Signatures from Key Encapsulation Mechanisms}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {586--593}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00084}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00084}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GongAX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoYGZCM19, author = {Yunlong Guo and Aimin Yu and Xiaoli Gong and Lixin Zhao and Lijun Cai and Dan Meng}, title = {Building Trust in Container Environment}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00011}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00011}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GuoYGZCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HamadZSN19, author = {Salma Abdalla Hamad and Wei Emma Zhang and Quan Z. Sheng and Surya Nepal}, title = {IoT Device Identification via Network-Flow Based Fingerprinting and Learning}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {103--111}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00023}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00023}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HamadZSN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanS0IKTN19, author = {Chansu Han and Jumpei Shimamura and Takeshi Takahashi and Daisuke Inoue and Masanori Kawakita and Jun'ichi Takeuchi and Koji Nakao}, title = {Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {144--151}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00028}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00028}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HanS0IKTN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Hassan0SD19, author = {Fadi Hassan and David S{\'{a}}nchez and Jordi Soria{-}Comas and Josep Domingo{-}Ferrer}, title = {Automatic Anonymization of Textual Documents: Detecting Sensitive Information via Word Embeddings}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {358--365}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00055}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00055}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Hassan0SD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HeK19, author = {Ke He and Dong Seong Kim}, title = {Malware Detection with Malware Images using Deep Learning Techniques}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {95--102}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00022}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00022}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HeK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HeRHCL19, author = {Zecheng He and Aswin Raghavan and Guangyuan Hu and Sek M. Chai and Ruby B. Lee}, title = {Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {160--167}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00030}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00030}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HeRHCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HeiBWZZJ19, author = {Xinhong Hei and Binbin Bai and Yichuan Wang and Li Zhang and Lei Zhu and Wenjiang Ji}, title = {Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {662--669}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00094}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00094}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HeiBWZZJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HorandnerR19, author = {Felix H{\"{o}}randner and Christof Rabensteiner}, title = {Horcruxes for Everyone - {A} Framework for Key-Loss Recovery by Splitting Trust}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {50--57}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00017}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00017}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HorandnerR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuHWWZL19, author = {Jianxing Hu and Dongdong Huo and Meilin Wang and Yazhe Wang and Yan Zhang and Yu Li}, title = {A Probability Prediction Based Mutable Control-Flow Attestation Scheme on Embedded Platforms}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {530--537}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00077}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00077}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuHWWZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangB19, author = {Shin{-}Ying Huang and Tao Ban}, title = {A Topic-Based Unsupervised Learning Approach for Online Underground Market Exploration}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {208--215}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00036}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00036}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuangB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangQAM019, author = {Jack Huang and Yuan Wei Qi and Muhammad Rizwan Asghar and Andrew Meads and Yu{-}Cheng Tu}, title = {MedBloc: {A} Blockchain-Based Secure {EHR} System for Sharing and Accessing Medical Data}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {594--601}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00085}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00085}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuangQAM019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangWYC19, author = {Yujun Huang and Yunpeng Weng and Shuai Yu and Xu Chen}, title = {Diffusion Convolutional Recurrent Neural Network with Rank Influence Learning for Traffic Forecasting}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {678--685}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00096}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00096}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuangWYC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangX0QC19, author = {Na Huang and Ming Xu and Ning Zheng and Tong Qiao and Kim{-}Kwang Raymond Choo}, title = {Deep Android Malware Classification with API-Based Feature Graph}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {296--303}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00047}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00047}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuangX0QC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangYQW19, author = {Yongjie Huang and Qiping Yang and Jinghui Qin and Wushao Wen}, title = {Phishing {URL} Detection via {CNN} and Attention-Based Hierarchical {RNN}}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {112--119}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00024}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00024}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuangYQW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/IslamKKM19, author = {Mohammad Manzurul Islam and Gour C. Karmakar and Joarder Kamruzzaman and M. Manzur Murshed}, title = {Measuring Trustworthiness of IoT Image Sensor Data Using Other Sensors' Complementary Multimodal Data}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {775--780}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00112}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00112}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/IslamKKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JabeenP19, author = {Gul Jabeen and Ping Luo}, title = {A Unified Measurable Software Trustworthy Model Based on Vulnerability Loss Speed Index}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {18--25}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00013}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00013}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JabeenP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiZZSG19, author = {Dongxu Ji and Qianying Zhang and Shijun Zhao and Zhiping Shi and Yong Guan}, title = {MicroTEE: Designing {TEE} {OS} Based on the Microkernel Architecture}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {26--33}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00014}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00014}, timestamp = {Thu, 23 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiZZSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiaMHKB19, author = {Guanbo Jia and Paul Miller and Xin Hong and Harsha K. Kalutarage and Tao Ban}, title = {Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {458--465}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00068}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00068}, timestamp = {Mon, 15 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JiaMHKB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JolfaeiKS19, author = {Alireza Jolfaei and Krishna Kant and Hassan Shafei}, title = {Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {793--798}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00115}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00115}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JolfaeiKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KhodaIKGR19, author = {Mahbub E. Khoda and Tasadduq Imam and Joarder Kamruzzaman and Iqbal Gondal and Ashfaqur Rahman}, title = {Selective Adversarial Learning for Mobile Malware}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {272--279}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00044}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00044}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KhodaIKGR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KnightLA19, author = {Edward Knight and Sam Lord and Budi Arief}, title = {Lock Picking in the Era of Internet of Things}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {835--842}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00121}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00121}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KnightLA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KuppaGAL19, author = {Aditya Kuppa and Slawomir Grzonkowski and Muhammad Rizwan Asghar and Nhien{-}An Le{-}Khac}, title = {Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {442--449}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00066}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00066}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KuppaGAL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KutylowskiK19, author = {Miroslaw Kutylowski and Przemyslaw Kubiak}, title = {Privacy and Security Analysis of {PACE} {GM} Protocol}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {763--768}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00110}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00110}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KutylowskiK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LadjelAPS19, author = {Riad Ladjel and Nicolas Anciaux and Philippe Pucheral and Guillaume Scerri}, title = {Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {381--388}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00058}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00058}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LadjelAPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LatzoF19, author = {Tobias Latzo and Felix C. Freiling}, title = {Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {466--475}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00069}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00069}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LatzoF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LauerSRN19, author = {Hagen Lauer and Amin Sakzad and Carsten Rudolph and Surya Nepal}, title = {A Logic for Secure Stratified Systems and its Application to Containerized Systems}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {562--569}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00081}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00081}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LauerSRN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Li0TWG19, author = {Dawei Li and Jianwei Liu and Zongxun Tang and Qianhong Wu and Zhenyu Guan}, title = {AgentChain: {A} Decentralized Cross-Chain Exchange System}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {491--498}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00072}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00072}, timestamp = {Tue, 27 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Li0TWG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Li0Z19, author = {Zhangtan Li and Liang Cheng and Yang Zhang}, title = {Tracking Sensitive Information and Operations in Integrated Clinical Environment}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {192--199}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00034}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00034}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Li0Z19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiCL0WM19, author = {Bingyu Li and Dawei Chu and Jingqiang Lin and Quanwei Cai and Congli Wang and Lingjia Meng}, title = {The Weakest Link of Certificate Transparency: Exploring the {TLS/HTTPS} Configurations of Third-Party Monitors}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {216--223}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00037}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00037}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiCL0WM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZ19, author = {Shixuan Li and Dongmei Zhao}, title = {A LSTM-Based Method for Comprehension and Evaluation of Network Security Situation}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {723--728}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00103}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00103}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LinLZT19, author = {Kunli Lin and Wenqing Liu and Kun Zhang and Bibo Tu}, title = {HyperMI: {A} Privilege-level {VM} Protection Approach against Compromised Hypervisor}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {58--65}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00018}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00018}, timestamp = {Mon, 16 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LinLZT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLLLSSTG19, author = {Qingyi Liu and Zhen Liu and Yu Long and Zhiqiang Liu and Zhimei Sui and Shifeng Sun and Shuyang Tang and Dawu Gu}, title = {Making Monero Hard-to-Trace and More Efficient}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {514--521}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00075}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00075}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLLLSSTG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuSLLLSTG19, author = {Hongyang Liu and Feng Shen and Zhiqiang Liu and Yu Long and Zhen Liu and Shifeng Sun and Shuyang Tang and Dawu Gu}, title = {A Secure and Practical Blockchain Scheme for IoT}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {538--545}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00078}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00078}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuSLLLSTG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuYZW19, author = {Zhicheng Liu and Xiaochun Yun and Yongzheng Zhang and Yipeng Wang}, title = {{CCGA:} Clustering and Capturing Group Activities for DGA-Based Botnets Detection}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {136--143}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00027}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00027}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuYZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuAZ19, author = {Xingye Lu and Man Ho Au and Zhenfei Zhang}, title = {(Linkable) Ring Signature from Hash-Then-One-Way Signature}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {578--585}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00083}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00083}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LuAZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuRCLJX19, author = {Liangfu Lu and Xiaohan Ren and Chenming Cui and Yun Luo and Yongheng Jia and Yinong Xu}, title = {Mutual Information on Tensors for Measuring the Nonlinear Correlations in Network Security}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {746--750}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00107}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00107}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LuRCLJX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LyuJWNAF19, author = {Jiazhuo Lyu and Zoe Lin Jiang and Xuan Wang and Zhenhao Nong and Man Ho Au and Junbin Fang}, title = {A Secure Decentralized Trustless E-Voting System Based on Smart Contract}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {570--577}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00082}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00082}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LyuJWNAF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MalikNHL19, author = {Nisha Malik and Priyadarsi Nanda and Xiangjian He and Ren Ping Liu}, title = {Trust and Reputation in Vehicular Networks: {A} Smart Contract-Based Approach}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {34--41}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00015}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00015}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MalikNHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MarsalekZ19, author = {Alexander Marsalek and Thomas Zefferer}, title = {A Correctable Public Blockchain}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {554--561}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00080}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00080}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MarsalekZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MarsalekZFZ19, author = {Alexander Marsalek and Thomas Zefferer and Edona Fasllija and Dominik Ziegler}, title = {Tackling Data Inefficiency: Compressing the Bitcoin Blockchain}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {626--633}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00089}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00089}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MarsalekZFZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaruatonaAW19, author = {Omaru Maruatona and Ahmad Azab and Paul A. Watters}, title = {{AVOCAD:} Adaptive Terrorist Comms Surveillance and Interception using Machine Learning}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {85--94}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00021}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00021}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MaruatonaAW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MoLYJGZ0019, author = {Ran Mo and Jianfeng Liu and Wentao Yu and Fu Jiang and Xin Gu and Xiaoshuai Zhao and Weirong Liu and Jun Peng}, title = {A Differential Privacy-Based Protecting Data Preprocessing Method for Big Data Mining}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {693--699}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00098}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00098}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MoLYJGZ0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MorelCM19, author = {Victor Morel and Mathieu Cunche and Daniel Le M{\'{e}}tayer}, title = {A Generic Information and Consent Framework for the IoT}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {366--373}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00056}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00056}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MorelCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NaiduM19, author = {Vijay Naidu and Manoranjan Mohanty}, title = {Defeating Fake Food Labels Using Watermarking and Biosequence Analysis}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {435--441}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00065}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00065}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NaiduM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NinetLMTZ19, author = {Tristan Ninet and Axel Legay and Romaric Maillard and Louis{-}Marie Traonouez and Olivier Zendra}, title = {The Deviation Attack: {A} Novel Denial-of-Service Attack Against IKEv2}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {66--74}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00019}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00019}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NinetLMTZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NisbetJ19, author = {Alastair Nisbet and Rijo Jacob}, title = {TRIM, Wear Levelling and Garbage Collection on Solid State Drives: {A} Prediction Model for Forensic Investigators}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {419--426}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00063}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00063}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NisbetJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NosouhiYSG19, author = {Mohammad Reza Nosouhi and Shui Yu and Keshav Sood and Marthie Grobler}, title = {HSDC-Net: Secure Anonymous Messaging in Online Social Networks}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {350--357}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00054}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00054}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NosouhiYSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OttM19, author = {Karl Ott and Rabi N. Mahapatra}, title = {Continuous Authentication of Embedded Software}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {128--135}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00026}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00026}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/OttM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PangCPMZJ19, author = {Ying Pang and Zhenxiang Chen and Lizhi Peng and Kun Ma and Chuan Zhao and Ke Ji}, title = {A Signature-Based Assistant Random Oversampling Method for Malware Detection}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {256--263}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00042}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00042}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PangCPMZJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PorwalM19, author = {Utkarsh Porwal and Smruthi Mukund}, title = {Credit Card Fraud Detection in E-Commerce}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {280--287}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00045}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00045}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PorwalM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiaoJJG19, author = {Yanchen Qiao and Qingshan Jiang and Zhenchao Jiang and Liang Gu}, title = {A Multi-channel Visualization Method for Malware Classification Based on Deep Learning}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {757--762}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00109}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00109}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QiaoJJG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Qiu0OF19, author = {Yuan Qiu and Xinhong Hei and Tadashi Ohmori and Hideyuki Fujita}, title = {An Object-Pair Driven Approach for Top-k mCK Query Problem by Using Hilbert R-Tree}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {655--661}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00093}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00093}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Qiu0OF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Rasheed0T19, author = {Shawn Rasheed and Jens Dietrich and Amjed Tahir}, title = {Laughter in the Wild: {A} Study Into DoS Vulnerabilities in {YAML} Libraries}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {342--349}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00053}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00053}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Rasheed0T19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RashidP19, author = {Mohammed A. Rashid and Houshyar Honar Pajooh}, title = {A Security Framework for IoT Authentication and Authorization Based on Blockchain Technology}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {264--271}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00043}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00043}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RashidP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RevadigarJLV19, author = {Girish Revadigar and Chitra Javali and Yang Li and Sreejaya Viswanathan}, title = {On the Effectiveness of Electric Network Frequency {(ENF)} as a Source of Randomness}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {849--854}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00123}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00123}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RevadigarJLV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RobinsonB19, author = {Peter Robinson and John Brainard}, title = {Anonymous State Pinning for Private Blockchains}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {827--834}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00120}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00120}, timestamp = {Wed, 09 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RobinsonB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SachidanandaBGE19, author = {Vinay Sachidananda and Suhas Bhairav and Nirnay Ghosh and Yuval Elovici}, title = {{PIT:} {A} Probe Into Internet of Things by Comprehensive Security Analysis}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {522--529}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00076}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00076}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SachidanandaBGE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SasakiMJ19, author = {Takayuki Sasaki and Yusuke Morita and Astha Jada}, title = {Access Control Architecture for Smart City IoT Platform}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {717--722}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00102}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00102}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SasakiMJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SenFM19, author = {Amartya Sen and Kenneth K. Fletcher and Sanjay Madria}, title = {A Secure User-Centric Framework for Dynamic Service Provisioning in IoT Environments}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {334--341}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00052}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00052}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SenFM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShahrakiRG19, author = {Ahmad Salehi Shahraki and Carsten Rudolph and Marthie Grobler}, title = {A Dynamic Access Control Policy Model for Sharing of Healthcare Data in Multiple Domains}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {618--625}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00088}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00088}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShahrakiRG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuYLL19, author = {Liya Su and Yepeng Yao and Zhigang Lu and Baoxu Liu}, title = {Understanding the Influence of Graph Kernels on Deep Learning Architecture: {A} Case Study of Flow-Based Network Attack Detection}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {312--318}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00049}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00049}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SuYLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Taubmann0R19, author = {Benjamin Taubmann and Alexander B{\"{o}}hm and Hans P. Reiser}, title = {TwinPorter - An Architecture For Enabling the Live Migration of VMI-Based Monitored Virtual Machines}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {427--434}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00064}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00064}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Taubmann0R19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ThantilageK19, author = {Ranul Deelaka Thantilage and Nhien{-}An Le{-}Khac}, title = {Framework for the Retrieval of Social Media and Instant Messaging Evidence from Volatile Memory}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {476--482}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00070}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00070}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ThantilageK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Theuermann19, author = {Kevin Theuermann}, title = {Trustworthy Privacy-Preserving Service Compositions}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {10--17}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00012}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00012}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Theuermann19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TienLHH19, author = {Yun{-}Ping Tien and Wei{-}Chen Lin and Jan{-}Ming Ho and Wing{-}Kai Hon}, title = {Optimal File Dissemination Scheduling Under a General Binary Tree of Trust Relationship}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {42--49}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00016}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00016}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TienLHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangSZ19, author = {Yuntao Wang and Zhou Su and Kuan Zhang}, title = {A Secure Private Charging Pile Sharing Scheme with Electric Vehicles in Energy Blockchain}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {648--654}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00092}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00092}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuXLY19, author = {Zhijun Wu and Enzhong Xu and Liang Liu and Meng Yue}, title = {{CHTDS:} {A} {CP-ABE} Access Control Scheme Based on Hash Table and Data Segmentation in {NDN}}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {843--848}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00122}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00122}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuXLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuZLM19, author = {Di Wu and Dali Zhu and Yinlong Liu and Luping Ma}, title = {Joint {RSS} and {CSI} Based Access Point Authentication Scheme in WiFi Networks via XGBoost}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {821--826}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00119}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00119}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuZLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Yan019, author = {Dingyu Yan and Feng Liu}, title = {A Heuristic Method for Network Modification Against Cyber Epidemic Attacks}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {184--191}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00033}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00033}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Yan019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangS19, author = {Yibing Yang and M. Omair Shafiq}, title = {Identifying High Value Users in Twitter Based on Text Mining Approaches}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {634--641}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00090}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00090}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YaoSLL19, author = {Yepeng Yao and Liya Su and Zhigang Lu and Baoxu Liu}, title = {STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {120--127}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00025}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00025}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YaoSLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YinCCC19, author = {Bo Yin and Yu Cheng and Lin X. Cai and Xianghui Cao}, title = {A Cooperative Edge Computing Scheme for Reducing the Cost of Transferring Big Data in 5G Networks}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {700--706}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00099}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00099}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YinCCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangCWCY19, author = {Jiale Zhang and Junjun Chen and Di Wu and Bing Chen and Shui Yu}, title = {Poisoning Attack in Federated Learning using Generative Adversarial Nets}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {374--380}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00057}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00057}, timestamp = {Tue, 05 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangCWCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangGPLCC19, author = {Yang Zhang and Haichang Gao and Ge Pei and Sainan Luo and Guoqin Chang and Nuo Cheng}, title = {A Survey of Research on {CAPTCHA} Designing and Breaking Techniques}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {75--84}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00020}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00020}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangGPLCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangZL19, author = {Yonghong Zhang and Peijia Zheng and Weiqi Luo}, title = {Privacy-Preserving Outsourcing Computation of {QR} Decomposition in the Encrypted Domain}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {389--396}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00059}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00059}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoY19, author = {Liangrong Zhao and Jiangshan Yu}, title = {Evaluating DAG-Based Blockchains for IoT}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {507--513}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00074}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00074}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoZH019, author = {Hong Zhao and Yuexin Zhang and Xinyi Huang and Yang Xiang}, title = {An Adaptive Physical Layer Key Extraction Scheme for Smart Homes}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {499--506}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00073}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00073}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoZH019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuCXCFF19, author = {Shaofeng Zhu and Hua Chen and Wei Xi and Meihui Chen and Limin Fan and Dengguo Feng}, title = {A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {152--159}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00029}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00029}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuCXCFF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuFYZW19, author = {Lipeng Zhu and Xiaotong Fu and Yao Yao and Yuqing Zhang and He Wang}, title = {FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {248--255}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00041}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00041}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuFYZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZobernigGR19, author = {Lukas Zobernig and Steven D. Galbraith and Giovanni Russello}, title = {When are Opaque Predicates Useful?}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {168--175}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00031}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00031}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZobernigGR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustcom/2019, title = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8883860/proceeding}, isbn = {978-1-7281-2777-4}, timestamp = {Thu, 14 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0001FLW18, author = {Guoqiang Bai and Hailiang Fu and Wei Li and Xingjun Wu}, title = {Differential Power Attack on {SM4} Block Cipher}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1494--1497}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00210}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00210}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/0001FLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0002HZ18, author = {Na Huang and Jingsha He and Nafei Zhu}, title = {A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1702--1705}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00255}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00255}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/0002HZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0004HZ18, author = {Xiang Liu and Jie Huang and Guowen Zong}, title = {Public Auditing for Network Coding Based Secure Cloud Storage}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {713--720}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00104}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00104}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/0004HZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AabyAMB18, author = {Peter Aaby and Juanjo Mata De Acuna and Richard Macfarlane and William J. Buchanan}, title = {Privacy Parameter Variation Using {RAPPOR} on a Malware Dataset}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {938--945}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00133}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00133}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AabyAMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AbrahamTK18, author = {Andreas Abraham and Kevin Theuermann and Emanuel Kirchengast}, title = {Qualified eID Derivation Into a Distributed Ledger Based IdM System}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1406--1412}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00195}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00195}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AbrahamTK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AdamsBGVM18, author = {Stephen C. Adams and Peter A. Beling and Steven Greenspan and Maria C. Velez{-}Rojas and Serge Mankovski}, title = {Model-Based Trust Assessment for Internet of Things Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1838--1843}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00278}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00278}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AdamsBGVM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AdamsCFB18, author = {Stephen C. Adams and Bryan T. Carter and Cody H. Fleming and Peter A. Beling}, title = {Selecting System Specific Cybersecurity Attack Patterns Using Topic Modeling}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {490--497}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00076}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00076}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AdamsCFB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AhmadSBSU18, author = {Usman Ahmad and Hong Song and Awais Bilal and Shahzad Saleem and Asad Ullah}, title = {Securing Insulin Pump System Using Deep Learning and Gesture Recognition}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1716--1719}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00258}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00258}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AhmadSBSU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AhmedA18, author = {Abu Shohel Ahmed and Tuomas Aura}, title = {Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {104--111}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00026}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00026}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AhmedA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlavizadehJK18, author = {Hooman Alavizadeh and Julian Jang{-}Jaccard and Dong Seong Kim}, title = {Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {573--578}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00087}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00087}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AlavizadehJK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlbabtainY18, author = {Yazeed Albabtain and Baijian Yang}, title = {The Process of Reverse Engineering {GPU} Malware and Provide Protection to {GPUS}}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1669--1673}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00248}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00248}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AlbabtainY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlbakriMH18, author = {Ashwag Albakri and Mahesh Maddumala and Lein Harn}, title = {Hierarchical Polynomial-Based Key Management Scheme in Fog Computing}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1593--1597}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00231}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00231}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AlbakriMH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlemanPAK18, author = {Concepcion Sanchez Aleman and Niki Pissinou and Sheila Alemany and Georges A. Kamhoua}, title = {A Dynamic Trust Weight Allocation Technique for Data Reconstruction in Mobile Wireless Sensor Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {61--67}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00020}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00020}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AlemanPAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AliWWC18, author = {Saqib Ali and Guojun Wang and Bebo White and Roger Leslie Cottrell}, title = {A Blockchain-Based Decentralized Data Storage and Access Framework for PingER}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1303--1308}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00179}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00179}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AliWWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlkhonainiE18, author = {Mimouna Alkhonaini and Hoda El{-}Sayed}, title = {Migrating Data Between Physical Server and Cloud: Improving Accuracy and Data Integrity}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1570--1574}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00226}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00226}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AlkhonainiE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlsaigAO18, author = {Alaa Alsaig and Vangular Alagar and Olga Ormandjieva}, title = {A Critical Analysis of the V-Model of Big Data}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1809--1813}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00273}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00273}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AlsaigAO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ApolinarioPC18, author = {Filipe Apolinario and Miguel L. Pardal and Miguel Correia}, title = {S-Audit: Efficient Data Integrity Verification for Cloud Storage}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {465--474}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00073}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00073}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ApolinarioPC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ArifWP18, author = {Muhammad Arif and Guojun Wang and Tao Peng}, title = {Track me if you can? Query Based Dual Location Privacy in VANETs for {V2V} and {V2I}}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1091--1096}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00152}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00152}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ArifWP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AroraP18, author = {Anshul Arora and Sateesh Kumar Peddoju}, title = {NTPDroid: {A} Hybrid Android Malware Detector Using Network Traffic and System Permissions}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {808--813}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00115}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00115}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AroraP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Atighehchi18, author = {Kevin Atighehchi}, title = {On the Incremental Digital Signatures}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1605--1609}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00234}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00234}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Atighehchi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AzabHM18, author = {Mohamed Azab and Ahmed Hamdy and Ahmed Mansour}, title = {Repoxy: Replication Proxy for Trustworthy {SDN} Controller Operation}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {55--60}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00019}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00019}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AzabHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BanerjeeH18, author = {Tanushree Banerjee and M. Anwar Hasan}, title = {Energy Efficiency Analysis of Elliptic Curve Based Cryptosystems}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1579--1583}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00228}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00228}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BanerjeeH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BaoHW18, author = {Judong Bao and Yongqiang He and Weiping Wen}, title = {DroidPro: An AOTC-Based Bytecode-Hiding Scheme for Packing the Android Applications}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {624--632}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00093}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00093}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BaoHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BaqaTCLG18, author = {Hamza Baqa and Nguyen Binh Truong and No{\"{e}}l Crespi and Gyu Myoung Lee and Franck Le Gall}, title = {Quality of Information as an indicator of Trust in the Internet of Things}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {204--211}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00040}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00040}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BaqaTCLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BariS18, author = {Anasse Bari and Goktug Saatcioglu}, title = {Emotion Artificial Intelligence Derived from Ensemble Learning}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1763--1770}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00266}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00266}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BariS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Beierle18, author = {Felix Beierle}, title = {Do You Like What {I} Like? Similarity Estimation in Proximity-Based Mobile Social Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1040--1047}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00146}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00146}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Beierle18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BianXW18, author = {Rongzhen Bian and Mingfu Xue and Jian Wang}, title = {Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1458--1463}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00203}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00203}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BianXW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BiondiGL18, author = {Fabrizio Biondi and Thomas Given{-}Wilson and Axel Legay}, title = {Universal Optimality of Apollonian Cell Encoders}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {424--435}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00069}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00069}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BiondiGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BreuerBP018, author = {Peter T. Breuer and Jonathan P. Bowen and Esther Palomar and Zhiming Liu}, title = {Superscalar Encrypted {RISC:} The Measure of a Secret Computer}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1336--1341}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00184}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00184}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BreuerBP018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BridgesJNGP18, author = {Robert A. Bridges and Jarilyn Hern{\'{a}}ndez Jim{\'{e}}nez and Jeffrey Nichols and Katerina Goseva{-}Popstojanova and Stacy J. Prowell}, title = {Towards Malware Detection via {CPU} Power Consumption: Data Collection Design and Analytics}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1680--1684}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00250}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00250}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BridgesJNGP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BuDLCS18, author = {Aiguo Bu and Wentao Dai and Minyi Lu and Hao Cai and Weiwei Shan}, title = {Correlation-Based Electromagnetic Analysis Attack Using Haar Wavelet Reconstruction with Low-Pass Filtering on an {FPGA} Implementaion of {AES}}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1897--1900}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00288}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00288}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BuDLCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BurkhartUEE18, author = {Sebastian Burkhart and Andreas Unterweger and G{\"{u}}nther Eibl and Dominik Engel}, title = {Detecting Swimming Pools in 15-Minute Load Data}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1651--1655}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00244}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00244}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BurkhartUEE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CalioT18, author = {Antonio Cali{\`{o}} and Andrea Tagarelli}, title = {Trust-Based Dynamic Linear Threshold Models for Non-competitive and Competitive Influence Propagation}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {156--162}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00033}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00033}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CalioT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoH18, author = {Zechun Cao and Shou{-}Hsuan Stephen Huang}, title = {Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {475--480}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00074}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00074}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CaoH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoLTXX18, author = {Huikang Cao and Ruixuan Li and Wenlong Tian and Zhiyong Xu and Weijun Xiao}, title = {A Practical Accountability Scheme for Oblivious {RAM} in Cloud Storage}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {397--402}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00066}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00066}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaoLTXX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CarmanKLCA18, author = {Mark J. Carman and Mark Koerber and Jiuyong Li and Kim{-}Kwang Raymond Choo and Helen Ashman}, title = {Manipulating Visibility of Political and Apolitical Threads on Reddit via Score Boosting}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {184--190}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00037}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00037}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CarmanKLCA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChakrabortySM18, author = {Nilesh Chakraborty and Shreya Singh and Samrat Mondal}, title = {On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {444--455}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00071}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00071}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChakrabortySM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Chawathe18, author = {Sudarshan S. Chawathe}, title = {Improving Email Security with Fuzzy Rules}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1864--1869}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00282}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00282}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Chawathe18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Chawathe18a, author = {Sudarshan S. Chawathe}, title = {Monitoring Blockchains with Self-Organizing Maps}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1870--1875}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00283}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00283}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Chawathe18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenCT18, author = {Shao{-}Chien Chen and Yi{-}Ruei Chen and Wen{-}Guey Tzeng}, title = {Effective Botnet Detection Through Neural Networks on Convolutional Features}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {372--378}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00062}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00062}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenCT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenCZGZH18, author = {Jian Chen and Ziyang Chen and Peijia Zheng and Jianting Guo and Wei Zhang and Jiwu Huang}, title = {Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio Watermarking}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {68--73}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00021}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00021}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenCZGZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenDQ18, author = {Hongbo Chen and Hongjun Dai and Meikang Qiu}, title = {A Multiple Layer Sercurity Architecture for Internet of Things into {MVC} Design}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {861--866}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00124}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00124}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenDQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenFZZL18, author = {Zhenyu Chen and Yanyan Fu and Min Zhang and Zhenfeng Zhang and Hao Li}, title = {A Flexible Mix-Zone Selection Scheme Towards Trajectory Privacy Protection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1180--1186}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00163}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00163}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenFZZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenGYLY18, author = {Shenghua Chen and Wei Ge and Jinjiang Yang and Bo Liu and Jun Yang}, title = {A Power Analysis Attack Countermeasure Based on Random Execution}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1474--1479}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00206}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00206}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenGYLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenLQC18, author = {Xi Chen and Zhaojun Lu and Gang Qu and Aijiao Cui}, title = {Partial Scan Design Against Scan-Based Side Channel Attacks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1484--1489}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00208}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00208}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenLQC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenLYWGCYZ18, author = {Zhenya Chen and Weifeng Liu and Ying Yang and Jizhi Wang and Meng Guo and Lijuan Chen and Guang Yang and Jie Zhou}, title = {Electronic Evidence Service Research in Cloud Computing Environment}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {332--338}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00058}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00058}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenLYWGCYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenZGZH18, author = {Jian Chen and Peijia Zheng and Jianting Guo and Wei Zhang and Jiwu Huang}, title = {A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication and Protection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {86--91}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00023}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00023}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenZGZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenZZ18, author = {Jiaqi Chen and Fan Zhang and Lei Zou}, title = {{SPARQL} Multi-Query Optimization}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1419--1425}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00197}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00197}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenZZHL18, author = {Cai Chen and Manyuan Zhang and Huanzhi Zhang and Zhenyun Huang and Yong Li}, title = {Privacy-Preserving Sensory Data Recovery}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1646--1650}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00243}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00243}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenZZHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChoudharyK18, author = {Sarika Choudhary and Nishtha Kesswani}, title = {Detection and Prevention of Routing Attacks in Internet of Things}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1537--1540}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00219}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00219}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChoudharyK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChowdhuryCK0S18, author = {Mohammad Jabed Morshed Chowdhury and Alan Colman and Muhammad Ashad Kabir and Jun Han and Paul Sarda}, title = {Blockchain as a Notarization Service for Data Sharing with Personal Data Store}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1330--1335}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00183}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00183}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChowdhuryCK0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChowdhuryCK0S18a, author = {Mohammad Jabed Morshed Chowdhury and Alan Colman and Muhammad Ashad Kabir and Jun Han and Paul Sarda}, title = {Blockchain Versus Database: {A} Critical Analysis}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1348--1353}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00186}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00186}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChowdhuryCK0S18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ClarkDG18, author = {George W. Clark and Michael V. Doran and William Glisson}, title = {A Malicious Attack on the Machine Learning Policy of a Robotic System}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {516--521}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00079}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00079}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ClarkDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CloydOEGC18, author = {Taylor Cloyd and Trey Osborn and Brian Ellingboe and William Bradley Glisson and Kim{-}Kwang Raymond Choo}, title = {Browser Analysis of Residual Facebook Data}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1440--1445}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00200}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00200}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CloydOEGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CostantinoMMMS18, author = {Gianpiero Costantino and Antonio La Marra and Fabio Martinelli and Paolo Mori and Andrea Saracino}, title = {Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1844--1851}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00279}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00279}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CostantinoMMMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CrescenzoBCRP18, author = {Giovanni Di Crescenzo and Lisa Bahler and Brian A. Coan and Kurt Rohloff and Yuriy Polyakov}, title = {Intrusion-Resilient Classifier Approximation: From Wildcard Matching to Range Membership}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1885--1890}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00286}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00286}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CrescenzoBCRP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CuiBAAR18, author = {Shujie Cui and Sana Belguith and Pramodya De Alwis and Muhammad Rizwan Asghar and Giovanni Russello}, title = {Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe Systems}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1624--1627}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00238}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00238}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CuiBAAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DakuZM18, author = {Hajredin Daku and Pavol Zavarsky and Yasir Malik}, title = {Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1560--1564}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00224}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00224}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DakuZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DeCusatisL18, author = {Casimer M. DeCusatis and Kulvinder Lotay}, title = {Secure, Decentralized Energy Resource Management Using the Ethereum Blockchain}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1907--1913}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00290}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00290}, timestamp = {Fri, 21 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DeCusatisL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DeljooEKGL18, author = {Ameneh Deljoo and Tom M. van Engers and Ralph Koning and Leon Gommans and Cees de Laat}, title = {Towards Trustworthy Information Sharing by Creating Cyber Security Alliances}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1506--1510}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00213}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00213}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DeljooEKGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuLS18, author = {Xiaoyu Du and Paul Ledwith and Mark Scanlon}, title = {Deduplicated Disk Image Evidence Acquisition and Forensically-Sound Reconstruction}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1674--1679}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00249}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00249}, timestamp = {Mon, 09 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DuLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ElappilaC18, author = {Manu Elappila and Suchismita Chinara}, title = {Dynamic Survivable Path Routing for Fast Changing IoT Network Topologies}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {92--97}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00024}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00024}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ElappilaC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Ergun18, author = {Salih Ergun}, title = {Cryptanalysis of a Chaotic Ring Oscillator Based Random Number Generator}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1498--1501}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00211}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00211}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Ergun18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FadheelSL18, author = {Wesam Fadheel and Raed M. Salih and Leszek Lilien}, title = {PHeDHA: Protecting Healthcare Data in Health Information Exchanges with Active Data Bundles}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1187--1195}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00164}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00164}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FadheelSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FanLTLZB18, author = {Yongkai Fan and Shengle Liu and Gang Tan and Xiaodong Lin and Guanqun Zhao and Jianrong Bai}, title = {One Secure Access Scheme Based on Trusted Execution Environment}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {16--21}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00013}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00013}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FanLTLZB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FengLCLKS18, author = {Yun Feng and Baoxu Liu and Xiang Cui and Chaoge Liu and Xuebin Kang and Junwei Su}, title = {A Systematic Method on {PDF} Privacy Leakage Issues}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1020--1029}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00144}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00144}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FengLCLKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Fischer18, author = {Tilo Fischer}, title = {Testing Cryptographically Secure Pseudo Random Number Generators with Artificial Neural Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1214--1223}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00168}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00168}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Fischer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FriebeSZ18, author = {Sebastian Friebe and Ingo Sobik and Martina Zitterbart}, title = {DecentID: Decentralized and Privacy-Preserving Identity Storage System Using Smart Contracts}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {37--42}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00016}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00016}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FriebeSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FulpG18, author = {Errin W. Fulp and H. Donald Gage}, title = {Using Feature Selection to Identify Chains of Insecure Software Configuration Parameters}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {825--830}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00118}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00118}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FulpG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaiWZQ18, author = {Keke Gai and Yulu Wu and Liehuang Zhu and Meikang Qiu}, title = {Privacy-Preserving Data Synchronization Using Tensor-Based Fully Homomorphic Encryption}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1149--1156}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00159}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00159}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GaiWZQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoC0Z18, author = {Yiwen Gao and Wei Cheng and Hailong Zhang and Yongbin Zhou}, title = {Cache-Collision Attacks on GPU-Based {AES} Implementation with Electro-Magnetic Leakages}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {300--306}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00053}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00053}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GaoC0Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaraeKA18, author = {Jeffery Garae and Ryan K. L. Ko and Mark D. Apperley}, title = {A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {639--650}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00095}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00095}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaraeKA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GillLZ18, author = {Manmeet Singh Gill and Dale Lindskog and Pavol Zavarsky}, title = {Profiling Network Traffic Behavior for the Purpose of Anomaly-Based Intrusion Detection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {885--890}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00127}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00127}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GillLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GomiYTS18, author = {Hidehito Gomi and Shuji Yamaguchi and Kota Tsubouchi and Naomi Sasaya}, title = {Continuous Authentication System Using Online Activities}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {522--532}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00080}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00080}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GomiYTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GoudbeekCL18, author = {Arnoud Goudbeek and Kim{-}Kwang Raymond Choo and Nhien{-}An Le{-}Khac}, title = {A Forensic Investigation Framework for Smart Home Environment}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1446--1451}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00201}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00201}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GoudbeekCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuZYZ18, author = {Ruichun Gu and Xiaolong Zhang and Yu Lei and Junxing Zhang}, title = {Enhancing Security and Scalability in Software Defined {LTE} Core Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {837--842}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00120}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00120}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuZYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoTCTB18, author = {Cheng Guo and Xinyu Tang and Yuanfang Chen and Pengxu Tian and Md. Zakirul Alam Bhuiyan}, title = {An Efficient Distributed Approach on High Dimensional Data Similarity Searchable Encryption}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1270--1275}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00175}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00175}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GuoTCTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GurulianMFA18, author = {Iakovos Gurulian and Konstantinos Markantonakis and Eibe Frank and Raja Naeem Akram}, title = {Good Vibrations: Artificial Ambience-Based Relay Attack Detection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {481--489}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00075}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00075}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GurulianMFA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuvenHOL18, author = {{\c{C}}i{\c{c}}ek G{\"{u}}ven and Mike Holenderski and Tanir {\"{O}}z{\c{c}}elebi and Johan Lukkien}, title = {Using Artificial Neurons in Evidence Based Trust Computation}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1879--1884}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00285}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00285}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GuvenHOL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GwakCLS18, author = {Bumjin Gwak and Jin{-}Hee Cho and Dongman Lee and Heesuk Son}, title = {{TARAS:} Trust-Aware Role-Based Access Control System in Public Internet-of-Things}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {74--85}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00022}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00022}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GwakCLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HabibAIH0M18, author = {Sheikh Mahbub Habib and Nikolaos Alexopoulos and Md Monirul Islam and Jens Heider and Stephen Marsh and Max M{\"{u}}hlh{\"{a}}user}, title = {Trust4App: Automating Trustworthiness Assessment of Mobile Applications}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {124--135}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00029}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00029}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HabibAIH0M18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HaddadAH18, author = {Ghada El Haddad and Esma A{\"{\i}}meur and Hicham Hage}, title = {Understanding Trust, Privacy and Financial Fears in Online Payment}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {28--36}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00015}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00015}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HaddadAH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HalabiBA18, author = {Talal Halabi and Martine Bella{\"{\i}}che and Adel Abusitta}, title = {Online Allocation of Cloud Resources Based on Security Satisfaction}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {379--384}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00063}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00063}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HalabiBA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HardwickAM18, author = {Freya Sheer Hardwick and Raja Naeem Akram and Konstantinos Markantonakis}, title = {Fair and Transparent Blockchain Based Tendering Framework - {A} Step Towards Open Governance}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1342--1347}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00185}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00185}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HardwickAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HasegawaST18, author = {Kento Hasegawa and Youhua Shi and Nozomu Togawa}, title = {Hardware Trojan Detection Utilizing Machine Learning Approaches}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1891--1896}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00287}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00287}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HasegawaST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HePL18, author = {Zheng He and Shiran Pan and Dongdai Lin}, title = {{PMDA:} Privacy-Preserving Multi-functional Data Aggregation Without {TTP} in Smart Grid}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1107--1114}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00154}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00154}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HePL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HossainHHSR18, author = {Md. Nazmul Hossain and Md. Alam Hossain and Md. Zobayer Hossain and Md. Hasan Imam Sohag and Shawon S. M. Rahman}, title = {OAuth-SSO: {A} Framework to Secure the OAuth-Based {SSO} Service for Packaged Web Applications}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1575--1578}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00227}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00227}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HossainHHSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Hou0KWDSH18, author = {Junjie Hou and Yongxin Zhu and Linghe Kong and Zhe Wang and Sen Du and Shijin Song and Tian Huang}, title = {A Case Study of Accelerating Apache Spark with {FPGA}}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {855--860}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00123}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00123}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Hou0KWDSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangLLXL18, author = {Yin Huang and Wei Liang and Jing Long and Jianbo Xu and Kuan{-}Ching Li}, title = {A Novel Identity Authentication for {FPGA} Based {IP} Designs}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1531--1536}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00218}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00218}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuangLLXL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangWZQW018, author = {Ji Huang and Pei Wang and Tianning Zang and Qian Qiang and Yipeng Wang and Miao Yu}, title = {Detecting Domain Generation Algorithms with Convolutional Neural Language Models}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1360--1367}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00188}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00188}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuangWZQW018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HussainASRR18, author = {Lal Hussain and Wajid Aziz and Sharjil Saeed and Saima Rathore and Muhammad Rafique}, title = {Automated Breast Cancer Detection Using Machine Learning Techniques by Extracting Different Feature Extracting Strategies}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {327--331}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00057}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00057}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HussainASRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ImineKBL18, author = {Youcef Imine and Djamel Eddine Kouicem and Abdelmadjid Bouabdallah and Ahmed Lounis}, title = {{MASFOG:} An Efficient Mutual Authentication Scheme for Fog Computing Architecture}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {608--613}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00091}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00091}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ImineKBL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/IsmailRS18, author = {Hatem Ismail and Stefanie Roos and Neeraj Suri}, title = {A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {456--464}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00072}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00072}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/IsmailRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JagerNK18, author = {Markus J{\"{a}}ger and Stefan Nadschl{\"{a}}ger and Josef K{\"{u}}ng}, title = {Concepts for Trust Propagation in Knowledge Processing Systems - {A} Brief Introduction and Overview}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1502--1505}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00212}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00212}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JagerNK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JavedTC18, author = {Ibrahim Tariq Javed and Khalifa Toumi and No{\"{e}}l Crespi}, title = {N-Combat: {A} Nuisance Call Combating Framework for Internet Telephony}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {112--117}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00027}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00027}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JavedTC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangYYLCLLH18, author = {Jianguo Jiang and Qian Yu and Min Yu and Gang Li and Jiuming Chen and Kunying Liu and Chao Liu and Weiqing Huang}, title = {{ALDD:} {A} Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1565--1569}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00225}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00225}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JiangYYLCLLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JosephRS18, author = {Jitto Joseph and Ron Ruhl and Hamman Samuel}, title = {Reducing Traffic Congestion for Machine to Machine Type Communication Over 4G-LTE Network by Decreasing Total Bytes Transmitted}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1720--1721}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00259}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00259}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JosephRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JuniorCPRFS18, author = {Marcos Antonio Simplicio Junior and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Leonardo T. D. Ferraz and Marcos Vinicius Maciel da Silva}, title = {Privacy-Preserving Method for Temporarily Linking/Revoking Pseudonym Certificates in VANETs}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1322--1329}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00182}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00182}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JuniorCPRFS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KGL18, author = {K. Aditya and Slawomir Grzonkowski and Nhien An LeKhac}, title = {Enabling Trust in Deep Learning Models: {A} Digital Forensics Case Study}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1250--1255}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00172}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00172}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KahlaAM18, author = {Mostafa Kahla and Mohamed Azab and Ahmed Mansour}, title = {Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {49--54}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00018}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00018}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KahlaAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KangLS18, author = {Sarvjot kaur Kang and Dale Lindskog and Hamman Samuel}, title = {An Implementation of Hierarchical Intrusion Detection Systems Using Snort and Federated Databases}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1521--1525}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00216}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00216}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KangLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KapustaM18, author = {Katarzyna Kapusta and G{\'{e}}rard Memmi}, title = {Enhancing Data Protection in a Distributed Storage Environment Using Structure-Wise Fragmentation and Dispersal of Encrypted Data}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {385--390}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00064}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00064}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KapustaM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KayesRDC18, author = {A. S. M. Kayes and J. Wenny Rahayu and Tharam S. Dillon and Elizabeth Chang}, title = {Accessing Data from Multiple Sources Through Context-Aware Access Control}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {551--559}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00084}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00084}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KayesRDC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KelkarKMZD18, author = {Soham Kelkar and Timothy Kraus and Daria Morgan and Junjie Zhang and Rui Dai}, title = {Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1642--1645}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00242}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00242}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KelkarKMZD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KevinM18, author = {Kevin Atighehchi and Morgan Barbier}, title = {Signature Renewal for Low Entropy Data}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {873--884}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00126}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00126}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KevinM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KhanDM18, author = {Haibat Khan and Benjamin Dowling and Keith M. Martin}, title = {Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1064--1069}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00149}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00149}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KhanDM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KhanWAK18, author = {Muhammad Saleem Khan and Saira Waris and Idrees Ahmed and Majid Iqbal Khan}, title = {A Comprehensive Analysis of Packet Loss in MANETs}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {118--123}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00028}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00028}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KhanWAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KimL18, author = {KiHwan Kim and HoonJae Lee}, title = {Proposal of Multi-channel Operation Technique Using PingPong256}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1551--1554}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00222}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00222}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KimL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KimSS18, author = {Doyeon Kim and Dongil Shin and Dongkyoo Shin}, title = {Unauthorized Access Point Detection Using Machine Learning Algorithms for Information Protection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1876--1878}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00284}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00284}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KimSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KlemsaKV18, author = {Jakub Klemsa and Lukas Kencl and Tomas Vanek}, title = {VeraGreg: {A} Framework for Verifiable Privacy-Preserving Data Aggregation}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1820--1825}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00275}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00275}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KlemsaKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KliemeTM18, author = {Eric Klieme and Christian Tietz and Christoph Meinel}, title = {Beware of {SMOMBIES:} Verification of Users Based on Activities While Walking}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {651--660}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00096}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00096}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KliemeTM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Koehl18, author = {Aaron Koehl}, title = {Autoblog Forensics and Attribution}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1276--1286}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00176}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00176}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Koehl18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Konorski18, author = {Jerzy Konorski}, title = {Double-Blind Reputation vs. Intelligent Fake {VIP} Attacks in Cloud-Assisted Interactions}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1637--1641}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00241}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00241}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Konorski18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Kritikos18, author = {Kyriakos Kritikos}, title = {Towards Dynamic and Optimal Big Data Placement}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1730--1737}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00262}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00262}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Kritikos18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KulUC18, author = {G{\"{o}}khan Kul and Shambhu J. Upadhyaya and Varun Chandola}, title = {Detecting Data Leakage from Databases on Android Apps with Concept Drift}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {905--913}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00129}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00129}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KulUC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KulkarniMCG18, author = {Vaibhav Kulkarni and Arielle Moro and Bertil Chapuis and Beno{\^{\i}}t Garbinato}, title = {Capstone: Mobility Modeling on Smartphones to Achieve Privacy by Design}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {964--971}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00136}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00136}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KulkarniMCG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KulykMVK18, author = {Oksana Kulyk and Peter Mayer and Melanie Volkamer and Oliver Kafer}, title = {A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1058--1063}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00148}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00148}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KulykMVK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KunihiroLNS18, author = {Noboru Kunihiro and Wenjie Lu and Takashi Nishide and Jun Sakuma}, title = {Outsourced Private Function Evaluation with Privacy Policy Enforcement}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {412--423}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00068}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00068}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KunihiroLNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LIdsterR18, author = {William W. Lidster and Shawon S. M. Rahman}, title = {Obstacles to Implementation of Information Security Governance}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1826--1831}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00276}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00276}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LIdsterR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LedbetterGMAGC18, author = {William Ledbetter and William Bradley Glisson and Todd McDonald and Todd R. Andel and George Grispos and Kim{-}Kwang Raymond Choo}, title = {Digital Blues: An Investigation Into the Use of Bluetooth Protocols}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {498--503}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00077}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00077}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LedbetterGMAGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LenzK18, author = {Thomas Lenz and Vesna Krnjic}, title = {Towards Domain-Specific and Privacy-Preserving Qualified eID in a User-Centric Identity Model}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1157--1163}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00160}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00160}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LenzK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiF18, author = {Ruidan Li and Errin W. Fulp}, title = {Using Evolutionary Approaches to Manage Surveillance Cameras in Dynamic Environments}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {191--196}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00038}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00038}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiJC18, author = {Xiehua Li and Jie Jiang and Yichen Chen}, title = {Fully Decentralized Authentication and Revocation Scheme in Data Sharing Systems}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {680--686}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00100}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00100}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiJYLWZ18, author = {Qiang Li and Zhengwei Jiang and Zeming Yang and Baoxu Liu and Xin Wang and Yunan Zhang}, title = {A Quality Evaluation Method of Cyber Threat Intelligence in User Perspective}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {269--276}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00049}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00049}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiJYLWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiMWKL18, author = {Wenjuan Li and Weizhi Meng and Yu Wang and Lam For Kwok and Rongxing Lu}, title = {Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1208--1213}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00167}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00167}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiMWKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiW18, author = {Bin Li and Yijie Wang}, title = {{RZKPB:} {A} Privacy-Preserving Blockchain-Based Fair Transaction Method for Sharing Economy}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1164--1169}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00161}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00161}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiWSCC18, author = {Bin Li and Yijie Wang and Peichang Shi and Huan Chen and Li Cheng}, title = {{FPPB:} {A} Fast and Privacy-Preserving Method Based on the Permissioned Blockchain for Fair Transactions in Sharing Economy}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1368--1373}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00189}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00189}, timestamp = {Mon, 29 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiWSCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiXZ18, author = {Chunhua Li and Weirui Xie and Ke Zhou}, title = {Efficient Binary-Encoding Access Control Policy Combination for Large-Scale Collaborative Scenarios}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {560--566}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00085}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00085}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuCD0Z18, author = {Ximeng Liu and Kim{-}Kwang Raymond Choo and Robert H. Deng and Yang Yang and Yinghui Zhang}, title = {{PUSC:} Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {958--963}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00135}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00135}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuCD0Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuJWYZW18, author = {Zechao Liu and Zoe Lin Jiang and Xuan Wang and Siu{-}Ming Yiu and Ruoqing Zhang and Yulin Wu}, title = {A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {614--623}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00092}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00092}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuJWYZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuKLW18, author = {Kai{-}Cheng Liu and Chuan{-}Wei Kuo and Wen{-}Chiuan Liao and Pang{-}Chieh Wang}, title = {Optimized Data de-Identification Using Multidimensional k-Anonymity}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1610--1614}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00235}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00235}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuKLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLL018, author = {Xinbo Liu and Yaping Lin and Qin Liu and Xin Yao}, title = {A Privacy-Preserving Principal Component Analysis Outsourcing Framework}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1354--1359}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00187}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00187}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLL018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLTWX18, author = {Danjun Liu and Yao Li and Yong Tang and Baosheng Wang and Wei Xie}, title = {{VMPBL:} Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by {LCS}}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {800--807}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00114}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00114}, timestamp = {Thu, 25 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLTWX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuNZYYL18, author = {Meng Liu and Priyadarsi Nanda and Xuyun Zhang and Chi Yang and Shui Yu and Jianxin Li}, title = {Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {990--995}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00139}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00139}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuNZYYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuPXWPW18, author = {Qin Liu and Shuyu Pei and Kang Xie and Jie Wu and Tao Peng and Guojun Wang}, title = {Achieving Secure and Effective Search Services in Cloud Computing}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1386--1391}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00192}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00192}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuPXWPW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuPZ18, author = {Fuwen Liu and Jin Peng and Min Zuo}, title = {Toward a Secure Access to 5G Network}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1121--1128}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00156}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00156}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuPZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuSCZYZ18, author = {Tong Liu and Gang Shi and Liwei Chen and Fei Zhang and Yaxuan Yang and Jihu Zhang}, title = {{TMDFI:} Tagged Memory Assisted for Fine-Grained Data-Flow Integrity Towards Embedded Systems Against Software Exploitation}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {545--550}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00083}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00083}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuSCZYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWLHF18, author = {Gaosheng Liu and Xin Wang and Xiaohong Li and Jianye Hao and Zhiyong Feng}, title = {{ESRQ:} An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {149--155}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00032}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00032}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWLHF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWRMGTW18, author = {Danjun Liu and Jingyuan Wang and Zelin Rong and Xianya Mi and Fangyu Gai and Yong Tang and Baosheng Wang}, title = {Pangr: {A} Behavior-Based Automatic Vulnerability Detection and Exploitation Framework}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {705--712}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00103}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00103}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWRMGTW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuXW0CB18, author = {Hongbin Liu and Ming Xu and Yiming Wu and Ning Zheng and Yuangfang Chen and Md. Zakirul Alam Bhuiyan}, title = {Resilient Bipartite Consensus for Multi-agent Networks with Antagonistic Interactions}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1262--1269}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00174}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00174}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuXW0CB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuYL18, author = {Xiaoning Liu and Xingliang Yuan and Joseph K. Liu}, title = {Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1664--1668}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00247}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00247}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuFXS18, author = {Minyi Lu and Ao Fan and Jiaming Xu and Weiwei Shan}, title = {A Compact, Lightweight and Low-Cost 8-Bit Datapath {AES} Circuit for IoT Applications in 28nm {CMOS}}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1464--1469}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00204}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00204}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LuFXS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuSV18, author = {Yang Lu and Richard O. Sinnott and Karin Verspoor}, title = {Semantic-Based Policy Composition for Privacy-Demanding Data Linkage}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {348--359}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00060}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00060}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LuSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuSVP18, author = {Yang Lu and Richard O. Sinnott and Karin Verspoor and Udaya Parampalli}, title = {Privacy-Preserving Access Control in Electronic Health Record Linkage}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1079--1090}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00151}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00151}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LuSVP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuWQL18, author = {Zhaojun Lu and Qian Wang and Gang Qu and Zhenglin Liu}, title = {{BARS:} {A} Blockchain-Based Anonymous Reputation System for Trust Management in VANETs}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {98--103}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00025}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00025}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LuWQL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuZZLBC18, author = {Liangfu Lu and Xinhe Zhu and Xuyun Zhang and Junhan Liu and Md. Zakirul Alam Bhuiyan and Guangtai Cui}, title = {One Intrusion Detection Method Based On Uniformed Conditional Dynamic Mutual Information}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1236--1241}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00170}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00170}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuZZLBC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Ma0WEGD18, author = {Tianao Ma and Wei Hu and Yonghao Wang and Dalia El{-}Banna and John Grant and Hongjun Dai}, title = {Evaluation of Flexilink as Deterministic Unified Real-Time Protocol for Industrial Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {22--27}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00014}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00014}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Ma0WEGD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Ma18, author = {Sha Ma}, title = {Authorized Equality Test of Encrypted Data for Secure Cloud Databases}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {223--230}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00043}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00043}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Ma18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaHW18, author = {Rongxuan Ma and Wei Hu and Yonghao Wang}, title = {Low Delay and Low Cost Audio Surveillance System via a New Optimum {FIR} Digtal Filter}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1541--1546}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00220}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00220}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaSZQ18, author = {Shunan Ma and Xunbo Shuai and Zhaohua Zhou and Kechun Qiao}, title = {Bionic Mechanism Based Dynamic Trust Evaluation Method in Cloud Environment}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {136--141}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00030}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00030}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaSZQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaWGL18, author = {Yuxiang Ma and Yulei Wu and Jingguo Ge and Jun Li}, title = {A Flow-Level Architecture for Balancing Accountability and Privacy}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {984--989}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00138}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00138}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaWGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MadhounBP18, author = {Nour El Madhoun and Emmanuel Bertin and Guy Pujolle}, title = {For Small Merchants: {A} Secure Smartphone-Based Architecture to Process and Accept {NFC} Payments}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {403--411}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00067}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00067}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MadhounBP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MalikNAHP18, author = {Nisha Malik and Priyadarsi Nanda and Arushi Arora and Xiangjian He and Deepak Puthal}, title = {Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {674--679}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00099}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00099}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MalikNAHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaoDS18, author = {Jiewen Mao and Weijun Deng and Fuke Shen}, title = {DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple Traffic Features}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {237--243}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00045}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00045}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaoDS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Marbukh18, author = {Vladimir Marbukh}, title = {On Mitigation Inefficiency of Selfish Investment in Network Recovery from High Loss {SIS} Infection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1928--1933}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00293}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00293}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Marbukh18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MataBC18, author = {Nicholas Mata and Nicole Beebe and Kim{-}Kwang Raymond Choo}, title = {Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1433--1439}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00199}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00199}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MataBC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MatosTAH18, author = {Everton de Matos and Ram{\~{a}}o Tiago Tiburski and Leonardo Albernaz Amaral and Fabiano Hessel}, title = {Providing Context-Aware Security for IoT Environments Through Context Sharing Feature}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1711--1715}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00257}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00257}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MatosTAH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Mell18, author = {Peter Mell}, title = {Managed Blockchain Based Cryptocurrencies with Consensus Enforced Rules and Transparency}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1287--1296}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00177}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00177}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Mell18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MellGS18, author = {Peter Mell and Assane Gueye and Christopher Schanzle}, title = {Quantifying Information Exposure in Internet Routing}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1619--1623}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00237}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00237}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MellGS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MengMYL18, author = {Keju Meng and Fuyou Miao and Yue Yu and Changbin Lu}, title = {A Universal Secret Sharing Scheme with General Access Structure Based on {CRT}}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {142--148}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00031}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00031}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MengMYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MichelCCE18, author = {Mary C. Michel and Marco Carvalho and Heather Crawford and Albert C. Esterline}, title = {Cyber Identity: Salient Trait Ontology and Computational Framework to Aid in Solving Cybercrime}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1242--1249}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00171}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00171}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MichelCCE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MitraQMLP18, author = {Saptashwa Mitra and Yu Qiu and Haley Moss and Kaigang Li and Sangmi Lee Pallickara}, title = {Effective Integration of Geotagged, Ancilliary Longitudinal Survey Datasets to Improve Adulthood Obesity Predictive Models}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1738--1746}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00263}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00263}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MitraQMLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Mohammad18, author = {Rashid Mohammad}, title = {{AMI} Smart Meter Big Data Analytics for Time Series of Electricity Consumption}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1771--1776}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00267}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00267}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Mohammad18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MohantyZAR18, author = {Manoranjan Mohanty and Ming Zhang and Muhammad Rizwan Asghar and Giovanni Russello}, title = {{PANDORA:} Preserving Privacy in PRNU-Based Source Camera Attribution}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1202--1207}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00166}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00166}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MohantyZAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MohsenABJS18, author = {Fadi Mohsen and Hamed Abdelhaq and Halil Bisgin and Andrew Jolly and Michael Szczepanski}, title = {Countering Intrusiveness Using New Security-Centric Ranking Algorithm Built on Top of Elasticsearch}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1048--1057}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00147}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00147}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MohsenABJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MostafaBH18, author = {Mohannad Mostafa and Tanushree Banerjee and M. Anwar Hasan}, title = {Energy Exhaustion Attack on Barrett's Reduction}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {814--818}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00116}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00116}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MostafaBH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NakanishiK18, author = {Toru Nakanishi and Takeshi Kanatani}, title = {An Efficient Blacklistable Anonymous Credential System with Reputation Using Pairing-Based Accumulator}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1140--1148}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00158}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00158}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NakanishiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NeyazSK18, author = {Ashar Neyaz and Narasimha K. Shashidhar and Umit Karabiyik}, title = {Forensic Analysis of Wear Leveling on Solid-State Media}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1706--1710}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00256}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00256}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NeyazSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NobakhtSSH18, author = {Mehdi Nobakht and Yulei Sui and Aruna Seneviratne and Wen Hu}, title = {Permission Analysis of Health and Fitness Apps in IoT Programming Frameworks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {533--538}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00081}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00081}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NobakhtSSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NoguchiH18, author = {Taku Noguchi and Mayuko Hayakawa}, title = {Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {539--544}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00082}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00082}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NoguchiH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ObertCJ18, author = {James Obert and Adrian R. Chavez and Jay Johnson}, title = {Behavioral Based Trust Metrics and the Smart Grid}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1490--1493}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00209}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00209}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ObertCJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OhataMM18, author = {Satsuya Ohata and Takahiro Matsuda and Kanta Matsuura}, title = {Provably Secure Password Reset Protocol: Model, Definition, and Construction}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {774--782}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00111}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00111}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/OhataMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OkonofuaR18, author = {Henry Okonofua and Shawon Rahman}, title = {Evaluating the Risk Management Plan and Addressing Factors for Successes in Government Agencies}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1589--1592}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00230}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00230}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/OkonofuaR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OkonofuaR18a, author = {Henry Okonofua and Shawon S. M. Rahman}, title = {Cybersecurity: An Analysis of the Protection Mechanisms in a Cloud-centered Environment}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1955--1962}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00299}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00299}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/OkonofuaR18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Oualha18, author = {Nouha Oualha}, title = {Reinforcing IoT-Enforced Security Policies}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {831--836}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00119}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00119}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Oualha18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PanYWH18, author = {Lanlan Pan and Xuebiao Yuchi and Jian Wang and Anlei Hu}, title = {A Public Key Based {EDNS} Privacy Tunnel for {DNS}}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1722--1724}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00260}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00260}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PanYWH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PariziDC18, author = {Reza M. Parizi and Ali Dehghantanha and Kim{-}Kwang Raymond Choo}, title = {Towards Better Ocular Recognition for Secure Real-World Applications}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {277--282}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00050}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00050}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PariziDC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PengHJI18, author = {Wuxu Peng and Linda Huang and Julia Jia and Emma Ingram}, title = {Enhancing the Naive Bayes Spam Filter Through Intelligent Text Modification Detection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {849--854}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00122}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00122}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PengHJI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PerezAS018, author = {Rocio Lopez Perez and Florian Adamsky and Ridha Soua and Thomas Engel}, title = {Machine Learning for Reliable Network Attack Detection in {SCADA} Systems}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {633--638}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00094}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00094}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PerezAS018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PouryousefRC18, author = {Shahrooz Pouryousef and Mariam Rezaiee and Ata Chizari}, title = {Let me Join Two Worlds! Analyzing the Integration of Web and Native Technologies in Hybrid Mobile Apps}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1814--1819}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00274}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00274}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PouryousefRC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiHWW18, author = {Lingtao Qi and Haiping Huang and Peng Wang and Ru Chuan Wang}, title = {Abnormal Item Detection Based on Time Window Merging for Recommender Systems}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {252--259}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00047}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00047}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QiHWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiJSMW18, author = {Biao Qi and Jianguo Jiang and Zhixin Shi and Rui Mao and Qiwen Wang}, title = {BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {754--762}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00109}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00109}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QiJSMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Qian0SC18, author = {Yuyin Qian and Peng Zeng and Zuming Shen and Kim{-}Kwang Raymond Choo}, title = {A Lightweight Path Authentication Protocol for RFID-Based Supply Chains}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1297--1302}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00178}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00178}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Qian0SC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QinY18, author = {Yi Qin and Chuan Yue}, title = {Website Fingerprinting by Power Estimation Based Side-Channel Attacks on Android 7}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1030--1039}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00145}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00145}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QinY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QuLWLX018, author = {Dapeng Qu and Dengyu Liang and Songlin Wu and Jie Li and Weihong Xuan and Xingwei Wang}, title = {A Trust Energy-Efficient QoS Routing Scheme for Mobile Peer-to-Peer Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {169--176}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00035}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00035}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QuLWLX018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RakoczyBGW18, author = {Monika Ewa Rakoczy and Amel Bouzeghoub and Alda Lopes Gan{\c{c}}arski and Katarzyna Wegrzyn{-}Wolska}, title = {Reputation Prediction Using Influence Conversion}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {43--48}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00017}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00017}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RakoczyBGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RenGSH18, author = {Hengyi Ren and Jian Guo and Lijuan Sun and Chong Han}, title = {Prediction Algorithm Based on Weather Forecast for Energy-Harvesting Wireless Sensor Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1785--1790}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00269}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00269}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RenGSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RenJYWWLC18, author = {Yizhi Ren and Mengjin Jiang and Ye Yao and Ting Wu and Zhen Wang and Mengkun Li and Kim{-}Kwang Raymond Choo}, title = {Node Immunization in Networks with Uncertainty}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1392--1397}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00193}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00193}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RenJYWWLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RizviGR18, author = {Syed Rizvi and Joseph Gualdoni and Abdul Razaque}, title = {Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {721--726}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00105}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00105}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RizviGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RizviKPR18, author = {Syed Rizvi and Andrew Kurtz and Joseph R. Pfeffer III and Mohammad Rizvi}, title = {Securing the Internet of Things (IoT): {A} Security Taxonomy for IoT}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {163--168}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00034}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00034}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RizviKPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RudrapatnaKTV18, author = {Rudrapatna K. Shyamasundar and N. V. Narendra Kumar and Abhijit Taware and Parjanya Vyas}, title = {An Experimental Flow Secure File System}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {790--799}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00113}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00113}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RudrapatnaKTV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SacramentoMB018, author = {Luis Sacramento and Iberia Medeiros and Joao Bota and Miguel Correia}, title = {FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data Using Network Flows}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {567--572}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00086}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00086}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SacramentoMB018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SaidiTG18, author = {Firas Saidi and Zouheir Trabelsi and Henda Ben Gh{\'{e}}zala}, title = {An Evidential Clustering Based Framework for Cyber Terrorist Cells Topology Identification}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {436--443}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00070}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00070}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SaidiTG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SajjadY18, author = {Syed Muhammad Sajjad and Muhammad Yousaf}, title = {{UCAM:} Usage, Communication and Access Monitoring Based Detection System for IoT Botnets}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1547--1550}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00221}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00221}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SajjadY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SalviaFSC18, author = {Rocco Salvia and Pietro Ferrara and Fausto Spoto and Agostino Cortesi}, title = {{SDLI:} Static Detection of Leaks Across Intents}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1002--1007}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00141}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00141}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SalviaFSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SaracinoRM18, author = {Andrea Saracino and Francesco Restuccia and Fabio Martinelli}, title = {Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {596--607}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00090}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00090}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SaracinoRM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SardaCCK018, author = {Paul Sarda and Mohammad Jabed Morshed Chowdhury and Alan Colman and Muhammad Ashad Kabir and Jun Han}, title = {Blockchain for Fraud Prevention: {A} Work-History Fraud Prevention System}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1858--1863}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00281}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00281}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SardaCCK018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SarwarYY18, author = {Kinza Sarwar and Sira Yongchareon and Jian Yu}, title = {Lightweight {ECC} with Fragile Zero-Watermarking for Internet of Things Security}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {867--872}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00125}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00125}, timestamp = {Thu, 07 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SarwarYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SayadiMRDRH18, author = {Hossein Sayadi and Hosein Mohammadi Makrani and Onkar Randive and Sai Manoj Pudukotai Dinakarrao and Setareh Rafatirad and Houman Homayoun}, title = {Customized Machine Learning-Based Hardware-Assisted Malware Detection in Embedded Devices}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1685--1688}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00251}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00251}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SayadiMRDRH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SayedS18, author = {Samir G. Sayed and Mohmed Shawkey}, title = {Data Mining Based Strategy for Detecting Malicious {PDF} Files}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {661--667}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00097}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00097}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SayedS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SchanzenbachBS18, author = {Martin Schanzenbach and Christian Banse and Julian Sch{\"{u}}tte}, title = {Practical Decentralized Attribute-Based Delegation Using Secure Name Systems}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {244--251}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00046}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00046}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SchanzenbachBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SchanzenbachBS18a, author = {Martin Schanzenbach and Georg Bramm and Julian Sch{\"{u}}tte}, title = {reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {946--957}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00134}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00134}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SchanzenbachBS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SchutteB18, author = {Julian Sch{\"{u}}tte and Gerd Stefan Brost}, title = {{LUCON:} Data Flow Control for Message-Based IoT Systems}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {289--299}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00052}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00052}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SchutteB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SerhaniKAN18, author = {Mohamed Adel Serhani and Hadeel T. El Kassabi and Nabeel A. Y. Al{-}Qirim and Alramzana Nujum Navaz}, title = {Towards a Multi-model Cloud Workflow Resource Monitoring, Adaptation, and Prediction}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1755--1762}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00265}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00265}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SerhaniKAN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SezariMD18, author = {Behrooz Sezari and Dietmar P. F. M{\"{o}}ller and Andreas Deutschmann}, title = {Anomaly-Based Network Intrusion Detection Model Using Deep Learning in Airports}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1725--1729}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00261}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00261}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SezariMD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShahV18, author = {Trusit Shah and Subbarayan Venkatesan}, title = {Authentication of IoT Device and IoT Server Using Secure Vaults}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {819--824}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00117}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00117}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShahV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShahidPIM18, author = {Abdur R. Shahid and Niki Pissinou and S. S. Iyengar and Kia Makki}, title = {Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1852--1857}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00280}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00280}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShahidPIM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShangCSZZ18, author = {Wenli Shang and Junrong Cui and Chunhe Song and Jianming Zhao and Peng Zeng}, title = {Research on Industrial Control Anomaly Detection Based on {FCM} and {SVM}}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {218--222}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00042}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00042}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShangCSZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SharmaK0LCM18, author = {Dilli Prasad Sharma and Dong Seong Kim and Seunghyun Yoon and Hyuk Lim and Jin{-}Hee Cho and Terrence J. Moore}, title = {{FRVM:} Flexible Random Virtual {IP} Multiplexing in Software-Defined Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {579--587}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00088}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00088}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SharmaK0LCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Sheppard18, author = {John Sheppard}, title = {Cloud Investigations of Illegal {IPTV} Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1942--1947}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00295}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00295}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Sheppard18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShiLLJWL18, author = {Jun Shi and Bo Lv and Yangyang Li and Yue Jia and Rui Wang and Yong Liao}, title = {A New Wavelet Thresholding Method Based on Cyclostationarity for Enhancing the Interception of Computer Video Leakage Signals}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1901--1906}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00289}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00289}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShiLLJWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShilaE18, author = {Devu Manikantan Shila and Emeka Eyisi}, title = {Adversarial Gait Detection on Mobile Devices Using Recurrent Neural Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {316--321}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00055}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00055}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShilaE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShufordKRCW18, author = {Erica Shuford and Tara Kavanaugh and Brian Ralph and Ebrima N. Ceesay and Paul A. Watters}, title = {Measuring Personal Privacy Breaches Using Third-Party Trackers}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1615--1618}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00236}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00236}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShufordKRCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SridharMYTH18, author = {Meera Sridhar and Abhinav Mohanty and Fadi Yilmaz and Vasant Tendulkar and Kevin W. Hamlen}, title = {Inscription: Thwarting ActionScript Web Attacks From Within}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {504--515}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00078}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00078}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SridharMYTH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuYLLLL18, author = {Liya Su and Yepeng Yao and Ning Li and Junrong Liu and Zhigang Lu and Baoxu Liu}, title = {Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {744--753}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00108}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00108}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SuYLLLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunGZ18, author = {Tao Sun and Xin Guo and Ting Zhang}, title = {Testing Sequence Generation Method Based on Unrelated Behaviors Serializing}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {177--183}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00036}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00036}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SunGZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Syynimaa18, author = {Nestori Syynimaa}, title = {Who Would you Like to be Today?: Impersonation by Fake Azure Active Directory Identity Federation}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1598--1604}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00232}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00232}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Syynimaa18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TanHSGZ18, author = {Qingqing Tan and Chong Han and Lijuan Sun and Jian Guo and Hai Zhu}, title = {A {CSI} Frequency Domain Fingerprint-Based Method for Passive Indoor Human Detection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1832--1837}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00277}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00277}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TanHSGZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TanZLLZD18, author = {Guolin Tan and Peng Zhang and Qingyun Liu and Xinran Liu and Chunge Zhu and Fenghu Dou}, title = {Adaptive Malicious {URL} Detection: Learning in the Presence of Concept Drifts}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {737--743}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00107}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00107}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TanZLLZD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TangZHC18, author = {Xin Tang and Linna Zhou and Yongfeng Huang and Chin{-}Chen Chang}, title = {Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {897--904}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00128}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00128}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TangZHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TapsellAM18, author = {James Tapsell and Raja Naeem Akram and Konstantinos Markantonakis}, title = {Consumer Centric Data Control, Tracking and Transparency - {A} Position Paper}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1380--1385}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00191}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00191}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TapsellAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TetaraveTKJ18, author = {Sumit Kumar Tetarave and Somanath Tripathy and Ezhil Kalaimannan and Caroline John}, title = {eBot: Approach Towards Modeling an Advanced {P2P} Botnet}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {391--396}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00065}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00065}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TetaraveTKJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TheodouliAMVT18, author = {Anastasia Theodouli and Stelios Arakliotis and Konstantinos Moschou and Konstantinos Votis and Dimitrios Tzovaras}, title = {On the Design of a Blockchain-Based System to Facilitate Healthcare Data Sharing}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1374--1379}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00190}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00190}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TheodouliAMVT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TianZLZSL18, author = {Xiang Tian and Yujia Zhu and Zhao Li and Chao Zheng and Yong Sun and Qingyun Liu}, title = {VegaStar: An Illegal Domain Detection System on Large-Scale Video Traffic}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {783--789}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00112}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00112}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TianZLZSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TolbaBTB18, author = {Mouslim Tolba and Salem Benferhat and Karim Tabia and Abdelkader Belkhir}, title = {Handling Capabilities in Security Policies}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1922--1927}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00292}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00292}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TolbaBTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TroegelerW18, author = {Bernd Troegeler and Paul A. Watters}, title = {Steganographic Transports: {A} Vector for Hidden Secret Internets?}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {891--896}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00233}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00233}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TroegelerW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TseCLTT18, author = {Daniel Tse and Chung{-}kin Chow and Ting{-}pong Ly and Chung{-}yan Tong and Kwok{-}wah Tam}, title = {The Challenges of Big Data Governance in Healthcare}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1632--1636}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00240}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00240}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TseCLTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TseWWYZ18, author = {Daniel Tse and Xuan Weng and Xin Wan and Lan Yao and Wensong Zhang}, title = {Research on Information Security Perception of Sina Weibo Users Based on {KISCAP} Model}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1584--1588}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00229}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00229}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TseWWYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Tucker18, author = {Scot Tucker}, title = {Engineering Trust: {A} Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00011}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00011}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Tucker18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TufailZB18, author = {Hina Tufail and Kashif Zafar and Abdul Rauf Baig}, title = {Digital Watermarking for Relational Database Security Using mRMR Based Binary Bat Algorithm}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1948--1954}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00298}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00298}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TufailZB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/UphoffWWW18, author = {Maximilian Uphoff and Matth{\"{a}}us Wander and Torben Weis and Marian Waltereit}, title = {SecureCloud: An Encrypted, Scalable Storage for Cloud Forensics}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1934--1941}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00294}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00294}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/UphoffWWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/VempatiDT18, author = {Jagannadh Vempati and Ram Dantu and Mark A. Thompson}, title = {Uninterrupted Video Surveillance in the Face of an Attack}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {843--848}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00121}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00121}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/VempatiDT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/VerzelettiMW18, author = {Glaidson Menegazzo Verzeletti and Emerson Ribeiro de Mello and Michelle Silva Wangham}, title = {A National Mobile Identity Management Strategy for Electronic Government Services}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {668--673}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00098}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00098}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/VerzelettiMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/VolodinaARH18, author = {Ekaterina Volodina and Adnan Aziz and Erwin P. Rathgeb and Tobias Ho{\ss}feld}, title = {Application of Visual Analysis to Detect and Analyze Patterns in VoIP Attack Traffic}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {260--268}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00048}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00048}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/VolodinaARH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Wang18, author = {Zheng Wang}, title = {Understanding the Performance and Challenges of {DNS} Query Name Minimization}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1115--1120}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00155}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00155}, timestamp = {Tue, 11 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Wang18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangABGRVMBB18, author = {Yang Wang and Stephen C. Adams and Peter A. Beling and Steven Greenspan and Sridhar Rajagopalan and Maria C. Velez{-}Rojas and Serge Mankovski and Steven M. Boker and Donald E. Brown}, title = {Privacy Preserving Distributed Deep Learning and Its Application in Credit Card Fraud Detection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1070--1078}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00150}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00150}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangABGRVMBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangCYZM18, author = {Jiarong Wang and Lijun Cai and Aimin Yu and Min Zhu and Dan Meng}, title = {TempatMDS: {A} Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {360--371}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00061}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00061}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangCYZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangF18, author = {Boyang Wang and Xinxin Fan}, title = {Lightweight Verification for Searchable Encryption}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {932--937}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00132}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00132}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangJSWLQY18, author = {Qiwen Wang and Jianguo Jiang and Zhixin Shi and Wen Wang and Bin Lv and Biao Qi and Qilei Yin}, title = {A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {727--736}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00106}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00106}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangJSWLQY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangSN18, author = {Shuo Wang and Richard O. Sinnott and Surya Nepal}, title = {{PAIRS:} Privacy-Aware Identification and Recommendation of Spatio-Friends}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {920--931}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00131}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00131}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangSN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangSN18a, author = {Shuo Wang and Richard O. Sinnott and Surya Nepal}, title = {{P-GENT:} Privacy-Preserving Geocoding of Non-Geotagged Tweets}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {972--983}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00137}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00137}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangSN18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWCLWH18, author = {Meng Wang and Chase Q. Wu and Huiyan Cao and Yang Liu and Yongqiang Wang and Aiqin Hou}, title = {On MapReduce Scheduling in Hadoop Yarn on Heterogeneous Clusters}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1747--1754}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00264}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00264}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangWCLWH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWLC18, author = {Pengfei Wang and Fengyu Wang and Fengbo Lin and Zhenzhong Cao}, title = {Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {283--288}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00051}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00051}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangWLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWZL18, author = {Yubiao Wang and Junhao Wen and Wei Zhou and Fengji Luo}, title = {A Novel Dynamic Cloud Service Trust Evaluation Model in Cloud Computing}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {10--15}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00012}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00012}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangWZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WeiBX18, author = {Yang Wei and Xiu{-}Li Bi and Bin Xiao}, title = {{C2R} Net: The Coarse to Refined Network for Image Forgery Detection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1656--1659}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00245}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00245}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WeiBX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WeiDWH18, author = {Shuang Wei and Shuaifu Dai and Xinfeng Wu and Xinhui Han}, title = {{STDC:} {A} SDN-Oriented Two-Stage DDoS Detection and Defence System Based on Clustering}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {339--347}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00059}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00059}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WeiDWH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WijayaLSL18, author = {Dimaz Ankaa Wijaya and Joseph K. Liu and Ron Steinfeld and Dongxi Liu}, title = {Monero Ring Attack: Recreating Zero Mixin Transaction Effect}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1196--1201}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00165}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00165}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WijayaLSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuM18, author = {Tina Wu and Andrew Martin}, title = {Bluetooth Low Energy Used for Memory Acquisition from Smart Health Care Devices}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1256--1261}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00173}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00173}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuPYM18, author = {Zhijun Wu and Qingbo Pan and Meng Yue and Shaopu Ma}, title = {An Approach of Security Protection for {VSAT} Network}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1511--1516}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00214}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00214}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuPYM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuZGZH18, author = {Yangxin Wu and Peijia Zheng and Jianting Guo and Wei Zhang and Jiwu Huang}, title = {A Controllable Efficient Content Distribution Framework Based on Blockchain and {ISODATA}}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1698--1701}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00254}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00254}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuZGZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XieLH18, author = {Hui Xie and Kun Lv and Changzhen Hu}, title = {An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {307--315}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00054}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00054}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XieLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XieLH18a, author = {Huihui Xie and Kun Lv and Changzhen Hu}, title = {An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1777--1784}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00268}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00268}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XieLH18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiongHWZL18, author = {Anping Xiong and Yi Huang and Yunsong Wu and Jun Zhang and Linbo Long}, title = {An Adaptive Sliding Window Algorithm for Mining Frequent Itemsets in Computer Forensics}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1660--1663}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00246}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00246}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XiongHWZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuFLS18, author = {Jiaming Xu and Ao Fan and Minyi Lu and Weiwei Shan}, title = {Differential Power Analysis of 8-Bit Datapath {AES} for IoT Applications}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1470--1473}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00205}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00205}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XuFLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuJH18, author = {Weitao Xu and Sanjay Jha and Wen Hu}, title = {Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {231--236}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00044}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00044}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XuJH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuPJ18, author = {Runhua Xu and Balaji Palanisamy and James Joshi}, title = {QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for Edge Computing}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1097--1106}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00153}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00153}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XuPJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XueBWL18, author = {Mingfu Xue and Rongzhen Bian and Jian Wang and Weiqiang Liu}, title = {A Co-training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1452--1457}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00202}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00202}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XueBWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XueSLHS18, author = {Wanli Xue and Yiran Shen and Chengwen Luo and Wen Hu and Aruna Seneviratne}, title = {Acies: {A} Privacy-Preserving System for Edge-Based Classification}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {914--919}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00130}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00130}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XueSLHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YadavO18, author = {Gyan Singh Yadav and Aparajita Ojha}, title = {A Reversible Data Hiding Scheme with High Security and Improved Embedding Capacity}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1555--1559}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00223}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00223}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YadavO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanQRQ18, author = {Jinpei Yan and Yong Qi and Qifan Rao and Saiyu Qi}, title = {Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1170--1179}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00162}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00162}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YanQRQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanXQWYZC18, author = {Feipeng Yan and Ming Xu and Tong Qiao and Ting Wu and Xue Yang and Ning Zheng and Kim{-}Kwang Raymond Choo}, title = {Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1426--1432}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00198}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00198}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YanXQWYZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Yang0Y18, author = {Zhiju Yang and Rui Zhao and Chuan Yue}, title = {Effective Mobile Web User Fingerprinting via Motion Sensors}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1398--1405}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00194}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00194}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Yang0Y18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangCSJL18, author = {Chao Yang and Xinghe Chen and Tingting Song and Bin Jiang and Qin Liu}, title = {A Hybrid Recommendation Algorithm Based on Heuristic Similarity and Trust Measure}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1413--1418}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00196}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00196}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangCSJL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangCYM18, author = {Guang Yang and Lijun Cai and Aimin Yu and Dan Meng}, title = {A General and Expandable Insider Threat Detection System Using Baseline Anomaly Detection and Scenario-Driven Alarm Filters}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {763--773}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00110}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00110}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangCYM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangL18, author = {Jinfeng Yang and David J. Lilja}, title = {Reducing Relational Database Performance Bottlenecks Using 3D XPoint Storage Technology}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1804--1808}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00272}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00272}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangLW18, author = {Hongyang Yang and Xiao{-}Yang Liu and Qingwei Wu}, title = {A Practical Machine Learning Approach for Dynamic Stock Recommendation}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1693--1697}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00253}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00253}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangLY18, author = {Chaoqun Yang and Xiangyu Li and Shujuan Yin}, title = {Low-Cost Energy-Efficient Side-Channel Attacks Resistant {AES} S-Box with Power-Aware Hiding Inverter in {GF(24)}}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1526--1530}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00217}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00217}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangS18, author = {Yibing Yang and M. Omair Shafiq}, title = {Large Scale and Parallel Sentiment Analysis Based on Label Propagation in Twitter Data}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1791--1798}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00270}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00270}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YaoZYL18, author = {Yi Yao and Jun Zhou and Bo Yan and Yuqian Li}, title = {RNS-Based Embedding Scheme for Data Hiding in Digital Images}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1480--1483}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00207}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00207}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YaoZYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YooYK18, author = {HyunKyung Yoo and Jongchoul Yim and Sunme Kim}, title = {The Blockchain for Domain Based Static Sharding}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1689--1692}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00252}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00252}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YooYK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YousefiMZT18, author = {Mehdi Yousefi and Nhamo Mtetwa and Yan Zhang and Huaglory Tianfield}, title = {A Reinforcement Learning Approach for Attack Graph Analysis}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {212--217}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00041}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00041}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YousefiMZT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuSMHX18, author = {Zijun Yu and Chun Shan and Limin Mao and Changzhen Hu and Wenjie Xiong}, title = {Software System Representation Methods Based on Algebraic Component}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1008--1013}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00142}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00142}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YuSMHX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuZWXSW18, author = {Liting Yu and Dongrong Zhang and Liang Wu and Shuguo Xie and Donglin Su and Xiaoxiao Wang}, title = {{AES} Design Improvements Towards Information Security Considering Scan Attack}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {322--326}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00056}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00056}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YuZWXSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YusufHK18, author = {Simon Yusuf Enoch and Jin B. Hong and Dong Seong Kim}, title = {Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {588--595}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00089}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00089}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YusufHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZeidlerA18, author = {Clemens Zeidler and Muhammad Rizwan Asghar}, title = {AuthStore: Password-Based Authentication and Encrypted Data Storage in Untrusted Environments}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {996--1001}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00140}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00140}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZeidlerA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangBBL18, author = {Menghao Zhang and Jun Bi and Jiasong Bai and Guanyu Li}, title = {FloodShield: Securing the {SDN} Infrastructure Against Denial-of-Service Attacks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {687--698}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00101}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00101}, timestamp = {Mon, 11 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangBBL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLZZG18, author = {Wei Zhang and Dongdai Lin and Hailong Zhang and Xiaojun Zhou and Yiwen Gao}, title = {A Lightweight FourQ Primitive on {ARM} Cortex-M0}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {699--704}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00102}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00102}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLZZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLZZGC18, author = {Wei Zhang and Dongdai Lin and Hailong Zhang and Xiaojun Zhou and Yiwen Gao and Cong Chen}, title = {A Lightweight Multi-precision Squaring on Embedded Processors for {ECC}}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1014--1019}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00143}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00143}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLZZGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangYWCW18, author = {Chunkai Zhang and Ao Yin and Yulin Wu and Yingyang Chen and Xuan Wang}, title = {Fast Time Series Discords Detection with Privacy Preserving}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1129--1139}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00157}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00157}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangYWCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoZLC18, author = {Xiaolin Zhao and Yiman Zhang and Xuhui Li and Quanbao Chen}, title = {Research on Malicious Code Homology Analysis Method Based on Texture Fingerprint Clustering}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1914--1921}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00291}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00291}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoZLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zheng0SXCH18, author = {Yu Zheng and Yongxin Zhu and Shijin Song and Peng Xiong and Zihao Cao and Junjie Hou}, title = {Improved Weighted Label Propagation Algorithm in Social Network Computing}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1799--1803}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00271}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00271}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Zheng0SXCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengWHLHL18, author = {Huangjie Zheng and Yuchen Wang and Chen Han and Fangjie Le and Ruan He and Jialiang Lu}, title = {Learning and Applying Ontology for Machine Learning in Cyber Attack Detection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1309--1315}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00180}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00180}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengWHLHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouLFSC18, author = {Haotian Zhou and Xiao{-}Yang Liu and Cai Fu and Chen Shang and Xinyi Chang}, title = {Differentially Private Matrix Completion via Distributed Matrix Factorization}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1628--1631}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00239}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00239}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouLFSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouT18, author = {Jie Zhou and Min Tian}, title = {An Elite Clone Parallel Genetic Algorithm for Trust Monitoring Assignment Problem in Adaptive Wireless Sensor Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {197--203}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00039}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00039}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouWJT18, author = {Changli Zhou and Tian Wang and Wenxian Jiang and Hui Tian}, title = {Practical {K} Nearest Neighbor Query Scheme with Two-Party Guarantees in Road Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1316--1321}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00181}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00181}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouWJT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuYRZD18, author = {Xulyu Zhu and Zheng Yan and Jianfei Ruan and Qinghua Zheng and Bo Dong}, title = {{IRTED-TL:} An Inter-Region Tax Evasion Detection Method Based on Transfer Learning}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1224--1235}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00169}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00169}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuYRZD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZrelliE18, author = {Amira Zrelli and Tahar Ezzedine}, title = {Monitoring of Temperature and Pressure Through Brillouin Optical Sensors for Disasters Systems}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1517--1520}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00215}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00215}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZrelliE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustcom/2018, title = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8454845/proceeding}, isbn = {978-1-5386-4388-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0004ZL17, author = {Di Wu and Yu Zhang and Yinlong Liu}, title = {Dummy Location Selection Scheme for K-Anonymity in Location Based Services}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {441--448}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.269}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.269}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/0004ZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0029BK17, author = {Li Li and Tegawend{\'{e}} F. Bissyand{\'{e}} and Jacques Klein}, title = {SimiDroid: Identifying and Explaining Similarities in Android Apps}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {136--143}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.230}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.230}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/0029BK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AhadipourS17, author = {Ava Ahadipour and Martin Schanzenbach}, title = {A Survey on Authorization in Distributed Systems: Information Storage, Data Retrieval and Trust Evaluation}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1016--1023}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.346}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.346}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AhadipourS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AhmedSFA17, author = {Nadeem Ahmed and Adeel Sadiq and Anum Farooq and Rabia Akram}, title = {Securing the Neighbour Discovery Protocol in IPv6 State-ful Address Auto-Configuration}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {96--103}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.225}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.225}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AhmedSFA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Al-ZobbiSR17, author = {Mohammed Al{-}Zobbi and Seyed A. Shahrestani and Chun Ruan}, title = {Implementing {A} Framework for Big Data Anonymity and Analytics Access Control}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {873--880}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.325}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.325}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Al-ZobbiSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AldebeiFJNH17, author = {Khaled Aldebei and Helia Farhood and Wenjing Jia and Priyadarsi Nanda and Xiangjian He}, title = {Sequential and Unsupervised Document Authorial Clustering Based on Hidden Markov Model}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {379--385}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.261}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.261}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AldebeiFJNH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlexopoulosDMH17, author = {Nikolaos Alexopoulos and J{\"{o}}rg Daubert and Max M{\"{u}}hlh{\"{a}}user and Sheikh Mahbub Habib}, title = {Beyond the Hype: On Using Blockchains in Trust Management for Authentication}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {546--553}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.283}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.283}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AlexopoulosDMH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AnkeleS17, author = {Robin Ankele and Andrew Simpson}, title = {On the Performance of a Trustworthy Remote Entity in Comparison to Secure Multi-party Computation}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1115--1122}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.361}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.361}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AnkeleS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ArfaouiSW17, author = {Ghada Arfaoui and Jos{\'{e}} Manuel S{\'{a}}nchez{-}V{\'{\i}}lchez and Jean{-}Philippe Wary}, title = {Security and Resilience in 5G: Current Challenges and Future Directions}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1010--1015}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.345}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.345}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ArfaouiSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BewongL0LC17, author = {Michael Bewong and Jixue Liu and Lin Liu and Jiuyong Li and Kim{-}Kwang Raymond Choo}, title = {A Relative Privacy Model for Effective Privacy Preservation in Transactional Data}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {394--401}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.263}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.263}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BewongL0LC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BhandariHLZRG17, author = {Shweta Bhandari and Fr{\'{e}}d{\'{e}}ric Herbreteau and Vijay Laxmi and Akka Zemmari and Partha S. Roop and Manoj Singh Gaur}, title = {SneakLeak: Detecting Multipartite Leakage Paths in Android Apps}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {285--292}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.249}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.249}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BhandariHLZRG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BradburyJ17, author = {Matthew Bradbury and Arshad Jhumka}, title = {A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {409--416}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.265}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.265}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BradburyJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenQZNX17, author = {Weiwen Chen and Keni Qiu and Jiqin Zhou and Yuanhui Ni and Yuanchao Xu}, title = {Queuing Theory-Guided Performance Evaluation for a Reconfigurable High-Speed Device Interconnected Bus}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {839--843}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.320}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.320}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenQZNX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengHCHK17, author = {Long Cheng and Kai Huang and Gang Chen and Biao Hu and Alois C. Knoll}, title = {Mixed-Criticality Control System with Performance and Robustness Guarantees}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {767--775}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.311}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.311}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChengHCHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengZHCK17, author = {Long Cheng and Zhihao Zhao and Kai Huang and Gang Chen and Alois C. Knoll}, title = {McFTP: {A} Framework to Explore and Prototype Multi-core Thermal Managements on Real Processors}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {806--814}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.316}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.316}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChengZHCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Cho17, author = {Hyuntae Cho}, title = {Design and Implementation of a Lightweight Smart Insole for Gait Analysis}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {792--797}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.314}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.314}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Cho17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DierckensHLP17, author = {Karl E. Dierckens and Adrian B. Harrison and Carson K. Leung and Adrienne V. Pind}, title = {A Data Science and Engineering Solution for Fast K-Means Clustering of Big Data}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {925--932}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.332}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.332}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DierckensHLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DingL17, author = {Jinnan Ding and Shuguo Li}, title = {A Reconfigurable High-Speed {ECC} Processor Over {NIST} Primes}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1064--1069}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.353}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.353}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DingL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DingWXZ17, author = {Shan Ding and Jinhui Wu and Guoqi Xie and Gang Zeng}, title = {A Hybrid Heuristic-Genetic Algorithm with Adaptive Parameters for Static Task Scheduling in Heterogeneous Computing System}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {761--766}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.310}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.310}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DingWXZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FarahbakhshMHCC17, author = {Reza Farahbakhsh and Samin Mohammadi and Xiao Han and {\'{A}}ngel Cuevas and No{\"{e}}l Crespi}, title = {Evolution of Publicly Disclosed Information in Facebook Profiles}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.214}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.214}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FarahbakhshMHCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FengL17, author = {Xiang Feng and Shuguo Li}, title = {A High-Speed and SPA-Resistant Implementation of {ECC} Point Multiplication Over GF(p)}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {255--260}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.245}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.245}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FengL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FleurbaaijSL17, author = {Dominique Fleurbaaij and Mark Scanlon and Nhien{-}An Le{-}Khac}, title = {Privileged Data Within Digital Evidence}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {737--744}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.307}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.307}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FleurbaaijSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FloresJ17, author = {Denys A. Flores and Arshad Jhumka}, title = {Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {675--682}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.299}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.299}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FloresJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ForuhandehG17, author = {Mahsa Foruhandeh and Ryan M. Gerdes}, title = {Analysis of Authentication Parameters in Uplink Scenario of Heterogeneous Networks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {833--838}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.319}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.319}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ForuhandehG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FukushimaXKH17, author = {Kazuhide Fukushima and Rui Xu and Shinsaku Kiyomoto and Naofumi Homma}, title = {Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1032--1037}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.348}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.348}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FukushimaXKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GamachchiB17, author = {Anagi Gamachchi and Serdar Boztas}, title = {Insider Threat Detection Through Attributed Graph Clustering}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {112--119}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.227}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.227}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GamachchiB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaraeKKSWA17, author = {Jeffery Garae and Ryan K. L. Ko and Janice Kho and Saidah Suwadi and Mark A. Will and Mark D. Apperley}, title = {Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1123--1130}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.362}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.362}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GaraeKKSWA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GeHAK17, author = {Mengmeng Ge and Jin B. Hong and Hani Alzaid and Dong Seong Kim}, title = {Security Modeling and Analysis of Cross-Protocol IoT Devices}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1043--1048}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.350}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.350}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GeHAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Given-WilsonJLL17, author = {Thomas Given{-}Wilson and Nisrine Jafri and Jean{-}Louis Lanet and Axel Legay}, title = {An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on {PRESENT}}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {293--300}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.250}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.250}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Given-WilsonJLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GongQCNXY17, author = {Zhiyao Gong and Keni Qiu and Weiwen Chen and Yuanhui Ni and Yuanchao Xu and Jianlei Yang}, title = {Pipeline Optimizations of Architecting {STT-RAM} as Registers in Rad-Hard Environment}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {844--852}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.321}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.321}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GongQCNXY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Gonzalez-LopezC17, author = {Jorge Gonzalez{-}Lopez and Alberto Cano and Sebasti{\'{a}}n Ventura}, title = {Large-Scale Multi-label Ensemble Learning on Spark}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {893--900}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.328}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.328}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Gonzalez-LopezC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GriningKS17, author = {Krzysztof Grining and Marek Klonowski and Malgorzata Sulkowska}, title = {How to Cooperate Locally to Improve Global Privacy in Social Networks? On Amplification of Privacy Preserving Data Aggregation}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {464--471}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.272}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.272}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GriningKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GurulianSFMAM17, author = {Iakovos Gurulian and Carlton Shepherd and Eibe Frank and Konstantinos Markantonakis and Raja Naeem Akram and Keith Mayes}, title = {On the Effectiveness of Ambient Sensing for Detecting {NFC} Relay Attacks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {41--49}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.218}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.218}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GurulianSFMAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GwakSKL17, author = {Bumjin Gwak and Heesuk Son and Jiyoon Kang and Dongman Lee}, title = {IoT Trust Estimation in an Unknown Place Using the Opinions of I-Sharing Friends}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {602--609}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.290}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.290}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GwakSKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HamdiGBY17, author = {Sana Hamdi and Alda Lopes Gan{\c{c}}arski and Amel Bouzeghoub and Sadok Ben Yahia}, title = {A New Fuzzy Clustering Approach for Reputation Management in OSNs}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {586--593}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.288}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.288}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HamdiGBY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanHJSF17, author = {Lansheng Han and Shuxia Han and Wenjing Jia and Changhua Sun and Cai Fu}, title = {Malware Discrimination Based on Reversed Association Task}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {120--127}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.228}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.228}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HanHJSF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HenzeWMZW17, author = {Martin Henze and Benedikt Wolters and Roman Matzutt and Torsten Zimmermann and Klaus Wehrle}, title = {Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {185--192}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.236}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.236}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HenzeWMZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HoangD17, author = {Doan Hoang and Thanh Dat Dang}, title = {{FBRC:} Optimization of task Scheduling in Fog-Based Region and Cloud}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1109--1114}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.360}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.360}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HoangD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Horsch0W17, author = {Julian Horsch and Manuel Huber and Sascha Wessel}, title = {TransCrypt: Transparent Main Memory Encryption Using a Minimal {ARM} Hypervisor}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {152--161}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.232}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.232}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Horsch0W17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuMSSCL17, author = {Chen Hu and Jiaxin Miao and Zhuo Su and Xiaohong Shi and Qiang Chen and Xiaonan Luo}, title = {Precision-Enhanced Image Attribute Prediction Model}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {866--872}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.324}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.324}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuMSSCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ImineLB17, author = {Youcef Imine and Ahmed Lounis and Abdelmadjid Bouabdallah}, title = {Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {33--40}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.217}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.217}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ImineLB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/IshibashiYY17, author = {Kota Ishibashi and Myungryun Yoo and Takanori Yokoyama}, title = {A Real-Time Operating System with CAN-Based Inter-Node Shared Resource Management and Distributed Shared Memory}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {798--805}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.315}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.315}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/IshibashiYY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JacobsCKL17, author = {Daniel Jacobs and Kim{-}Kwang Raymond Choo and M. Tahar Kechadi and Nhien{-}An Le{-}Khac}, title = {Volkswagen Car Entertainment System Forensics}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {699--705}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.302}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.302}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JacobsCKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Jahan0SSJ17, author = {Mosarrat Jahan and Partha Sarathi Roy and Kouichi Sakurai and Aruna Seneviratne and Sanjay Jha}, title = {Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {201--209}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.238}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.238}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Jahan0SSJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JainBLGM17, author = {Vineeta Jain and Shweta Bhandari and Vijay Laxmi and Manoj Singh Gaur and Mohamed Mosbah}, title = {SniffDroid: Detection of Inter-App Privacy Leaks in Android}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {331--338}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.255}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.255}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JainBLGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JavedTC17, author = {Ibrahim Tariq Javed and Khalifa Toumi and No{\"{e}}l Crespi}, title = {ProtectCall: Call Protection Based on User Reputation}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {660--667}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.297}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.297}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JavedTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiC17, author = {Shiyu Ji and Tingting Chen}, title = {On Designing Collusion-Resistant Incentive Mechanisms for Mobile Crowdsensing Systems}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {162--169}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.233}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.233}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JiC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangLZZ17, author = {Liying Jiang and Jiafeng Li and Li Zhuo and Ziqi Zhu}, title = {Robust Vehicle Classification Based on the Combination of Deep Features and Handcrafted Features}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {859--865}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.323}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.323}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JiangLZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JinVT17, author = {Fan Jin and Vijay Varadharajan and Udaya Kiran Tupakula}, title = {An Eclat Algorithm Based Energy Detection for Cognitive Radio Networks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1096--1102}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.358}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.358}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JinVT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KarapetyanAA17, author = {Areg Karapetyan and Syafiq Kamarul Azman and Zeyar Aung}, title = {Assessing the Privacy Cost in Centralized Event-Based Demand Response for Microgrids}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {494--501}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.276}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.276}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KarapetyanAA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KulykRGVVM17, author = {Oksana Kulyk and Benjamin Maximilian Reinheimer and Paul Gerber and Florian Volk and Melanie Volkamer and Max M{\"{u}}hlh{\"{a}}user}, title = {Advancing Trust Visualisations for Wider Applicability and User Acceptance}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {562--569}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.285}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.285}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KulykRGVVM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LeemaqzLM17, author = {Kaleb L. Leemaqz and Sharon X. Lee and Geoffrey J. McLachlan}, title = {Corruption-Resistant Privacy Preserving Distributed {EM} Algorithm for Model-Based Clustering}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1082--1089}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.356}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.356}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LeemaqzLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LengZ17, author = {Lihua Leng and Jeffery Zheng}, title = {Mapping {ECG} Signal Sequences on Variant Maps}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {881--884}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.326}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.326}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LengZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LenzA17, author = {Thomas Lenz and Lukas Alber}, title = {Towards Cross-Domain eID by Using Agile Mobile Authentication}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {570--577}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.286}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.286}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LenzA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiCHZZX17, author = {Jin Li and Jinfu Chen and Minhuan Huang and Minmin Zhou and Lin Zhang and Wanggen Xie}, title = {An Integration Testing Platform for Software Vulnerability Detection Method}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {984--989}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.341}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.341}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiCHZZX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiJWYZ17, author = {Ye Li and Zoe Lin Jiang and Xuan Wang and Siu{-}Ming Yiu and Peng Zhang}, title = {Outsourcing Privacy Preserving {ID3} Decision Tree Algorithm over Encrypted Data-sets for Two-Parties}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1070--1075}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.354}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.354}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiJWYZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLYLWL17, author = {Min Li and Yunzheng Liu and Min Yu and Gang Li and Yongjian Wang and Chao Liu}, title = {{FEPDF:} {A} Robust Feature Extractor for Malicious {PDF} Detection}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {218--224}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.240}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.240}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiLYLWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiMWZZZ17, author = {Zengpeng Li and Chunguang Ma and Ding Wang and Minghao Zhao and Qian Zhao and Lu Zhou}, title = {Toward Proxy Re-encryption From Learning with Errors in the Exponent}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {683--690}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.300}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.300}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiMWZZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiTJNHH17, author = {Qingru Li and Zhiyuan Tan and Aruna Jamdagni and Priyadarsi Nanda and Xiangjian He and Wei Han}, title = {An Intrusion Detection System Based on Polynomial Feature Correlation Analysis}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {978--983}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.340}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.340}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiTJNHH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZ17, author = {Ming Li and Qin Zhou}, title = {Industrial Big Data Visualization: {A} Case Study Using Flight Data Recordings to Discover the Factors Affecting the Airplane Fuel Efficiency}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {853--858}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.322}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.322}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLZXCP17, author = {Jingkun Liu and Shuhao Li and Yongzheng Zhang and Jun Xiao and Peng Chang and Chengwei Peng}, title = {Detecting {DNS} Tunnel through Binary-Classification Based on Behavior Features}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {339--346}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.256}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.256}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLZXCP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuZY17, author = {Yao Liu and Qingkai Zeng and Pinghai Yuan}, title = {NodeLeaper: Lower Overhead Oblivious {AVL} Tree}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {487--493}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.275}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.275}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuZYPPR17, author = {Meng Liu and Xuyun Zhang and Chi Yang and Shaoning Pang and Deepak Puthal and Kaijun Ren}, title = {Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {502--509}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.277}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.277}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuZYPPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuQZLZL17, author = {Qian Lu and Haipeng Qu and Yuan Zhuang and Xi Jun Lin and Yanyong Zhu and Yunzheng Liu}, title = {A Passive Client-based Approach to Detect Evil Twin Attacks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {233--239}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.242}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.242}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LuQZLZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoWL17, author = {Entao Luo and Guojun Wang and Qin Liu}, title = {Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {58--64}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.220}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.220}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LuoWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoZS017, author = {Changqing Luo and Kaijin Zhang and Sergio Salinas and Pan Li}, title = {Efficient Privacy-Preserving Outsourcing of Large-Scale {QR} Factorization}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {917--924}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.331}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.331}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuoZS017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LyuLJP17, author = {Lingjuan Lyu and Yee Wei Law and Jiong Jin and Marimuthu Palaniswami}, title = {Privacy-Preserving Aggregation of Smart Metering via Transformation and Encryption}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {472--479}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.273}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.273}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LyuLJP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaXLYLY17, author = {Rong Ma and Jinbo Xiong and Mingwei Lin and Zhiqiang Yao and Hui Lin and Ayong Ye}, title = {Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {990--995}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.342}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.342}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaXLYLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MahajanP17, author = {Varun Mahajan and Sateesh K. Peddoju}, title = {Deployment of Intrusion Detection System in Cloud: {A} Performance-Based Study}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1103--1108}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.359}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.359}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MahajanP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MahriSBDW17, author = {Hassan Qahur Al Mahri and Leonie Simpson and Harry Bartlett and Ed Dawson and Kenneth Koon{-}Ho Wong}, title = {A Fault-based Attack on {AEZ} v4.2}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {634--641}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.294}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.294}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MahriSBDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MarraMMS17, author = {Antonio La Marra and Fabio Martinelli and Paolo Mori and Andrea Saracino}, title = {Implementing Usage Control in Internet of Things: {A} Smart Home Use Case}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1056--1063}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.352}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.352}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MarraMMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaurerNF17, author = {Felix Konstantin Maurer and Till Neudecker and Martin Florian}, title = {Anonymous CoinJoin Transactions with Arbitrary Values}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {522--529}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.280}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.280}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaurerNF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/McDonaldMGAG17, author = {Jeffrey Todd McDonald and Ramya Manikyam and William Bradley Glisson and Todd R. Andel and Yuan Xiang Gu}, title = {Enhanced Operating System Protection to Support Digital Forensic Investigations}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {650--659}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.296}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.296}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/McDonaldMGAG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MedjekTRD17, author = {Faiza Medjek and Djamel Tandjaoui and Imed Romdhani and Nabil Djedjig}, title = {Performance Evaluation of {RPL} Protocol under Mobile Sybil Attacks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1049--1055}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.351}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.351}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MedjekTRD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MeerCKL17, author = {Wybren van der Meer and Kim{-}Kwang Raymond Choo and M. Tahar Kechadi and Nhien{-}An Le{-}Khac}, title = {Investigation and Automating Extraction of Thumbnails Produced by Image Viewers}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1076--1081}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.355}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.355}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MeerCKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MessaiS17, author = {Mohamed{-}Lamine Messai and Hamida Seba}, title = {A Self-healing Key Pre-distribution Scheme for Multi-phase Wireless Sensor Networks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {144--151}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.231}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.231}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MessaiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MimotoKTM17, author = {Tomoaki Mimoto and Shinsaku Kiyomoto and Katsuya Tanaka and Atsuko Miyaji}, title = {(p, N)-identifiability: Anonymity under Practical Adversaries}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {996--1003}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.343}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.343}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MimotoKTM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MiquiliniRQMB17, author = {Patricia Miquilini and Rafael Geraldeli Rossi and Marcos G. Quiles and Vin{\'{\i}}cius Veloso de Melo and M{\'{a}}rcio P. Basgalupp}, title = {Automatically Design Distance Functions for Graph-Based Semi-Supervised Learning}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {933--940}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.333}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.333}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MiquiliniRQMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MoL17, author = {Yifeng Mo and Shuguo Li}, title = {Base Extent Optimization for {RNS} Montgomery Algorithm}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1004--1009}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.344}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.344}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MoL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ModiLNG17, author = {Garima Modi and Vijay Laxmi and Smita Naval and Manoj Singh Gaur}, title = {Improving Leakage Path Coverage in Android Apps}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {355--362}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.258}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.258}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ModiLNG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MrabetSS17, author = {Manel Mrabet and Yosra Ben Saied and Le{\"{\i}}la Azouz Sa{\"{\i}}dane}, title = {Feedback Entropy: {A} New Metric to Detect Unfair Rating Attacks for Trust Computing in Cloud Environments}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {538--545}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.282}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.282}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MrabetSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NS17, author = {N. Karthik and Ananthanarayana V. S.}, title = {Sensor Data Modeling for Data Trustworthiness}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {909--916}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.330}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.330}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NandaNHJP17, author = {Ashish Nanda and Priyadarsi Nanda and Xiangjian He and Aruna Jamdagni and Deepak Puthal}, title = {Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {269--276}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.247}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.247}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NandaNHJP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NguyenH17, author = {Th{\^{o}}ng T. Nguy{\^{e}}n and Siu Cheung Hui}, title = {Privacy-Preserving Mechanisms for Parametric Survival Analysis with Weibull Distribution}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {456--463}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.271}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.271}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NguyenH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NietoRL17, author = {Ana Nieto and Ruben Rios and Javier L{\'{o}}pez}, title = {A Methodology for Privacy-Aware IoT-Forensics}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {626--633}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.293}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.293}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NietoRL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NietoRL17a, author = {Ana Nieto and Ruben Rios and Javier L{\'{o}}pez}, title = {Digital Witness and Privacy in IoT: Anonymous Witnessing Approach}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {642--649}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.295}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.295}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NietoRL17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NomaguchiMS17, author = {Hiroshi Nomaguchi and Atsuko Miyaji and Chunhua Su}, title = {Evaluation and Improvement of Pseudo-Random Number Generator for {EPC} Gen2}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {721--728}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.305}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.305}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NomaguchiMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PanCT17, author = {Wubin Pan and Guang Cheng and Yongning Tang}, title = {{WENC:} {HTTPS} Encrypted Traffic Classification Using Weighted Ensemble Learning and Markov Chain}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {50--57}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.219}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.219}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PanCT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PengY0LX17, author = {Chengwei Peng and Xiaochun Yun and Yongzheng Zhang and Shuhao Li and Jun Xiao}, title = {Discovering Malicious Domains through Alias-Canonical Graph}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {225--232}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.241}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.241}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PengY0LX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiangXSZJ17, author = {Weizhong Qiang and Gongping Xu and Guozhong Sun and Tianqing Zhu and Hai Jin}, title = {CloudController: {A} Writable and Heterogeneous-Adaptive Virtual Machine Introspection for Cloud Management}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {177--184}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.235}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.235}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QiangXSZJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiuSLLW17, author = {Yuqin Qiu and Qingni Shen and Yang Luo and Cong Li and Zhonghai Wu}, title = {A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {347--354}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.257}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.257}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QiuSLLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RafiqueLRJ17, author = {Ansar Rafique and Dimitri Van Landuyt and Vincent Reniers and Wouter Joosen}, title = {Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant SaaS}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {885--892}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.327}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.327}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RafiqueLRJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RaniKH17, author = {Sapana Rani and Dileep Kumar Koshley and Raju Halder}, title = {Adapting MapReduce for Efficient Watermarking of Large Relational Dataset}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {729--736}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.306}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.306}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RaniKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RathnayakaJ17, author = {Chathuranga Rathnayaka and Aruna Jamdagni}, title = {An Efficient Approach for Advanced Malware Analysis Using Memory Forensic Technique}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1145--1150}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.365}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.365}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RathnayakaJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RayR17, author = {Indranil Ghosh Ray and Muttukrishnan Rajarajan}, title = {A Public Key Encryption Scheme for String Identification}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {104--111}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.226}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.226}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RayR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RezaeibaghaM17, author = {Fatemeh Rezaeibagha and Yi Mu}, title = {Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved {EHR} Systems}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {386--393}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.262}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.262}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RezaeibaghaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RoohiT17, author = {Leyla Roohi and Vanessa Teague}, title = {Privacy-Preserving Queries over Secret-Shared Graph-Structured Data}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {955--960}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.336}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.336}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RoohiT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RoselinNN17, author = {Annie Gilda Roselin and Priyadarsi Nanda and Surya Nepal}, title = {Lightweight Authentication Protocol {(LAUP)} for 6LoWPAN Wireless Sensor Networks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {371--378}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.260}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.260}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RoselinNN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SalamSBDPW17, author = {Md. Iftekhar Salam and Leonie Simpson and Harry Bartlett and Ed Dawson and Josef Pieprzyk and Kenneth Koon{-}Ho Wong}, title = {Investigating Cube Attacks on the Authenticated Encryption Stream Cipher {MORUS}}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {961--966}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.337}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.337}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SalamSBDPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SantraPB017, author = {Monika Santra and Sateesh K. Peddoju and A. K. Bhattacharjee and Arindam Khan}, title = {Design and Analysis of a Modified Remote Attestation Protocol}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {578--585}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.287}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.287}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SantraPB017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SchutteKT17, author = {Julian Sch{\"{u}}tte and Alexander K{\"{u}}chler and Dennis Titze}, title = {Practical Application-Level Dynamic Taint Analysis of Android Apps}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {17--24}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.215}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.215}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SchutteKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShalaWTLGS17, author = {Besfort Shala and Patrick Wacht and Ulrich Trick and Armin Lehmann and Bogdan V. Ghita and Stavros Shiaeles}, title = {Trust Integration for Security Optimisation in P2P-Based {M2M} Applications}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {949--954}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.335}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.335}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShalaWTLGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShaoL17, author = {Cuiping Shao and Huiyun Li}, title = {Detection of Single Event Transients Based on Compressed Sensing}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {83--88}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.223}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.223}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShaoL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShawA17, author = {Adrian L. Shaw and Hamza Attak}, title = {Exploring Granular flow Integrity for Interconnected Trusted Platforms}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {594--601}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.289}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.289}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShawA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShuteKC17, author = {Sam Shute and Ryan K. L. Ko and Sivadon Chaisiri}, title = {Attribution Using Keyboard Row Based Behavioural Biometrics for Handedness Recognition}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1131--1138}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.363}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.363}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShuteKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Smith-CreaseyR17, author = {Max Smith{-}Creasey and Muttukrishnan Rajarajan}, title = {Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication Using Sensor Trust}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {554--561}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.284}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.284}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Smith-CreaseyR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SousaLB17, author = {Arua De M. Sousa and Ana Carolina Lorena and M{\'{a}}rcio P. Basgalupp}, title = {{GEEK:} Grammatical Evolution for Automatically Evolving Kernel Functions}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {941--948}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.334}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.334}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SousaLB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunX17, author = {Da{-}Zhi Sun and Guangquan Xu}, title = {One-Round Provably Secure Yoking-Proof for {RFID} Applications}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {315--322}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.253}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.253}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SunX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunYSW17, author = {Degang Sun and Kun Yang and Zhixin Shi and Yan Wang}, title = {A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {65--72}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.221}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.221}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SunYSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TahirRR17, author = {Shahzaib Tahir and Sushmita Ruj and Muttukrishnan Rajarajan}, title = {An Efficient Disjunctive Query Enabled Ranked Searchable Encryption Scheme}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {425--432}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.267}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.267}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TahirRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TangHG17, author = {Haina Tang and Chunjing Han and Jingguo Ge}, title = {Applications of Visualization Technology for Network Security}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1038--1042}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.349}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.349}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TangHG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TangKWXGCFLW17, author = {Zhanyong Tang and Kaiyuan Kuang and Lei Wang and Chao Xue and Xiaoqing Gong and Xiaojiang Chen and Dingyi Fang and Jie Liu and Zheng Wang}, title = {{SEEAD:} {A} Semantic-Based Approach for Automatic Binary Code De-obfuscation}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {261--268}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.246}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.246}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TangKWXGCFLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TangLHZG17, author = {Junwei Tang and Ruixuan Li and Hongmu Han and Heng Zhang and Xiwu Gu}, title = {Detecting Permission Over-claim of Android Applications with Static and Semantic Analysis Approach}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {706--713}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.303}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.303}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TangLHZG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ThaoYMUSK17, author = {Tran Phuong Thao and Akira Yamada and Kosuke Murakami and Jumpei Urakawa and Yukiko Sawaya and Ayumu Kubota}, title = {Classification of Landing and Distribution Domains Using Whois' Text Mining}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.213}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.213}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ThaoYMUSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TithiWG17, author = {Tasnuva Tithi and Chris Winstead and Ryan M. Gerdes}, title = {Viability of Using Shadows Cast by Vehicles for Position Verification in Vehicle Platooning}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {210--217}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.239}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.239}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TithiWG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TitzeLS17, author = {Dennis Titze and Michael Lux and Julian Sch{\"{u}}tte}, title = {Ordol: Obfuscation-Resilient Detection of Libraries in Android Applications}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {618--625}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.292}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.292}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TitzeLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Touati17, author = {Lyes Touati}, title = {Grouping-Proofs Based Access Control Using {KP-ABE} for IoT Applications}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {301--308}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.251}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.251}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Touati17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TouatiC17, author = {Lyes Touati and Yacine Challal}, title = {Mediator-Based Immediate Attribute Revocation Mechanism for {CP-ABE} in Multicast Group Communications}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {309--314}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.252}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.252}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TouatiC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TrigueroFMGJ17, author = {Isaac Triguero and Grazziela P. Figueredo and Mohammad Mesgarpour and Jonathan M. Garibaldi and Robert I. John}, title = {Vehicle Incident Hot Spots Identification: An Approach for Big Data}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {901--908}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.329}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.329}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TrigueroFMGJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/UmairNH17, author = {Amber Umair and Priyadarsi Nanda and Xiangjian He}, title = {Online Social Network Information Forensics: {A} Survey on Use of Various Tools and Determining How Cautious Facebook Users are?}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1139--1144}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.364}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.364}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/UmairNH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangCWW17, author = {Lei Wang and Shoufeng Cao and Lin Wan and Fengyu Wang}, title = {Web Anomaly Detection Based on Frequent Closed Episode Rules}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {967--972}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.338}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.338}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangCWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZ17, author = {Xin Wang and Wei Zhang}, title = {{GPU} Register Packing: Dynamically Exploiting Narrow-Width Operands to Improve Performance}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {745--752}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.308}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.308}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZ17a, author = {Xin Wang and Wei Zhang}, title = {A Sample-Based Dynamic {CPU} and {GPU} {LLC} Bypassing Method for Heterogeneous {CPU-GPU} Architectures}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {753--760}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.309}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.309}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangZ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZLZD17, author = {Taochun Wang and Ji Zhang and Yonglong Luo and Kaizhong Zuo and Xintao Ding}, title = {An Efficient and Secure Itinerary-Based Data Aggregation Algorithm for WSNs}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {433--440}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.268}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.268}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangZLZD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WeidlerBMAWCKWW17, author = {Nathanael R. Weidler and Dane Brown and Samuel A. Mitchell and Joel Anderson and Jonathan R. Williams and Austin Costley and Chase Kunz and Christopher Wilkinson and Remy Wehbe and Ryan M. Gerdes}, title = {Return-Oriented Programming on a Cortex-M Processor}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {823--832}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.318}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.318}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WeidlerBMAWCKWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WillK17, author = {Mark A. Will and Ryan K. L. Ko}, title = {Secure {FPGA} as a Service - Towards Secure Data Processing by Physicalizing the Cloud}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {449--455}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.270}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.270}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WillK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WillKS17, author = {Mark A. Will and Ryan K. L. Ko and Silvino J. Schlickmann}, title = {Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1024--1031}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.347}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.347}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WillKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaZZ0LH17, author = {Haiying Xia and Wenxian Zhao and Zheng Zhou and Frank Jiang and Hai{-}Sheng Li and Xiangjian He}, title = {Deformable Template Matching Using Proposal-Based Best-Buddies Similarity}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {517--521}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.279}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.279}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XiaZZ0LH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiangLLZLRL17, author = {Chaoneng Xiang and Duo Liu and Shiming Li and Xiao Zhu and Yang Li and Jinting Ren and Liang Liang}, title = {HiNextApp: {A} Context-Aware and Adaptive Framework for App Prediction in Mobile Systems}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {776--783}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.312}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.312}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XiangLLZLRL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XingWWTL17, author = {Qianqian Xing and Baosheng Wang and Xiaofeng Wang and Jing Tao and Liu Liu}, title = {A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {89--95}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.224}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.224}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XingWWTL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuY0SC17, author = {Jian Xu and Xiaochun Yun and Yongzheng Zhang and Yafei Sang and Zhenyu Cheng}, title = {NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {691--698}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.301}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.301}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XuY0SC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YalewMHC17, author = {Sileshi Demesie Yalew and Gerald Q. Maguire Jr. and Seif Haridi and Miguel Correia}, title = {T2Droid: {A} TrustZone-Based Dynamic Analyser for Android Applications}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {240--247}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.243}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.243}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YalewMHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YamamotoHIOTA17, author = {Takuro Yamamoto and Takuma Hara and Takuya Ishikawa and Hiroshi Oyama and Hiroaki Takada and Takuya Azumi}, title = {{TINET+TECS:} Component-Based {TCP/IP} Protocol Stack for Embedded Systems}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {784--791}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.313}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.313}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YamamotoHIOTA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangZMXZ17, author = {Mengmeng Yang and Tianqing Zhu and Lichuan Ma and Yang Xiang and Wanlei Zhou}, title = {Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss Transform}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {417--424}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.266}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.266}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangZMXZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YeLXLL17, author = {Ayong Ye and Yacheng Li and Li Xu and Qing Li and Hui Lin}, title = {A Trajectory Privacy-Preserving Algorithm Based on Road Networks in Continuous Location-Based Services}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {510--516}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.278}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.278}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YeLXLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuRC17, author = {Jiangshan Yu and Mark Ryan and Liqun Chen}, title = {Authenticating Compromisable Storage Systems}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {25--32}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.216}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.216}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YusufGHAK17, author = {Simon Yusuf Enoch and Mengmeng Ge and Jin B. Hong and Hani Alzaid and Dong Seong Kim}, title = {Evaluating the Effectiveness of Security Metrics for Dynamic Networks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {277--284}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.248}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.248}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YusufGHAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZengCLLLW17, author = {Juru Zeng and Hong Chen and Weiling Lai and Ying Liu and Cuiping Li and Shan Wang}, title = {Privacy-Preserving and Collusion-aware k-NN Query Processing in Two-tiered Sensor Networks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {480--486}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.274}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.274}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZengCLLLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhanZGMZ17, author = {Yantong Zhan and Guoying Zhang and Yu Guo and Hang Meng and Xuejun Zhao}, title = {Particle Size Measurement Based on Image Multivariate Multiscale Entropy}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {973--977}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.339}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.339}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhanZGMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangGWXZ17, author = {Ying Zhang and Zhishan Guo and Lingxiang Wang and Haoyi Xiong and Zhenkai Zhang}, title = {Integrating Cache-Related Preemption Delay into {GEDF} Analysis for Multiprocessor Scheduling with On-chip Cache}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {815--822}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.317}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.317}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangGWXZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangHYYLJ17, author = {Ruoqing Zhang and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Xiaoqi Yu and Zechao Liu and Zoe Lin Jiang}, title = {A Traceable Outsourcing {CP-ABE} Scheme with Attribute Revocation}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {363--370}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.259}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.259}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangHYYLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangHZSQL17, author = {Minjian Zhang and Jianwei Hou and Ziqi Zhang and Wenchang Shi and Bo Qin and Bin Liang}, title = {Fine-Grained Fingerprinting Threats to Software-Defined Networks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {128--135}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.229}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.229}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangHZSQL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLXS17, author = {Yan Zhang and Lejian Liao and Chang Xu and Licheng Shi}, title = {Situation Semantics Aggregator for Realtime Simulation on Organizational Behaviors}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {714--720}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.304}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.304}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLXS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLZCZ17, author = {Wei Zhang and Dongdai Lin and Hailong Zhang and Cong Chen and Xiaojun Zhou}, title = {A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on {ECC}}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {170--176}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.234}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.234}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLZCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangRHWYJ17, author = {Yunan Zhang and Chenghao Rong and Qingjia Huang and Yang Wu and Zeming Yang and Jianguo Jiang}, title = {Based on Multi-features and Clustering Ensemble Method for Automatic Malware Categorization}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {73--82}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.222}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.222}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangRHWYJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangWL17, author = {Shaobo Zhang and Guojun Wang and Qin Liu}, title = {A Dual Privacy Preserving Scheme in Continuous Location-Based Services}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {402--408}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.264}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.264}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangX17, author = {Shaofeng Zhang and Xi Xiao}, title = {CSCdroid: Accurately Detect Android Malware via Contribution-Level-Based System Call Categorization}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {193--200}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.237}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.237}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangZSLYJ17, author = {Peng Zhang and Xiafei Zhang and Xiaoqiang Sun and Joseph K. Liu and Jianping Yu and Zoe Lin Jiang}, title = {Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {668--674}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.298}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.298}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangZSLYJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhao0C17, author = {Shuyuan Zhao and Yongzheng Zhang and Peng Chang}, title = {Network Traffic Classification Using Tri-training Based on Statistical Flow Characteristics}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {323--330}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.254}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.254}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Zhao0C17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoMZJRX17, author = {Rui Zhao and Zhao{-}Peng Meng and Yan Zheng and Qiangguo Jin and Anbang Ruan and Hanglun Xie}, title = {{SOMR:} Towards a Security-Oriented MapReduce Infrastructure}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {530--537}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.281}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.281}, timestamp = {Mon, 03 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoMZJRX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengPCPB17, author = {Xi Zheng and Lei Pan and Hongxu Chen and Rick Di Pietro and Lynn Batten}, title = {A Testbed for Security Analysis of Modern Vehicle Systems}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1090--1095}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.357}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.357}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengPCPB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZicariITG17, author = {Paolo Zicari and Roberto Interdonato and Andrea Tagarelli and Sergio Greco}, title = {Controversy-Aware Hybrid Trust Inference in Online Social Networks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {610--617}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.291}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.291}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZicariITG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZuoSLLW17, author = {Cong Zuo and Jun Shao and Zhe Liu and Yun Ling and Guiyi Wei}, title = {Hidden-Token Searchable Public-Key Encryption}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {248--254}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.244}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.244}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZuoSLLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustcom/2017, title = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8027145/proceeding}, isbn = {978-1-5090-4906-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0007YB16, author = {Guoqiang Li and Bian Yang and Christoph Busch}, title = {A Fingerprint Indexing Algorithm on Encrypted Domain}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1030--1037}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0172}, doi = {10.1109/TRUSTCOM.2016.0172}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/0007YB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AbduljabbarJIHH16, author = {Zaid Ameen Abduljabbar and Hai Jin and Ayad Ibrahim and Zaid Alaa Hussien and Mohammed Abdulridha Hussain and Salah H. Abbdal and Deqing Zou}, title = {Privacy-Preserving Image Retrieval in IoT-Cloud}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {799--806}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0141}, doi = {10.1109/TRUSTCOM.2016.0141}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AbduljabbarJIHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AbegundeXS16, author = {Jacob Abegunde and Hannan Xiao and Joseph Spring}, title = {A Dynamic Game with Adaptive Strategies for {IEEE} 802.15.4 and IoT}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {473--480}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0099}, doi = {10.1109/TRUSTCOM.2016.0099}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AbegundeXS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AhamedSJ16, author = {Farhad Ahamed and Seyed A. Shahrestani and Bahman Javadi}, title = {Security Aware and Energy-Efficient Virtual Machine Consolidation in Cloud Computing Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1516--1523}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0236}, doi = {10.1109/TRUSTCOM.2016.0236}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AhamedSJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AhmedKKA16, author = {Idrees Ahmed and Abid Khan and Muhammad Saleem Khan and Mansoor Ahmed}, title = {Aggregated Signatures for Chaining: {A} Secure Provenance Scheme}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2012--2017}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0307}, doi = {10.1109/TRUSTCOM.2016.0307}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AhmedKKA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AkramBCMS16, author = {Raja Naeem Akram and Pierre{-}Fran{\c{c}}ois Bonnefoi and Serge Chaumette and Konstantinos Markantonakis and Damien Sauveron}, title = {Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {606--614}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0116}, doi = {10.1109/TRUSTCOM.2016.0116}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AkramBCMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Atoofian16, author = {Ehsan Atoofian}, title = {Temperature-Aware Register Mapping in GPGPUs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1636--1643}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0252}, doi = {10.1109/TRUSTCOM.2016.0252}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Atoofian16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AzabAA16, author = {Ahmad Azab and Mamoun Alazab and Mahdi Aiash}, title = {Machine Learning Based Botnet Identification Traffic}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1788--1794}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0275}, doi = {10.1109/TRUSTCOM.2016.0275}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AzabAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BasuKV016, author = {Anirban Basu and Shinsaku Kiyomoto and Jaideep Vaidya and Stephen Marsh}, title = {PrefRank: Quantification and Aggregation of Subjective User Preferences}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {7--13}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0039}, doi = {10.1109/TRUSTCOM.2016.0039}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BasuKV016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BiPY16, author = {Xiu{-}Li Bi and Chi{-}Man Pun and Xiaochen Yuan}, title = {Adaptive Polar Based Filtering Method for Image Copy-Move Forgery Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {952--956}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0161}, doi = {10.1109/TRUSTCOM.2016.0161}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BiPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BlakemoreRC16, author = {Christine Blakemore and Jo{\~{a}}o Redol and Miguel Correia}, title = {Fingerprinting for Web Applications: From Devices to Related Groups}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {144--151}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0057}, doi = {10.1109/TRUSTCOM.2016.0057}, timestamp = {Wed, 13 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BlakemoreRC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoCZ16, author = {Xiaoxiao Cao and Bing Chen and Yanchao Zhao}, title = {Wi-Wri: Fine-Grained Writing Recognition Using Wi-Fi Signals}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1366--1373}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0216}, doi = {10.1109/TRUSTCOM.2016.0216}, timestamp = {Tue, 05 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaoCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoLW16, author = {Zhenhai Cao and Bo Lang and Jinmiao Wang}, title = {An Efficient and Fine-Grained Access Control Scheme for Multidimensional Data Aggregation in Smart Grid}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {362--369}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0085}, doi = {10.1109/TRUSTCOM.2016.0085}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaoLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoQLS16, author = {Yuan Cao and Heng Qi and Keqiu Li and Milos Stojmenovic}, title = {Multiple Query-Independent Values Based Asymmetric Ranking for Approximate Nearest Neighbor Search}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1628--1635}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0251}, doi = {10.1109/TRUSTCOM.2016.0251}, timestamp = {Tue, 04 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaoQLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoSWL16, author = {Liu Cao and Yuqing Sun and Shaoqing Wang and Mingzhu Li}, title = {Detecting Malicious Behavior and Collusion for Online Rating System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1046--1053}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0174}, doi = {10.1109/TRUSTCOM.2016.0174}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CaoSWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoWLCYPY16, author = {Dong Cao and Shanshan Wang and Qun Li and Zhenxiang Chen and Qiben Yan and Lizhi Peng and Bo Yang}, title = {DroidCollector: {A} High Performance Framework for High Quality Android Traffic Collection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1753--1758}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0269}, doi = {10.1109/TRUSTCOM.2016.0269}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaoWLCYPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChaisiriK16, author = {Sivadon Chaisiri and Ryan K. L. Ko}, title = {From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {535--543}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0107}, doi = {10.1109/TRUSTCOM.2016.0107}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChaisiriK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChakrabortyARM16, author = {Nilesh Chakraborty and S. Vijay Anand and Gurpinder Singh Randhawa and Samrat Mondal}, title = {On Designing Leakage-Resilient Vibration Based Authentication Techniques}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1875--1881}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0287}, doi = {10.1109/TRUSTCOM.2016.0287}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChakrabortyARM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChangZDL16, author = {Xiaoshan Chang and Zenghua Zhao and Bingxue Diao and Tao Li}, title = {Experimental Study of Disruption-Tolerant Transport Protocol for Mobile Ad-Hoc Networks with Connection Diversity}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1613--1620}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0249}, doi = {10.1109/TRUSTCOM.2016.0249}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChangZDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenCYSTG16, author = {Yong Chen and Chao Chen and Yanlong Yin and Xian{-}He Sun and Rajeev Thakur and William Gropp}, title = {Rethinking High Performance Computing System Architecture for Scientific Big Data Applications}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1605--1612}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0248}, doi = {10.1109/TRUSTCOM.2016.0248}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenCYSTG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenCZZX16, author = {Zhengyang Chen and Renjie Chen and Yu Zhang and Jianzhong Zhang and Jingdong Xu}, title = {A Statistical-Feature {ML} Approach to {IP} Traffic Classification Based on {CUDA}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2235--2239}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0344}, doi = {10.1109/TRUSTCOM.2016.0344}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenCZZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenDYWL16, author = {Changyuan Chen and Ran Dai and Tingting Yang and Zuxin Wu and Quan Li}, title = {The Design and Application of an Intelligentialized Monitoring System for Mooring Safety}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2031--2034}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0310}, doi = {10.1109/TRUSTCOM.2016.0310}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenDYWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenLWH16, author = {Chao Chen and Kun{-}Yu Lin and Chang{-}Dong Wang and Dong Huang}, title = {{CSBD:} {A} Nonlinear Clustering Method Based on Cluster Shrinking and Border Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2240--2245}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0345}, doi = {10.1109/TRUSTCOM.2016.0345}, timestamp = {Tue, 07 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenLWH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenLZLZ16, author = {Pei Chen and Yaping Lin and Wei Zhang and Xiaoying Li and Shiwen Zhang}, title = {Preserving Location and Content Privacy for Secure Ranked Queries in Location Based Services}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {892--899}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0153}, doi = {10.1109/TRUSTCOM.2016.0153}, timestamp = {Tue, 19 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenLZLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenM16, author = {Long Chen and Yue Mao}, title = {Forensic Analysis of Email on Android Volatile Memory}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {945--951}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0160}, doi = {10.1109/TRUSTCOM.2016.0160}, timestamp = {Tue, 28 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenS16, author = {Shu Chen and Hong Shen}, title = {Semantic-Aware Dummy Selection for Location Privacy Preservation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {752--759}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0135}, doi = {10.1109/TRUSTCOM.2016.0135}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenS16a, author = {Houwu Chen and Jiwu Shu}, title = {Sznajd2: {A} Community-Aware Opinion Dynamics Model}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1477--1484}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0231}, doi = {10.1109/TRUSTCOM.2016.0231}, timestamp = {Sat, 17 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenSC16, author = {Yu Chen and Yuliang Shi and Li{-}zhen Cui}, title = {Model for Hiding Data Relationships Based on Chunk-Confusion in Cloud Computing}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {837--844}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0146}, doi = {10.1109/TRUSTCOM.2016.0146}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenTWZG16, author = {Shanshan Chen and Xiaoxin Tang and Hongwei Wang and Han Zhao and Minyi Guo}, title = {Towards Scalable and Reliable In-Memory Storage System: {A} Case Study with Redis}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1660--1667}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0255}, doi = {10.1109/TRUSTCOM.2016.0255}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenTWZG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenYZZX16, author = {Zhengyang Chen and Bowen Yu and Yu Zhang and Jianzhong Zhang and Jingdong Xu}, title = {Automatic Mobile Application Traffic Identification by Convolutional Neural Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {301--307}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0077}, doi = {10.1109/TRUSTCOM.2016.0077}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenYZZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenZXW16, author = {Haibin Chen and Lei Zhang and Junyuan Xie and Chongjun Wang}, title = {New Efficient Certificateless Blind Signature Scheme}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {349--353}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0083}, doi = {10.1109/TRUSTCOM.2016.0083}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenZXW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengLMZZW16, author = {Longwang Cheng and Wei Li and Dongtang Ma and Li Zhou and Chunsheng Zhu and Jibo Wei}, title = {Towards an Effective Secret Key Generation Scheme for Imperfect Channel State Information}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {915--920}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0156}, doi = {10.1109/TRUSTCOM.2016.0156}, timestamp = {Sat, 01 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChengLMZZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengWMW16, author = {Li Cheng and Yijie Wang and Xingkong Ma and Yongjun Wang}, title = {{GSLAC:} {A} General Scalable and Low-Overhead Alert Correlation Method}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {316--323}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0079}, doi = {10.1109/TRUSTCOM.2016.0079}, timestamp = {Thu, 01 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChengWMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChomsiriHNT16, author = {Thawatchai Chomsiri and Xiangjian He and Priyadarsi Nanda and Zhiyuan Tan}, title = {An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {178--184}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0061}, doi = {10.1109/TRUSTCOM.2016.0061}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChomsiriHNT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CuiLLY16, author = {Haoyi Cui and Qingzhong Li and Hui Li and Zhongmin Yan}, title = {Healthcare Fraud Detection Based on Trustworthiness of Doctors}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {74--81}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0048}, doi = {10.1109/TRUSTCOM.2016.0048}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CuiLLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DaiYTZG16, author = {You Dai and Jin Yan and Xiaoxin Tang and Han Zhao and Minyi Guo}, title = {Online Credit Card Fraud Detection: {A} Hybrid Framework with Big Data Technologies}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1644--1651}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0253}, doi = {10.1109/TRUSTCOM.2016.0253}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DaiYTZG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DangHN16, author = {Thanh Dat Dang and Doan B. Hoang and Priyadarsi Nanda}, title = {A Novel Hash-Based File Clustering Scheme for Efficient Distributing, Storing, and Retrieving of Large Scale Health Records}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1485--1491}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0232}, doi = {10.1109/TRUSTCOM.2016.0232}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DangHN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DangI16, author = {Quang{-}Vinh Dang and Claudia{-}Lavinia Ignat}, title = {Computational Trust Model for Repeated Trust Games}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {34--41}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0043}, doi = {10.1109/TRUSTCOM.2016.0043}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DangI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DengBZW16, author = {Liang Deng and Hanli Bai and Dan Zhao and Fang Wang}, title = {Evaluating Multi-core and Many-Core Architectures through Parallelizing a High-Order {WENO} Solver}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2167--2174}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0333}, doi = {10.1109/TRUSTCOM.2016.0333}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DengBZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DengGWP16, author = {Changyi Deng and Ruifeng Guo and Hongliang Wang and Azhen Peng}, title = {A Dynamic Power Management Algorithm for Sporadic Tasks in Real-Time Embedded Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2073--2078}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0318}, doi = {10.1109/TRUSTCOM.2016.0318}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DengGWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DillonC16, author = {Tharam S. Dillon and Elizabeth Chang}, title = {Trust and Risk Semantics and Prediction through Big Data Analytics to Encompass Cloud Services, Cyber-Physical Systems, and Social Media: Issues and Challenges}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {185--193}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0062}, doi = {10.1109/TRUSTCOM.2016.0062}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DillonC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DingWWZZ16, author = {Weiwei Ding and Jin Wang and Xiumin Wang and Ruimin Zhao and Yanqin Zhu}, title = {Optimal Flow Allocation and Linear Network Coding Design for Multiple Multicasts under the Requirements of Information Theoretical Security}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {576--583}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0112}, doi = {10.1109/TRUSTCOM.2016.0112}, timestamp = {Wed, 18 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DingWWZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DongW16, author = {Wei Dong and Jianjun Wang}, title = {{JPEG} Compression Forensics against Resizing}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1001--1007}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0168}, doi = {10.1109/TRUSTCOM.2016.0168}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DongW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuCLY16, author = {Haizhou Du and Zhengbo Chen and Qifen Li and Yongwen Yang}, title = {A Novel Text Feature Weight Calculation Method Applied to Power Field}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1700--1705}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0260}, doi = {10.1109/TRUSTCOM.2016.0260}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DuCLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FanYXS16, author = {Xiaochen Fan and Panlong Yang and Chaocan Xiang and Lei Shi}, title = {iMap: {A} Crowdsensing Based System for Outdoor Radio Signal Strength Map}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1442--1447}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0226}, doi = {10.1109/TRUSTCOM.2016.0226}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FanYXS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FangLHF16, author = {Kunding Fang and Xiaohong Li and Jianye Hao and Zhiyong Feng}, title = {Formal Modeling and Verification of Security Protocols on Cloud Computing Systems Based on {UML} 2.3}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {852--859}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0148}, doi = {10.1109/TRUSTCOM.2016.0148}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FangLHF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FattahiMP16, author = {Jaouhar Fattahi and Mohamed Mejri and Emil Pricop}, title = {Authentication by Witness Functions}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1990--1997}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0304}, doi = {10.1109/TRUSTCOM.2016.0304}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FattahiMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FengWL16, author = {Bo Feng and Chentao Wu and Jie Li}, title = {{MLC:} An Efficient Multi-level Log Compression Method for Cloud Backup Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1358--1365}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0215}, doi = {10.1109/TRUSTCOM.2016.0215}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FengWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FloresQJ16, author = {Denys A. Flores and Farrukh Qazi and Arshad Jhumka}, title = {Bring Your Own Disclosure: Analysing {BYOD} Threats to Corporate Information}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1008--1015}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0169}, doi = {10.1109/TRUSTCOM.2016.0169}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FloresQJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FuLLD16, author = {Jianming Fu and Pengwei Li and Yan Lin and Shuang Ding}, title = {Android App Malicious Behavior Detection Based on User Intention}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {560--567}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0110}, doi = {10.1109/TRUSTCOM.2016.0110}, timestamp = {Wed, 23 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FuLLD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FuLZ16, author = {Jianming Fu and Yan Lin and Xu Zhang}, title = {Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {394--401}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0089}, doi = {10.1109/TRUSTCOM.2016.0089}, timestamp = {Thu, 17 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FuLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FukushimaSHNDGN16, author = {Kazuhide Fukushima and Youssef Souissi and Seira Hidano and Robert Nguyen and Jean{-}Luc Danger and Sylvain Guilley and Yuto Nakano and Shinsaku Kiyomoto and Laurent Sauvage}, title = {Delay {PUF} Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {201--207}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0064}, doi = {10.1109/TRUSTCOM.2016.0064}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FukushimaSHNDGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoLSS16, author = {Hongyun Gao and Fujun Liu and Shengjuan Sun and Gaotao Shi}, title = {A New Model Based on {GEP-SWPM} for Predicting Heavy Metals Speciation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2122--2126}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0326}, doi = {10.1109/TRUSTCOM.2016.0326}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaoLSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoX16, author = {Shengli Gao and Ruini Xue}, title = {{BOLAS+:} Scalable Lightweight Locality-Aware Scheduling for Hadoop}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1077--1084}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0178}, doi = {10.1109/TRUSTCOM.2016.0178}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaoX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaraeKC16, author = {Jeffery Garae and Ryan K. L. Ko and Sivadon Chaisiri}, title = {UVisP: User-centric Visualization of Data Provenance with Gestalt Principles}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1923--1930}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0294}, doi = {10.1109/TRUSTCOM.2016.0294}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaraeKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GheidC16, author = {Zakaria Gheid and Yacine Challal}, title = {Efficient and Privacy-Preserving k-Means Clustering for Big Data Mining}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {791--798}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0140}, doi = {10.1109/TRUSTCOM.2016.0140}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GheidC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GongWZL16, author = {Lirui Gong and Jiawei Wang and Xiang Zhang and Kai Lei}, title = {Intelligent Forwarding Strategy Based on Online Machine Learning in Named Data Networking}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1288--1294}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0206}, doi = {10.1109/TRUSTCOM.2016.0206}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GongWZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GongYXMYY16, author = {Liangyi Gong and Wu Yang and Chaocan Xiang and Dapeng Man and Miao Yu and Zuwei Yin}, title = {WiSal: Ubiquitous WiFi-Based Device-Free Passive Subarea Localization without Intensive Site-Survey}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1129--1136}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0185}, doi = {10.1109/TRUSTCOM.2016.0185}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GongYXMYY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GottwaltWL16, author = {Florian Gottwalt and Adrian Waller and Weiru Liu}, title = {Natural Laws as a Baseline for Network Anomaly Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {370--377}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0086}, doi = {10.1109/TRUSTCOM.2016.0086}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GottwaltWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GranadilloRGD16, author = {Gustavo {Gonzalez Granadillo} and Jose Rubio{-}Hernan and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar}, title = {Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {340--348}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0082}, doi = {10.1109/TRUSTCOM.2016.0082}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GranadilloRGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuHLYHJ16, author = {Chonglin Gu and Ke Hu and Zhenlong Li and Qiang Yuan and Hejiao Huang and Xiaohua Jia}, title = {Lowering Down the Cost for Green Cloud Data Centers by Using ESDs and Energy Trading}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1508--1515}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0235}, doi = {10.1109/TRUSTCOM.2016.0235}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuHLYHJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuanL16, author = {Lei Guan and Yutong Lu}, title = {Using Dynamic Granularity Strategy to Accelerate Unbalanced Tree Search}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1302--1310}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0208}, doi = {10.1109/TRUSTCOM.2016.0208}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuanL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoCHD16, author = {Xiaojun Guo and Guang Cheng and Yifei Hu and Mian Dai}, title = {Progress in Command and Control Server Finding Schemes of Botnet}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1723--1727}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0264}, doi = {10.1109/TRUSTCOM.2016.0264}, timestamp = {Tue, 26 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GuoCHD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoLLHL16, author = {Ping Guo and Bin Lin and Xin Li and Rongxi He and Sen Li}, title = {Optimal Deployment and Dimensioning of Fog Computing Supported Vehicular Network}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2058--2062}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0315}, doi = {10.1109/TRUSTCOM.2016.0315}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoLLHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoS16, author = {Longkun Guo and Hong Shen}, title = {Privacy-Preserving Internet Traffic Publication}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {884--891}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0152}, doi = {10.1109/TRUSTCOM.2016.0152}, timestamp = {Wed, 20 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoWYHW16, author = {Zonghao Guo and Ou Wei and Peng Yu and Lansheng Han and Weiming Wu}, title = {Model Checking Probabilistic Network Propagation Protection Strategies}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {354--361}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0084}, doi = {10.1109/TRUSTCOM.2016.0084}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoWYHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoWZC16, author = {Jian Guo and Lirong Wang and Wenliang Zhu and Xiaohe Chen}, title = {The Analysis of Crosstalk Noise Component in Wearable Device}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2202--2205}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0339}, doi = {10.1109/TRUSTCOM.2016.0339}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoWZC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoZZ16, author = {Yanbin Guo and Jianzhong Zhang and Yu Zhang}, title = {An Algorithm for Analyzing the City Residents' Activity Information through Mobile Big Data Mining}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2133--2138}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0328}, doi = {10.1109/TRUSTCOM.2016.0328}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GuoZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanGRMX16, author = {Hongfang Han and Ang Gao and Jianji Ren and Yongqiang Ma and Xiao Xue}, title = {An {O2O} Service Recommendation Algorithm Based on User Context and Trust Service}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1904--1909}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0291}, doi = {10.1109/TRUSTCOM.2016.0291}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HanGRMX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanHCWS16, author = {Yandong Han and Zhiyu Hao and Lei Cui and Chonghua Wang and Yafei Sang}, title = {A Hybrid Monitoring Mechanism in Virtualized Environments}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1038--1045}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0173}, doi = {10.1109/TRUSTCOM.2016.0173}, timestamp = {Mon, 01 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HanHCWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanLLDQ16, author = {Lin Han and Zhiyang Li and Weijiang Liu and Ke Dai and Wenyu Qu}, title = {Minimum Control Latency of {SDN} Controller Placement}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2175--2180}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0334}, doi = {10.1109/TRUSTCOM.2016.0334}, timestamp = {Tue, 10 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HanLLDQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanQBD16, author = {Zijun Han and Guangzhi Qu and Dona Burkard and Kelvin Dobbins}, title = {A Memory Access Pattern-Based Program Profiling System for Dynamic Parallelism Prediction}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1448--1454}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0227}, doi = {10.1109/TRUSTCOM.2016.0227}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HanQBD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanzlikKKD16, author = {Lucjan Hanzlik and Kamil Kluczniak and Miroslaw Kutylowski and Shlomi Dolev}, title = {Local Self-Organization with Strong Privacy Protection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {775--782}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0138}, doi = {10.1109/TRUSTCOM.2016.0138}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HanzlikKKD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HaoGWS16, author = {Zhongyuan Hao and Wei Guo and Jizeng Wei and Dazhi Sun}, title = {Dual Processing Engine Architecture to Speed Up Optimal Ate Pairing on {FPGA} Platform}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {584--589}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0113}, doi = {10.1109/TRUSTCOM.2016.0113}, timestamp = {Sun, 27 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HaoGWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HeL016, author = {Xinglu He and Kai Lu and Gen Li}, title = {Taint Reverse Propagation for Analysis of Privacy Leak}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1718--1722}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0263}, doi = {10.1109/TRUSTCOM.2016.0263}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HeL016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HeXXLX16, author = {Shiming He and Kun Xie and Kexin Xie and Zhetao Li and Chuan Xu}, title = {Interference-Aware Multi-source Transmission}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1233--1240}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0199}, doi = {10.1109/TRUSTCOM.2016.0199}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HeXXLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HouZWCWL16, author = {Gang Hou and Kuanjiu Zhou and Yanran Wu and Zongzheng Chi and Jie Wang and Mingchu Li}, title = {{ETSTM:} {A} New Green Software Model}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1825--1830}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0280}, doi = {10.1109/TRUSTCOM.2016.0280}, timestamp = {Wed, 14 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HouZWCWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuC0S16, author = {Feng Hu and Bing Chen and Xiaojun Zhu and Hong Shen}, title = {SDN-Based Efficient Bandwidth Allocation for Caching Enabled Cognitive Radio Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1382--1389}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0218}, doi = {10.1109/TRUSTCOM.2016.0218}, timestamp = {Sat, 26 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuC0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuWWCZ16, author = {Shengshan Hu and Qian Wang and Jingjun Wang and Sherman S. M. Chow and Qin Zou}, title = {Securing Fast Learning! Ridge Regression over Encrypted Big Data}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {19--26}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0041}, doi = {10.1109/TRUSTCOM.2016.0041}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuWWCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuWZF16, author = {Zongshuai Hu and Yong Wang and Lipeng Zhang and Rusen Fan}, title = {Bad Data Injection Attacks Identification in Power System on Fast Decoupled Load Flow}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1970--1975}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0301}, doi = {10.1109/TRUSTCOM.2016.0301}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuWZF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangDWW16, author = {Haiping Huang and Jianpeng Du and Hui Wang and Ruchuan Wang}, title = {A Multi-keyword Multi-user Searchable Encryption Scheme Based on Cloud Storage}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1937--1943}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0296}, doi = {10.1109/TRUSTCOM.2016.0296}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuangDWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangLWS16, author = {Xi Huang and Xiaoguang Liu and Gang Wang and Ming Su}, title = {A Robust Image Hashing with Enhanced Randomness by Using Random Walk on Zigzag Blocking}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {14--18}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0040}, doi = {10.1109/TRUSTCOM.2016.0040}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuangLWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangZQ16, author = {Xingyuan Huang and Jiandong Zhang and Kun Qian}, title = {Big Data Analysis on the Relationship between the Organizational Career Management and Knowledge Workers' Work Involved - Take the High-Tech Enterprise as an Example}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2251--2256}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0347}, doi = {10.1109/TRUSTCOM.2016.0347}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuangZQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HussainSP16, author = {Sardar Hussain and Richard O. Sinnott and Ron Poet}, title = {A Security-Oriented Workflow Framework for Collaborative Environments}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {707--714}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0129}, doi = {10.1109/TRUSTCOM.2016.0129}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HussainSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JayarathnaVT16, author = {Dilshan Jayarathna and Vijay Varadharajan and Udaya Kiran Tupakula}, title = {Integrated Security for Services Hosted in Virtual Environments}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {82--89}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0049}, doi = {10.1109/TRUSTCOM.2016.0049}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JayarathnaVT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JayasingheMGAM16, author = {Danushka Jayasinghe and Konstantinos Markantonakis and Iakovos Gurulian and Raja Naeem Akram and Keith Mayes}, title = {Extending {EMV} Tokenised Payments to Offline-Environments}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {443--450}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0095}, doi = {10.1109/TRUSTCOM.2016.0095}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JayasingheMGAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiWTWWTZZ16, author = {Changqing Ji and Baofeng Wang and Shuai Tao and Junfeng Wu and Zumin Wang and Long Tang and Tiange Zu and Gui Zhao}, title = {Inverted Voronoi-Based kNN Query Processing with MapReduce}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2263--2268}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0349}, doi = {10.1109/TRUSTCOM.2016.0349}, timestamp = {Mon, 28 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JiWTWWTZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiaWZWJ16, author = {Chengjin Jia and Jin Wang and Yanqin Zhu and Zhengqing Wen and Juncheng Jia}, title = {Joint Selection of Providers and the New Comer for Optimal Repair in Distributed Storage Network with Network Coding}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1567--1574}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0243}, doi = {10.1109/TRUSTCOM.2016.0243}, timestamp = {Wed, 18 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiaWZWJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiaYKXCS16, author = {Minglei Jia and Yanqin Yang and Lei Kuang and Wenchao Xu and Tianxing Chu and Hongzhi Song}, title = {An Indoor and Outdoor Seamless Positioning System Based on Android Platform}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1114--1120}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0183}, doi = {10.1109/TRUSTCOM.2016.0183}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiaYKXCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangLXTYK16, author = {Meng Jiang and Yanbo Liu and Wenchao Xu and Feilong Tang and Yanqin Yang and Lei Kuang}, title = {An Optimized Layered Routing Algorithm for {GEO/LEO} Hybrid Satellite Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1153--1158}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0188}, doi = {10.1109/TRUSTCOM.2016.0188}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiangLXTYK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangQSWL16, author = {Jianguo Jiang and Biao Qi and Zhixin Shi and Yan Wang and Bin Lv}, title = {Botnet Detection Method Analysis on the Effect of Feature Extraction}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1882--1888}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0288}, doi = {10.1109/TRUSTCOM.2016.0288}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiangQSWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Jianyong16, author = {Fang Jianyong}, title = {Research on the Nonintrusive Resource Level Fault Injection Technology for Windows System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1856--1860}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0284}, doi = {10.1109/TRUSTCOM.2016.0284}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Jianyong16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JinGQZPL16, author = {Yibo Jin and Yuan Gao and Zhuzhong Qian and Mingyu Zhai and Hui Peng and Sanglu Lu}, title = {Workload-Aware Scheduling Across Geo-distributed Data Centers}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1455--1462}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0228}, doi = {10.1109/TRUSTCOM.2016.0228}, timestamp = {Thu, 04 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JinGQZPL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JinW16, author = {Hua Jin and Changda Wang}, title = {Robustness of the Packet Delay Channels}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {260--267}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0072}, doi = {10.1109/TRUSTCOM.2016.0072}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JinW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JinZTF16, author = {Jiangming Jin and Yang Zhang and Shanjiang Tang and Hongfei Fan}, title = {Performance Modeling and Analysis for Critical Section Contention in Parallel Codes}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2139--2146}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0329}, doi = {10.1109/TRUSTCOM.2016.0329}, timestamp = {Tue, 22 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JinZTF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JingZDXL16, author = {Jing Wang and Xianfeng Zhao and Yanjie Deng and Shibo Xu and Jichun Li}, title = {Research on Key Technologies and Standard Framework of Secure and Smart Container}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2063--2067}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0316}, doi = {10.1109/TRUSTCOM.2016.0316}, timestamp = {Mon, 12 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JingZDXL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KacemWCB16, author = {Thabet Kacem and Duminda Wijesekera and Paulo Cesar G. da Costa and Alexandre Barreto}, title = {An {ADS-B} Intrusion Detection System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {544--551}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0108}, doi = {10.1109/TRUSTCOM.2016.0108}, timestamp = {Thu, 10 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KacemWCB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KarthikS16, author = {N. Karthik and Ananthanarayana V. S.}, title = {Data Trustworthiness in Wireless Sensor Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2181--2186}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0335}, doi = {10.1109/TRUSTCOM.2016.0335}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KarthikS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KejariwalO16, author = {Arun Kejariwal and Francois Orsini}, title = {On the Definition of Real-Time: Applications and Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2213--2220}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0341}, doi = {10.1109/TRUSTCOM.2016.0341}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KejariwalO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KenazaALLW16, author = {Tayeb Kenaza and Mahdi Aiash and Jonathan Loo and Aboubaker Lasebae and Gill Whitney}, title = {A Progressive Approach to Design Authentication Protocols for Mobile Heterogeneous Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1776--1781}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0273}, doi = {10.1109/TRUSTCOM.2016.0273}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KenazaALLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KenazaBLA16, author = {Tayeb Kenaza and Khadidja Bennaceur and Abdenour Labed and Mahdi Aiash}, title = {Enhancing the {SVDD} Accuracy in Intrusion Detection Systems by Removing External Voids}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1765--1770}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0271}, doi = {10.1109/TRUSTCOM.2016.0271}, timestamp = {Tue, 28 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KenazaBLA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KhanAKK16, author = {Muhammad Saleem Khan and Idrees Ahmed and Abid Khan and Majid Iqbal Khan}, title = {Adaptive Reputation Weights Assignment Scheme for MANETs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {160--167}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0059}, doi = {10.1109/TRUSTCOM.2016.0059}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KhanAKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KuangTGFCXYZW16, author = {Kaiyuan Kuang and Zhanyong Tang and Xiaoqing Gong and Dingyi Fang and Xiaojiang Chen and Tianzhang Xing and Guixin Ye and Jie Zhang and Zheng Wang}, title = {Exploiting Dynamic Scheduling for VM-Based Code Obfuscation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {489--496}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0101}, doi = {10.1109/TRUSTCOM.2016.0101}, timestamp = {Tue, 12 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KuangTGFCXYZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LaiWSLQZ16, author = {Meng Lai and Jiajun Wang and Tao Song and Ning Liu and Zhengwei Qi and Weijia Zhou}, title = {{VSP:} {A} Virtual Smartphone Platform to Enhance the Capability of Physical Smartphone}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1434--1441}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0225}, doi = {10.1109/TRUSTCOM.2016.0225}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LaiWSLQZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Lei0FLZ16, author = {Shiming Lei and Chao Wang and Haijie Fang and Xi Li and Xuehai Zhou}, title = {{SCADIS:} {A} Scalable Accelerator for Data-Intensive String Set Matching on FPGAs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1190--1197}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0193}, doi = {10.1109/TRUSTCOM.2016.0193}, timestamp = {Thu, 19 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Lei0FLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LenzZ16, author = {Thomas Lenz and Bernd Zwattendorfer}, title = {Towards Cross-Border Authorization in European eID Federations}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {426--434}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0093}, doi = {10.1109/TRUSTCOM.2016.0093}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LenzZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiC16, author = {Yamin Li and Wanming Chu}, title = {Adjusting Parameters of k-Ary n-Cube to Achieve Better Cost Performance}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1218--1225}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0197}, doi = {10.1109/TRUSTCOM.2016.0197}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiCLSCL16, author = {Xiaochao Li and Chunhui Cao and Pengtao Li and Shuli Shen and Yihui Chen and Lin Li}, title = {Energy-Efficient Hardware Implementation of {LUKS} {PBKDF2} with {AES} on {FPGA}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {402--409}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0090}, doi = {10.1109/TRUSTCOM.2016.0090}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiCLSCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiJSWLLR16, author = {Peng Li and Xingtong Jin and Rebecca J. Stones and Gang Wang and Zhongwei Li and Xiaoguang Liu and Mingming Ren}, title = {Parallelizing Degraded Read for Erasure Coded Cloud Storage Systems Using Collective Communications}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1272--1279}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0204}, doi = {10.1109/TRUSTCOM.2016.0204}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiJSWLLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLC16, author = {Lulu Li and Zhuo Li and Xin Chen}, title = {Capacity Analysis and Link Scheduling Design in Double-Channel Full-Duplex Wireless Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1581--1588}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0245}, doi = {10.1109/TRUSTCOM.2016.0245}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLD16, author = {Minghui Li and Zhaobin Liu and Kang Dong}, title = {Privacy Preservation in Social Network against Public Neighborhood Attacks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1575--1580}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0244}, doi = {10.1109/TRUSTCOM.2016.0244}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLGLH16, author = {Xin Li and Bin Lin and Ping Guo and Sen Li and Rongxi He}, title = {Design and Planning of Heterogeneous Marine Sensor Networks for Marine Intelligent Transportation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2052--2057}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0314}, doi = {10.1109/TRUSTCOM.2016.0314}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLGLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLWL16, author = {Juan{-}Hui Li and Pei{-}Zhen Li and Chang{-}Dong Wang and Jian{-}Huang Lai}, title = {Community Detection in Complicated Network Based on the Multi-view Weighted Signed Permanence}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1589--1596}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0246}, doi = {10.1109/TRUSTCOM.2016.0246}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLZWCD16, author = {Jian Li and Wenhuan Lu and Chen Zhang and Jianguo Wei and Xiaochun Cao and Jianwu Dang}, title = {A Study on Detection and Recovery of Speech Signal Tampering}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {678--682}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0125}, doi = {10.1109/TRUSTCOM.2016.0125}, timestamp = {Thu, 06 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLZWCD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiWHSF16, author = {Qian Li and Weiguo Wu and Jianhang Huang and Zeyu Sun and Mingxia Feng}, title = {A Novel Trustworthy Framework for Cloud Based Rendering Application}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1951--1956}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0298}, doi = {10.1109/TRUSTCOM.2016.0298}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiWHSF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiXG16, author = {Dali Li and Chuanfu Xu and Ningbo Guo}, title = {Evaluating and Optimizing Parallel {LU-SGS} for High-Order {CFD} Simulations on the Tianhe-2 Supercomputer}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1182--1189}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0192}, doi = {10.1109/TRUSTCOM.2016.0192}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiXG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiYLZWL16, author = {Hui Li and Guoqiao Ye and Xuezheng Liu and Fei Zhao and Di Wu and Xiaola Lin}, title = {URLSight: Profiling Mobile Users via Large-Scale Internet Metadata Analytics}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1728--1733}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0265}, doi = {10.1109/TRUSTCOM.2016.0265}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiYLZWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZDLYM16, author = {Tao Li and Kezhao Zhao and Qiankun Dong and Jiabing Ling and Yulu Yang and Wenjing Ma}, title = {Data-Oriented Runtime Scheduling Framework on Multi-GPUs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1311--1318}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0209}, doi = {10.1109/TRUSTCOM.2016.0209}, timestamp = {Fri, 12 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZDLYM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiangFWG16, author = {Kaiyuan Liang and Yanzhao Feng and Jizeng Wei and Wei Guo}, title = {SecPage - {A} Lightweight Memory Protection Architecture}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1917--1922}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0293}, doi = {10.1109/TRUSTCOM.2016.0293}, timestamp = {Sun, 27 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiangFWG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LinWJYZW16, author = {Zimin Lin and Rui Wang and Xiaoqi Jia and Jingyu Yang and Daojuan Zhang and Chuankun Wu}, title = {ForceDROID: Extracting Hidden Information in Android Apps by Forced Execution Technique}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {386--393}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0088}, doi = {10.1109/TRUSTCOM.2016.0088}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LinWJYZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LinWJZW16, author = {Zimin Lin and Rui Wang and Xiaoqi Jia and Shengzhi Zhang and Chuankun Wu}, title = {Classifying Android Malware with Dynamic Behavior Dependency Graphs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {378--385}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0087}, doi = {10.1109/TRUSTCOM.2016.0087}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LinWJZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LingGL16, author = {Cheng Ling and Jing{-}Yang Gao and Gang Lu}, title = {Phylogenetic Likelihood Estimation on GPUs Using Vertical Partitioning Scheme}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1210--1217}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0196}, doi = {10.1109/TRUSTCOM.2016.0196}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LingGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuBW16, author = {Juhua Liu and Guoqiang Bai and Xingjun Wu}, title = {Efficient Hardware Implementation of Roadrunner for Lightweight Application}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {224--227}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0067}, doi = {10.1109/TRUSTCOM.2016.0067}, timestamp = {Sat, 03 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuBW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuDCZW16, author = {Qiang Liu and Xiaoshe Dong and Heng Chen and Zhengdong Zhu and Yinfeng Wang}, title = {An Efficient Framework for Incremental Graph Computation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1420--1426}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0223}, doi = {10.1109/TRUSTCOM.2016.0223}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuDCZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuJWYZZ16, author = {Zechao Liu and Zoe Lin Jiang and Xuan Wang and Siu{-}Ming Yiu and Chunkai Zhang and Xiaomeng Zhao}, title = {Dynamic Attribute-Based Access Control in Cloud Storage Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {129--137}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0055}, doi = {10.1109/TRUSTCOM.2016.0055}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuJWYZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLLQTC16, author = {Yang Liu and Wenxin Li and Keqiu Li and Heng Qi and Xiaoyi Tao and Sheng Chen}, title = {Scheduling Dependent Coflows with Guaranteed Job Completion Time}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2109--2115}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0324}, doi = {10.1109/TRUSTCOM.2016.0324}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLLQTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLMZZZ16, author = {Feng Liu and Pengpeng Luo and Zhujuan Ma and Cheng Zhang and Yiwen Zhang and Erzhou Zhu}, title = {Security Secret Information Hiding Based on Hash Function and Invisible {ASCII} Characters Replacement}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1963--1969}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0300}, doi = {10.1109/TRUSTCOM.2016.0300}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLMZZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLSZ16, author = {Peng Liu and Yidong Li and Yingpeng Sang and Ji Zhang}, title = {Anonymity-Based Privacy Preserving Network Data Publication}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {823--828}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0144}, doi = {10.1109/TRUSTCOM.2016.0144}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuTXCZF16, author = {Cang Liu and Chuan Tang and Zuocheng Xing and Lirui Chen and Yang Zhang and Guitao Fu}, title = {An Architecture of Parallel Tiled {QRD} Algorithm for {MIMO-OFDM} Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2092--2096}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0321}, doi = {10.1109/TRUSTCOM.2016.0321}, timestamp = {Wed, 16 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuTXCZF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuXLTWL16, author = {Na Liu and Peng Xiao and Ying Lu and Xiao{-}Jun Tang and Hai{-}Wen Wang and Ming{-}Xia Li}, title = {A Topic Approach to Sentence Ordering for Multi-document Summarization}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1390--1395}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0219}, doi = {10.1109/TRUSTCOM.2016.0219}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuXLTWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuXTKY16, author = {Yanbo Liu and Wenchao Xu and Feilong Tang and Lei Kuang and Yanqin Yang}, title = {An Improved Multi-path Routing Algorithm for Hybrid {LEO-MEO} Satellite Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1101--1105}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0181}, doi = {10.1109/TRUSTCOM.2016.0181}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuXTKY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuS16, author = {Yang Lu and Richard O. Sinnott}, title = {Semantic-Based Privacy Protection of Electronic Health Records for Collaborative Research}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {519--526}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0105}, doi = {10.1109/TRUSTCOM.2016.0105}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoFHWX16, author = {Yuchuan Luo and Shaojing Fu and Kai Huang and Dongsheng Wang and Ming Xu}, title = {Securely Outsourcing of Bilinear Pairings with Untrusted Servers for Cloud Storage}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {623--629}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0118}, doi = {10.1109/TRUSTCOM.2016.0118}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LuoFHWX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoLLRSW16, author = {Wu Luo and Wei Liu and Yang Luo and Anbang Ruan and Qingni Shen and Zhonghai Wu}, title = {Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {152--159}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0058}, doi = {10.1109/TRUSTCOM.2016.0058}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuoLLRSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoLSSRW16, author = {Yang Luo and Wu Luo and Xiaoning Sun and Qingni Shen and Anbang Ruan and Zhonghai Wu}, title = {Whispers between the Containers: High-Capacity Covert Channel Attacks in Docker}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {630--637}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0119}, doi = {10.1109/TRUSTCOM.2016.0119}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuoLSSRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LvLF16, author = {Yali Lv and Cheng{-}Kuan Lin and Jianxi Fan}, title = {Hamiltonian Cycle and Path Embeddings in 3-Ary n-Cubes Based on K1, 2-Structure Faults}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1226--1232}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0198}, doi = {10.1109/TRUSTCOM.2016.0198}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LvLF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LyuLYZ16, author = {Fang Lyu and Yapin Lin and Junfeng Yang and Junhai Zhou}, title = {SUIDroid: An Efficient Hardening-Resilient Approach to Android App Clone Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {511--518}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0104}, doi = {10.1109/TRUSTCOM.2016.0104}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LyuLYZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaWL16, author = {Jingwei Ma and Gang Wang and Xiaoguang Liu}, title = {DedupeSwift: Object-Oriented Storage System Based on Data Deduplication}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1069--1076}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0177}, doi = {10.1109/TRUSTCOM.2016.0177}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaYKMCWWL16, author = {Jingwei Ma and Boxue Yin and Zhi Kong and Yuxiang Ma and Chang Chen and Long Wang and Gang Wang and Xiaoguang Liu}, title = {Leveraging Page-Level Compression in MySQL - {A} Practice at Baidu}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1085--1092}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0179}, doi = {10.1109/TRUSTCOM.2016.0179}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaYKMCWWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MadhounP16, author = {Nour El Madhoun and Guy Pujolle}, title = {Security Enhancements in {EMV} Protocol for {NFC} Mobile Payment}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1889--1895}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0289}, doi = {10.1109/TRUSTCOM.2016.0289}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MadhounP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MansorMAMG16, author = {Hafizah Mansor and Konstantinos Markantonakis and Raja Naeem Akram and Keith Mayes and Iakovos Gurulian}, title = {Log Your Car: The Non-invasive Vehicle Forensics}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {974--982}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0164}, doi = {10.1109/TRUSTCOM.2016.0164}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MansorMAMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ManzoorTS16, author = {Salman Manzoor and Ahmed Taha and Neeraj Suri}, title = {Trust Validation of Cloud IaaS: {A} Customer-centric Approach}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {97--104}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0051}, doi = {10.1109/TRUSTCOM.2016.0051}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ManzoorTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaoGYL16, author = {KunPeng Mao and Songtao Guo and Yuanyuan Yang and Guiyan Liu}, title = {{MRDC:} Multicast Data Restoration in Fat-Tree Data Center Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1500--1507}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0234}, doi = {10.1109/TRUSTCOM.2016.0234}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MaoGYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MarraMSA16, author = {Antonio La Marra and Fabio Martinelli and Andrea Saracino and Alessandro Aldini}, title = {On Probabilistic Application Compliance}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1848--1855}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0283}, doi = {10.1109/TRUSTCOM.2016.0283}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MarraMSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MartinelliSS16, author = {Fabio Martinelli and Andrea Saracino and Mina Sheikhalishahi}, title = {Modeling Privacy Aware Information Sharing Systems: {A} Formal and General Approach}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {767--774}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0137}, doi = {10.1109/TRUSTCOM.2016.0137}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MartinelliSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MengLLL16, author = {Weizhi Meng and Xiapu Luo and Wenjuan Li and Yan Li}, title = {Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1061--1068}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0176}, doi = {10.1109/TRUSTCOM.2016.0176}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MengLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MengXCZ16, author = {Xuying Meng and Zhiwei Xu and Bo Chen and Yujun Zhang}, title = {Privacy-Preserving Query Log Sharing Based on Prior N-Word Aggregation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {722--729}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0131}, doi = {10.1109/TRUSTCOM.2016.0131}, timestamp = {Fri, 15 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MengXCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MinLLC16, author = {Xinping Min and Qingzhong Li and Lei Liu and Lizhen Cui}, title = {A Permissioned Blockchain Framework for Supporting Instant Transaction and Dynamic Block Size}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {90--96}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0050}, doi = {10.1109/TRUSTCOM.2016.0050}, timestamp = {Wed, 08 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MinLLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MisraSB16, author = {Gaurav Misra and Jose M. Such and Hamed Balogun}, title = {{IMPROVE} - Identifying Minimal PROfile VEctors for Similarity Based Access Control}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {868--875}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0150}, doi = {10.1109/TRUSTCOM.2016.0150}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MisraSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NayakT16, author = {Sanjeet Kumar Nayak and Somanath Tripathy}, title = {Privacy Preserving Provable Data Possession for Cloud Based Electronic Health Record System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {860--867}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0149}, doi = {10.1109/TRUSTCOM.2016.0149}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NayakT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NieLQ16, author = {Lihai Nie and Zhiyang Li and Wenyu Qu}, title = {Association Rules Discovery via Approximate Method from Probabilistic Database}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {909--914}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0155}, doi = {10.1109/TRUSTCOM.2016.0155}, timestamp = {Tue, 10 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NieLQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NingZYSM16, author = {Fangxiao Ning and Min Zhu and Ruibang You and Gang Shi and Dan Meng}, title = {Group-Based Memory Deduplication against Covert Channel Attacks in Virtualized Environments}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {194--200}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0063}, doi = {10.1109/TRUSTCOM.2016.0063}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NingZYSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OuWSZA16, author = {Changhai Ou and Zhu Wang and Degang Sun and Xinping Zhou and Juan Ai}, title = {Power Traces Clipping and Splicing Enhanced Correlation Collision Analysis}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {989--995}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0166}, doi = {10.1109/TRUSTCOM.2016.0166}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/OuWSZA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PadilloLV16, author = {Francisco Padillo and Jos{\'{e}} Mar{\'{\i}}a Luna and Sebasti{\'{a}}n Ventura}, title = {Subgroup Discovery on Big Data: Exhaustive Methodologies Using Map-Reduce}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1684--1691}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0258}, doi = {10.1109/TRUSTCOM.2016.0258}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PadilloLV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PanM16, author = {Jinkun Pan and Xiaoguang Mao}, title = {DomXssMicro: {A} Micro Benchmark for Evaluating DOM-Based Cross-Site Scripting Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {208--215}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0065}, doi = {10.1109/TRUSTCOM.2016.0065}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PanM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PantangiXM16, author = {Ajay Pantangi and Kaiqi Xiong and Mufaddal Makati}, title = {SECUPerf: End-to-End Security and Performance Assessment of Cloud Services}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1747--1752}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0268}, doi = {10.1109/TRUSTCOM.2016.0268}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PantangiXM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Pattaranantakul16, author = {Montida Pattaranantakul and Ruan He and Ahmed Meddahi and Zonghua Zhang}, title = {SecMANO: Towards Network Functions Virtualization {(NFV)} Based Security MANagement and Orchestration}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {598--605}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0115}, doi = {10.1109/TRUSTCOM.2016.0115}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Pattaranantakul16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PeiWCJGGZ16, author = {Songwen Pei and Jinkai Wang and Wenyang Cui and Linhua Jiang and Tongsheng Geng and Jean{-}Luc Gaudiot and St{\'{e}}phane Zuckerman}, title = {Codelet Scheduling by Genetic Algorithm}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1492--1499}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0233}, doi = {10.1109/TRUSTCOM.2016.0233}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PeiWCJGGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PeiWMX16, author = {Xiaoqiang Pei and Yijie Wang and Xingkong Ma and Fangliang Xu}, title = {Pipelined Online Data Insertion for Erasure Codes in Distributed Storage Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1159--1166}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0189}, doi = {10.1109/TRUSTCOM.2016.0189}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PeiWMX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PeiWYLP16, author = {Xin Pei and Yongjian Wang and Wei Yao and Jiuchuan Lin and Ruxiang Peng}, title = {Security Enhanced Attribute Based Signcryption for Private Data Sharing in Cloud}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {737--743}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0133}, doi = {10.1109/TRUSTCOM.2016.0133}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PeiWYLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PengCA16, author = {Jian Peng and Kim{-}Kwang Raymond Choo and Helen Ashman}, title = {Astroturfing Detection in Social Media: Using Binary n-Gram Analysis for Authorship Attribution}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {121--128}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0054}, doi = {10.1109/TRUSTCOM.2016.0054}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PengCA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PengY16, author = {Hao Peng and Mengzhuo You}, title = {The Health Care Fraud Detection Using the Pharmacopoeia Spectrum Tree and Neural Network Analytic Contribution Hierarchy Process}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2006--2011}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0306}, doi = {10.1109/TRUSTCOM.2016.0306}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PengY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiaoY016, author = {Yanchen Qiao and Xiaochun Yun and Yongzheng Zhang}, title = {How to Automatically Identify the Homology of Different Malware}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {929--936}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0158}, doi = {10.1109/TRUSTCOM.2016.0158}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiaoY016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiaoY016a, author = {Yanchen Qiao and Xiaochun Yun and Yongzheng Zhang}, title = {Fast Reused Function Retrieval Method Based on Simhash and Inverted Index}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {937--944}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0159}, doi = {10.1109/TRUSTCOM.2016.0159}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiaoY016a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiaoZXZH16, author = {Hong Qiao and Dafang Zhang and Kun Xie and Ji Zhang and Shiming He}, title = {Power-Bandwidth Aware Cooperative Routing in Multi-radio Multi-channel Wireless Network}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1342--1349}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0213}, doi = {10.1109/TRUSTCOM.2016.0213}, timestamp = {Wed, 18 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiaoZXZH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QinWLL16, author = {Xiongpai Qin and Bangguo Wang and Ruchuan Lai and Keqin Li}, title = {Improving Robustness of a {SVR} Based Algorithm Trading Model with Carefully Crafted Features and a Diversified Portfolio}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1676--1683}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0257}, doi = {10.1109/TRUSTCOM.2016.0257}, timestamp = {Fri, 27 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QinWLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QinZL16, author = {Haiyan Qin and Yonglong Zhang and Bin Li}, title = {pHSA: {A} Price Schedule for Heterogeneous Spectrum Auction}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2103--2108}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0323}, doi = {10.1109/TRUSTCOM.2016.0323}, timestamp = {Tue, 05 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QinZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QuYYXGX16, author = {Hongyang Qu and Zhiwen Yu and Zhiyong Yu and Huang Xu and Bin Guo and Xing Xie}, title = {What Is My Next Job: Predicting the Company Size and Position in Career Changes}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1668--1675}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0256}, doi = {10.1109/TRUSTCOM.2016.0256}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QuYYXGX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RahmanBK16, author = {Mohammad Shahriar Rahman and Anirban Basu and Shinsaku Kiyomoto}, title = {Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1759--1764}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0270}, doi = {10.1109/TRUSTCOM.2016.0270}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RahmanBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RahmanEK16, author = {Mohammad Shahriar Rahman and Keita Emura and Shinsaku Kiyomoto}, title = {On the Leakage Resilient Cryptography in Game-Theoretic Settings}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1984--1989}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0303}, doi = {10.1109/TRUSTCOM.2016.0303}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RahmanEK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RaoWZ16, author = {Qiang Rao and Jianjun Wang and Liming Zhang}, title = {Enhancing Source Camera Identification Based on Multiplicative Denoising Filter}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {983--988}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0165}, doi = {10.1109/TRUSTCOM.2016.0165}, timestamp = {Tue, 14 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RaoWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RenJZLW16, author = {Yongjian Ren and Dailiang Jin and Dongyu Zheng and Lei Liu and Xinjing Wei}, title = {An Analytical Model of Data Plane Performance Subject to Prioritized Service}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1537--1542}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0239}, doi = {10.1109/TRUSTCOM.2016.0239}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RenJZLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RongWLWX16, author = {Hong Rong and Huimei Wang and Jian Liu and Wei Wu and Ming Xian}, title = {Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {236--243}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0069}, doi = {10.1109/TRUSTCOM.2016.0069}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RongWLWX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SaadaouiSB16, author = {Amina Saadaoui and Nihel Ben Youssef Ben Souayeh and Adel Bouhoula}, title = {An Accurate FDD-Based Approach for Discovering Distributed Firewalls Misconfigurations}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {552--559}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0109}, doi = {10.1109/TRUSTCOM.2016.0109}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SaadaouiSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SangL0X16, author = {Yafei Sang and Shicong Li and Yongzheng Zhang and Tao Xu}, title = {ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning via Byte Embedding}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {284--291}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0075}, doi = {10.1109/TRUSTCOM.2016.0075}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SangL0X16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SarantinosBAA16, author = {Nikolaos Sarantinos and Chafika Benzaid and Omar Arabiat and Ameer Al{-}Nemrat}, title = {Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1782--1787}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0274}, doi = {10.1109/TRUSTCOM.2016.0274}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SarantinosBAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SasagawaOK16, author = {Takashi Sasagawa and Satoshi Ohzahata and Toshihiko Kato}, title = {Suppressing Selfish Transmissions with Extending {NAV} Period and Resetting {CW} of Access Point in Wireless {LAN}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1910--1916}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0292}, doi = {10.1109/TRUSTCOM.2016.0292}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SasagawaOK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ScoonK16, author = {Craig Scoon and Ryan K. L. Ko}, title = {The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1998--2005}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0305}, doi = {10.1109/TRUSTCOM.2016.0305}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ScoonK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Serrano-PerezSC16, author = {Jos{\'{e}} de Jes{\'{u}}s Serrano{-}P{\'{e}}rez and Mois{\'{e}}s Salinas{-}Rosales and Nareli Cruz Cort{\'{e}}s}, title = {Universal Steganography Detector Based on an Artificial Immune System for {JPEG} Images}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1896--1903}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0290}, doi = {10.1109/TRUSTCOM.2016.0290}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Serrano-PerezSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShenXWG16, author = {Chao Shen and Haodi Xu and Haijun Wang and Xiaohong Guan}, title = {Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1054--1060}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0175}, doi = {10.1109/TRUSTCOM.2016.0175}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShenXWG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShenZ16, author = {Tong Shen and Dafang Zhang}, title = {Rule Selector: {A} Novel Scalable Model for High-Performance Flow Recognition}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1121--1128}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0184}, doi = {10.1109/TRUSTCOM.2016.0184}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShenZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShengGCWG16, author = {Long Sheng and Xiaoyun Guang and Feng Chen and Hui Wang and Kang Gao}, title = {A Review on Complex Network Dynamics in Evolutionary Algorithm}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2221--2226}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0342}, doi = {10.1109/TRUSTCOM.2016.0342}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShengGCWG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShepherdAGLMASC16, author = {Carlton Shepherd and Ghada Arfaoui and Iakovos Gurulian and Robert P. Lee and Konstantinos Markantonakis and Raja Naeem Akram and Damien Sauveron and Emmanuel Conchon}, title = {Secure and Trusted Execution: Past, Present, and Future - {A} Critical Review in the Context of the Internet of Things and Cyber-Physical Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {168--177}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0060}, doi = {10.1109/TRUSTCOM.2016.0060}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShepherdAGLMASC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShinoharaKSS16, author = {Ryoki Shinohara and Takashi Kamimoto and Kazuya Sato and Hiroshi Shigeno}, title = {Cache Control Method Mitigating Packet Concentration of Router Caused by Interest Flooding Attack}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {324--331}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0080}, doi = {10.1109/TRUSTCOM.2016.0080}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShinoharaKSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShuGDYH16, author = {Peng Shu and Rong Gu and Qianhao Dong and Chunfeng Yuan and Yihua Huang}, title = {Accelerating Big Data Applications on Tiered Storage System with Various Eviction Policies}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1350--1357}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0214}, doi = {10.1109/TRUSTCOM.2016.0214}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShuGDYH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShuLLL16, author = {Jian Shu and Weijie Lin and Linlan Liu and Xuyan Luo}, title = {Topology Prediction Mechanism for Pocket Switched Network Based on Deep Belief Network}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1811--1817}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0278}, doi = {10.1109/TRUSTCOM.2016.0278}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShuLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SignorelloPG16, author = {Salvatore Signorello and Maria Rita Palattella and Luigi Alfredo Grieco}, title = {Security Challenges in Future NDN-Enabled VANETs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1771--1775}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0272}, doi = {10.1109/TRUSTCOM.2016.0272}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SignorelloPG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SilvaMPL16, author = {Jo{\~{a}}o A. Silva and Ricardo Monteiro and Herv{\'{e}} Paulino and Jo{\~{a}}o M. Louren{\c{c}}o}, title = {Ephemeral Data Storage for Networks of Hand-Held Devices}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1106--1113}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0182}, doi = {10.1109/TRUSTCOM.2016.0182}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SilvaMPL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Stricot-Tarboton16, author = {Shaun Stricot{-}Tarboton and Sivadon Chaisiri and Ryan K. L. Ko}, title = {Taxonomy of Man-in-the-Middle Attacks on {HTTPS}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {527--534}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0106}, doi = {10.1109/TRUSTCOM.2016.0106}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Stricot-Tarboton16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuFYS16, author = {Mang Su and Anmin Fu and Yan Yu and Guozhen Shi}, title = {Resource-centric Dynamic Access Control in Cloud}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1957--1962}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0299}, doi = {10.1109/TRUSTCOM.2016.0299}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SuFYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuWWL16, author = {Dan Su and Wei Wang and Xing Wang and Jiqiang Liu}, title = {Anomadroid: Profiling Android Applications' Behaviors for Identifying Unknown Malapps}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {691--698}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0127}, doi = {10.1109/TRUSTCOM.2016.0127}, timestamp = {Wed, 11 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SuWWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuZLZ16, author = {Xin Su and Dafang Zhang and Wenjia Li and Kai Zhao}, title = {A Deep Learning Approach to Android Malware Feature Learning and Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {244--251}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0070}, doi = {10.1109/TRUSTCOM.2016.0070}, timestamp = {Tue, 24 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SuZLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunLLL16, author = {Yujie Sun and Weijiang Liu and Zhaobin Liu and Chao Liu}, title = {Comparison of Five Packet-Sampling-Based Methods for Detecting Elephant Flows}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2018--2023}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0308}, doi = {10.1109/TRUSTCOM.2016.0308}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunSDZH16, author = {Degang Sun and Jun Shi and Xuejie Ding and Meng Zhang and Wei{-}qing Huang}, title = {Method for Detecting Information Leakage from Computer Display in Electromagnetic Radiation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2041--2046}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0312}, doi = {10.1109/TRUSTCOM.2016.0312}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SunSDZH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunSLW16, author = {Qian Sun and Qingni Shen and Cong Li and Zhonghai Wu}, title = {SeLance: Secure Load Balancing of Virtual Machines in Cloud}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {662--669}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0123}, doi = {10.1109/TRUSTCOM.2016.0123}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunSLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunSZC16, author = {Shibin Sun and Yuliang Shi and Shidong Zhang and Lizhen Cui}, title = {A Privacy Protection Mechanism for NoSql Database Based on Data Chunks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {829--836}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0145}, doi = {10.1109/TRUSTCOM.2016.0145}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunSZC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TanY16, author = {Yujuan Tan and Zhichao Yan}, title = {Multi-objective Based Performance Evaluation of Deduplication Approaches}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1137--1144}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0186}, doi = {10.1109/TRUSTCOM.2016.0186}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TanY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TangLJW16, author = {Hongyan Tang and Ying Li and Tong Jia and Zhonghai Wu}, title = {Evaluating Performance of Rescheduling Strategies in Cloud System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1559--1566}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0242}, doi = {10.1109/TRUSTCOM.2016.0242}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TangLJW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TaubmannRR16, author = {Benjamin Taubmann and No{\"{e}}lle Rakotondravony and Hans P. Reiser}, title = {CloudPhylactor: Harnessing Mandatory Access Control for Virtual Machine Introspection in Cloud Data Centers}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {957--964}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0162}, doi = {10.1109/TRUSTCOM.2016.0162}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TaubmannRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TengCSB16, author = {Yiping Teng and Xiang Cheng and Sen Su and Rong Bi}, title = {Privacy-Preserving Top-k Nearest Keyword Search on Outsourced Graphs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {815--822}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0143}, doi = {10.1109/TRUSTCOM.2016.0143}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TengCSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TianQDL16, author = {Jianbang Tian and Zhuzhong Qian and Mianxiong Dong and Sanglu Lu}, title = {FairShare: Dynamic Max-Min Fairness Bandwidth Allocation in Datacenters}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1463--1470}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0229}, doi = {10.1109/TRUSTCOM.2016.0229}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TianQDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TouatiHC16, author = {Lyes Touati and Hamed Hellaoui and Yacine Challal}, title = {Threshold Yoking/Grouping Proofs Based on {CP-ABE} for IoT Applications}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {568--575}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0111}, doi = {10.1109/TRUSTCOM.2016.0111}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TouatiHC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TrojaB16, author = {Erald Troja and Spiridon Bakiras}, title = {Privacy-Preserving Location-Aware Mobile Advertisement}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {783--790}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0139}, doi = {10.1109/TRUSTCOM.2016.0139}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TrojaB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Tse16, author = {Savio S. H. Tse}, title = {Bicriteria Load Balancing for Online Placement in Heterogeneous Servers with Extreme Upper Bounds}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1319--1326}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0210}, doi = {10.1109/TRUSTCOM.2016.0210}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Tse16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TseWL16, author = {Daniel Tse and Lu Wang and Yuxi Li}, title = {Mobility Management for Enterprises in {BYOD} Deployment}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {638--645}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0120}, doi = {10.1109/TRUSTCOM.2016.0120}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TseWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/UsmanJHN16, author = {Muhammad Usman and Mian Ahmad Jan and Xiangjian He and Priyadarsi Nanda}, title = {Data Sharing in Secure Multimedia Wireless Sensor Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {590--597}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0114}, doi = {10.1109/TRUSTCOM.2016.0114}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/UsmanJHN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangALLH16, author = {Yaobin Wang and Hong An and Zhiqin Liu and Ling Li and Jun Huang}, title = {A Flexible Chip Multiprocessor Simulator Dedicated for Thread Level Speculation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2127--2132}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0327}, doi = {10.1109/TRUSTCOM.2016.0327}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangALLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangCCZLW16, author = {Hui Wang and Xiaohe Chen and Xinjian Chen and Peilin Zang and Yunqing Liu and Lirong Wang}, title = {Fall Detection Based on {KPCA} and 3D {KPCA}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2187--2191}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0336}, doi = {10.1109/TRUSTCOM.2016.0336}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangCCZLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangJMH16, author = {Ying Wang and Yang Ju and Tiantian Miao and Rongxi He}, title = {Chunk-Based Resource Allocation with Fairness Consideration for Layered Multicast Streaming in {OFDMA} Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2047--2051}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0313}, doi = {10.1109/TRUSTCOM.2016.0313}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangJMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLDQ16, author = {Jun Wang and Zhiyang Li and Yegang Du and Wenyu Qu}, title = {Stacked Product Quantization for Nearest Neighbor Search on Large Datasets}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1621--1627}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0250}, doi = {10.1109/TRUSTCOM.2016.0250}, timestamp = {Tue, 10 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangLDQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLGQM16, author = {Yuwei Wang and Min Liu and Bo Gao and Chenchong Qin and Cheng Ma}, title = {{I/O} Congestion-Aware Computing Resource Assignment and Scheduling in Virtualized Cloud Environments}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1280--1287}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0205}, doi = {10.1109/TRUSTCOM.2016.0205}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLGQM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLLWC16, author = {Shiqing Wang and Yuanyuan Li and Zhiyang Li and Junfeng Wu and Fengjuan Chen}, title = {Surveillance Methods of Running Condition of Chemical Equipments Based on Skyline}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2246--2250}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0346}, doi = {10.1109/TRUSTCOM.2016.0346}, timestamp = {Mon, 28 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangLLWC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLZX16, author = {Changhai Wang and Meng Li and Jianzhong Zhang and Yuwei Xu}, title = {A Model with Hierarchical Classifiers for Activity Recognition on Mobile Devices}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1295--1301}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0207}, doi = {10.1109/TRUSTCOM.2016.0207}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangSSL16, author = {Bo Wang and Ying Song and Yuzhong Sun and Jun Liu}, title = {Improvements to Online Distributed Monitoring Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1093--1100}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0180}, doi = {10.1109/TRUSTCOM.2016.0180}, timestamp = {Fri, 10 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangSSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangSZ16, author = {Shu{-}Yan Wang and Jia{-}Ze Sun and Ju Zhang}, title = {The Method of Generating Web Link Security Testing Scenario Based on {UML} Diagram}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1831--1838}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0281}, doi = {10.1109/TRUSTCOM.2016.0281}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangW16, author = {Jiequn Wang and Lei Wang}, title = {A Novel Solution of Data Analysis in Modern Sports Education}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2269--2272}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0350}, doi = {10.1109/TRUSTCOM.2016.0350}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWCZ16, author = {Yan Wang and Lirong Wang and Xiaohe Chen and Wenliang Zhu}, title = {P Wave Detection and Delineation Based on Distances Transform}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2197--2201}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0338}, doi = {10.1109/TRUSTCOM.2016.0338}, timestamp = {Tue, 28 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangWCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWGM16, author = {Liang Wang and Weiping Wang and Jingzi Gu and Dan Meng}, title = {Delta-Generalization: High Accuracy Data Release for Privacy Preserving}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1861--1866}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0285}, doi = {10.1109/TRUSTCOM.2016.0285}, timestamp = {Thu, 13 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangWGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWHW16, author = {Xueyi Wang and Xingwei Wang and Min Huang and Zun Wang}, title = {Combinatorial Reverse Auction-Based Service Provision in Social Clouds}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2097--2102}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0322}, doi = {10.1109/TRUSTCOM.2016.0322}, timestamp = {Mon, 04 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangWHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangXHXH16, author = {Caimei Wang and Yan Xiong and Wenchao Huang and Huihua Xia and Jianmeng Huang}, title = {Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {42--49}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0044}, doi = {10.1109/TRUSTCOM.2016.0044}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangXHXH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangXZY16, author = {Changhai Wang and Yuwei Xu and Jianzhong Zhang and Wenping Yu}, title = {{SW-HMM:} {A} Method for Evaluating Confidence of Smartphone-Based Activity Recognition}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2086--2091}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0320}, doi = {10.1109/TRUSTCOM.2016.0320}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangXZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangYHXLS16, author = {Jie Wang and Ce Yu and Zhi Hong and Jian Xiao and Chen Li and Jizhou Sun}, title = {Pattern Aware Cache Management for Efficient Subset Retrieving of Astronomical Image Data}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1396--1403}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0220}, doi = {10.1109/TRUSTCOM.2016.0220}, timestamp = {Wed, 21 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangYHXLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangYTZH16, author = {Xiaolei Wang and Yuexiang Yang and Chuan Tang and Yingzhi Zeng and Jie He}, title = {DroidContext: Identifying Malicious Mobile Privacy Leak Using Context}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {807--814}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0142}, doi = {10.1109/TRUSTCOM.2016.0142}, timestamp = {Tue, 20 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangYTZH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangYZLZ16, author = {Ziyu Wang and Jiahai Yang and Shize Zhang and Chenxi Li and Hui Zhang}, title = {Automatic Model Selection for Anomaly Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {276--283}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0074}, doi = {10.1109/TRUSTCOM.2016.0074}, timestamp = {Sat, 20 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangYZLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZLW16, author = {Shijia Wang and Liang Zhou and Yuanyuan Li and Junfeng Wu}, title = {Parallel Monte Carlo Method with MapReduce for Option Pricing}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2116--2121}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0325}, doi = {10.1109/TRUSTCOM.2016.0325}, timestamp = {Mon, 28 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangZLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZWY16, author = {Yu Wang and Yuqing Zhang and Kai Wang and Jingbo Yan}, title = {Security Analysis and Vulnerability Detection of Gesture-Based Lock in Android Applications}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {410--417}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0091}, doi = {10.1109/TRUSTCOM.2016.0091}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangZWY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WeiJZZX16, author = {Xiaochao Wei and Han Jiang and Chuan Zhao and Minghao Zhao and Qiuliang Xu}, title = {Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {418--425}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0092}, doi = {10.1109/TRUSTCOM.2016.0092}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WeiJZZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WeiPYLWM16, author = {Yi Wei and Li Pan and Dong Yuan and Shijun Liu and Lei Wu and Xiangxu Meng}, title = {A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1543--1550}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0240}, doi = {10.1109/TRUSTCOM.2016.0240}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WeiPYLWM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WenDZJ16, author = {Zilong Wen and Weiqi Dai and Deqing Zou and Hai Jin}, title = {PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing Infrastructures}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {683--690}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0126}, doi = {10.1109/TRUSTCOM.2016.0126}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WenDZJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WenY16, author = {Juping Wen and QingDan Yuan}, title = {Social Circles Discovery Based on Structural and Attribute Similarities}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1652--1659}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0254}, doi = {10.1109/TRUSTCOM.2016.0254}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WenY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WengL16, author = {Wu{-}Xiang Weng and Shou{-}Chih Lo}, title = {Fall Detection Based on Tilt Angle and Acceleration Variations}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1712--1717}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0262}, doi = {10.1109/TRUSTCOM.2016.0262}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WengL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WengLL16, author = {Xu Weng and Zhaobin Liu and Zhiyang Li}, title = {An Efficient Influence Maximization Algorithm Considering Both Positive and Negative Relationships}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1931--1936}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0295}, doi = {10.1109/TRUSTCOM.2016.0295}, timestamp = {Wed, 11 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WengLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WillKW16, author = {Mark A. Will and Ryan K. L. Ko and Ian H. Witten}, title = {Privacy Preserving Computation by Fragmenting Individual Bits and Distributing Gates}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {900--908}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0154}, doi = {10.1109/TRUSTCOM.2016.0154}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WillKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuHWX16, author = {Genqiang Wu and Yeping He and JingZheng Wu and Xianyao Xia}, title = {Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function Computation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {921--928}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0157}, doi = {10.1109/TRUSTCOM.2016.0157}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuHWX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuHYSSZ16, author = {Renke Wu and Linpeng Huang and Peng Yu and Kai Shen and Qiuwei Shi and Haojie Zhou}, title = {Meta-Model Evolution with Self-Adaptation: An Empirical Development Approach for Distributed Parallel Computing Framework}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2227--2234}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0343}, doi = {10.1109/TRUSTCOM.2016.0343}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuHYSSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuLLJ16, author = {Jigang Wu and Ningjing Liu and Siew Kei Lam and Guiyuan Jiang}, title = {Shortest Partial Path First Algorithm for Reconfigurable Processor Array with Faults}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1198--1203}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0194}, doi = {10.1109/TRUSTCOM.2016.0194}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuLLJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuLWHL16, author = {Jain{-}Shing Wu and Yuh{-}Jye Lee and Te{-}En Wei and Chih{-}Hung Hsieh and Chia{-}Min Lai}, title = {ChainSpot: Mining Service Logs for Cyber Security Threat Detection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1867--1874}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0286}, doi = {10.1109/TRUSTCOM.2016.0286}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuLWHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuWQJLXS16, author = {Junfeng Wu and Yitong Wan and Wenyu Qu and Changqing Ji and Yuanyuan Li and Peng Xiao and Jianwei Sun}, title = {A Novel Image Retrieval Approach with Bag-of-Word Model and Gabor Feature}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1706--1711}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0261}, doi = {10.1109/TRUSTCOM.2016.0261}, timestamp = {Mon, 28 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuWQJLXS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuXCZ16, author = {Danye Wu and Zhiwei Xu and Bo Chen and Yujun Zhang}, title = {What If Routers Are Malicious? Mitigating Content Poisoning Attack in {NDN}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {481--488}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0100}, doi = {10.1109/TRUSTCOM.2016.0100}, timestamp = {Fri, 15 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuXCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuZL0W16, author = {Huijun Wu and Liming Zhu and Kai Lu and Gen Li and Dongyao Wu}, title = {StageFS: {A} Parallel File System Optimizing Metadata Performance for {SSD} Based Clusters}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2147--2152}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0330}, doi = {10.1109/TRUSTCOM.2016.0330}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuZL0W16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaWP16, author = {Hui Xia and Guo{-}Dong Wang and Zhenkuan Pan}, title = {Node Trust Prediction Framework in Mobile Ad Hoc Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {50--56}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0045}, doi = {10.1109/TRUSTCOM.2016.0045}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XiaWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoAC16, author = {Hannan Xiao and Awatif Ali Alshehri and Bruce Christianson}, title = {A Cloud-Based {RFID} Authentication Protocol with Insecure Communication Channels}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {332--339}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0081}, doi = {10.1109/TRUSTCOM.2016.0081}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoAC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoCCWLWB16, author = {Yajuan Xiao and Shoufeng Cao and Zhenzhong Cao and Fengyu Wang and Fengbo Lin and Jiayan Wu and Hancheng Bi}, title = {Matching Similar Functions in Different Versions of a Malware}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {252--259}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0071}, doi = {10.1109/TRUSTCOM.2016.0071}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoCCWLWB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoLQQY16, author = {Peng Xiao and Zhiyang Li and Heng Qi and Wenyu Qu and Haisheng Yu}, title = {An Efficient DDoS Detection with Bloom Filter in {SDN}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0038}, doi = {10.1109/TRUSTCOM.2016.0038}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoLQQY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoWJM16, author = {Peipei Xiao and Yufeng Wang and Qun Jin and Jianhua Ma}, title = {A Privacy-Preserving Incentive Scheme for Advertisement Dissemination in Vehicular Social Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1741--1746}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0267}, doi = {10.1109/TRUSTCOM.2016.0267}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoWJM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoXLL16, author = {Xiongren Xiao and Guoqi Xie and Renfa Li and Keqin Li}, title = {Minimizing Schedule Length of Energy Consumption Constrained Parallel Applications on Heterogeneous Distributed Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1471--1476}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0230}, doi = {10.1109/TRUSTCOM.2016.0230}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoXLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XieWL16, author = {Yuanyuan Xie and Jiang Wu and Fengzhu Liu}, title = {A Hierarchic Hybrid Scheduling Algorithm for Static Task with Precedence Constraints}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2079--2085}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0319}, doi = {10.1109/TRUSTCOM.2016.0319}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XieWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XieZLLG16, author = {Tianyi Xie and Yuanyuan Zhang and Juanru Li and Hui Liu and Dawu Gu}, title = {New Exploit Methods against Ptmalloc of {GLIBC}}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {646--653}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0121}, doi = {10.1109/TRUSTCOM.2016.0121}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XieZLLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuCCSZ16, author = {Youjun Xu and Xianglan Chen and Zhinan Cheng and Jiachen Song and Yuxiang Zhang}, title = {Improving Energy Efficiency by Phase-Grained Migration for Asymmetric Multicore}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1412--1419}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0222}, doi = {10.1109/TRUSTCOM.2016.0222}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuCCSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuFGSPSY16, author = {Jingheng Xu and Haohuan Fu and Lin Gan and Yu Song and Hongbo Peng and Wen Shi and Guangwen Yang}, title = {Evaluating the {POWER8} Architecture through Optimizing Stencil-Based Algorithms}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1374--1381}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0217}, doi = {10.1109/TRUSTCOM.2016.0217}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuFGSPSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuH16, author = {Yuanchao Xu and Zeyi Hou}, title = {NVM-Assisted Non-redundant Logging for Android Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1427--1433}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0224}, doi = {10.1109/TRUSTCOM.2016.0224}, timestamp = {Wed, 05 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuHYL16, author = {Wen Xu and Jiangqiang Hu and Jianchuan Yin and Ke Li}, title = {Ship Automatic Collision Avoidance by Altering Course Based on Ship Dynamic Domain}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2024--2030}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0309}, doi = {10.1109/TRUSTCOM.2016.0309}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuHYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuLLQ16, author = {Renhai Xu and Wenxin Li and Keqiu Li and Heng Qi}, title = {Towards Application-Aware In-Network Bandwidth Management in Data Centers}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2206--2212}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0340}, doi = {10.1109/TRUSTCOM.2016.0340}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuLLQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuLNCZ16, author = {Shibo Xu and Qingzhou Li and Peng Ni and Wensheng Cao and Xianfeng Zhao}, title = {The Application of Ad-Hoc Network in Smart Container Tracking System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2068--2072}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0317}, doi = {10.1109/TRUSTCOM.2016.0317}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuLNCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuWLS16, author = {Yemao Xu and Jialong Wang and Yanhong Liu and Li Shen}, title = {Fast Task Submission in Software Thread Level Speculation Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2160--2166}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0332}, doi = {10.1109/TRUSTCOM.2016.0332}, timestamp = {Thu, 03 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuWLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuZY16, author = {Zhikai Xu and Hongli Zhang and Xiang{-}Zhan Yu}, title = {Multiple Mix-Zones Deployment for Continuous Location Privacy Protection}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {760--766}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0136}, doi = {10.1109/TRUSTCOM.2016.0136}, timestamp = {Sun, 19 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XueHZ16, author = {Nian Xue and Xin Huang and Jie Zhang}, title = {S2Net: {A} Security Framework for Software Defined Intelligent Building Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {654--661}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0122}, doi = {10.1109/TRUSTCOM.2016.0122}, timestamp = {Sat, 12 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XueHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangCWGX16, author = {Liu Yang and Xingmin Cui and Changyuan Wang and Shanqing Guo and Xin{-}Shun Xu}, title = {Risk Analysis of Exposed Methods to JavaScript in Hybrid Apps}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {458--464}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0097}, doi = {10.1109/TRUSTCOM.2016.0097}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangCWGX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangHLYY16, author = {Xinyu Yang and Xiaofei He and Jie Lin and Wei Yu and Qingyu Yang}, title = {A Game-Theoretic Model on Coalitional Attacks in Smart Grid}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {435--442}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0094}, doi = {10.1109/TRUSTCOM.2016.0094}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangHLYY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangJXHWZC16, author = {Xiaoyan Yang and Han Jiang and Qiuliang Xu and Mengbo Hou and Xiaochao Wei and Minghao Zhao and Kim{-}Kwang Raymond Choo}, title = {A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {670--677}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0124}, doi = {10.1109/TRUSTCOM.2016.0124}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangJXHWZC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangLLH16, author = {Xu Yang and Ting{-}Ting Lee and Joseph K. Liu and Xinyi Huang}, title = {Trust Enhancement over Range Search for Encrypted Data}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {66--73}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0047}, doi = {10.1109/TRUSTCOM.2016.0047}, timestamp = {Wed, 17 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangLLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangSYW16, author = {Yan Yang and Xingang Shi and Xia Yin and Zhiliang Wang}, title = {The Power of Prefix Hijackings in the Internet Hierarchy}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {228--235}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0068}, doi = {10.1109/TRUSTCOM.2016.0068}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangSYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangZLZ16, author = {Xu Yang and Yuexin Zhang and Joseph K. Liu and YaLi Zeng}, title = {A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {138--143}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0056}, doi = {10.1109/TRUSTCOM.2016.0056}, timestamp = {Tue, 30 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangZLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YiMLYW16, author = {Zibo Yi and Jun Ma and Lei Luo and Jie Yu and Qingbo Wu}, title = {Improving JavaScript Malware Classifier's Security against Evasion by Particle Swarm Optimization}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1734--1740}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0266}, doi = {10.1109/TRUSTCOM.2016.0266}, timestamp = {Wed, 22 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YiMLYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Yin0L16, author = {Tao Yin and Yongzheng Zhang and Jia Li}, title = {AppBot: {A} Novel {P2P} Botnet Architecture Resistant to Graph-Based Tracking}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {615--622}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0117}, doi = {10.1109/TRUSTCOM.2016.0117}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Yin0L16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuCZ16, author = {Fajiang Yu and Lie Chen and Huanguo Zhang}, title = {Virtual {TPM} Dynamic Trust Extension Suitable for Frequent Migrations}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {57--65}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0046}, doi = {10.1109/TRUSTCOM.2016.0046}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuSWR16, author = {Fangwen Yu and Ming Su and Gang Wang and Mingming Ren}, title = {Error Decomposition Algorithm for Approximating the k-Error Linear Complexity of Periodic Sequences}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {505--510}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0103}, doi = {10.1109/TRUSTCOM.2016.0103}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuSWR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZengLXZ16, author = {Fanzi Zeng and Jie Li and Jisheng Xu and Jing Zhong}, title = {A Trust-Based Cooperative Spectrum Sensing Scheme against {SSDF} Attack in CRNs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1167--1173}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0190}, doi = {10.1109/TRUSTCOM.2016.0190}, timestamp = {Fri, 10 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZengLXZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZengWWCLW16, author = {Juru Zeng and Yuncheng Wu and Yao Wu and Hong Chen and Cuiping Li and Shan Wang}, title = {Energy-Efficient and Privacy-Preserving Range Query in Participatory Sensing}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {876--883}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0151}, doi = {10.1109/TRUSTCOM.2016.0151}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZengWWCLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhang0QWL16, author = {Wei Zhang and Sheng Zhang and Zhuzhong Qian and Kaiyuan Wen and Sanglu Lu}, title = {Virtual Network Deployment in Hybrid Data Center Networks}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1256--1263}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0202}, doi = {10.1109/TRUSTCOM.2016.0202}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Zhang0QWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhang16, author = {Jiliang Zhang}, title = {Combinational Logic Binding for {FPGA} System Security}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {216--223}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0066}, doi = {10.1109/TRUSTCOM.2016.0066}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Zhang16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangC16, author = {Huirong Zhang and Jianwen Cao}, title = {A Subgraph Preconditioning Algorithm for Large Linear Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2153--2159}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0331}, doi = {10.1109/TRUSTCOM.2016.0331}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangFCYZ16, author = {Zheng Zhang and Dan Feng and Jianxi Chen and Ya Yu and Jing Zeng}, title = {The Design and Implementation of a Lightweight Management Framework for Non-volatile Memory}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1551--1558}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0241}, doi = {10.1109/TRUSTCOM.2016.0241}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangFCYZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangHMYJ16, author = {Yunan Zhang and Qingjia Huang and Xinjian Ma and Zeming Yang and Jianguo Jiang}, title = {Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {965--973}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0163}, doi = {10.1109/TRUSTCOM.2016.0163}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangHMYJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangJ016, author = {Qian Zhang and Ying Jiang and Peng Wu}, title = {Modelling and Analysis of Network Security - An Algebraic Approach}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {308--315}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0078}, doi = {10.1109/TRUSTCOM.2016.0078}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangJ016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLHZ16, author = {Jian Zhang and Pin Liu and Jianbiao He and Yawei Zhang}, title = {A Hadoop Based Analysis and Detection Model for {IP} Spoofing Typed DDoS Attack}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1976--1983}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0302}, doi = {10.1109/TRUSTCOM.2016.0302}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLLXC16, author = {Shuai Zhang and Lei Liu and Hui Li and Zongshui Xiao and Lizhen Cui}, title = {MTPGraph: {A} Data-Driven Approach to Predict Medical Risk Based on Temporal Profile Graph}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1174--1181}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0191}, doi = {10.1109/TRUSTCOM.2016.0191}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLLXC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLMC16, author = {Puheng Zhang and Chuang Lin and Kun Meng and Ying Chen}, title = {A Comprehensive Optimization for Performance, Energy Efficiency, and Maintenance in Cloud Datacenters}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1264--1271}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0203}, doi = {10.1109/TRUSTCOM.2016.0203}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLW16, author = {Shaobo Zhang and Qin Liu and Guojun Wang}, title = {Enhancing Location Privacy through User-Defined Grid in Location-Based Services}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {730--736}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0132}, doi = {10.1109/TRUSTCOM.2016.0132}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLY16, author = {Yong Zhang and Bo Liu and Fan Yang}, title = {Differential Evolution Based Selective Ensemble of Extreme Learning Machine}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1327--1333}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0211}, doi = {10.1109/TRUSTCOM.2016.0211}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLYSC16, author = {Xinwen Zhang and Huakang Li and Yitao Yang and Guozi Sun and Guangxuan Chen}, title = {{LIPPS:} Logistics Information Privacy Protection System Based on Encrypted {QR} Code}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {996--1000}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0167}, doi = {10.1109/TRUSTCOM.2016.0167}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLYSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLZ16, author = {Jiexin Zhang and Xiaoxue Liu and Peidong Zhu}, title = {Securing Power System State Estimation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {699--706}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0128}, doi = {10.1109/TRUSTCOM.2016.0128}, timestamp = {Tue, 01 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangPWL16, author = {Jianyi Zhang and Yang Pan and Zhiqiang Wang and Biao Liu}, title = {{URL} Based Gateway Side Phishing Detection Method}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {268--275}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0073}, doi = {10.1109/TRUSTCOM.2016.0073}, timestamp = {Mon, 06 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangPWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangTTLS16, author = {Heng Zhang and Ahmed Taha and Rub{\'{e}}n Trapero and Jesus Luna and Neeraj Suri}, title = {{SENTRY:} {A} Novel Approach for Mitigating Application Layer DDoS Threats}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {465--472}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0098}, doi = {10.1109/TRUSTCOM.2016.0098}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangTTLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangXJJ16, author = {Guozhu Zhang and Luning Xia and Shijie Jia and Yafei Ji}, title = {Identification of Cloned {HF} {RFID} Proximity Cards Based on {RF} Fingerprinting}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {292--300}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0076}, doi = {10.1109/TRUSTCOM.2016.0076}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangXJJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangXZZ16, author = {Yang Zhang and Zuocheng Xing and Li Zhou and Chunsheng Zhu}, title = {Locality Protected Dynamic Cache Allocation Scheme on GPUs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1524--1530}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0237}, doi = {10.1109/TRUSTCOM.2016.0237}, timestamp = {Mon, 10 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangXZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangZW16, author = {Qijia Zhang and Fangjin Zhu and Canhui Wang}, title = {An Enhanced Node Mapping Algorithm for {VNE} Problem Based on Path Relevance}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1204--1209}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0195}, doi = {10.1109/TRUSTCOM.2016.0195}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoY16, author = {Jian Zhao and Jianchuan Yin}, title = {Study on the Control of Fractional-Order {PID} for Underwater Vehicle Attitude Angle}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2035--2040}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0311}, doi = {10.1109/TRUSTCOM.2016.0311}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoZ16, author = {Huan Zhao and Xixiang Zhang}, title = {A Mobile Security-Related Behavior Prevention Model Based on Speech Personality Traits}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1803--1810}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0277}, doi = {10.1109/TRUSTCOM.2016.0277}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengJHLW16, author = {Dongyu Zheng and Dailiang Jin and Yuanzhe Hao and Lei Liu and Xinjing Wei}, title = {Prediction of Consecutive Road Node Congestion Based on Queueing Model}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1531--1536}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0238}, doi = {10.1109/TRUSTCOM.2016.0238}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengJHLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengYSM16, author = {Xianyi Zheng and Lulu Yang and Gang Shi and Dan Meng}, title = {Secure Mobile Payment Employing Trusted Computing on TrustZone Enabled Platforms}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1944--1950}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0297}, doi = {10.1109/TRUSTCOM.2016.0297}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengYSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouCSL16, author = {Kailai Zhou and Hong Chen and Hui Sun and Cuiping Li}, title = {A Skew-Insensitive Hashing Sync and Construction Scheme for Many-Core Coprocessors}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1334--1341}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0212}, doi = {10.1109/TRUSTCOM.2016.0212}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouCSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouCZZ16, author = {Tianqi Zhou and Bing Chen and Chunsheng Zhu and Xiangping Zhai}, title = {{TPAHS:} {A} Truthful and Profit Maximizing Double Auction for Heterogeneous Spectrums}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {27--33}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0042}, doi = {10.1109/TRUSTCOM.2016.0042}, timestamp = {Wed, 16 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouCZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouLLW16, author = {Lei Zhou and Xiaowei Liu and Qin Liu and Guojun Wang}, title = {A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {451--457}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0096}, doi = {10.1109/TRUSTCOM.2016.0096}, timestamp = {Mon, 23 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouLLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouSWOA16, author = {Xinping Zhou and Degang Sun and Zhu Wang and Changhai Ou and Juan Ai}, title = {Double-Key Recovery Based Correlation Power Analysis}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1016--1022}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0170}, doi = {10.1109/TRUSTCOM.2016.0170}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouSWOA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouSY16, author = {Bo Zhou and Qi Shi and Po Yang}, title = {A Survey on Quantitative Evaluation of Web Service Security}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {715--721}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0130}, doi = {10.1109/TRUSTCOM.2016.0130}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouWQHL16, author = {Xiuwen Zhou and Qianhong Wu and Bo Qin and Xinyi Huang and Jianwei Liu}, title = {Distributed Bitcoin Account Management}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {105--112}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0052}, doi = {10.1109/TRUSTCOM.2016.0052}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouWQHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouXGC16, author = {Jiang Zhou and Wei Xie and Qiang Gu and Yong Chen}, title = {Hierarchical Consistent Hashing for Heterogeneous Object-Based Storage}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1597--1604}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0247}, doi = {10.1109/TRUSTCOM.2016.0247}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouXGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouZJL16, author = {Zhiwei Zhou and Junwu Zhu and Yi Jiang and Bin Li}, title = {A Truthful Greedy Mechanism toward Resource Sharing for Cloudlets in Mobile Cloud Computing}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1241--1247}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0200}, doi = {10.1109/TRUSTCOM.2016.0200}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouZJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouZXC16, author = {Huibin Zhou and Dafang Zhang and Kun Xie and Yuxiang Chen}, title = {Robust Spatio-temporal Tensor Recovery for Internet Traffic Data}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1404--1411}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0221}, doi = {10.1109/TRUSTCOM.2016.0221}, timestamp = {Wed, 18 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouZXC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuCWW16, author = {Wenliang Zhu and Xiaohe Chen and Yan Wang and Lirong Wang}, title = {The Survey of Low-Power Sleep Monitoring Algorithm Based on the Wrist Movement Signal}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2192--2196}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0337}, doi = {10.1109/TRUSTCOM.2016.0337}, timestamp = {Tue, 28 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuCWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuCZWK16, author = {Dali Zhu and Junhuang Chen and Yanfang Zhang and Siye Wang and Huafeng Kong}, title = {An Efficient Approach of Integrating {RFID} and Vision Techniques in Object Surveillance System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1023--1029}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0171}, doi = {10.1109/TRUSTCOM.2016.0171}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuCZWK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuJL16, author = {Liang Zhu and Hai Jin and Xiaofei Liao}, title = {A Tool to Detect Performance Problems of Multi-threaded Programs on {NUMA} Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1145--1152}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0187}, doi = {10.1109/TRUSTCOM.2016.0187}, timestamp = {Wed, 23 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuLW16, author = {Xiaoyu Zhu and Qin Liu and Guojun Wang}, title = {A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {845--851}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0147}, doi = {10.1109/TRUSTCOM.2016.0147}, timestamp = {Mon, 23 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuPLRF16, author = {Dali Zhu and Na Pang and Gang Li and Wenjing Rong and Zheming Fan}, title = {WiN: Non-invasive Abnormal Activity Detection Leveraging Fine-Grained WiFi Signals}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {744--751}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0134}, doi = {10.1109/TRUSTCOM.2016.0134}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuPLRF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuWXCW16, author = {Hong Zhu and Bin Wu and Meiyi Xie and Zongmin Cui and Zongda Wu}, title = {Secure Shortest Path Search over Encrypted Graph Supporting Synonym Query in Cloud Computing}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {497--504}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0102}, doi = {10.1109/TRUSTCOM.2016.0102}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuWXCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuYJSF16, author = {Dali Zhu and Ying Yang and Hao Jin and Jing Shao and Weimiao Feng}, title = {Application of Modified {BLP} Model on Mobile Web Operating System}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1818--1824}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0279}, doi = {10.1109/TRUSTCOM.2016.0279}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuYJSF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuangMC16, author = {Yu Zhuang and Yu Mao and Xin Chen}, title = {A Limited-Iteration Bisecting K-Means for Fast Clustering Large Datasets}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2257--2262}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0348}, doi = {10.1109/TRUSTCOM.2016.0348}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuangMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZouLLZZX16, author = {Lida Zou and Qingzhong Li and Hui Li and Shidong Zhang and Yongqing Zheng and Zongshui Xiao}, title = {Penalty Cost Minimization for Multi-tenant Query Deadline Employing Cache Optimization and Log Based Dispatching}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1248--1255}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0201}, doi = {10.1109/TRUSTCOM.2016.0201}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZouLLZZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZuoMYSL16, author = {Cong Zuo and James Macindoe and Siyin Yang and Ron Steinfeld and Joseph K. Liu}, title = {Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {113--120}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0053}, doi = {10.1109/TRUSTCOM.2016.0053}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZuoMYSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZuoZ16, author = {Liudong Zuo and Mengxia Michelle Zhu}, title = {Improved Scheduling Algorithms for Single-Path Multiple Bandwidth Reservation Requests}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1692--1699}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0259}, doi = {10.1109/TRUSTCOM.2016.0259}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZuoZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustcom/2016, title = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7845250/proceeding}, isbn = {978-1-5090-3205-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0002GR15, author = {Robert Koch and Mario Golling and Gabi Dreo Rodosek}, title = {Disequilibrium: Tor's Exit Node Selection under the Stereoscope}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {942--949}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.468}, doi = {10.1109/TRUSTCOM.2015.468}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0002GR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0011MD15, author = {Naveen Kumar and Anish Mathuria and Manik Lal Das}, title = {Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1249--1254}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.513}, doi = {10.1109/TRUSTCOM.2015.513}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0011MD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AbrahamN15, author = {Subil Abraham and Suku Nair}, title = {A Novel Architecture for Predictive CyberSecurity Using Non-homogenous Markov Models}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {774--781}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.446}, doi = {10.1109/TRUSTCOM.2015.446}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AbrahamN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AkramMSM15, author = {Raja Naeem Akram and Konstantinos Markantonakis and Damien Sauveron and Keith Mayes}, title = {Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {483--490}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.410}, doi = {10.1109/TRUSTCOM.2015.410}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AkramMSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Al-NemratB15, author = {Ameer Al{-}Nemrat and Chafika Benzaid}, title = {Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1380--1385}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.534}, doi = {10.1109/TRUSTCOM.2015.534}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Al-NemratB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Al-TaharwaLJHWC15, author = {Ismail Adel Al{-}Taharwa and Hahn{-}Ming Lee and Albert B. Jeng and Cheng{-}Seen Ho and Kuo{-}Ping Wu and Shyi{-}Ming Chen}, title = {Drive-by Disclosure: {A} Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {334--343}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.392}, doi = {10.1109/TRUSTCOM.2015.392}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Al-TaharwaLJHWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AldiniSLTG15, author = {Alessandro Aldini and Jean{-}Marc Seigneur and Carlos Ballester Lafuente and Xavier Titi and Jonathan Guislain}, title = {Formal Modeling and Verification of Opportunity-enabled Risk Management}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {676--684}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.434}, doi = {10.1109/TRUSTCOM.2015.434}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AldiniSLTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AldinucciDDKPT15, author = {Marco Aldinucci and Marco Danelutto and Maurizio Drocco and Peter Kilpatrick and Guilherme Peretti Pezzi and Massimo Torquati}, title = {The Loop-of-Stencil-Reduce Paradigm}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 3}, pages = {172--177}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.628}, doi = {10.1109/TRUSTCOM.2015.628}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AldinucciDDKPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlmuhaidebSLAA15, author = {Abdullah Mohammed Almuhaideb and Bala Srinivasan and Phu Dung Le and Mohammed A. Alhabeeb and Waleed Alfehaid}, title = {A Hybrid Mobile Authentication Model for Ubiquitous Networking}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {360--367}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.395}, doi = {10.1109/TRUSTCOM.2015.395}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AlmuhaidebSLAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlneyadiSM15, author = {Sultan Alneyadi and Elankayer Sithirasenan and Vallipuram Muthukkumarasamy}, title = {Detecting Data Semantic: {A} Data Leakage Prevention Approach}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {910--917}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.464}, doi = {10.1109/TRUSTCOM.2015.464}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AlneyadiSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlruhailyBC15, author = {Nada Alruhaily and Behzad Bordbar and Tom Chothia}, title = {Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware Detection}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {766--773}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.445}, doi = {10.1109/TRUSTCOM.2015.445}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AlruhailyBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlzuruLGZL15, author = {Icaro Alzuru and Kevin Long and Bhaskar Gowda and David Zimmerman and Tao Li}, title = {Hadoop Characterization}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 2}, pages = {96--103}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.567}, doi = {10.1109/TRUSTCOM.2015.567}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AlzuruLGZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AmarieDM0F15, author = {Maria Carpen{-}Amarie and Dave Dice and Patrick Marlier and Ga{\"{e}}l Thomas and Pascal Felber}, title = {Evaluating {HTM} for Pauseless Garbage Collectors in Java}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 3}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.606}, doi = {10.1109/TRUSTCOM.2015.606}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AmarieDM0F15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AmbusaidiHN15, author = {Mohammed A. Ambusaidi and Xiangjian He and Priyadarsi Nanda}, title = {Unsupervised Feature Selection Method for Intrusion Detection System}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {295--301}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.387}, doi = {10.1109/TRUSTCOM.2015.387}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AmbusaidiHN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ApvrilleA15, author = {Ludovic Apvrille and Axelle Apvrille}, title = {Identifying Unknown Android Malware with Feature Extractions and Classification Techniques}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {182--189}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.373}, doi = {10.1109/TRUSTCOM.2015.373}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ApvrilleA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ArefT15, author = {Abdullah Aref and Thomas T. Tran}, title = {{RLTE:} {A} Reinforcement Learning Based Trust Establishment Model}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {694--701}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.436}, doi = {10.1109/TRUSTCOM.2015.436}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ArefT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AriasGP15, author = {Jacinto Arias and Jos{\'{e}} A. G{\'{a}}mez and Jos{\'{e}} Miguel Puerta}, title = {Scalable Learning of k-dependence Bayesian Classifiers under MapReduce}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 2}, pages = {25--32}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.558}, doi = {10.1109/TRUSTCOM.2015.558}, timestamp = {Tue, 05 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AriasGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AridhidMN15, author = {Sabeur Aridhi and Laurent d'Orazio and Mondher Maddouri and Engelbert Mephu Nguifo}, title = {Cost Models for Distributed Pattern Mining in the Cloud}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 2}, pages = {112--119}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.569}, doi = {10.1109/TRUSTCOM.2015.569}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AridhidMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ArkkoNNS15, author = {Jari Arkko and Karl Norrman and Mats N{\"{a}}slund and Bengt Sahlin}, title = {A {USIM} Compatible 5G {AKA} Protocol with Perfect Forward Secrecy}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1205--1209}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.506}, doi = {10.1109/TRUSTCOM.2015.506}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ArkkoNNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AsnicarEGGMMSST15, author = {Francesco Asnicar and Luca Erculiani and Francesca Galante and Caterina Gallo and Luca Masera and Paolo Morettin and Nadir Sella and Stanislau Semeniuta and Thomas Tolio and Giulia Malacarne and Kristof Engelen and Andrea Argentini and Valter Cavecchia and Claudio Moser and Enrico Blanzieri}, title = {Discovering Candidates for Gene Network Expansion by Distributed Volunteer Computing}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 3}, pages = {248--253}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.640}, doi = {10.1109/TRUSTCOM.2015.640}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AsnicarEGGMMSST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AuricchioFLMRTV15, author = {Ferdinando Auricchio and Marco Ferretti and Adrien Lefieux and Mirto Musci and Alessandro Reali and Santi Trimarchi and Alessandro Veneziani}, title = {Assessment of a Black-Box Approach for a Parallel Finite Elements Solver in Computational Hemodynamics}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 3}, pages = {202--207}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.633}, doi = {10.1109/TRUSTCOM.2015.633}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AuricchioFLMRTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AvdyushkinR15, author = {Maksim Avdyushkin and Musfiq Rahman}, title = {Secure Location Validation with Wi-Fi Geo-fencing and {NFC}}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {890--896}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.461}, doi = {10.1109/TRUSTCOM.2015.461}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AvdyushkinR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BanFSK15, author = {D{\'{e}}nes B{\'{a}}n and Rudolf Ferenc and Istv{\'{a}}n Siket and {\'{A}}kos Kiss}, title = {Prediction Models for Performance, Power, and Energy Efficiency of Software Executed on Heterogeneous Hardware}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 3}, pages = {178--183}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.629}, doi = {10.1109/TRUSTCOM.2015.629}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BanFSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BanseR15, author = {Christian Banse and Sathyanarayanan Rangarajan}, title = {A Secure Northbound Interface for {SDN} Applications}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {834--839}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.454}, doi = {10.1109/TRUSTCOM.2015.454}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BanseR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BarretoFS15, author = {Luciano Barreto and Joni da Silva Fraga and Frank Siqueira}, title = {Architectural Model and Security Mechanisms for Cloud Federations}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1108--1115}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.490}, doi = {10.1109/TRUSTCOM.2015.490}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BarretoFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BasuNHK15, author = {Anirban Basu and Toru Nakamura and Seira Hidano and Shinsaku Kiyomoto}, title = {k-anonymity: Risks and the Reality}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {983--989}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.473}, doi = {10.1109/TRUSTCOM.2015.473}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BasuNHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BaumgartnerHLF15, author = {Lars Baumg{\"{a}}rtner and Jonas Hochst and Matthias Leinweber and Bernd Freisleben}, title = {How to Misuse {SMTP} over {TLS:} {A} Study of the (In) Security of Email Server Communication}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {287--294}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.386}, doi = {10.1109/TRUSTCOM.2015.386}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BaumgartnerHLF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BelyakovSYV15, author = {Stanislav L. Belyakov and Marina Savelyeva and Jeffrey Yan and Valeriy Vyatkin}, title = {Adaptation of Material Flows in Mechanical Transportation Systems Based on Observation Experience}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 3}, pages = {269--274}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.643}, doi = {10.1109/TRUSTCOM.2015.643}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BelyakovSYV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BenmalekC15, author = {Mourad Benmalek and Yacine Challal}, title = {eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart Grid}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {782--789}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.447}, doi = {10.1109/TRUSTCOM.2015.447}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BenmalekC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BiondiGL15, author = {Fabrizio Biondi and Thomas Given{-}Wilson and Axel Legay}, title = {Attainable Unconditional Security for Shared-Key Cryptosystems}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {159--166}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.370}, doi = {10.1109/TRUSTCOM.2015.370}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BiondiGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BokRPY15, author = {Kyoungsoo Bok and Eunkyung Ryu and Junho Park and Jaesoo Yoo}, title = {An Energy Efficient Congestion Control Scheme for Multimedia Data in Wireless Sensor Networks}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1279--1283}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.518}, doi = {10.1109/TRUSTCOM.2015.518}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BokRPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BolsterM15, author = {Andrew Bolster and Alan Marshall}, title = {Single and Multi-metric Trust Management Frameworks for Use in Underwater Autonomous Networks}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {685--693}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.435}, doi = {10.1109/TRUSTCOM.2015.435}, timestamp = {Fri, 08 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BolsterM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BonnefoiDSAM15, author = {Pierre{-}Fran{\c{c}}ois Bonnefoi and Pierre Dusart and Damien Sauveron and Raja Naeem Akram and Konstantinos Markantonakis}, title = {A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost {RFID} Tags}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {612--620}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.426}, doi = {10.1109/TRUSTCOM.2015.426}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BonnefoiDSAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BonnichsenPK15, author = {Lars Frydendal Bonnichsen and Christian Wilhelm Probst and Sven Karlsson}, title = {Hardware Transactional Memory Optimization Guidelines, Applied to Ordered Maps}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 3}, pages = {124--131}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.621}, doi = {10.1109/TRUSTCOM.2015.621}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BonnichsenPK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BoonkPS15, author = {Martin Boonk and Ronald Petrlic and Christoph Sorge}, title = {Save Our Passwords}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {797--800}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.449}, doi = {10.1109/TRUSTCOM.2015.449}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BoonkPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BouchamiGPG15, author = {Ahmed Bouchami and Elio Goettelmann and Olivier Perrin and Claude Godart}, title = {Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-Platforms}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {864--871}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.458}, doi = {10.1109/TRUSTCOM.2015.458}, timestamp = {Tue, 26 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BouchamiGPG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BouchamiPZ15, author = {Ahmed Bouchami and Olivier Perrin and Ehtesham Zahoor}, title = {Trust-Based Formal Delegation Framework for Enterprise Social Networks}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {127--134}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.366}, doi = {10.1109/TRUSTCOM.2015.366}, timestamp = {Tue, 26 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BouchamiPZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BradburyLJ15, author = {Matthew Bradbury and Matthew Leeke and Arshad Jhumka}, title = {A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {531--538}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.416}, doi = {10.1109/TRUSTCOM.2015.416}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BradburyLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BuzhinskyPV15, author = {Igor Buzhinsky and Cheng Pang and Valeriy Vyatkin}, title = {Formal Modeling of Testing Software for Cyber-Physical Automation Systems}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 3}, pages = {301--306}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.648}, doi = {10.1109/TRUSTCOM.2015.648}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BuzhinskyPV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoXG15, author = {Zigang Cao and Gang Xiong and Li Guo}, title = {MimicHunter: {A} General Passive Network Protocol Mimicry Detection Framework}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {271--278}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.384}, doi = {10.1109/TRUSTCOM.2015.384}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaoXG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChaisiriKN15, author = {Sivadon Chaisiri and Ryan K. L. Ko and Dusit Niyato}, title = {A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {426--433}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.403}, doi = {10.1109/TRUSTCOM.2015.403}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChaisiriKN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChanTTT15, author = {Jose Juan Mijares Chan and Parimala Thulasiraman and Gabriel Thomas and Ruppa K. Thulasiram}, title = {Stationarity Enforcement of Accelerator Based {TRNG} by Genetic Algorithm}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1122--1128}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.492}, doi = {10.1109/TRUSTCOM.2015.492}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChanTTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenHF15, author = {Hongsong Chen and Zhi Han and Zhongchuan Fu}, title = {Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1272--1278}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.517}, doi = {10.1109/TRUSTCOM.2015.517}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenHF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenHYYPZL15, author = {Zhenxiang Chen and Hongbo Han and Qiben Yan and Bo Yang and Lizhi Peng and Lei Zhang and Jin Li}, title = {A First Look at Android Malware Traffic in First Few Minutes}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {206--213}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.376}, doi = {10.1109/TRUSTCOM.2015.376}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenHYYPZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenJWY15, author = {Zuo Chen and Mengyuan Jia and Yan Wang and Xiaolong Yan}, title = {A Security Topology Protocol of Wireless Sensor Networks Based on Community Detection and Energy Aware}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1284--1291}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.519}, doi = {10.1109/TRUSTCOM.2015.519}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenJWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenLJW15, author = {Yen{-}Lin Chen and Hahn{-}Ming Lee and Albert B. Jeng and Te{-}En Wei}, title = {DroidCIA: {A} Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1014--1021}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.477}, doi = {10.1109/TRUSTCOM.2015.477}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenLJW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenLLJ15, author = {Zuo Chen and Xue Li and Bin Lv and Mengyuan Jia}, title = {A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Particle Swarm Optimization and Cuckoo Search}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1298--1305}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.521}, doi = {10.1109/TRUSTCOM.2015.521}, timestamp = {Wed, 16 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenLLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenMSS15, author = {Jiageng Chen and Atsuko Miyaji and Hiroyuki Sato and Chunhua Su}, title = {Improved Lightweight Pseudo-Random Number Generators for the Low-Cost {RFID} Tags}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {17--24}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.352}, doi = {10.1109/TRUSTCOM.2015.352}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenMSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenPDYZ15, author = {Jing Chen and Yuling Peng and Ruiying Du and Quan Yuan and Minghui Zheng}, title = {Regenerating-Codes-Based Efficient Remote Data Checking and Repairing in Cloud Storage}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {143--150}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.368}, doi = {10.1109/TRUSTCOM.2015.368}, timestamp = {Mon, 10 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenPDYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenTC15, author = {Jun{-}Horng Chen and I{-}Lin Tang and Chun{-}Hsuan Chang}, title = {Enhancing the Detection Rate of Inclined Faces}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 2}, pages = {143--146}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.573}, doi = {10.1109/TRUSTCOM.2015.573}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenTC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CherrueauDS15, author = {Ronan{-}Alexandre Cherrueau and R{\'{e}}mi Douence and Mario S{\"{u}}dholt}, title = {A Language for the Composition of Privacy-Enforcement Techniques}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1037--1044}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.480}, doi = {10.1109/TRUSTCOM.2015.480}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CherrueauDS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChibaYAAHG15, author = {Daiki Chiba and Takeshi Yagi and Mitsuaki Akiyama and Kazufumi Aoki and Takeo Hariu and Shigeki Goto}, title = {BotProfiler: Profiling Variability of Substrings in {HTTP} Requests to Detect Malware-Infected Hosts}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {758--765}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.444}, doi = {10.1109/TRUSTCOM.2015.444}, timestamp = {Thu, 16 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChibaYAAHG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChivilikhinSV15, author = {Daniil Chivilikhin and Anatoly Shalyto and Valeriy Vyatkin}, title = {Inferring Automata Logic from Manual Control Scenarios: Implementation in Function Blocks}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 3}, pages = {307--312}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.649}, doi = {10.1109/TRUSTCOM.2015.649}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChivilikhinSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Classen0VHBM15, author = {Jiska Classen and Johannes Braun and Florian Volk and Matthias Hollick and Johannes Buchmann and Max M{\"{u}}hlh{\"{a}}user}, title = {A Distributed Reputation System for Certification Authority Trust Management}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1349--1356}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.529}, doi = {10.1109/TRUSTCOM.2015.529}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Classen0VHBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CoetzeeJ15, author = {Peter Coetzee and Stephen A. Jarvis}, title = {Goal-Based Analytic Composition for On-and Off-line Execution at Scale}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 2}, pages = {56--65}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.562}, doi = {10.1109/TRUSTCOM.2015.562}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CoetzeeJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CzarneckiR15, author = {Wojciech Marian Czarnecki and Krzysztof Rataj}, title = {Compounds Activity Prediction in Large Imbalanced Datasets with Substructural Relations Fingerprint and {EEM}}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 2}, pages = {192}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.581}, doi = {10.1109/TRUSTCOM.2015.581}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CzarneckiR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DaberdakuF15, author = {Sebastian Daberdaku and Carlo Ferrari}, title = {Parallel Computation of Voxelized Macromolecular Surfaces by Spatial Slicing}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 3}, pages = {184--189}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.630}, doi = {10.1109/TRUSTCOM.2015.630}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DaberdakuF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DaneluttoMMT15, author = {Marco Danelutto and Tiziano De Matteis and Gabriele Mencagli and Massimo Torquati}, title = {Parallelizing High-Frequency Trading Applications by Using {C++11} Attributes}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 3}, pages = {140--147}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.623}, doi = {10.1109/TRUSTCOM.2015.623}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DaneluttoMMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DangHN15, author = {Thanh Dat Dang and Doan B. Hoang and Priyadarsi Nanda}, title = {Data Mobility Management Model for Active Data Cubes}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {750--757}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.443}, doi = {10.1109/TRUSTCOM.2015.443}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DangHN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DelamoreK15, author = {Baden Delamore and Ryan K. L. Ko}, title = {A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1129--1135}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.493}, doi = {10.1109/TRUSTCOM.2015.493}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DelamoreK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuB15, author = {Chaohui Du and Guoqiang Bai}, title = {A Family of Scalable Polynomial Multiplier Architectures for Lattice-Based Cryptography}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {392--399}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.399}, doi = {10.1109/TRUSTCOM.2015.399}, timestamp = {Sat, 03 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DuB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuBC15, author = {Chaohui Du and Guoqiang Bai and Hongyi Chen}, title = {Towards Efficient Implementation of Lattice-Based Public-Key Encryption on Modern CPUs}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1230--1236}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.510}, doi = {10.1109/TRUSTCOM.2015.510}, timestamp = {Sat, 03 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DuBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DubininVH15, author = {Victor Dubinin and Valeriy Vyatkin and Hans{-}Michael Hanisch}, title = {Synthesis of Safety Controllers for Distributed Automation Systems on the Basis of Reverse Safe Net Condition/Event Systems}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 3}, pages = {287--292}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.646}, doi = {10.1109/TRUSTCOM.2015.646}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DubininVH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DubrovaNS15, author = {Elena Dubrova and Mats N{\"{a}}slund and G{\"{o}}ran Selander}, title = {CRC-Based Message Authentication for 5G Mobile Technology}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1186--1191}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.503}, doi = {10.1109/TRUSTCOM.2015.503}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DubrovaNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuncanW15, author = {Bob Duncan and Mark Whittington}, title = {Enhancing Cloud Security and Privacy: Broadening the Service Level Agreement}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1088--1093}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.487}, doi = {10.1109/TRUSTCOM.2015.487}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DuncanW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/El-SerngawyT15, author = {Mohamed Ali El{-}Serngawy and Chamseddine Talhi}, title = {CaptureMe: Attacking the User Credential in Mobile Banking Applications}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {924--933}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.466}, doi = {10.1109/TRUSTCOM.2015.466}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/El-SerngawyT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/EmuraPW15, author = {Keita Emura and Le Trieu Phong and Yohei Watanabe}, title = {Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {167--174}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.371}, doi = {10.1109/TRUSTCOM.2015.371}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/EmuraPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/EricksonKNS15, author = {Alejandro Erickson and Abbas Eslami Kiasari and Javier Navaridas and Iain A. Stewart}, title = {Routing Algorithms for Recursively-Defined Data Centre Networks}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 3}, pages = {84--91}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.616}, doi = {10.1109/TRUSTCOM.2015.616}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/EricksonKNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Estivill-Castro15, author = {Vladimir Estivill{-}Castro and David F. Nettleton}, title = {Can On-line Social Network Users Trust That What They Designated as Confidential Data Remains So?}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {966--973}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.471}, doi = {10.1109/TRUSTCOM.2015.471}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Estivill-Castro15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/EtaherWA15, author = {Najla Etaher and George R. S. Weir and Mamoun Alazab}, title = {From ZeuS to Zitmo: Trends in Banking Malware}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1386--1391}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.535}, doi = {10.1109/TRUSTCOM.2015.535}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/EtaherWA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/EzzeddineA15, author = {Mazen Ezzeddine and Haitham Akkary}, title = {Issues in Trustworthy Software Systems}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1142--1147}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.495}, doi = {10.1109/TRUSTCOM.2015.495}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/EzzeddineA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FanGDLY15, author = {Kai Fan and Yuanyuan Gong and Zhao Du and Hui Li and Yintang Yang}, title = {{RFID} Secure Application Revocation for IoT in 5G}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {175--181}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.372}, doi = {10.1109/TRUSTCOM.2015.372}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FanGDLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FanHZWS15, author = {Wei Fan and Wei{-}qing Huang and Zhujun Zhang and Ye Wang and Degang Sun}, title = {A Near Field Communication(NFC) Security Model Based on {OSI} Reference Model}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1324--1328}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.525}, doi = {10.1109/TRUSTCOM.2015.525}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FanHZWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FarooqIVI15, author = {Ali Farooq and Johanna Isoaho and Seppo Virtanen and Jouni Isoaho}, title = {Information Security Awareness in Educational Institution: An Analysis of Students' Individual Factors}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {352--359}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.394}, doi = {10.1109/TRUSTCOM.2015.394}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FarooqIVI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FarrashW15, author = {Majed Farrash and Wenjia Wang}, title = {An Algorithm for Identifying the Learning Patterns in Big Data}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 2}, pages = {48--55}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.561}, doi = {10.1109/TRUSTCOM.2015.561}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FarrashW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FengHLXY15, author = {Jing Feng and Xin Huang and Yulin Lu and Ruiyang Xu and Zheng Yan}, title = {A Study of {IEEE} 802.15.6 Association Protocols}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {848--855}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.456}, doi = {10.1109/TRUSTCOM.2015.456}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FengHLXY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FigueredoWGA15, author = {Grazziela P. Figueredo and Christian Wagner and Jonathan M. Garibaldi and Uwe Aickelin}, title = {Adaptive Data Communication Interface: {A} User-Centric Visual Data Interpretation Framework}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 2}, pages = {128--135}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.571}, doi = {10.1109/TRUSTCOM.2015.571}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FigueredoWGA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FlourisGGD15, author = {Ioannis Flouris and Nikos Giatrakos and Minos N. Garofalakis and Antonios Deligiannakis}, title = {Issues in Complex Event Processing Systems}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 2}, pages = {241--246}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.590}, doi = {10.1109/TRUSTCOM.2015.590}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FlourisGGD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FuZL15, author = {Jianming Fu and Xu Zhang and Yan Lin}, title = {An Instruction-Set Randomization Using Length-Preserving Permutation}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {376--383}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.397}, doi = {10.1109/TRUSTCOM.2015.397}, timestamp = {Thu, 17 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FuZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GhoorchianRG15, author = {Kambiz Ghoorchian and Fatemeh Rahimian and Sarunas Girdzijauskas}, title = {Semi-Supervised Multiple Disambiguation}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 2}, pages = {88--95}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.566}, doi = {10.1109/TRUSTCOM.2015.566}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GhoorchianRG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GimenoMPQ15, author = {Adri{\'{a}}n Castell{\'{o}} and Rafael Mayo and Judit Planas and Enrique S. Quintana{-}Ort{\'{\i}}}, title = {Exploiting Task-Parallelism on {GPU} Clusters via OmpSs and rCUDA Virtualization}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 3}, pages = {160--165}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.626}, doi = {10.1109/TRUSTCOM.2015.626}, timestamp = {Mon, 02 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GimenoMPQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GoncalvesBC15, author = {Daniel Gon{\c{c}}alves and Joao Bota and Miguel Correia}, title = {Big Data Analytics for Detecting Host Misbehavior in Large Logs}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {238--245}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.380}, doi = {10.1109/TRUSTCOM.2015.380}, timestamp = {Tue, 12 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GoncalvesBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Gonzalez-Manzano15, author = {Lorena Gonz{\'{a}}lez{-}Manzano and Jos{\'{e}} Mar{\'{\i}}a de Fuentes and Agust{\'{\i}}n Orfila}, title = {Access Control for the Cloud Based on Multi-device Authentication}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {856--863}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.457}, doi = {10.1109/TRUSTCOM.2015.457}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Gonzalez-Manzano15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GornerupDH15, author = {Olof G{\"{o}}rnerup and Nima Dokoohaki and Andrea Hess}, title = {Privacy-Preserving Mining of Frequent Routes in Cellular Network Data}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {581--587}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.422}, doi = {10.1109/TRUSTCOM.2015.422}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GornerupDH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuenaneLS15, author = {Fouad Amine Guenane and Michele Nogueira Lima and Ahmed Serhrouchni}, title = {{DDOS} Mitigation Cloud-Based Service}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1363--1368}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.531}, doi = {10.1109/TRUSTCOM.2015.531}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GuenaneLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuriPSE15, author = {Mordechai Guri and Yuri Poliak and Bracha Shapira and Yuval Elovici}, title = {JoKER: Trusted Detection of Kernel Rootkits in Android Devices via {JTAG} Interface}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {65--73}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.358}, doi = {10.1109/TRUSTCOM.2015.358}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GuriPSE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GurumdimmaJLCB15, author = {Nentawe Gurumdimma and Arshad Jhumka and Maria Liakata and Edward Chuah and James C. Browne}, title = {Towards Increasing the Error Handling Time Window in Large-Scale Distributed Systems Using Console and Resource Usage Logs}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 3}, pages = {61--68}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.613}, doi = {10.1109/TRUSTCOM.2015.613}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GurumdimmaJLCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HameedJS15, author = {Sufian Hameed and Usman Murad Jamali and Adnan Samad}, title = {Integrity Protection of {NDEF} Message with Flexible and Enhanced {NFC} Signature Records}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {368--375}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.396}, doi = {10.1109/TRUSTCOM.2015.396}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HameedJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Hamid15, author = {Brahim Hamid}, title = {Interplay of Security{\&}Dependability and Resource Using Model-Driven and Pattern-Based Development}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {254--262}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.382}, doi = {10.1109/TRUSTCOM.2015.382}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Hamid15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.